• Title/Summary/Keyword: User task

Search Result 819, Processing Time 0.034 seconds

Augmented Reality and Virtual Reality Technology Trend for Unmanned Arial Vehicles (무인항공기를 위한 증강/가상현실 기술 동향)

  • Bang, J.S.;Lee, Y.H.;Lee, H.J.;Lee, G.H.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.5
    • /
    • pp.117-126
    • /
    • 2017
  • With the advances of high-performance, lightweight hardware components and control software, unmanned aerial vehicles (UAVs) have expanded in terms of use, not only for military applications but also for civilian applications. To complete their task at a remote location, UAVs are generally equipped with a camera, and various sensors and types of hardware devices can be attached according to the particular task. When UAVs capture video images and transmit them into the user's interface, augmented reality (AR) and virtual reality (VR) technologies as a user interface may have advantages in controlling the UAV. In this paper, we review AR and VR applications for UAVs and discuss their future directions.

A Hybrid Collaborative Filtering Method using Context-aware Information Retrieval (상황인식 정보 검색 기법을 이용한 하이브리드 협업 필터링 기법)

  • Kim, Sung Rim;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.1
    • /
    • pp.143-149
    • /
    • 2010
  • In ubiquitous environment, information retrieval using collaborative filtering is a popular technique for reducing information overload. Collaborative filtering systems can produce personal recommendations by computing the similarity between your preference and the one of other people. We integrate the collaboration filtering method and context-aware information retrieval method. The proposed method enables to find some relevant information to specific user's contexts. It aims to makes more effective information retrieval to the users. The proposed method is conceptually comprised of two main tasks. The first task is to tag context tags by automatic tagging technique. The second task is to recommend items for each user's contexts integrating collaborative filtering and information retrieval. We describe a new integration method algorithm and then present a u-commerce application prototype.

A Multi-Class Task Scheduling Strategy for Heterogeneous Distributed Computing Systems

  • El-Zoghdy, S.F.;Ghoneim, Ahmed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.117-135
    • /
    • 2016
  • Performance enhancement is one of the most important issues in high performance distributed computing systems. In such computing systems, online users submit their jobs anytime and anywhere to a set of dynamic resources. Jobs arrival and processes execution times are stochastic. The performance of a distributed computing system can be improved by using an effective load balancing strategy to redistribute the user tasks among computing resources for efficient utilization. This paper presents a multi-class load balancing strategy that balances different classes of user tasks on multiple heterogeneous computing nodes to minimize the per-class mean response time. For a wide range of system parameters, the performance of the proposed multi-class load balancing strategy is compared with that of the random distribution load balancing, and uniform distribution load balancing strategies using simulation. The results show that, the proposed strategy outperforms the other two studied strategies in terms of average task response time, and average computing nodes utilization.

A Study on UI Design Guideline based for UCC(User Created Content) Service for Video - Focused on Viewing Interface and Uploading Interface - (UCC(User Created Content) 동영상 서비스를 위한 UI Design 가이드라인 개발에 관한 연구 - Viewing Interface 및 Uploading Interface를 중심으로 -)

  • Kim, Hee-Jeong;Kim, Hyun-Jeong
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.112-117
    • /
    • 2007
  • Web 2.0 시대의 도래와 함께 사용자가 제작한 동영상 컨텐츠를 공유하는 웹서비스인 UCC에 대한 관심이 날로 높아지고 있다. 이는 지속적인 사용이 요구되는 서비스 분야로서 UI의 중요성이 더욱 절실한 분야이다. 이에 본 연구에서는 UCC 동영상 서비스 사이트의 UI Design 가이드라인을 제시하기 위하여 다음과 같은 연구를 진행하였다. 다양한 UCC 동영상 서비스의 대표사이트 중 국외의 YouTube 사이트와 국내의 Pandora 사이트를 중심으로 Task 분석을 통해 사용성 평가에 필요한 Task 항목을 도출하였다. 사용성 평가를 실시한 후, 평가 결과를 분석하여 문제점을 종합하고 실제 다른 사이트의 UI Design을 분석하는데 필요한 비교 분석표를 제안하였다. 이 비교 분석표를 통해 대표적인 UCC 동영상 서비스 사이트의 사례 분석을 실시한 후, 최종 UCC 동영상 서비스를 위한 UI Design 가이드라인을 제안한다.

  • PDF

Scan-to-Geometry Mapping Rule Definition for Building Plane Reverse engineering Automation (건축물 평면 형상 역설계 자동화를 위한 Scan-to-Geometry 맵핑 규칙 정의)

  • Kang, Tae-Wook
    • Journal of KIBIM
    • /
    • v.9 no.2
    • /
    • pp.21-28
    • /
    • 2019
  • Recently, many scan projects are gradually increasing for maintenance, construction. The scan data contains useful data, which can be generated in the target application from the facility, space. However, modeling the scan data required for the application requires a lot of cost. In example, the converting 3D point cloud obtained from scan data into 3D object is a time-consuming task, and the modeling task is still very manual. This research proposes Scan-to-Geometry Mapping Rule Definition (S2G-MD) which maps point cloud data to geometry for irregular building plane objects. The S2G-MD considers user use case variability. The method to define rules for mapping scan to geometry is proposed. This research supports the reverse engineering semi-automatic process for the building planar geometry from the user perspective.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

Development of a Distributed OperatorTtraining System (조업자 훈련을 위한 분산 교육시스템 구축)

  • Cho, Sung-Il;Jang, Byung-Mu;Moon, Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.1424-1427
    • /
    • 1996
  • OTS(Operator Training System) requires computation for the systematic training in real-time. So we have developed a distributed operator training system that is composed of workstation based server and PC based user modules. Sever and OM(OTS Manager) modules are located in the workstation server and user modules are located in PCs. User modules have DCS-like user interfaces and transfer data with OM over the coaxial ethernet. This paper delineates a total system architecture and definition of data transferring between OM and User module. Having applied this system to a batch process, we could analyze operator's tasks.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

A Study on the Construction of an Efficient Text-Based User Interface (효율적 문자 기반의 사용자 인터폐이스 구축에 관한 연구)

  • 허진석;서장춘
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.289-289
    • /
    • 2000
  • In this paper, a new text-based method is suggested for the user-system interaction. The use of text-based user interface is mote efficient under situation which don't be introduced the GUI because of the limitation of hardware cost or improvement of system performance. The dialogical method using suggested hierarchical structure is the easier for a convenience of usage and the method in this paper is the more useful as considering knowledgeable background and environment of task for user As a practical example, the method for the proposed text-based user interface construction is applied to Double-Lift Open Shedding Electronic Jacquard.

  • PDF

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.