• Title/Summary/Keyword: User Generated Contents

Search Result 129, Processing Time 0.024 seconds

A Study on Virtual Reality Techniques for Immersive Traditional Fairy Tale Contents Production (몰입형 전래동화 콘텐츠 제작을 위한 가상현실 기술에 대한 연구)

  • Jeong, Kisung;Han, Seunghun;Lee, Dongkyu;Kim, Jinmo
    • Journal of the Korea Computer Graphics Society
    • /
    • v.22 no.3
    • /
    • pp.43-52
    • /
    • 2016
  • This paper is to study techniques of a virtual reality to maximize the depth of the users' immersion based on differentiated interactive contents using korean traditional fairy tale. In order to increase more interests in korean traditional fairy tale, we produce a interactive 3D contents and propose a new approach to a system designing applying a virtual realities such as HMD, Leap motion. First, using Korean traditional fairy tale, we generate interactive contents consisting of scenes intensifying user's tensions while interaction of game process. Based on the interactive contents generated, we design scene generation using Oculus HMD, the gaze based input processes and a hand interface using Leap motion, in order to provide a multi dimensional scene transmission and an input process method to intensify the sense of the reality. We will verify through diverse tests whether the proposed virtual reality contents based on a technique of an input process will actually intensify the immersion in the virtual reality or not while minimizing the motion sickness of the users.

A Study on the Online History Information Service (온라인 역사정보서비스에 관한 연구)

  • Chun, Jung-Hyun;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.67-82
    • /
    • 2010
  • In comparison to the services provided by the typical information systems, the historical records from the period before the modern times require additional information services to reflect the format and content oriented peculiarities of the data. The additional services also need to be considered in light of the users' information needs. For this study, a series of literature reviews was conducted to present the specific analysis criteria for the historical information services. Based on these criteria, the domestic and foreign historical information service provision and use status was investigated. In addition, users' information needs were identified and user-based historical information service improvement suggestions were generated.

RSS Service Method Using the User's Concerned Area and the QoS of Wireless Devices (사용자의 관심영역과 무선 단말기의 QoS를 고려한 RSS 서비스 방법)

  • Lee, Jong-Kap;Ryu, Dong-Yeop;Kong, Ran-Sook;Lim, Young-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.125-132
    • /
    • 2009
  • The pre-generated web contents or various devices have to be used in order to execute UMA(UMA:Universal Multimedia Access). However, an HTLM web page for PC is not very compatible with wireless internet because of its unnecessary advertisements, high resolution, and various multimedia data. This is because the main focus when creating it was on high speed. In this paper indicates with the RSS channel, converted from the main part of the HTML web page, which users show interest in, a wireless compatible internet page can easily be created. Consequently, web administrators could create a wireless page easily and quickly, and wireless users would be able to find information in the same manner.

Research and development of haptic simulator for Dental education using Virtual reality and User motion

  • Lee, Sang-Hyun
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.52-57
    • /
    • 2018
  • The purpose of this paper is to develop simulations that can be used for virtual education in dentistry. The virtual education to be developed will be developed with clinical training and actual case data of tooth extraction. This development goal is to allow dental students to learn the necessary surgical techniques at the point of their choice, not going into the operating room, away from time, space, and physical limits. I want to develop content using VR. Oculus Rift HMD, Optical Based Outside-in Tracking System, Oculus Touch Motion Controller, and Headset as Input / Output Device. In this configuration, the optimization method is applied convergent, and when the operation of the VR contents is performed, the content data is extracted from the interaction analysis formed in the VR engine, and the data is processed by the content algorithm. It also computes events and dental operations generated within the 3D engine programming and generates corresponding events through data processing according to the input signal. The visualization information is output to the HMD using the rendering information. In addition, the operating room environment was constructed by studying lighting and material for actual operating room environment. We applied the ratio of actual space to virtual space and the ratio between character and actual person to create a spatial composition at a similar rate to actual space.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

A Topic Modeling-based Recommender System Considering Changes in User Preferences (고객 선호 변화를 고려한 토픽 모델링 기반 추천 시스템)

  • Kang, So Young;Kim, Jae Kyeong;Choi, Il Young;Kang, Chang Dong
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.43-56
    • /
    • 2020
  • Recommender systems help users make the best choice among various options. Especially, recommender systems play important roles in internet sites as digital information is generated innumerable every second. Many studies on recommender systems have focused on an accurate recommendation. However, there are some problems to overcome in order for the recommendation system to be commercially successful. First, there is a lack of transparency in the recommender system. That is, users cannot know why products are recommended. Second, the recommender system cannot immediately reflect changes in user preferences. That is, although the preference of the user's product changes over time, the recommender system must rebuild the model to reflect the user's preference. Therefore, in this study, we proposed a recommendation methodology using topic modeling and sequential association rule mining to solve these problems from review data. Product reviews provide useful information for recommendations because product reviews include not only rating of the product but also various contents such as user experiences and emotional state. So, reviews imply user preference for the product. So, topic modeling is useful for explaining why items are recommended to users. In addition, sequential association rule mining is useful for identifying changes in user preferences. The proposed methodology is largely divided into two phases. The first phase is to create user profile based on topic modeling. After extracting topics from user reviews on products, user profile on topics is created. The second phase is to recommend products using sequential rules that appear in buying behaviors of users as time passes. The buying behaviors are derived from a change in the topic of each user. A collaborative filtering-based recommendation system was developed as a benchmark system, and we compared the performance of the proposed methodology with that of the collaborative filtering-based recommendation system using Amazon's review dataset. As evaluation metrics, accuracy, recall, precision, and F1 were used. For topic modeling, collapsed Gibbs sampling was conducted. And we extracted 15 topics. Looking at the main topics, topic 1, top 3, topic 4, topic 7, topic 9, topic 13, topic 14 are related to "comedy shows", "high-teen drama series", "crime investigation drama", "horror theme", "British drama", "medical drama", "science fiction drama", respectively. As a result of comparative analysis, the proposed methodology outperformed the collaborative filtering-based recommendation system. From the results, we found that the time just prior to the recommendation was very important for inferring changes in user preference. Therefore, the proposed methodology not only can secure the transparency of the recommender system but also can reflect the user's preferences that change over time. However, the proposed methodology has some limitations. The proposed methodology cannot recommend product elaborately if the number of products included in the topic is large. In addition, the number of sequential patterns is small because the number of topics is too small. Therefore, future research needs to consider these limitations.

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents (디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구)

  • Kim, Yong;Kim, Eun-Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.27-41
    • /
    • 2009
  • With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records or reports, which have high commercial value, e-tickets and so on. However, because those digital contents have commercial value, high-level security should be required for delivery between a consumer and a provider with non face-to-face method in online environment. As a digital contents, an e-ticket is a sort of electronic certificate to assure ticket-holder's proprietary rights of a real ticket. This paper focuses on e-ticket as a typical digital contents which has real commercial value. For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card holding e-tickets for delivery in online environment, 3) how to save an e-ticket transferred through network into a smart card, 4) how to issue and authenticate e-tickets in offline, and 5) how to collect and discard outdated or used e-tickets.

Design and Implementation of Multiple View Image Synthesis Scheme based on RAM Disk for Real-Time 3D Browsing System (실시간 3D 브라우징 시스템을 위한 램 디스크 기반의 다시점 영상 합성 기법의 설계 및 구현)

  • Sim, Chun-Bo;Lim, Eun-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.13-23
    • /
    • 2009
  • One of the main purpose of multiple-view image processing technology is support realistic 3D image to device user by using multiple viewpoint display devices and compressed data restoration devices. This paper proposes a multiple view image synthesis scheme based on RAM disk which makes possible to browse 3D images generated by applying effective composing method to real time input stereo images. The proposed scheme first converts input images to binary image. We applies edge detection algorithm such as Sobel algorithm and Prewiit algorithm to find edges used to evaluate disparities from images of 4 multi-cameras. In addition, we make use of time interval between hardware trigger and software trigger to solve the synchronization problem which has stated ambiguously in related studies. We use a unique identifier on each snapshot of images for distributed environment. With respect of performance results, the proposed scheme takes 0.67 sec in each binary array. to transfer entire images which contains left and right side with disparity information for high quality 3D image browsing. We conclude that the proposed scheme is suitable for real time 3D applications.

Wireless Internet Payment Protocol Using Weil Pairing Method (무선인터넷에서 Weil Pairing 기법을 적용한 지불 프로토콜)

  • Jin Shi-Mei;Lee Hyun-Ju;Rhee Chung-Sei
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.9-17
    • /
    • 2005
  • Recently, there are rapid development of information and communication technology and rapid growing of e-business users. We propose a method for security problem on the internet environment which changes from wire internet to wireless internet or wire/ wireless internet. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which connected wire and wireless communication. Certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil pairing. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol also solves the privacy protection and Non-repudiation problem.

  • PDF

Implement of The Authoring Tool for WIPI Business Program using UIDL(User Interface Description Language) (사용자 인터페이스 명세 언어를 이용한 위피 비즈니스 프로그램 저작도구 구현)

  • Lee, Dong-Su;Park, Ki-Chang;Kim, Byung-Ki
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.152-162
    • /
    • 2009
  • At present, Authoring tools, which are used to develop the WIPI applications are less convenient to be coded. Usually, the programming tools only focus on the grammar while scarcity of visualization. Developer forced directly codes all times during the development by this cause. As a procedure for rapid WIPI Application Development, in this paper, WIPI API High Level Component is first visualized, in order words, graphic control is developed. Second this control is used in designing the mobile layout. Then UI Markup Language and source code can be generated automatically. With this view, we propose the JIML(Jlet Interface Markup Language) with UI Markup Language based XML of WIPI Jlet Platform and also present the transformable rule for generation to the WIPI code about WIPI Jlet UI from offered JIML. Also we implement the WIPI Jlet Generation System to make the generation to JIML, WIPI code. The Implemented System provides efficiency when developing WIPI Business Application, and helps to enable rapid development.