• Title/Summary/Keyword: User Input

Search Result 1,620, Processing Time 0.033 seconds

Mobile Web User Interface Patterns for Screen Usage and User Input (화면 활용과 사용자 입력을 위한 모바일 웹 사용자 인터페이스 패턴)

  • Choi, Jong Myung;Lee, Young Ho;Cho, Yong Yun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.183-190
    • /
    • 2012
  • Mobile web applications are different from desktop web applications because of their small screen size and small user input devices. Therefore user interface designers have spent their effort and time to re-design the user interface of mobile web applications to meet these differences. In this paper, we introduce five user interface patterns for mobile web applications to reduce their effort and time. Two of them are for utilizing small screen size efficiently, and they are space overloading pattern and data filtering pattern. These patterns enable designers to reduce screen usage. The other three patterns - data suggestion pattern, input reuse pattern, and incremental data input pattern - are for helping users' data input on mobile devices. These three patterns enable users to reduce direct data input. Our work will help user interface designers develop mobile web interface to utilize screen space efficiently and get data with less errors and less efforts from users.

Multiple Dimension User Motion Detection System base on Wireless Sensors (무선센서 기반 다차원 사용자 움직임 탐지 시스템)

  • Kim, Jeong-Rae;Jeong, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.700-712
    • /
    • 2011
  • Due to recently advanced electrical devices, human can access computer network regardless of working location or time restriction. However, currently widely used mouse, joystick, and trackball input system are not easy to carry and they bound user hands exclusively within working space. Those make user inconvenient in Ubiquitous environments.. In this paper, we propose multiple dimension human motion detection system based on wireless sensor networks. It is a portable input device and provides easy installation process and unbinds user hands during input processing stages. Our implemented system is comprised of three components. One is input unit that senses user motions and transmits collected data to receiver. Second is receiver that conveys the received data to application, which runs on server computer. Third is application that performs command operations according to received data. Experiments shows that proposed system accurately detect the characteristics of user arm motions and fully support corresponding input requests.

An Efficient User Selection Algorithm in Downlink Multiuser MIMO Systems with Zero-Forcing Beamforming (하향링크 다중 사용자 MIMO 시스템에서의 Zero-Forcing 빔 형성을 이용한 효과적인 사용자 선택 기법)

  • Go, Hyun-Sung;Oh, Tae-Youl;Choi, Seung-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.6A
    • /
    • pp.494-499
    • /
    • 2009
  • In this paper, we provide an efficient method of user selection for achieving the maximum system throughput in downlink multiuser Multiple-Input Multiple-Output (MIMO) systems. A proposed method is for selecting a fine user set only with powers of each user channel and angles between them. This algorithm is simpler than SUS because there is no considering about the optimal value of correlation. The proposed method finds the user set toward maximizing system throughput, so it has high performance.

A comparison between different TV channel input methods using numeric keypads (숫자판을 이용한 TV채널 입력방식에 대한 고찰)

  • Lee, Nam-Sik;Kim, Ho-Seong;Sin, Chan-Su
    • Journal of the Ergonomics Society of Korea
    • /
    • v.17 no.3
    • /
    • pp.61-70
    • /
    • 1998
  • The purpose of this paper is to evaluate the input methods of the numeric keypads that are widely used in various types of consumer and industrial electronic products. Three methods to enter numerals using keypads were compared: (1) Machine Intelligence, (2) + 100 key, and (3) Enter key input methods. Experiments were conducted to compare these three input methods for the channel selection of TV. Experimental prototypes which simulate TV user interfaces were developed using $RAPID^{TM}$ for usability testings. In the experiment, data on subject performance such as completion time, operational errors, and user interaction were collected through auto-logging method and video recording. After each test session, subjective preference was also asked using a questionnaire. In order to analyze the type of operation errors and the error causation, operation sequences were analyzed from the collected data. The Enter key input method showed better performance than other input methods. Based on these results. we can conclude that the input method using numeric keypads should be compatible with generic number counting(to input ch 7, it would be better to input 7 directly than to input 07 or 007) and should switch the channel as quickly as possible. This conclusion can be applied to the design of user interfaces which require numeral inputs.

  • PDF

Handwriting and Voice Input using Transparent Input Overlay (투명한 입력오버레이를 이용한 필기 및 음성 입력)

  • Kim, Dae-Hyun;Kim, Myoung-Jun;Lee, Zin-O
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.4
    • /
    • pp.245-254
    • /
    • 2008
  • This paper proposes a unified multi-modal input framework to interface the recognition engines such as IBM ViaVoice and Microsoft handwriting-recognition system with general window applications, particularly, for pen-input displays. As soon as user pushes a hardware button attached to the pin-input display with one hand, the current window of focus such as a internet search window and a word processor is overlaid with a transparent window covering the whole desktop; upon which user inputs handwriting with the other hand, without losing the focus of attention on working context. As well as freeform handwriting on this transparent input overlay as a sketch pad, the user can dictate some words and draw diagrams to communicate with the system.

A Study on the attack technique using android UI events (안드로이드 UI 이벤트를 이용한 공격 기법 연구)

  • Yoon, Seok-Eon;Kim, Min-Sung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.603-613
    • /
    • 2015
  • Smart-phone Applications are consists of UI(User Interface). During using applications, UI events such as button click and scroll down are transmitted to Smart-phone system with many changes of UI. In these UI events, various information including user-input data are also involved. While Keylogging, which is a well-known user-input data acquisition technique, is needed a restrictive condition like rooting to obtain the user-input data in android environment, UI events have advantage which can be easily accessible to user-input data on user privileges. Although security solutions based keypad in several applications are applied, we demonstrate that these were exposed to vulnerability of application security and could be obtained user-input data using UI events regardless of presence of any security system. In this paper, we show the security threats related information disclosure using UI events and suggest the alternative countermeasures by showing the replay-attack example based scenarios.

Active Secondary User Selection Algorithm of Opportunistic Spatial Orthogonalization Considering Interference by a Primary User (주 사용자의 간섭을 고려한 Opportunistic Spatial Orthogonalization의 활성 부 사용자 선택 알고리즘)

  • Yoo, Kang-Hyun;Kim, Yong-Hwa;Lee, Han-Byul;Kim, Seong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11A
    • /
    • pp.892-902
    • /
    • 2011
  • The opportunistic spatial orthogonalization (OSO) scheme, proposed by Cong Shen and Michael P. Fitz, allows the existence of secondary users during the period in which the primary user is occupying all licensed bands. This paper introduces an active secondary user selection algorithm which mitigates the interference from the primary user transmitter to the secondary user receiver based on single-input multi-output system without altering a primary user's transmission strategy. A proposed algorithm guarantees the minimum average throughput of the primary user and overcomes the average sum throughput of a conventional OSO. We have numerically analyzed the average throughput under various constraints.

Modeling of Convolutional Neural Network-based Recommendation System

  • Kim, Tae-Yeun
    • Journal of Integrative Natural Science
    • /
    • v.14 no.4
    • /
    • pp.183-188
    • /
    • 2021
  • Collaborative filtering is one of the commonly used methods in the web recommendation system. Numerous researches on the collaborative filtering proposed the numbers of measures for enhancing the accuracy. This study suggests the movie recommendation system applied with Word2Vec and ensemble convolutional neural networks. First, user sentences and movie sentences are made from the user, movie, and rating information. Then, the user sentences and movie sentences are input into Word2Vec to figure out the user vector and movie vector. The user vector is input on the user convolutional model while the movie vector is input on the movie convolutional model. These user and movie convolutional models are connected to the fully-connected neural network model. Ultimately, the output layer of the fully-connected neural network model outputs the forecasts for user, movie, and rating. The test result showed that the system proposed in this study showed higher accuracy than the conventional cooperative filtering system and Word2Vec and deep neural network-based system suggested in the similar researches. The Word2Vec and deep neural network-based recommendation system is expected to help in enhancing the satisfaction while considering about the characteristics of users.

Feature Subset for Improving Accuracy of Keystroke Dynamics on Mobile Environment

  • Lee, Sung-Hoon;Roh, Jong-hyuk;Kim, SooHyung;Jin, Seung-Hun
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.523-538
    • /
    • 2018
  • Keystroke dynamics user authentication is a behavior-based authentication method which analyzes patterns in how a user enters passwords and PINs to authenticate the user. Even if a password or PIN is revealed to another user, it analyzes the input pattern to authenticate the user; hence, it can compensate for the drawbacks of knowledge-based (what you know) authentication. However, users' input patterns are not always fixed, and each user's touch method is different. Therefore, there are limitations to extracting the same features for all users to create a user's pattern and perform authentication. In this study, we perform experiments to examine the changes in user authentication performance when using feature vectors customized for each user versus using all features. User customized features show a mean improvement of over 6% in error equal rate, as compared to when all features are used.

Behavior Realization of Multi-Robots Responding to User's Input Characters (사용자 입력 문자에 반응하는 군집 로봇 행동 구현)

  • Jo, Young-Rae;Lee, Kil-Ho;Jo, Sung-Ho;Shin, In-Sik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.5
    • /
    • pp.419-425
    • /
    • 2012
  • This paper presents an approach to implement the behaviors of multi-robots responding to user's input characters. The robots are appropriately displaced to express any input characters. Using our method, any user can easily and friendly control multirobots. The responses of the robots to the user's input are intuitive. We utilize the centroidal Voronoi algorithm and the continuoustime Lloyd algorithm, which have popularly been used for the optimal sensing coverage problems. Collision protection is considered to be applied for real robots. LED sensors are used to identify positions of multi-robots. Our approach is evaluated through experiments with five mobile robots. When a user draw alphabets, the robots are deployed correspondingly. By checking position errors, the feasibility of our method is validated.