• Title/Summary/Keyword: Smart phones

Search Result 974, Processing Time 0.035 seconds

Multimedia Application and Ubiquitous English Education Environment (멀티미디어 기기 활용과 유비쿼터스 영어 교육환경)

  • Choi, Michelle Mi-Hee
    • Journal of Digital Contents Society
    • /
    • v.13 no.3
    • /
    • pp.393-399
    • /
    • 2012
  • New and creative skills must be developed, and adapted into a lesson, to motivate learners to acquire a second language easily and enjoyment, Multimedia tools which are of interest to learners, such as; smart phones, computers, and notebooks with wireless internet compatability, will provide learners opportunities to study, and do their work practically anywhere and anytime. Recently, podcasts, which are a type of digital media, consisting of a series of audio episodes or video files, subscribed to and downloaded through web syndication, or streamed online to a computer or mobile device, are used to facilitate ESL (English as a Second Language) learning. Development of a variety of teaching methods, using multimedia tools, is needed. There are advantages and disadvantages to using a variety of multimedia tools. The current research aims to study its characteristics and application, in order to maximize their effective use, in English education. The current study suggests a ubiquitous learning environment using multimedia content tools, internet media, video teleconferencing, cyber-learning, and one-to-one videos used in conjunction with, or as a digital textbook for the English lesson. This study also investigates future educational changes, using state-of-the-art equipment for the self-learning experience, and will present a new direction in English education, through a variety of instructional devices and a marginalized class system model.

Effects of Virtual Reality Images on Body Stability : Focused on Hand Stability (VR 영상이 신체 안정성에 미치는 영향 : 손 안정성을 중심으로)

  • Han, Seung Jo;Kim, Sun-Uk;Koo, Kyo-Chan;Lee, Kyun-Joo;Cho, Min-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.391-400
    • /
    • 2017
  • The purpose of this paper is to present the effect of image stimulation on body stability as a conceptual model and to investigate the effect of image stimulus(2D, VR) on body stability(hand stability) through experiments Recently, stereoscopic images such as virtual and augmented reality are combined with smart phones and exercise equipments, and the diffusion is becoming active. The possibility of a safety accident or human error is also increasing as it temporarily affects the balance of the body and hand stability after the image stimulus is removed. The conceptual model is presented based on the results of previous studies. Based on the experimental results, the conceptual model has been explained in combination with the human information processing process and cognitive resource models that take place in the brain. Twenty subjects were exposed to 2D and VR stimuli, and display fatigue was measured by cybersickness questionnaire and hand stability by hand steadiness tester. Experimental results show that VR images induce higher display fatigue and lower hand stability than 2D. In this study, it is meaningful that hand stability according to image type and display fatigue level which have not been tried yet is revealed through conceptual model and experiment.

Development of unified communication for marine VoIP service (해상 VoIP 서비스를 위한 통합 커뮤니케이션 기술 개발)

  • Kang, Nam-seon;Yim, Geun-wan;Lee, Seong-haeng;Kim, Sang-yong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.7
    • /
    • pp.744-753
    • /
    • 2015
  • This paper presents the results of research on developing marine unified communications to provide VoIP service based on marine satellites. With the recent popularity of smart-phones and other mobile devices, the demand for Internet-based wired and wireless unified technology has been growing in marine environments, and increasing interest is being directed to VoIP products and service models with high price competitiveness and the ability to deliver a variety of services. In this regard, this research designed three instruments, developed their unit modules, and verified their performances. These three instruments included the following: (1) a marine VoIP module equipped with an analogue gateway that can be linked to the existing devices used in vessels, which is more than 80% smaller than that of a land system; (2) a text/voice/video engine for marine satellite communications that runs on technology that minimizes communication data usage, which is a core technology for a marine VoIP service; and (3) a unified communication service that can support multilateral cloud-based message conversations, telephone number-based call functions, and voice/video calling between a private space in a ship and shore.

Effects that Faith Factor of Social Bonds Have on Cyber Bullying Phenomenon (사회유대의 신념요인이 사이버 불링 가해 현상에 미치는 영향)

  • Lee, Young-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.256-262
    • /
    • 2016
  • A cyber crime has been evolving, as other crimes have. Beyond physical damages such as financial crimes in the cyber world, it has evolved into psychological forms like cyber-bullying. In today's crimes, measures that consider psychological effects of crimes are highly regarded in that fear of crime is considered as well as visible crimes. Accordingly, cyber bullying, which causes psychological damages, needs to be treated very importantly. Because the characteristics of cyber crime is caused by different circumstances from the real world, measures should be taken in different aspects. Rather than physical damages, which can be found in the conventional crimes, cyber crimes cause psychological damages, so the effect that has on inflicting should be specified. Especially, in the environment that virtual reality is ubiquitous through smart phones, it is very difficult to establish measures by considering all the causes of general cyber crimes. Therefore, this study estimated what affects cyber bullying by focusing on personalized faith factor among social bond theory, which can control cyber crimes. As a result, self-controling faith was verified to have a negative effect on cyber bullying, so faith is a very important factor in personalized environment. Thus, it is suggested that the characteristics of cyber space and education of humanism, which can affect individuals' faith should be emphasized.

Performance Analysis of MBMS and Wi-Fi Priority Policy in Heterogeneous Networks having a dispersed Single-cell MBMS (분산된 단일 셀 MBMS을 지원하는 이종 네트워크 환경에서 MBMS와 와이파이 사용자 우선 정책에 대한 성능 분석)

  • Jeong, Un Ho;Lee, Jung Moon;Kim, Gi Taek;Nam, Boo Hee;Kim, Dong Hoi
    • Journal of Broadcast Engineering
    • /
    • v.18 no.2
    • /
    • pp.215-224
    • /
    • 2013
  • With the rising popularity of smart-phones, the supply of Internet protocol television is largely increased and it causes the wireless communication network load to be increased. To overcome such an overloading problem, 3GPP is now working on the standardization of MBMS since LTE Release 6 specification. MBMS has good performance in bandwidth efficiency by sharing the same bandwidth with the mulitple MBMS users having the same content. According to the proposed algorithm, in heterogeneous networks having a dispersed Single-cell MBMS where 3GPP network and Wi-Fi network are mixed, if the number of MBMS users, who are belonging to cells supporting a dispersed Single-cell MBMS, is more than a specified threshold, the MBMS priority policy is operated. Otherwise, the Wi-Fi priority policy is executed. As the simulation results show both the increase of total available bandwidth ratio and the decrease of network usage cost, it is confirmed that the proposed scheme allows the network efficiency to be maximized.

Smartphone-User Interactive based Self Developing Place-Time-Activity Coupled Prediction Method for Daily Routine Planning System (일상생활 계획을 위한 스마트폰-사용자 상호작용 기반 지속 발전 가능한 사용자 맞춤 위치-시간-행동 추론 방법)

  • Lee, Beom-Jin;Kim, Jiseob;Ryu, Je-Hwan;Heo, Min-Oh;Kim, Joo-Seuk;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.2
    • /
    • pp.154-159
    • /
    • 2015
  • Over the past few years, user needs in the smartphone application market have been shifted from diversity toward intelligence. Here, we propose a novel cognitive agent that plans the daily routines of users using the lifelog data collected by the smart phones of individuals. The proposed method first employs DPGMM (Dirichlet Process Gaussian Mixture Model) to automatically extract the users' POI (Point of Interest) from the lifelog data. After extraction, the POI and other meaningful features such as GPS, the user's activity label extracted from the log data is then used to learn the patterns of the user's daily routine by POMDP (Partially Observable Markov Decision Process). To determine the significant patterns within the user's time dependent patterns, collaboration was made with the SNS application Foursquare to record the locations visited by the user and the activities that the user had performed. The method was evaluated by predicting the daily routine of seven users with 3300 feedback data. Experimental results showed that daily routine scheduling can be established after seven days of lifelogged data and feedback data have been collected, demonstrating the potential of the new method of place-time-activity coupled daily routine planning systems in the intelligence application market.

Design and Implementation of B-Tree on Flash Memory (플래시 메모리 상에서 B-트리 설계 및 구현)

  • Nam, Jung-Hyun;Park, Dong-Joo
    • Journal of KIISE:Databases
    • /
    • v.34 no.2
    • /
    • pp.109-118
    • /
    • 2007
  • Recently, flash memory is used to store data in mobile computing devices such as PDAs, SmartCards, mobile phones and MP3 players. These devices need index structures like the B-tree to efficiently support some operations like insertion, deletion and search. The BFTL(B-tree Flash Translation Layer) technique was first introduced which is for implementing the B-tree on flash memory. Flash memory has characteristics that a write operation is more costly than a read operation and an overwrite operation is impossible. Therefore, the BFTL method focuses on minimizing the number of write operations resulting from building the B-tree. However, we indicate in this paper that there are many rooms of improving the performance of the I/O cost in building the B-tree using this method and it is not practical since it increases highly the usage of the SRAM memory storage. In this paper, we propose a BOF(the B-tree On Flash memory) approach for implementing the B-tree on flash memory efficiently. The core of this approach is to store index units belonging to the same B-tree node to the same sector on flash memory in case of the replacement of the buffer used to build the B-tree. In this paper, we show that our BOF technique outperforms the BFTL or other techniques.

Evaluation of Recycling Resources in Discarded Information and Communication Technology Devices (Smartphones, Laptop computers) (폐 정보통신기기(스마트폰, 노트북 PC)의 자원화 가치 분석)

  • Park, Seungsoo;Jung, Minuk;Kim, Seongmin;Han, Seongsoo;Jung, Insang;Park, Jihwan;Park, Jaikoo
    • Resources Recycling
    • /
    • v.27 no.3
    • /
    • pp.16-29
    • /
    • 2018
  • In this study, metal and nonmetal contents and their economic values in ICT devices such as smart phones and laptop computers were evaluated. The electronic devices made by LG and Samsung were disassembled into 5 parts, which are printed circuit board assembly, battery, display, case and other electronic components. Metal and nonmetal contents in these parts were analyzed, and their economic values were calculated via multiplying the materials' contents by metal price obtained from KOMIS or nonmetal exchange price acquired from Korean recycling markets. Finally, the materials' contents and values according to each electronic parts and electronic devices were calculated. The results showed that the value of the smartphones and laptop computers of LG are 4,449.6 KRW (28,506 KRW/kg) and 6,830.2 KRW (7,053 KRW/kg), and those of Samsung are 1,849.3 KRW (13,499 KRW/kg) and 6,667.5 KRW (4,831 KRW/kg), respectively. It was also found that most of the value was concentrated in batteries and printed circuit board assemblies. In addition, Co, Au and Cu were found to be the most valuable resources in the devices.

Design and Implementation of Library Information System Using Collective Intelligence and Cloud Computing (집단지성과 클라우드 컴퓨팅을 활용한 도서관 정보시스템 설계 및 구현)

  • Min, Byoung-Won
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.49-61
    • /
    • 2011
  • In recent, library is considered as an integrated knowledge convergence center that can respond to various requests about information service of users. Therefor it is necessary to establish a novel information system based on information communications technologies of the era. In other words, it is currently required to develop mobile information service available in portable devices such as smart phones or tablet PCs, and to establish information system reflecting cloud computing, SaaS, Annotation, and Library 2.0 etc. In this paper we design and implement a library information system using collective intelligence and cloud computing. This information system can be adapted for the varieties of mobile service paradigm and abruptly increasing amount of electronic materials. Advantages of this concept model are resource sharing, multi-tenant supporting, configuration, and meta-data supporting etc. In addition it can offer software on-demand type user services. In order to test the performance of our system, we perform an effectiveness analysis and TTA authentication test. The average response time corresponding to variance of data reveals 0.692 seconds which is very good performance in timing effectiveness point of view. And we detect maturity level-3 or 4 authentication in TTA tests such as SaaS maturity, performance, and application programs.

A Property-Based Data Sealing using the Weakest Precondition Concept (최소 전제조건 개념을 이용한 성질 기반 데이터 실링)

  • Park, Tae-Jin;Park, Jun-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.1-13
    • /
    • 2008
  • Trusted Computing is a hardware-based technology that aims to guarantee security for machines beyond their users' control by providing security on computing hardware and software. TPM(Trusted Platform Module), the trusted platform specified by the Trusted Computing Group, acts as the roots for the trusted data storage and the trusted reporting of platform configuration. Data sealing encrypts secret data with a key and the platform's configuration at the time of encryption. In contrast to the traditional data sealing based on binary hash values of the platform configuration, a new approach called property-based data sealing was recently suggested. In this paper, we propose and analyze a new property-based data sealing protocol using the weakest precondition concept by Dijkstra. The proposed protocol resolves the problem of system updates by allowing sealed data to be unsealed at any configuration providing the required property. It assumes practically implementable trusted third parties only and protects platform's privacy when communicating. We demonstrate the proposed protocol's operability with any TPM chip by implementing and running the protocol on a software TPM emulator by Strasser. The proposed scheme can be deployed in PDAs and smart phones over wireless mobile networks as well as desktop PCs.

  • PDF