• Title/Summary/Keyword: Web information

Search Result 11,586, Processing Time 0.038 seconds

Implementation of User-friendly Intelligent Space for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 사용자 친화적 지능형 공간 구현)

  • Choi, Jong-Moo;Baek, Chang-Woo;Koo, Ja-Kyoung;Choi, Yong-Suk;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.443-452
    • /
    • 2004
  • The paper presents an intelligent space management system for ubiquitous computing. The system is basically a home/office automation system that could control light, electronic key, and home appliances such as TV and audio. On top of these basic capabilities, there are four elegant features in the system. First, we can access the system using either a cellular Phone or using a browser on the PC connected to the Internet, so that we control the system at any time and any place. Second, to provide more human-oriented interface, we integrate voice recognition functionalities into the system. Third, the system supports not only reactive services but also proactive services, based on the regularities of user behavior. Finally, by exploiting embedded technologies, the system could be run on the hardware that has less-processing power and storage. We have implemented the system on the embedded board consisting of StrongARM CPU with 205MHz, 32MB SDRAM, 16MB NOR-type flash memory, and Relay box. Under these hardware platforms, software components such as embedded Linux, HTK voice recognition tools, GoAhead Web Server, and GPIO driver are cooperated to support user-friendly intelligent space.

Policy Suggestions for Soil Contamination Prevention and Management of Inactive or Abandoned Metal Mines (휴.폐금속광산지역의 토양오염관리정책의 평가)

  • Park Yong-Ha;Seo Kyung-Won
    • Journal of Soil and Groundwater Environment
    • /
    • v.11 no.3
    • /
    • pp.1-11
    • /
    • 2006
  • Attempts were made to analyze the national policy of soil contamination prevention and management of inactive or abandoned metal (IAM) mines in Korea. This approach focused on legal systems and legislation, remediation technology development, and the arrangement or distribution of budgets pertaining to national policy since the mid 1990's. Prevention of Mining Damage and Recovery Act enacted. Defines the roles, responsibility and budget of the government when recovering mine damages. However, in 2005 there still remains to improve the national policy of soil contamination prevention and management of IAM mines. Analysis of national and industrialized foreign countries including the United States, the United Kingdom, and the Netherlands suggest the following improvements: i) arranging distinct regulations between strict and non-strict liability criteria for potentially responsible parties; limiting innocent and non-strict liability depending on the period of incurred mining activity, ii) enhancing participation of local communities by enforcing law and legislation, iii) establishing a national database system of (potentially) IAM contaminated sites based on the Website-Geographic Information System, iv) carrying out site-specific risk assessments and remediation of IAM contaminated sites, v) preparation and distribution of clean-up fund at mine sites adequately, and vi) technology development for the cleaning of IAM contaminated sites; awarding positive incentives of a legal nature for participants applying newly developed technology in IAM mines.

Relationship of Initial Density, Biomass and Tuber Productivity of Scirpus planiculmis in the Nakdong River Estuary (낙동강 하구 새섬매자기 초기밀도, 생체량과 괴경량의 관계)

  • Yi, Yong Min;Yeo, Un Sang;Sung, Kijune
    • Journal of Wetlands Research
    • /
    • v.15 no.1
    • /
    • pp.9-17
    • /
    • 2013
  • Scirpus planiculmis dominated in Nakdong river estuary is known as food for birds visiting to Nakdong river estuary and plays an important role in material cycle and food web, while repeating growth and production, decomposition process in 1-year interval. Therefore, if it is able to predict effectively biomass or tuber production of Scirpus planiculmis which is food source for estuarine organisms or birds, it can provide very useful information on the Nakdong river estuary management. In this study, regression equation that can predict the tuber production, food for birds, was obtained using initial density of Scirpus planiculmis that can minimize the disturbance of ecosystem and is faster and easier. The correlation analysis results show that density, biomass and tuber production have liner relationship(p<0.001) with 0.6103~0.9950 of correlation coefficients. In addition, the regression equations have high coefficients of determination of 0.3696~0.7145 and it shows that it is able to predict biomass or tuber production while using the estimated regression equation obtained from relationship among the initial density, biomass and tuber production. The results of this study are expected to utilize effectively the management of estuary ecosystem such as management on food source for migratory birds visiting to Nakdong river estuary.

Effective Design Pattern and Enterprise Architecture Design Techniques in EJB Environment (EJB기반의 효율적인 설계 패턴 및 엔터프라이즈 아키텍처 설계 기법)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.11
    • /
    • pp.1025-1036
    • /
    • 2003
  • In industry, it is a current trend that systems are developed by using Enterprise JavaBeans(EJB) technology for reducing the cost and the time. Thus, the architecture of EJB is getting more essential to enhance reusability, extensibility and portability of system. However little has been studied in the realm of the practical software architectures for EJB. The architecture has just bean studied in abstract level, but not in concrete level providing the method to substantiate it using the practical J2EE techniques. Just using the EJB technology doesn't guarantee the reusability of the artifacts because EJB specification provides the characteristics and architecture for only fine grained components as session and entity bean. In this paper, we propose the enterprise software architecture for the systems based on EJB and the concrete techniques for implementing that. Also, design patterns of modeling efficient enterprise architecture are represented. By analyzing both the strengths and the weaknesses of suggested design patterns, EJB design patterns which are suitable for each layer of enterprise architecture will be identified. Through the component which design patterns are applied, the architecture can support the optimized relationship between the components. Five techniques for designing components from fine grained to coarse grained based on EJB technology, and architecture design techniques including transaction and assembling techniques are proposed.

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

Message Interoperability in e-Logistics System (e-Logistics시스템의 메시지 상호운용성)

  • Seo Sungbo;Lee Young Joon;Hwang Jaegak;Ryu Keun Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.436-450
    • /
    • 2005
  • Existing B2B, B2C computer systems and applications that executed business trans-actions were the client- server based architecture which consists of heterogeneous hardware and software including personal computers and mainframes. Due to the active boom of electronic business, integration and compatibility of exchanged data, applications and hardwares have emerged as hot issue. This paper designs and implements a message transport system and a document transformation system in order to solve the interoperability problem of integrated logistics system in e-Business when doing electronic business. Message transport system integrated ebMS 2.0 which is standard business message exchange format of ebXML, the international standard electronic commerce framework, and JMS of J2EE enable to ensure reliable messaging. The document transformation system could convert non-standard XML documents into standard XML documents and provide the web services after integrating message system. Using suggested business scenario and various test data, our message oriented system preyed to be interoperable and stable. We participated ebXML messaging interoperability test organized by ebXML Asia Committee ITG in oder to evaluate and certify the suitability for message system.

Gesture Spotting by Web-Camera in Arbitrary Two Positions and Fuzzy Garbage Model (임의 두 지점의 웹 카메라와 퍼지 가비지 모델을 이용한 사용자의 의미 있는 동작 검출)

  • Yang, Seung-Eun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.2
    • /
    • pp.127-136
    • /
    • 2012
  • Many research of hand gesture recognition based on vision system have been conducted which enable user operate various electronic devices more easily. 3D position calculation and meaningful gesture classification from similar gestures should be executed to recognize hand gesture accurately. A simple and cost effective method of 3D position calculation and gesture spotting (a task to recognize meaningful gesture from other similar meaningless gestures) is described in this paper. 3D position is achieved by calculation of two cameras relative position through pan/tilt module and a marker regardless with the placed position. Fuzzy garbage model is proposed to provide a variable reference value to decide whether the user gesture is the command gesture or not. The reference is achieved from fuzzy command gesture model and fuzzy garbage model which returns the score that shows the degree of belonging to command gesture and garbage gesture respectively. Two-stage user adaptation is proposed that off-line (batch) adaptation for inter-personal difference and on-line (incremental) adaptation for intra-difference to enhance the performance. Experiment is conducted for 5 different users. The recognition rate of command (discriminate command gesture) is more than 95% when only one command like meaningless gesture exists and more than 85% when the command is mixed with many other similar gestures.

A Study on the Development of the 『Guunmong』 Story's Digital Image-Contents by Collective Intelligence (집단지성기반의 『구운몽』 디지털 이미지 콘텐츠 개발 방안 연구)

  • Lee, Jung-Gon;Jeong, Dae-Yul
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.11
    • /
    • pp.501-512
    • /
    • 2019
  • The purpose of this study is to explore the necessity and method of the development of modern digital image contents using the story of the literary work 'Guunmong'' by Kim Man-joong. Collective intelligence technique is one of the most recommended. Today, most cultural content development is achieved through the application of digital technology through collaboration of various people from the planning stage to the completion stage. Most prototypes of local cultural contents are developed based on the literary works of artists from the region or background of the region on the works. These local cultural resources can be developed into experiential tourism products and used for the development of local cultural industry. This study first examines the availability of collective intelligence method as a way to effectively develop local cultural contents, and proposes application of image-telling technique and using web-toon characters in digital image contents development. In order to prove the practical applicability of the proposed method, we present an example of cultural contents development of 'Guunmong'. Finally, we propose a new business model based on collective intelligence to develop a system of creation and distribution of the cultural contents through the continuous collaboration.

Design of Programming Failure Feedback System Based on Control Flow of Test Case to Support Programming Training (프로그래밍 훈련 지원을 위한 테스트케이스의 제어흐름에 기반한 프로그래밍 실패 피드백 시스템 설계)

  • Lee, Sunghee;Kim, Deok Yeop;Seo, Kang Bok;Lee, Woo Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.8
    • /
    • pp.317-322
    • /
    • 2019
  • Programming judge systems for programming training support are typically built on the Web, where the examiners uploads a programming problem, which the student reads and submits an answer to the problem. The judge system executes the submitted answer of source code to provide feedback such as pass, failure, and error messages. Students who receive the feedback except for the pass continues debugging the source code until they are judged to pass. We developed an online judge system to support programming training and analyzed answers submitted by the students and found that many of the students who were not judged to pass that test did not know exactly where they were wrong but continued to solve the problem. The current judge system generally feeds runtime error messages back to students. However, with only runtime error message, it is difficult for student who train to find the wrong part of the answer. Therefore, in this paper, we propose a system that provides the feedback of programming failure by analyzing the control flow of the test cases used in the source code submitted by the student. The proposed system helps students find the wrong parts more quickly by feeding back the paths where faults in the control flow may exist. In addition, we show that this system is applicable to the answer source code that the actual student submitted.

Effect of Simulator Sickness Caused by Head-mounted Display on the Stability of the Pupillary Rhythm (머리착용 디스플레이에 의해 유발된 멀미 증상이 동공 리듬의 안정성에 미치는 영향)

  • Park, Sangin;Lee, Don Won;Mun, Sungchul;Kim, Hong-Ik;Whang, Mincheol
    • Science of Emotion and Sensibility
    • /
    • v.21 no.4
    • /
    • pp.43-54
    • /
    • 2018
  • The aim of this study is to determine the effect of motion sickness on pupil rhythm. Sixteen volunteers of both genders (8 male, 8 female, mean age $25.67{\pm}2.43$ years) experienced VR contents in both 2D and HMD versions for 15 minutes, and their pupillary rhythms were compared. The irregular pattern of the pupillary rhythms, as demonstrated by increasing mean pupil diameter (mPD) and standard deviation of the pupil diameter (sPD), revealed motion sickness after experiencing HMD condition. The pupillary response is strongly related to the cognitive load, and the motion sickness can be interpreted as a change in the cognitive load caused by the increasing volume of visual information that must be processed and the conflict or inconsistency between different sensory modalities. The method proposed in this study could be a non-contact measurement method for the monitoring of motion sickness using a web-camera rather than previous sensor-based methods.