• Title/Summary/Keyword: Personal Assistant

Search Result 211, Processing Time 0.026 seconds

MTCMOS ASIC Design Methodology for High Performance Low Power Mobile Computing Applications (고성능 저전력 모바일 컴퓨팅 제품을 위한 MTCMOS ASIC 설계 방식)

  • Kim Kyosun;Won Hyo-Sig
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.2 s.332
    • /
    • pp.31-40
    • /
    • 2005
  • The Multi-Threshold CMOS (MTCMOS) technology provides a solution to the high performance and low power design requirements of mobile computing applications. In this paper, we (i) motivate the post-mask-tooling performance enhancement technique combined with the MTCMOS leakage current suppression technology, and (ii) develop a practical MTCMOS ASIC design methodology which fine-tunes and integrates best-in-class techniques and commercially available tools to fix the new design issues related to the MTCMOS technology. Towards validating the proposed techniques, a Personal Digital Assistant (PDA) processor has been implemented using the methodology, and a 0.18um Process. The fabricated PDA processor operates at 333MHz which has been improved about $23\%$ at no additional cost of redesign and masks, and consumes about 2uW of standby mode leakage power which could have been three orders of magnitude larger if the MTCMOS technology was not applied.

An Application for Management of National Geodetic Control Points on the Web 2.0 (Web 2.0 기반 국가기준점 어플리케이션 설계)

  • Kim, Tae-Woo;Kim, Jyung-Wuk;Suh, Yong-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.79-84
    • /
    • 2009
  • As a surveying standard of a nation, the Korean geodetic control points such as triangulation points and benchmarks require continuous and effective management toward a spatially enabled society. As the developments of information technologies, use of mobile devices like PDA (personal digital assistant) has been increasing and the Web 2.0 environment became an important part of GIS. In this context, the management systems for national geodetic control points should be upgraded in accordance with the current trend, particularly for more interactive user-interface on the Web 2.0. This paper describes the framework design and prototype implementation of a Web 2.0 GIS application for the management of Korean geodetic control points. Our system enables a real-time update of the control point information and provides aerial photos on vector maps using Ajax(Asynchronous JavaScript and XML) techniques.

  • PDF

The Optimization path searching Method Development for Destination (목적지를 고려한 최적 경로탐색 기법 개발)

  • Ham Young-Kug;Kim Tae-Eun
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.55-62
    • /
    • 2005
  • In this paper, we propose the new technique to compute the optimal route by considering the direction of distribution vehicles and the location for delivery, developing the algorithm of the shortest route to approach the location as applying the gemetic algorithm. This approach makes it possible for us to find the best route even under itineraries which include many destinations. Lively studies are currently in progress on the development of vehicle navigation software, combining PDA GPS, and electronic maps. Many web-sites are providing a varier of services which use electronic maps. Popular among these services is one that computes the optimal route between two positions that a user inputs. This service of computing the optimal route plays an important role in distribution industries such as home-delivery. For the distribution system. the construction of a vehicle regulation system enables us to calculate and manipulate the optimal route for distribution vehicles, to enhance the efficiency in making use of vehicles and labor, and to reduce costs.

  • PDF

A Study on Fashion Images according to the Types of the Korean First Ladies (한국 영부인의 역할유형에 따른 패션이미지 연구)

  • Kim, Young-Sam;Kim, Jang-Hyeon;Jun, Yuh-Sun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.36 no.9
    • /
    • pp.1000-1013
    • /
    • 2012
  • This study analyzes public images, role types, and fashion images of Korean First Ladies in modern times to find a correlation of a standard through an analysis of literature reviews. The conclusion of the study is as follows. First, in terms of official functions in formal situations, First Ladies represent a type of customary presidential protocol and offer appealing neat images through a moderate style and simple mode. In other situations, such as non-formal times, they show duty-based roles in regards to the lady of the house as well as the companion of the president that are represent soft and comfortable images through a feminine style and graceful mode. Second, it reflects their tastes and images in the silhouette and colors of Western style clothing through the personal roles and activities of the First Lady. Third, the Korean First Ladies tend to prefer the feminine image of housewife-based assistant that shows that they prefer clothes with a regular repetition and stabilized pattern such as dots and checkered patterns. Fourth, as compared to a previous period, they create a style for bright images and dainty feelings that use a variety of colors and light fabrics that represent many aspects of political assistance with active support.

Exposure assessment of musculoskeletal disorder risk factors in non routinized work: An application of PATH-KOSHA observational tool to hospital workers (비정형작업 근골격계질환 위험요인의 노출평가: 일부 병원근로자에 대한 PATH-KOSHA 관찰도구 적용사례)

  • Park, Jung-Keun;Han, Young-Sun
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.19 no.4
    • /
    • pp.412-422
    • /
    • 2009
  • This study was conducted to assess exposure to musculoskeletal disorder(MSD) risk factors in hospital personnel who performed non-routinized work tasks. A tool ("PATH-KOSHA" version) was newly revised from PATH(Posture, Activity, Tools and Handling) method and uploaded into a personal digital assistant(PDA). The version was used, on a basis of direct-observation, to collect PATH data at the 2 hospital settings in different regions. Job analysis was performed to get various information (e.g., work and rest time, task type) as well. The data collected were visually checked for data cleaning and stored for future data analysis. A total of 1,992 PATH observations were made for 37 hospital workers. Exposure levels varied across 18 items of the MSD risk factors. The highest percent time spent on non-neutral postures was 53% for wrist deviation, followed by 47%(pinch grip), 35%(trunk posture), 23%(neck posture), and 20%(shoulder/arm posture). The highest percent time spent among hand activity level(HAL) variables was 55% for HAL-cat2 (HAL: 3.3 - <6.7). The percent time of items with respect to both loads with more than 5kg and contact stress was less than 4%. Vibration was not exposed in the study workers. Different aspects were discussed for findings. The study results showed that wrist deviation was highest in percent time spent on awkward posture while HAL-cat2 was highest in hand repetition. The study suggests that distal upper extremity posture and HAL should be primarily addressed and controlled in non-routinized work including the hospital settings.

A Study on Traffic Information Service and Collection by the Use of DSRC Technology (DSRC통신 기반 교통정보 제공 및 수집에 관한 연구)

  • Yang, Won-Mo;Bang, Jeong-Hyeon;Kim, Gyu-Ok
    • Proceedings of the KOR-KST Conference
    • /
    • 2007.05a
    • /
    • pp.399-408
    • /
    • 2007
  • Dedicated Short Range Communications(DSRC) is a block of spectrum in the 5.8GHz band. DSRC is the useful technology of ITS Service. Japan operates ETCS, VICS by DSRC technology and DSRC technology is used ETCS Standard in Korea. There are many kind of utilization of DSRC in ITS. This is a study for traffic information service and collection with DSRC. Traffic management server service traffic information to driving vehicle by RSE(Road Side Equipment). OBU(Onboard Unit) in vehicle send the information to PDA(Personal Digital Assistant). Client S/W show the information to driver by text, pictogram, sound and return PDA H/W ID to OBU. Server make section traffic information by the PDA H/W ID information.

  • PDF

Study of an Accurate and Efficient Data Integration for Decision Making in Data Management of Ubiquitous (유비쿼터스 데이터 관리에서 의사결정을 위한 정확하고 효율적인 데이터 통합 연구)

  • Lee Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.145-151
    • /
    • 2006
  • In conjunction with the rapid progress of IT(information technology) an increasing amount of data are being generated. The amount of new data is so big and the type of new data generated from clients or sensor devices needed to be in ubiquitous environment is so various that it is hard to manage and control them. Especially data to be occurred in ubiquitous environment are generated through PDA(personal digital assistant) smart phone, mobile device or sensor units etc. Therefore, to manage and control them generated from ubiquitous devices for decision making, we can use data warehouse as an integrated storage. A data warehouse integrates and aggregates data of several different DBMS into one DBMS. Also the updated data from source data have to be effectively propagated to the data warehouse. Therefore, in this paper, we proposed a mode) for an exact and efficient data management methodology in new IT paradigm environment, ubiquitous computing environment, to apply updated data on the warehouse to make decision. We also show brief result compared to conventional methodology.

  • PDF

Effect of Work-Family Culture on Attitude and Turnover Intention of Organizational Members (일-가족문화가 조직구성원의 태도와 이직의도에 미치는 영향)

  • Song, Jong-Han;Kim, Yong-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.387-396
    • /
    • 2010
  • The purpose of this study was to research the relationships among work-family culture, job satisfaction, organizational commitment and turnover intention of employees in banking industry. In response to employees' need for work-family balance, employers have instituted a number of programs, such as assistant with child care and elder care, flex time, job sharing, shorter work weeks, and telecommuting were adopted. These areas of study are so important in modern organizations because of their influence on organizational success and on the personal lives of employees. To accomplish this study, it was determined that the analysis derived from a hypothesis and literature reviews and data collected from 254 employees in bank industry. The results of empirical analysis showed as follows. First, Perceived work-family culture has a significant effect on job satisfaction, organizational commitment and turnover intention. Second, Job satisfaction and organizational commitment have a significant effect on turnover intention. Based on these findings, the implications and limitations of the study were presented including some directions for future studies.

The input method of the Hangul and Alphanumeric characters for the PDAs (휴대형 정보기기의 한글 및 영숫자 필기 입력 방안)

  • 홍성민;국일호;조원경
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.3
    • /
    • pp.53-60
    • /
    • 1998
  • In this paper, we proposed a set of ANSI-Korean character patterns for handwriting recognition that can be used as an input method of mobile computers like PDA (Personal Digital Assistant). In the case of bilinguals, two kinds of alphabets are written alternatively So the method of input character mode change must be provided, and this cause discomfort of writing. Our proposed written character patterns have some constraint but permit ANSI-Korean mixed writing without mode change keeping original form of alphabets and can be recognized with simple algorithm relatively. For ANSI character we analysis Graffiti and propose new writing pattern, which is more similar to original form. There are many researches about input method of unpacking Korean character and writing patterns. But they are not widely used because it's excessively contrary to original form of Korean characters. To show our proposed writing patterns usefulness, we studied the satisfaction and easiness of writing and the recognition rates. Writers are divided into two groups; PDA users, familiar to Graffiti, and others. The results satisfy usefulness in the both groups.

  • PDF

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.