• Title/Summary/Keyword: a user form

Search Result 1,243, Processing Time 0.034 seconds

The Study on Dynamic Query Visualization of Digital Data - Focusing on Developing Element, Expression and Interface - (디지털 데이터의 동적 질의형 시각화에 관한 연구 -개발 요소, 표현, 인터페이스 중심으로-)

  • 최홍석;김성곤
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.437-450
    • /
    • 2004
  • Advancement of the media it will be able to express the development and information of computer system causes a problem, how to get the information from plenty of digital data. It needs to the research that provides efficient interface to the user and presents the information visualization standard to the author Consequently, From this paper it investigated analysis of the dynamic diagram and the computer software it led development process of information visualization and result of development outcome. Important developing forms of Information visualization are include Element, Expression, Interface. For developing information visualization model, First, Find the element from many kind of media, include graphic. Second, Find form of the expression from past the diagram which comes to be used plentifully. Last, To get appropriate result it applies the interface, necessary from the interface component which is various uses from computer program. like this, on this paper presents about important three visualization developing forms with detail examples.

  • PDF

Service for Bicycle Use Information Based on Low Carbon Green Growth (저탄소 녹색성장 기반의 자전거 이용정보 서비스)

  • Kim, Eui-Myoung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.75-81
    • /
    • 2010
  • Existing studies on the bicycle road were mostly for the promotion of bicycle road through the creation of bicycle road. However, as the gradually increase of bicycle users, it has been required service based on low carbon green growth in order to promote the use of bicycles which are green means of transportation. Analysis of existing bicycle use information is mainly based on calculating the amount of exercise, so the diverse needs of bicycle user does not accommodated. Therefore, in this study, it is proposed that methodology compute to reduce cost or amount of carbon dioxide, fuel, and processing costs of global warming by using bicycle. For this, a program is implemented to display bicycle use information provided in the form of GPX based on Google Earth in three-dimensional environment and to service based on low carbon, green growth. The developed program is compared with existing commercial software. Through this study, new services have been developed to carry out low carbon and green growth in terms of bicycle users, and it is considered that the services can be applied to devices such as smart phones.

Physical Interactive Game on the Digital Desk (디지털 데스크상의 체감형 게임 구현)

  • Chung, Jee-Hoon;Yun, Tae-Soo;Lee, Dong-Hoon;Yang, Hwang-Kyu
    • Journal of Korea Game Society
    • /
    • v.5 no.1
    • /
    • pp.11-18
    • /
    • 2005
  • Recently, as one method of the game manipulation, physical interactive game is increasing, which controls the program by direct human movement. Tangible interface for physical interactive game implementation can control virtual model directly through real world object. A digital desk, one of the tangible interface, offers the interface that human can manipulate virtual object directly, by making projection screen on real world desk as computer display device. In this paper, we implement "Battle Region" game in the form of tangible interface, which can offer game users an efficient and amusing experiences by the use of physical interactive game. Traditional game cannot pursuit the diversity of game background contents but our game can do it through Map image projection. From this, game provider can supply the diversity of choice and users ran set up the difficulty of game. Therefore, our implemented game can offer users an efficient and amusing experiences by making game user's challenge and satisfaction maximum.

  • PDF

Anytime Multimedia Service based on In-Home Storage (댁내 저장장치를 활용한 Anytime 멀티미디어 서비스)

  • 김광수;최태상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1211-1219
    • /
    • 1999
  • High quality real-time interactive multimedia services like VOD gained huge momentum by information technology industries during the middle of 1990, but failed successful commercial service deployment despite of the expectations. Among the number of reasons, lack of high bandwidth and QoS support from the network infrastructure have become main cause of the failure. On the other hand, the advance of computer industry-driven storage technologies has been reducing the price of in-home storage dramatically. This fact and the delivery of audio-visual material in a digital form to the home storage make very interesting multimedia service applications possible. It enables anytime content delivery (e.g., during off-peak time) without user interaction and anytime content play and, also, enhances utilization by reducing the loads applied to servers and networks using multicast network infrastructure. In this paper, we propose design and implementation of our anytime multimedia service system based on in-home storage, called IMPRESS-AMS.

  • PDF

Improved BER Performance of Non-Orthogonal Multiple Access System for Interactive Mobile Users: Maximum Likelihood Detection Perspective (상호작용 이동통신 사용자에 대한 비직교 다중접속 시스템의 BER 성능 향상: ML 검출 관점)

  • Chung, Kyu-Hyuk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.865-872
    • /
    • 2020
  • In the fifth generation (5G) mobile networks, non-orthogonal multiple access (: NOMA) has been considered as a promising technology, to increase the channel capacity. In NOMA, the multiple users share the channel resources and multiplex simultaneously. Recently, for the stronger channel user, it was reported that the bit-error rate (: BER) performance with interactive mobile users is degraded, compared to the BER of non-interactive users. In this paper, in order to improve such degraded BER performance, we propose the maximum-likelihood (: ML) receiver. First, the closed-form expression for the BER of the ML receiver is derived, and then it is shown that the BER of the ML receiver is improved, compared with the BER of the ideal perfect successive interference cancellation (: SIC) receiver. Additionally, based on the analytical expression, Monte Carlo simulations validates the above-mentioned results.

An Analysis and modeling of Mobile IP network in VoIP Network (VoIP Network에서 Mobile IP 분석 및 설계)

  • Eom, Ki-Bok;Yoe, Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.414-418
    • /
    • 2003
  • VoIP is a core technology used to transmit both voice and data in an integrated packet' form. Within this technology, SIP is the signaling protocol used for 'real time' call services; particularly those where H323 is used. Yet, when considering the needs of mobile users, it is essential we integrate VoIp within the mobile technology so the mobile host is able to receive the 'packet' transported and by, and connected to, any available internet-address. For all this to occur, we need to improve Network Delay by reducing transmission problems associated with mobile services. If we are to obtain an optimal service then we must reduce any network delays which may arise from joining Mobile IP and VoIp services. This paper, therefore, considers how, unlike previous research, these delays may be improved through the use of the signaling technology\ulcorner SIP. It also considers how this research may be introduced into current wired and wireless integrated services enabling them to use the IP 'packet'.

  • PDF

AAA Mechanism for the Integration between Heterogeneous Network in Wireless Network Roaming Environment (무선 네트워크 로밍 환경에서 이기종 네트워크간 연동을 위한 AAA 메커니즘)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.481-492
    • /
    • 2008
  • With the advancement of the Internet and networks, the combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security vulnerability. Also, form of service that users offer will be service for roaming user. In these service, we must provide fast authentication and security at roaming. Therefore in this paper we proposed roaming and AAA mechanism in heterogeneous network environment. Our system provides secure communication and efficiency.

Development of an MCNP-Based Cone-Beam CT Simulator (MCNP 기반의 CBCT 전산모사 시스템 개발)

  • Lim, Chang-Hwy;Cho, Min-Kook;Han, Jong-Chul;Youn, Han-Bean;Yun, Seung-Man;Cheong, Min-Ho;Kim, Ho-Kyung
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.29 no.4
    • /
    • pp.351-359
    • /
    • 2009
  • We have developed a computer simulator fur cone-beam computed tomography (CBCT) based on the commercial Monte Carlo code, MCNP. All the functions to generate input files, run MCNP, convert output files to image data, reconstruct tomographs were realized in graphical user-interface form. The performance of the simulator was demonstrated by comparing with the experimental data. Although some discrepancies were observed due to the ignorance of the detailed physics in the simulation, such as scattered X-rays and noise in image sensors, the overall tendency was well agreed between the measured and simulated data. The developed simulator will be very useful for understanding the operation and the better design of CT systems.

The Algorithm For Spatial XQuery2SQL Converter (Spatial XQuery2SQL Converter를 위한 알고리즘)

  • Choi, Young Nn;Seo, Hyun-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.442-447
    • /
    • 2004
  • XML is normalized text form that is designed to transmit structured document in web as that propose in W3C (World Wide Web Consortium) in 1996. Function that this can overcome HTML's limit that use in existing in Internet and user define new tag to HTML by way to solve SGML's complexity added. There is many efforts to use storing this XML document in RDBMS but to relation style DB because XML document is tree structure structurally data SQL and perfect disaster caused by things that is language to ask a question accomplish XQuery that so it is W3C's XML standard query appear. After store XML informations including space information to RDBMS in this paper, Spatial XQuery through converter that is Sqatial XQuery2SQL through Spatial operator, Spatial function SQL of by Sqatial XQuery2SQL conversion algorithm that draw information in RDBMS after change embody wish to.

  • PDF

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF