• 제목/요약/키워드: Computers

검색결과 3,692건 처리시간 0.038초

Computer를 이용한 여자저고리 모형의 GRADING 및 자동제도 (A study on the Automatic Drafting for Jogori pattern and Grading by using Computer)

  • 염영란;조효순
    • 복식
    • /
    • 제18권
    • /
    • pp.307-319
    • /
    • 1992
  • The Purpose of this study Gerber company AM-300 system of the automatic system of Producing the original form the automatic system of Producing the original form of "Jogori(a Korean Jacket)' and Grading by the usage of computers and find out its efficiency. In the result, the auther has found out the following facts and became confident on the facts; The AM-300 program of the automatic system enabled to produce the original form of 'Jogori' and Grading fitting in a short time and definately, and which indicated that the automatically producing system of the original form of 'Jorgori' and Granding is efficient. Even in the aspect of education, it has been acknowledged that there is necessity of using computers, the accumulation of techincs and technology based on traditions by cultivating professional designers, and computerization so that the composition of 'Hanbok' (Korean clothes) should be rational and scientific. In addition, advertisement and education on the traditionalism and superiority of 'Hanblk' are indispensable and absolutely necessary. Also, to succeed folk costumes rightly, the usage of computers is thought to be a way to effectiveness. So far in the study, only the automatic system of producing the original form of 'Jogori' and Grading through computers is emphasized on, however in the future, such an automatic system should be continuously supplemented, studied on and developed even in other various fields such as in pattern making, design, products planning, etc..

  • PDF

Technology Requirements for Wearable User Interface

  • Cho, Il-Yeon
    • 대한인간공학회지
    • /
    • 제34권5호
    • /
    • pp.531-540
    • /
    • 2015
  • Objective: The objective of this research is to investigate the fundamentals of human computer interaction for wearable computers and derive technology requirements. Background: A wearable computer can be worn anytime with the support of unrestricted communications and a variety of services which provide maximum capability of information use. Key challenges in developing such wearable computers are the level of comfort that users do not feel what they wear, and easy and intuitive user interface. The research presented in this paper examines user interfaces for wearable computers. Method: In this research, we have classified the wearable user interface technologies and analyzed the advantages and disadvantages from the user's point of view. Based on this analysis, we issued a user interface technology to conduct research and development for commercialization. Results: Technology requirements are drawn to make wearable computers commercialized. Conclusion: The user interface technology for wearable system must start from the understanding of the ergonomic aspects of the end user, because users wear the system on their body. Developers do not try to develop a state-of-the-art technology without the requirement analysis of the end users. If people do not use the technology, it can't survive in the market. Currently, there is no dominant wearable user interface in the world. So, this area might try a new challenge for the technology beyond the traditional interface paradigm through various approaches and attempts. Application: The findings in this study are expected to be used for designing user interface for wearable systems, such as digital clothes and fashion apparel.

Multi-Screen Virtual Reality System : VROOM - Hi-Resolution and four-screen Stereo Image Projection System -

  • NAKAJIMA, Masayuki;TAKAHASHI, Hiroki
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 1997년도 Proceedings International Workshop on New Video Media Technology
    • /
    • pp.95-100
    • /
    • 1997
  • In this paper, we report a system specifications of Hi-resolution and four-screen stereo image projection system which was established in VBL(Venture Business Laboratory) at Tokyo Institute of Technology on 3rd July 1996. The system is 3m $\times$ 3m $\times$2.2m rectangular parallelepiped composed of three 150inch side screens and floor. Host computers can generate virtual environment s in real-time and four projecters project these images to the screens. Viewers are, therefore, surrounded by these screens and an illusion of immersion can be created. Because, the views of users are completely covered with the projection images and many kinds of interactive devices can be used in this system. Moreover, many users can have experience the virtual environments at the same time. Usually, this kind of system uses hi-performance graphics workstations for host computers. One is SGI(Silicon Graphics, Inc.) Onyx with 3 Reality Engines. The other system is 4 personal computers. Because hi-performance and low price graphics accelerators for personal computer have been developed in these years, the abilities of VR(Virtual Reality) systems based on personal computers should be investigated.

  • PDF

CAI(Computer Assisted Instruction) 프로그램이 컴퓨터와 과학교과에 대한 학습자의 태도에 미치는 영향 (The Influence of CAI(Computer-Assisted Instruction)Programs On Learner's Attitudes toward Computer and Science)

  • 정진우
    • 한국과학교육학회지
    • /
    • 제12권1호
    • /
    • pp.47-60
    • /
    • 1992
  • The purpose of this study was to investigate studesnts' attitudes toward computers and science subject using CAI(Computer-Assisted Instruction) as an instructional strategy in the elementary school level of science and computer literacy course. The influence of CAI programs on learner's attitudes toward computers and science varied according to the variables of,(l)sex (2)experience by computer learning, (3)learner's attitudes toward computers and science. Eighty nine samples were divided into the two groups.One group(48 studesnts)which is in the experimental group took a science instruction using CAI programs and computer literacy course, another group which is in the control group took only a science instruction using CAI programs. Data were collected and compared the experimental group with the control group. The results indicate as follows:(l) studesnts took science instruction using the CAI programs appeared a positive attitudes toward science. (2) the science attitudes of science instruction using the CAI programs was more effective in the lower group than in the upper group. (3) computer literacy course produced the positive attitude toward computers regardless of the experience by computer learning. (4) students using CAI programs with computer literacy course were more effective than students using CAI program only. (5) science instruction using the CAI programs was not found a meaningful difference by sex.

  • PDF

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

Upcycling strategies for waste electronic and electrical equipment based on material flow analysis

  • Yi, Sora;Lee, Hisun;Lee, Jeongmin;Kim, Woong
    • Environmental Engineering Research
    • /
    • 제24권1호
    • /
    • pp.74-81
    • /
    • 2019
  • Upcycling generally refers to the conversion of waste materials to something useful or valuable and is a useful concept that can be applied not only to the waste design industry but also to waste recycling and resource circulation. Our study highlights upcycling as the key concept for improving the value of waste by redefining the concept as "the recycling of waste materials and discarded products in ways that enhance their value." Four upcycling strategies are linked to material flow analyses conducted on waste electronic and electrical equipment, specifically waste refrigerators and waste computers, to examine the technologies available for implementation and suggest guidelines for the promotion of upcycling. The amount of waste refrigerators collected by the formal sector was 121,642 tons/y and the informal sector, 63,823 tons/y. The current recycling ratio of waste refrigerators was estimated as 88.53%. A total of 7,585 tons/y of waste computers were collected by the formal sector and 3,807 tons/y by the informal sector after discharge. Meanwhile, the current recycling ratio of waste computers was estimated as 77.43%. We found that it is possible to introduce 28 upcycling technologies in the case of refrigerators, and 15 technologies are available to promote upcycling in the case of computers. By refining the broad concept of upcycling and looking at the stages of material flow, our approach presents universally applicable directions for incorporating upcycling in resource recovery and recirculation plans.

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.184-191
    • /
    • 2021
  • The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

IOT Intelligent Watering Sensor For Indoor Plant

  • Hana, Mujlid;Haneen Daifallah, Alghamdi;Hind Abdulaziz, Alkharashi;Marah Awadh, Alkhaldi
    • International Journal of Computer Science & Network Security
    • /
    • 제22권12호
    • /
    • pp.171-177
    • /
    • 2022
  • The number of people who own indoor plants is growing today, but as a result of their busy lifestyles-such as work or travel-as well as a lack of enthusiasm in caring for their plants, their plants wither. The use of an irrigation control system with a surveillance camera can assist such folks in taking care of their plants. Such a device can assist in remotely watering plants at predetermined times and checking on the health of the plants. The proprietors would be able to live comfortably without feeling bad thanks to this change. Internet access is required for this technology in order to monitor the plants and control the watering through apps. A sensor is installed in the soil to monitor soil humidity and send data to the microcontroller for irrigation, allowing the owner to schedule irrigation as they see fit and keep an eye on their plants all day. With the use of a remote irrigation control system, the plants will grow properly and be irrigated with the proper amount of water, and the owners will be so glad and delighted to watch their plants. Knowing the time and quantity of water are vital parts of the plant growth.

Predicting Brain Tumor Using Transfer Learning

  • Mustafa Abdul Salam;Sanaa Taha;Sameh Alahmady;Alwan Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.73-88
    • /
    • 2023
  • Brain tumors can also be an abnormal collection or accumulation of cells in the brain that can be life-threatening due to their ability to invade and metastasize to nearby tissues. Accurate diagnosis is critical to the success of treatment planning, and resonant imaging is the primary diagnostic imaging method used to diagnose brain tumors and their extent. Deep learning methods for computer vision applications have shown significant improvements in recent years, primarily due to the undeniable fact that there is a large amount of data on the market to teach models. Therefore, improvements within the model architecture perform better approximations in the monitored configuration. Tumor classification using these deep learning techniques has made great strides by providing reliable, annotated open data sets. Reduce computational effort and learn specific spatial and temporal relationships. This white paper describes transfer models such as the MobileNet model, VGG19 model, InceptionResNetV2 model, Inception model, and DenseNet201 model. The model uses three different optimizers, Adam, SGD, and RMSprop. Finally, the pre-trained MobileNet with RMSprop optimizer is the best model in this paper, with 0.995 accuracies, 0.99 sensitivity, and 1.00 specificity, while at the same time having the lowest computational cost.

PISA 2009에서 ICT 활용능력과 학습목적 컴퓨터 사용 영향요인에 대한 다층분석 (Multi-level Analysis on the Using ICT Ability and Using Computers for Learning through PISA 2009 Data)

  • 허균
    • 컴퓨터교육학회논문지
    • /
    • 제16권1호
    • /
    • pp.51-61
    • /
    • 2013
  • 본 연구는 ICT 활용능력과 학습목적 컴퓨터 사용영향 요인을 파악하기 위해 PISA 2009 한국자료 141개 학교의 학생 4,298명을 대상으로 다층분석을 실시하였다. 연구의 결과로 첫째, ICT 활용능력은 여학생, 사회경제문화적지위, 온라인 자료읽기, 컴퓨터 태도 하위항목의 중요성과 관심은 정적으로 유의하였고, 재미 및 시간왜곡은 부적으로 유의하였다. 학교수준에서는 사회경제문화적지위만이 유의하였다. 둘째, 가정에서 학습목적의 컴퓨터 사용은 ICT 활용능력의 학생수준 영향변인들의 결과와 같았으나 컴퓨터 태도 하위항목의 중요성은 유의하지 않았다. 학교수준에서는 사회경제문화적지위가 정적 영향, 지역규모는 부적 영향을 나타내었다. 셋째, 학교에서 학습목적 컴퓨터 사용은 성별 차이가 없었고, 온라인자료읽기는 정적 영향, 재미와 시간왜곡은 부적인 영향을 주었다. 학교수준에서는 사회경제문화적지위와 컴퓨터 비율은 정적 영향, 지역규모와 학생-교사비율은 부적 영향을 주었다. 연구결과는 다층적 접근을 통해 개인차와 학교 간 차이를 고려한 정보교육 정책이 이뤄져야 함을 시사한다.

  • PDF