• Title/Summary/Keyword: User Configuration

Search Result 418, Processing Time 0.028 seconds

Development of Smart Healthcare Scheduling Monitoring System for Elderly Health Care

  • Cho, Sooyong;Lee, Sang Hyun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.51-59
    • /
    • 2018
  • Health care has attracted a lot of attention, recently due to an increase in life expectancy and interest in health. Various biometric data of the user are collected by using the air pressure sensor, gyro sensor, acceleration sensor, and heart rate sensor to perform the Smart Health Care Activity Tracker function. Basically, smartphone application is made and tested for biometric data collection, but the Arduino platform and bio-signal measurement sensor are used to confirm the accuracy of the measured value of the smartphone. Use the Google Maps API to set user goals and provide guidance on the location of the user and the points the user wants. Also, the basic configuration of the main UI is composed of the screen of the camera, and it is possible for the user to confirm the forward while using the application, so that accident prevention is possible.

User Intervention for Controllable Engagement Simulation System (교전급 시뮬레이션 시스템의 통제를 위한 사용자 개입)

  • Ham, Won K.;Chung, Yongho;Park, Sang C.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.473-479
    • /
    • 2013
  • This paper introduces user intervention to control simulation states during the execution of a simulation for military engagements. In an engagement simulation, it covers both a discrete event system and a continuous state system. Thus a system for the engagement simulation can have numerous simulation states, because there are lots of factors to decide states of an engagement that are derived during an execution of the simulation (e. g. detection probability, moving speed, moving path, and so on). It means both a result and progression of simulations are important outputs. Configuration of an engagement simulation scenario and expectation of simulation states, though, is hindered by the number of generate-able states. In order to solve the obstacle, the engagement simulation system should be controllable by user intervention during a simulation execution. This paper is to define objects of user intervention, and to design control processes of defined objects.

Gaussian Optimization of Vocabulary Recognition Clustering Model using Configuration Thread Control (형상 형성 제어를 이용한 어휘인식 공유 모델의 가우시안 최적화)

  • Ahn, Chan-Shik;Oh, Sang-Yeob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.127-134
    • /
    • 2010
  • In continuous vocabulary recognition system by probability distribution of clustering method has used model parameters of an advance estimate to generated each contexts for phoneme data surely needed but it has it's bad points of gaussian model the accuracy unsecure of composed model for phoneme data. To improve suggested probability distribution mixed gaussian model to optimized that phoneme data search supported configuration thread system. This paper of configuration thread system has used extension facet classification user phoneme configuration thread information offered gaussian model the accuracy secure. System performance as a result of represent vocabulary dependence recognition rate of 98.31%, vocabulary independence recognition rate of 97.63%.

A Study on the Satisfaction with the Configuration of Eating and Drinking Spaces for Solo Diners - Focusing on Korean Restaurants for Solo Diners within Gwanak-gu, Seoul - (1인 식음공간 구성 만족도 연구 - 서울 관악구 내 한식 1인 식음공간 중심으로 -)

  • Lee, Eun-Kyung;Han, Hae-Ryon
    • Korean Institute of Interior Design Journal
    • /
    • v.26 no.5
    • /
    • pp.125-134
    • /
    • 2017
  • This study is aimed at analyzing desired spaces and demands for their improvements, and subsequently proposing the design plan for eating and drinking places for solo diners by surveying the user satisfaction based on the analysis of the space configuration, and the physical environment of eating and drinking spaces for solo diners. Theoretical discussions about eating and drinking spaces for solo diners and their physical environment were reviewed from the previous studies, and an on-site survey was conducted with a checklist, for which the items regarding configuring elements of physical environments for the satisfaction with eating and drinking spaces for solo diners have been derived. Measurable checklist items according to the configuration of eating and drinking spaces were derived for this survey, which had then been conducted with diners in the eating and drinking spaces for 2 weeks. The analysis results are as follows. First, cleanliness is required as a necessity for the user satisfaction in eating and drinking spaces for solo diners. Second, a '-' shaped bar and the spaces to utilize and combine additional facilities are required in the central service space. Third, the self service should be performed in the additional service space. Fourth, the menu composition and the location selection considering main age groups of diners are needed. Fifth, interior design elements need to be improved to allow diners to feel visual interest along with enjoying food and beverage. It is considered that the strategies of spatial design need to be analyzed and proposed from the perspective of design among the physical environments of eating and drinking spaces for solo diners in future studies.

Address Auto-configuration in Broadband Convergence Networks for Supporting Multi-Hop User Access Networks (BcN에서 멀티 홉 사용자 액세스 망 수용을 위한 자동 주소 설정)

  • Park, Il-Kyun;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.809-816
    • /
    • 2005
  • MANET(mobile ad hoc network) cn be one of the access networks of BcN(broadband convergence network), and an user node requires address auto-configuration protocol for mu14i-hop environment. Some address auto-configuration protocols are proposed for independent MANET, but they don't consider BcN-accessable MANET environment. In this paper, new address auto-configuration protocol for wireless nodes is proposed. With this proposal, they ran configure their global addresses automatically in hybrid MANETs as BcN access networks. The autoconfiguration protocol modifies IPv6 NDP(neighbor discovery protocol) messages to deliver global prefix information to all wireless nodes, and avoids message boradcasting to minimize network overhead.

Design and Implementation of XCAP Server (XCAP 서버 기능 설계 및 구현)

  • Hyun, Wook;Park, Sun-Ok;Lee, Il-Jin;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.571-574
    • /
    • 2005
  • XCAP(XML Configuration Access Protocol) which has been proposed in IETF is based on both XML and HTTP protocol. XCAP server maintains user's configuration information for specific application which is described by XML. This protocol can be applied to many application servers for adapting user's preferences. There can be many way to interwork with other application servers. In this paper, we will talk about the experience of designing and implementation of XCAP server and the way of interwork with application servers.

  • PDF

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Implementation of User Account Vulnerability Checking Function System using MS-SQL Database (MS-SQL 데이터베이스에서 특정 계정 취약점 판별 시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2482-2488
    • /
    • 2014
  • This paper proposes that a user account of the MS-SQL is checked whether expirated or not in C++ program environment. Vulnerability checking module decides security weakness for password change time or user configuration time. The proposed module prevents and protects a user account from a malicious user account. Recently, Information Assets becomes more important. If the loss of database information it would make large damage in our life. This paper develops user account checking module, which checks whether user password have not been changed for a long time or whether the user account expirated in the MS-SQL Database. By checking security vulnerability using this feature, a malicious user cannot access the Database.

Text to Speech System from Web Images (웹상의 영상 내의 문자 인식과 음성 전환 시스템)

  • 안희임;정기철
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.5-8
    • /
    • 2001
  • The computer programs based upon graphic user interface(GUI) became commonplace with the advance of computer technology. Nevertheless, programs for the visually-handicapped have still remained at the level of TTS(text to speech) programs and this prevents many visually-handicapped from enjoying the pleasure and convenience of the information age. This paper is, paying attention to the importance of character recognition in images, about the configuration of the system that converts text in the image selected by a user to the speech by extracting the character part, and carrying out character recognition.

  • PDF

A QoS Prediction Management System in Distributed Multimedia Networks

  • Ueno, Yoshito
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1996.06b
    • /
    • pp.95-100
    • /
    • 1996
  • User's qualities of services (QoS) are the basic requirements involved in distributed multimedia systems. Considering ATM network, ATM adapter cannot control the end-to-end connection satisfying the user's QoS. This paper describes the new concept of a QoS prediction management system in the distributed network and the configuration of it's QoS prediction management architecture and also discusses it's algorithm.

  • PDF