• Title/Summary/Keyword: Smartphone games

Search Result 77, Processing Time 0.021 seconds

Learning App Development using App Inventor for Preliminary Early Childhood Teacher (앱 인벤터를 활용한 예비 유아교사 학습 앱 개발)

  • An, Mi-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.355-361
    • /
    • 2018
  • Recently, there are efforts to improve my learning ability by using various learning tools based on ICT technology. The application such as games is used in conjunction with lecture class to induce interest in the class and to enhance the learning effect by using smartphone app as learning tool. In addition, we are trying to improve creative thinking ability, problem solving ability and logical thinking ability through early coding education. In this paper, we describe the learning and quiz app using the app inventor and conducted the related questionnaire. We developed a learning philosophy for preliminary early childhood teachers using the developed apps and taught them how to utilize them in early childhood education by explaining the apps and using the app inventor. Through questionnaires, we confirmed the learning effect and the willingness to use in early childhood education. Through this study, I hope to improve the ability of early childhood teacher learning and to utilize the coding in early childhood education with the app developed as the app inventor.

Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration

  • Nandhini, Uma;TamilSelvan, Latha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3916-3936
    • /
    • 2014
  • Smartphone applications like games, image processing, e-commerce and social networking are gaining exponential growth, with the ubiquity of cellular services. This demands increased computational power and storage from mobile devices with a sufficiently high bandwidth for mobile internet service. But mobile nodes are highly constrained in the processing and storage, along with the battery power, which further restrains their dependability. Adopting the unlimited storage and computing power offered by cloud servers, it is possible to overcome and turn these issues into a favorable opportunity for the growth of mobile cloud computing. As the mobile internet data traffic is predicted to grow at the rate of around 65 percent yearly, even advanced services like 3G and 4G for mobile communication will fail to accommodate such exponential growth of data. On the other hand, developers extend popular applications with high end graphics leading to smart phones, manufactured with multicore processors and graphics processing units making them unaffordable. Therefore, to address the need of resource constrained mobile nodes and bandwidth constrained cellular networks, the computations can be migrated to resourceful servers connected to cloud. The server now acts as a bridge that should enable the participating mobile nodes to offload their computations through Wi-Fi directly to the virtualized server. Our proposed model enables an on-demand service offloading with a decision support system that identifies the capabilities of the client's hardware and software resources in judging the requirements for offloading. Further, the node's location, context and security capabilities are estimated to facilitate adaptive migration.

Development of Language Learning Application Using Buforia (뷰포리아를 이용한 언어 학습 어플리케이션 개발)

  • Yoon, Dong-eon;Lee, Hyo-sang;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.131-133
    • /
    • 2021
  • Recently, the average cost of education per child has increased compared to the annual birthrate, which has been decreasing, and the quality of education has also changed. In this paper, we aim to provide more efficient delivery for language learning using Unity's Buforia techniques. Using an application using a smartphone's camera based on Unity, it provides effective language development by inducing interest to learners through sound along with three-dimensional pictures. By providing such education, parents can gain satisfaction in providing high-quality education to their children. For children learning, smartphones have the effect of becoming educational elements, not just watching videos or playing games. Finally, by improving the quality of education, it gives satisfaction to parents and gives children who learn a language as well as the perception that smartphones serve as educational devices.

  • PDF

Analysis of the Status and Future Direction for Digital Therapeutics in Children and Adolescent Psychiatry

  • Haemi Choi;Bora Kim;Insoo Kim;Jae-Gu Kang;Yoonjae Lee;Hyowon Lee;Min-Hyeon Park
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.34 no.4
    • /
    • pp.192-203
    • /
    • 2023
  • Digital therapeutics based on software, such as artificial intelligence, virtual reality, games, and smartphone applications, are in the spotlight as new therapeutic alternatives in child and adolescent psychiatry. It draws attention to overcoming conventional therapeutics' limitations, such as toxicity, cost, and accessibility, and encourages patients to participate in the treatment attractively. The growth potential of the digital therapeutics market for psychiatric disorders in children and adolescents in Korea and abroad has been highlighted. Clinical studies and Food and Drug Administration approvals for digital therapeutics have increased, and cases approved by the Ministry of Food and Drug Safety have emerged in Korea. As seen above, digital transformation in child and adolescent psychiatry will change treatment paradigms significantly. Therefore, as this new field has just begun to emerge, it is necessary to verify the effectiveness and scope of the application of digital therapeutics and consider preparing a compensation system and institutional arrangements. Accordingly, this study analyzed the development trends and application status of digital therapeutics in children and adolescents and presented limitations and development directions from the perspective of application in healthcare. Further, the study is expected to identify the utility and limitations of digital therapeutics for children and adolescents and establish effective application measures.

Proposal for the Model of mobile RPG lobby layoutfrom Viewpoint of UX (UX관점에서의 모바일 RPG 로비 layout 모델 제시)

  • Kim, Seong-gon;Kim, Tae-Gyu
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.467-472
    • /
    • 2019
  • Growing smartphone usage in South Korea has also accelerated the pace of development of mobile games, but competition is intensifying as the market grows. As one of the factors for the success of the game in this mobile game market, UI has been presented, suggesting that the design of such mobile game UI should be approached in terms of designing the user's experience, along with its function, aesthetic expression, function-oriented design and information delivery before. In this paper, we propose an effective lobby layout of mobile RPG using experience among UX factors. Through the layout classification of Ernest Adams and Andrew Rollings, we selected 9 mobile RPGs in the 20th place of google play cumulative sales rankings and analyzed the layout of the lobby. As a result, the lobby layout of the game, which led the first market success of the mobile RPG genre, The result was that it became the standard of the boxed game. It can be interpreted that the lobby layout, which is similar to the game used previously by the user, is effective because low entry barriers and learning are unnecessary due to the experience of using the existing RPG. Future studies may produce a common layout of a broad genre if studies are conducted to measure the optimum UX for other genres than RPG.

A Study on Factors of Internet Overdependence for Adults Using the Decision Tree Analysis Model (성인층의 인터넷 과의존 영향요인: 의사결정나무분석을 활용하여)

  • Seo, Hyung-Jun;Shin, Ji-Woong
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.20-45
    • /
    • 2018
  • This study aims to find the factors of Internet overdependence in adults, through the decision tree analysis model, which is a data mining method using National Information Society Agency's raw data from the survey on Internet overdependence in 2016. As a result of the decision tree analysis, a total 16 nodes of Internet overdependence risk groups were identified. The main predicated variables were the amount of time spent per smart media usage in weekdays; amount of time spent per smart media usage in weekends; experiences of purchasing cash items; percentage of using smart media for leisure; negative personality; percentage of using smart media for information search and utilization; and awareness on good functions of the Internet, all of which in order had greater impact on the risk groups. Users in the highest risk node spent the smart media for more than 5 minutes per use and less than 5~10 minutes in weekdays, had experiences of cash item purchase, and had lower level of awareness on the good functions of the Internet. The analysis led to the following recommendations: First, even a short-time use has higher chances of causing Internet overdependence, and therefore, guidelines need to be developed based on research on the usage behavior rather than the usage time. Second, self-regulation is required because factors that affect overindulgence in games, such as the cash items, increase Internet overdependence. Third, using the Internet for leisure causes higher risk of overdependence and therefore, other means of leisure should be recommended.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF