• Title/Summary/Keyword: Context Awareness Information

Search Result 548, Processing Time 0.025 seconds

Tactile Sensing for Virtual Interaction as a Part of Ubiquitous Game Development (유비쿼터스게임의 상호작용 구성요소 개발을 위한 촉각응용)

  • Lee, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1062-1068
    • /
    • 2007
  • In order to design and develop a ubiquitous game, it is necessary to develop a natural and flexible interface between the real world and the virtual world, based on social and physical context awareness. We design user interface model and the tactile sensing system that performs virtual interaction and collection of the sensor data. It is sensitive so the collected data should be filtered, rearranged and analyzed. This information is quite different from stylus input, keyboard, button or mouse for interaction. We detect kicked 3D force position of a ball, moment of area, moment of inertia and modified ball shape using tactile sensing system and analyzed data. The results demonstrate that the proposed approach is desirable and robust as well as the results can be used realistic actions and reactions considering attack force and to make interesting environments for ubiquitous game.

Analysis of Dental Hygienist Job Recognition Using Text Mining

  • Kim, Bo-Ra;Ahn, Eunsuk;Hwang, Soo-Jeong;Jeong, Soon-Jeong;Kim, Sun-Mi;Han, Ji-Hyoung
    • Journal of dental hygiene science
    • /
    • v.21 no.1
    • /
    • pp.70-78
    • /
    • 2021
  • Background: The aim of this study was to analyze the public demand for information about the job of dental hygienists by mining text data collected from the online Q & A section on an Internet portal site. Methods: Text data were collected from inquiries that were posted on the Naver Q & A section from January 2003 to July 2020 using "dental hygienist job recognition," "role recognition," "medical assistance," and "scaling" as search keywords. Text mining techniques were used to identify significant Korean words and their frequency of occurrence. In addition, the association between words was analyzed. Results: A total of 10,753 Korean words related to the job of dental hygienists were extracted from the text data. "Chi-lyo (treatment)," "chigwa (dental clinic)," "ske-illing (scaling)," "itmom (gum)," and "chia (tooth)" were the five most frequently used words. The words were classified into the following areas of job of the dental hygienist: periodontal disease treatment and prevention, medical assistance, patient care and consultation, and others. Among these areas, the number of words related to medical assistance was the largest, with sixty-six association rules found between the words, and "chi-lyo," "chigwa," and "ske-illing" as core words. Conclusion: The public demand for information about the job of dental hygienists was mainly related to "chi-lyo," "chigwa," and "ske-illing" as core words, demonstrating that scaling is recognized by the public as the job of a dental hygienist. However, the high demand for information related to treatment and medical assistance in the context of dental hygienists indicates that the job of dental hygienists is recognized by the public as being more focused on medical assistance than preventive dental care that are provided with job autonomy.

A Virtual Battlefield Situation Dataset Generation for Battlefield Analysis based on Artificial Intelligence

  • Cho, Eunji;Jin, Soyeon;Shin, Yukyung;Lee, Woosin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.33-42
    • /
    • 2022
  • In the existing intelligent command control system study, the analysis results of the commander's battlefield situation questions are provided from knowledge-based situation data. Analysis reporters write these results in various expressions of natural language. However, it is important to analyze situations about information and intelligence according to context. Analyzing the battlefield situation using artificial intelligence is necessary. We propose a virtual dataset generation method based on battlefield simulation scenarios in order to provide a dataset necessary for the battlefield situation analysis based on artificial intelligence. Dataset is generated after identifying battlefield knowledge elements in scenarios. When a candidate hypothesis is created, a unit hypothesis is automatically created. By combining unit hypotheses, similar identification hypothesis combinations are generated. An aggregation hypothesis is generated by grouping candidate hypotheses. Dataset generator SW implementation demonstrates that the proposed method can be generated the virtual battlefield situation dataset.

Re-Engineering of Educational Contexts in the Digital Transformation of Socio-Economic Interactions of Society

  • Tsekhmister Yaroslav;Tetiana Konovalova;Tsekhmister Bogdan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.135-141
    • /
    • 2024
  • The article examines the key constants of reengineering the modern educational cluster, associated with the processes of digital transformation of all spheres of modern socio-cultural space. The first constant is the strategic rethinking of the educational process organization and awareness of the new roles of all participants (tutors, applicants, controlling elements, etc.). The other constant involves practical re-design of the system of educational services, which consists in the reorientation from the traditional model of education functioning for society to the implementation of the educational format in the form of new projects (structural, target, business). Consequently, the purpose of the study is to highlight the attitudes relevant to the modern realities of information and technological support of education in the context of socio-economic interactions of society. The criteria for the reengineering of educational concepts and the structural organization of the educational sphere are defined. The modern world is going through a period of complete digital transformation of all spheres of public activity. The scientific intelligence notes that education is no exception in these processes, as the dependence of educational realities on information and computer technologies is now noted. The COVID-19 pandemic, for all its tragedy, was also a kind of trigger, clearly marking the new components that have become defined in the organization of the educational process. The conclusion is made that the use of digital technologies in the organization of the educational institution or in the organization of the educational process has become not an auxiliary element, but a dominant factor. Mobility, dynamism, interdisciplinarity, synergy - all these aspects are relevant for socio-economic interactions of society and should be provided by educational programs. The results of the study can be used in the reorganization processes of educational institutions and institutions. Further research requires aspects of the analysis of the foreign experience of reengineering in education, carried out taking into account digital transformations of modern sociocultural space.

The Smart Electronic Tagging System for Sexual Offenses Prevention Context-Aware Services in Extreme Situations such as Location Unrecognized (위치인식 불가의 극한상황에서 성범죄 예방 상황인지 서비스를 위한 스마트 전자발찌 시스템)

  • Lee, Gil-Yong;Park, Soo-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.11
    • /
    • pp.118-131
    • /
    • 2012
  • The existing electronic tagging system traces the location of a sex offender through communicating with GPS satellites and mobile phone base stations in order to prevent repeated crimes. However, the GPS satellite communication method does not work well in the interiors of downtown buildings or on the subways where it is difficult to receive satellite signals. In such cases, the location can be traced through communication with mobile phone base stations. But the distance between mobile phone base stations is several hundred meters, and as a result the margin of error for location tracing can be maximum of 2km in accuracy reduction. Take for example, if a kindergarten is located on the 2nd floor and a coffee shop and the sex offender are located on the 3rd floor in a 5-story building that is downtown, the existing electronic tagging system cannot trace the location of the sex offender as the GPS satellite communication does not work in the interior of the building and the exact floor that the sex offender is located on cannot be recognized through communication with mobile phone base stations. This occurrence is a big problem for the existing electronic tagging system, which is based on position recognition. Therefore, this study suggests a smart electronic tagging system that can monitor sex offenders by using a Ubiquitous Sensor Network in such extreme situations where position recognition is not possible.

A UPnP A/V Multimedia System using Prediction of Mobility for Mobile User (이동하는 사용자를 위한 이동성 예측을 이용하는 UPnP A/V 멀티미디어 시스템)

  • Kim, Kyung-Deok;Jung, E-Gun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.11
    • /
    • pp.1509-1520
    • /
    • 2009
  • Contrary to ubiquitous environments, indoor computing environments like home network doesn't support user mobility. This paper suggests UPnP A/V multimedia system using prediction of mobility for adaption of seamless multimedia service. The multimedia system enables indoor mobile users to play multimedia contents by transferring the current session to an adjacent device automatically. The system represents users' contextual information by Five Ws and One H model, and predicts user's movements by using contextual information and transitions of locations. The prediction basically includes multiple locations so that it improves accuracy of prediction. We evaluated the suggested system using in accuracy of prediction, time for prediction, handover time for service, and the system showed that adapt ion of seamless multimedia service was enabled by using prediction of mobility on mobile user.

  • PDF

A Phenomenological Study of the Pre-service Teacher Librarian During Student Teaching Practice (예비사서교사의 교육실습에 대한 현상학적 연구)

  • Kwon, SunYoung;Park, JangSoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.3
    • /
    • pp.321-348
    • /
    • 2014
  • The purpose of this study is to examine in depth the personal experience of Pre-Service Librarian Teacher during Student Teaching Practice. This helps us understand the overall process and diverse environment of Student Teaching Practice. We conducted in depth interview with participants who had recently experienced. and data analysis was undertaken using the phenomenological method devised by Giorgi. The significance of Pre-service Teacher Librarian experiences during Student Teaching Practice can be summarized in five categories as follows: 'the formation of Pre-service Librarian teacher's awareness about library and librarian through growth process', 'concretization and Strategy Implementation about Career Planning', 'Self-growth Need through experience of student teaching practice', 'Understanding of Organizational Culture Perception of Communication', 'Face reality about library and librarian'. These constituents can be understood in the context of time sequence. The result of this study may contribute for improving the overall environment at Student Teaching Practice.

A clustering algorithm based on dynamic properties in Mobile Ad-hoc network (에드 혹 네트워크에서 노드의 동적 속성 기반 클러스터링 알고리즘 연구)

  • Oh, Young-Jun;Woo, Byeong-Hun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.715-723
    • /
    • 2015
  • In this paper, we propose a context-awareness routing algorithm DDV (Dynamic Direction Vector)-hop algorithm in Mobile Ad Hoc Networks. The existing algorithm in MANET, it has a vulnerability that the dynamic network topology and the absence of network expandability of mobility of nodes. The proposed algorithm performs cluster formation using a range of direction and threshold of velocity for the base-station, we calculate the exchange of the cluster head node probability using the direction and velocity for maintaining cluster formation. The DDV algorithm forms a cluster based on the cluster head node. As a result of simulation, our scheme could maintain the proper number of cluster and cluster members regardless of topology changes.

Energy conserving routing algorithm based on the direction for Mobile Ad-hoc network (모바일 에드 혹 네트워크에서 노드의 방향성을 고려한 에너지 효율적 라우팅 알고리즘 연구)

  • Oh, Young-Jun;Lee, Kong-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2699-2707
    • /
    • 2013
  • We proposed the context-awareness routing algorithm DDV (Dynamic Direction Vector)-hop algorithm at Mobile Ad-hoc Network(MANET). MANET has problem about dynamic topology, the lack of scalability of the network by mobile of node. By mobile of node, energy consumption rate is different. So it is important choosing routing algorithms for the minium of energy consumption rate. DDV-hop algorithms considers of the attribute of mobile node, create a cluster and maintain. And it provides a path by searching a route more energy efficient. We apply mobile of node by direction and time, the alogorighm of routning path and energy efficiency clustering is provided, it is shown the result of enery consumption that is optimized for the network.

A Study on the Selection Process of RFID Middleware and Quality Factor Evaluation in Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에서 RFID 미들웨어 선정 프로세스 및 품질 요소 평가에 대한 연구)

  • Oh, Gi-Oug;Park, Jung-Oh
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.257-263
    • /
    • 2011
  • Conventional middleware is software providing services between clients and servers efficiently, but it is not applicable to RFID systems because of low consistency due to the absence of context awareness function, and problems in the management of meaning, security system, etc. Accordingly, we need a quality selection process and a quality evaluation method for selecting RFID middleware based on new criteria. This Paper proposed a new selection process based on international standard ISO/IEC 14598, and extracted and selected optimal quality factors through the proposed process. The selected quality factors were mapped to the quality characteristics of standard quality model ISO/IEC 9126, and to quality factors of RFID middleware of SUN, Microsoft, EPCglobal, IBM, etc. The results of these works showed that the quality factors extracted and selected through the proposed process were fair and adequate for evaluating the quality of RFID middleware.