• Title/Summary/Keyword: Computer Keyboard key

Search Result 20, Processing Time 0.026 seconds

The Effect on the Tension Trapezius Muscle of the Height Keyboard Computer (작업대 높이가 승모근의 근긴장도에 미치는 영향)

  • An, Chang-Sik;An, Yun-Hee;Lee, Myeong-Hee
    • The Journal of Korean Physical Therapy
    • /
    • v.18 no.6
    • /
    • pp.67-75
    • /
    • 2006
  • Purpose: Many kinds of musculoskeletal disease and symptom are caused by the longtime computer works. However, trapezius muscle tonus has not been established in regarding to keyboard height during typing. Therefore, this study is to evaluate the relationship between trapezius muscle tonus and the height of keyboard while typing, controling for the postures of neck, Lumbar, cervical vertebra. Methods: The experimental height of keyboard was set at elbow height, 3cm higher, 6cm higher, 9cm higher, than elbow. We studied trapezius tonus with the mean value for 2 minutes by EMG in 15 males and 15 females worker of hospital in seoul, who did not have a history of muscle disease, neurological signs, nerve damage. Results: In this experimental, as the height of the keyboard went up, the trapezius tonus significantly increased with shoulder abduction of brachium. Second, right and left trapezius tonus appeared similar while typing. Third, the best height that release the trapezius tonus the was as high as elbow and 3cm higher than elbow. Conclusion: With these above results, we suggest that the appropriate height of keyboard during typing to release the trapezius tonus most is the height of the elbow and 3cm higher than elbow. The study has important implications for focusing on the height of VDT worktable and complaining of a pain by oneself which are useful to establish a method of prevention of musculoskeletal disorder in work in the future.

  • PDF

Improvement of computer keyboard design through behavioral analysis (Focused on the characteristics of Korean Alphabet and its use) (사용행태 분석에 의한 컴퓨터 키보드 디자인 개선 -한글의 특성 및 사용행태를 중심으로-)

  • 변재형
    • Archives of design research
    • /
    • v.15 no.3
    • /
    • pp.241-248
    • /
    • 2002
  • Researches of Hangul automation have been focused mainly on the set of character system. But, practical problem of using the Korean standard keyboard system of two sets is increment of errors and fatigue due to frequent use of shift keys. The author formulate a hypothesis as follows to solve the problem. 'Changing location and design of shift keys can reduce errors in typing Korean by avoiding interferences with other keys when pressing shift keys.' This study verify the hypothesis by the analysis of experiments using improved keyboard prototypes which have changed layout and design of shift keys. On the result, change of shift key location causes confusion to experienced user. But, while keeping its location, removing other keys at the bottom row and magnifying size of shift keys decrease errors in typing by avoiding interferences. And, the efficiency of typing in Korean is increased, too, because there is not any influence on typing speed. This study focuses on layout and design of shift keys only, but further study for entire layout of keyboard including alternative location of other function keys is needed to improve general usability.

  • PDF

Key Strike Forces and Their Relation to High Level of Musculoskeletal Symptoms

  • Levanon, Yafa;Gefen, Amit;Lerman, Yehuda;Portnoy, Sigal;Ratzon, Navah Z.
    • Safety and Health at Work
    • /
    • v.7 no.4
    • /
    • pp.347-353
    • /
    • 2016
  • Background: This study aimed to investigate the relation between key strike forces and musculoskeletal symptoms (MSS). Moreover, this study presents a key strike force measurement method to be used in a workplace setting. The correlation between key strike force characteristics and MSS was previously studied, but the measurement methods used either a single-key switch or force platforms applied under the keyboard. Most of the studies were conducted in a laboratory setting. The uniqueness of measurement methods in the current study is their ability to measure forces applied to a specific key in a workplace setting and to provide more information about specific key strike forces during typing. Methods: Twenty-four healthy computer workers were recruited for the study. The demographic questionnaire, and self-reported questionnaires for psychosocial status (General Nordic Questionnaire for Psychological and Social Factors at Work) and for detecting MSS were filled up, which later helped in dividing the participants into two groups (12 participants with pain and 12 without pain). Participants typed a predetermined text that utilized the instrumented keys multiple times. The dynamic forces applied to the keys were recorded and collected, using four thin and flexible force sensors attached to the preselected keys according to their location. Results: The results demonstrated that participants with high levels of MSS, specifically in the back and neck, in the last year exerted significantly higher key strike forces than those with lower levels of symptoms (p < 0.005). Conclusion: The key strike force exerted while typing on a keyboard may be a risk factor for MSS, and should therefore be considered in ergonomic evaluations and interventional programs.

The Method of Soft Key Using for efficient Hangul Word on Standard Keypad (표준 키패드에서 효율적인 한글 단어 작성을 위한 소프트 키 사용 방법)

  • Kim, Hyun-Woo;Kim, Jun-Ho;Song, Eun-Ha;Jeong, Young-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1764-1766
    • /
    • 2012
  • 현재 스마트폰의 급격한 대중화가 이루어짐에 따라, 터치스크린에서 한글을 효율적으로 입력하는 방법의 연구가 활발히 진행되고 있다. 하지만, 많은 터치스크린 한글 키패드가 만들어졌음에도 불구하고, 사용자가 습득하는데 시간이 오래 걸리며 오타가 빈번하게 나타나고 있다. 따라서 본 논문에서는 한글 키패드의 표준인 '천지인'의 장점인 사용자 습득율을 최대화하고, 단점인 자음의 멀티탭(반복누름)방식으로 인한 오타발생 빈도율을 스마트폰의 터치 슬라이드방식을 이용하여 최소화한 SC-Keyboard를 제안하고자 한다.

Robot Gesture Reconition System based on PCA algorithm (PCA 알고리즘 기반의 로봇 제스처 인식 시스템)

  • Youk, Yui-Su;Kim, Seung-Young;Kim, Sung-Ho
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.400-402
    • /
    • 2008
  • The human-computer interaction technology (HCI) that has played an important role in the exchange of information between human being and computer belongs to a key field for information technology. Recently, control studies through which robots and control devices are controlled by using the movements of a person's body or hands without using conventional input devices such as keyboard and mouse, have been going only in diverse aspects, and their importance has been steadily increasing. This study is proposing a recognition method of user's gestures by applying measurements from an acceleration sensor to the PCA algorithm.

  • PDF

TG-SPSR: A Systematic Targeted Password Attacking Model

  • Zhang, Mengli;Zhang, Qihui;Liu, Wenfen;Hu, Xuexian;Wei, Jianghong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2674-2697
    • /
    • 2019
  • Identity authentication is a crucial line of defense for network security, and passwords are still the mainstream of identity authentication. So far trawling password attacking has been extensively studied, but the research related with personal information is always sporadic. Probabilistic context-free grammar (PCFG) and Markov chain-based models perform greatly well in trawling guessing. In this paper we propose a systematic targeted attacking model based on structure partition and string reorganization by migrating the above two models to targeted attacking, denoted as TG-SPSR. In structure partition phase, besides dividing passwords to basic structure similar to PCFG, we additionally define a trajectory-based keyboard pattern in the basic grammar and introduce index bits to accurately characterize the position of special characters. Moreover, we also construct a BiLSTM recurrent neural network classifier to characterize the behavior of password reuse and modification after defining nine kinds of modification rules. Extensive experimental results indicate that in online attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 275%, and respectively outperforms its foremost counterparts, Personal-PCFG, TarGuess-I, by about 70% and 19%; In offline attacking, TG-SPSR outperforms traditional trawling attacking algorithms by average about 90%, outperforms Personal-PCFG and TarGuess-I by 85% and 30%, respectively.

Design of an Improved On-line Neural Network with Circulating Layer Connections (순환하는 레이어 연결을 갖는 개선된 On-line 신경회로망의 설계)

  • Yeo, Seong-Won;Lee, Chong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2293-2295
    • /
    • 1998
  • In this paper, an improved on-line neural network model is suggested. This neural network is designed to store and recall sequence of key strokes in on-line. The network stores incoming patterns as weight connections between series of layers. The layer has a 2-dimensionally distributed neurons where the location of neurons are relevant to the actual location of computer keyboard. To store longer patterns, the network has circulating layer connections and different patterns can be superposed on the same layer. Also, when the patterns are stored over the layers, the starting layer is not fixed but changed by the characteristics of Patterns to increases network capability. The ways how to choose the starting layer during the store and recall process are investigated.

  • PDF

The Study on the improvement plan for Military combat power by the future computer (미래형컴퓨터를 이용한 군전투력 발전방안 연구)

  • Heo, Yeong Dae
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.57-66
    • /
    • 2013
  • Predicting pattern of future combat ensures a successful war. It is possible to anticipate the shape of the future combat from the fighting method of US Army in the Iraq War. The fighting method: a series of combat progress by real time information to pinpoint strike using a guided weapon by GPS, an intelligence satellite and unmanned surveillance vehicle (USV), shows that real time unification combat power is key element for decide outcome of a war. The NCW is an organically connected network centric warfare paradigm by networking a factor of operation. In this paper, studied on the improvement plan for combat power by the future computer like a portable computer, an audio-recognized computer and non-keyboard computer. In addition, this paper attempts to establish a comprehensive intelligence network of Korea Marine Corps and to apply to combat or training.

Trend of hand dimensions for Koreans and Comparison with foreigners' data (한국인 손 치수의 추세 변동 및 외국 자료와의 비교)

  • Kee, Do-Hyung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.36 no.3
    • /
    • pp.146-153
    • /
    • 2010
  • The purposes of this are (1) to present representative five hand dimensions by measurement year, (2) to investigate hand characteristics based on relative ratios of varying hand dimensions and (3) to compare Korean hand dimensions to other countries' data. Comparing to those of 1979, statures of 2004 increased by 3.0~3.5%, while males' hand dimensions of hand length, medius finger length, hand circumference, hand breadth and hand thickness decreased by 2.0~5.0%. Ratios of hand dimensions to those of medius finger were not significantly different depending upon age group and gender, but were significantly different depending upon races of Korean and American. Hand lengths of Koreans were shorter by about 4.0% than those of Japanese irrespective of gender, while the other compared dimensions for Koreans were larger than those of Japanese. Hand dimensions used in this study of Koreans were generally smaller that those of Americans. It is recommended from this study that when designing hand relevant things including glove, computer keyboard, smart phone key pad, etc., the different hand characteristics found in this study be fully reflected to develop competitive products.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.