• Title/Summary/Keyword: computer technologies

Search Result 2,670, Processing Time 0.034 seconds

A Study on the Patent Map of Apparel Design using Computer Technology

  • Lee, Keum-Hee
    • The International Journal of Costume Culture
    • /
    • v.5 no.3
    • /
    • pp.151-163
    • /
    • 2002
  • This study attempted to creat patent map 163 cases of patent for technology of apparel design using computer technology and researched the trend of Patent application by count교, technologies, applicant and filing date. In regard to application by country, the United States mark the first place with 99 cases (61%), Japan marks the second with 34 cases (21%), Korea the third with 19 cases (12%). Comparing the patent applications in specialized technologies, we find the United States is overwhelming the technologies for garment Production Process, Patterning Process and preparatory process, and Japan is currently undergoing development work in this area, while most of Korean applications are focused in the technologies for selection or substitution methods related to Purchase and sale of apparels, body image and design service Therefore, it is required to preoccupy and defend patent rights as well as develop technologies aggressively and extensively in preparation for the expansion of e-commerce market. Analysing the speed of progress in technology in terms of number of applicants and application cases, we can say it entered into developing stage from the middle of 1990s and it seems that they will continue the development work from now on. in case of Korea, they began in 1996, somewhat late, but reached a similar level with the United States in 2000.

  • PDF

An Analysis of Human Gesture Recognition Technologies for Electronic Device Control (전자 기기 조종을 위한 인간 동작 인식 기술 분석)

  • Choi, Min-Seok;Jang, Beakcheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.91-100
    • /
    • 2014
  • In this paper, we categorize existing human gesture recognition technologies to camera-based, additional hardware-based and frequency-based technologies. Then we describe several representative techniques for each of them, emphasizing their strengths and weaknesses. We define important performance issues for human gesture recognition technologies and analyze recent technologies according to the performance issues. Our analyses show that camera-based technologies are easy to use and have high accuracy, but they have limitations on recognition ranges and need additional costs for their devices. Additional hardware-based technologies are not limited by recognition ranges and not affected by light or noise, but they have the disadvantage that human must wear or carry additional devices and need additional costs for their devices. Finally, frequency-based technologies are not limited by recognition ranges, and they do not need additional devices. However, they have not commercialized yet, and their accuracies can be deteriorated by other frequencies and signals.

A Survey on Concepts, Applications, and Challenges in Cyber-Physical Systems

  • Gunes, Volkan;Peter, Steffen;Givargis, Tony;Vahid, Frank
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4242-4268
    • /
    • 2014
  • The Cyber-Physical System (CPS) is a term describing a broad range of complex, multi-disciplinary, physically-aware next generation engineered system that integrates embedded computing technologies (cyber part) into the physical world. In order to define and understand CPS more precisely, this article presents a detailed survey of the related work, discussing the origin of CPS, the relations to other research fields, prevalent concepts, and practical applications. Further, this article enumerates an extensive set of technical challenges and uses specific applications to elaborate and provide insight into each specific concept. CPS is a very broad research area and therefore has diverse applications spanning different scales. Additionally, the next generation technologies are expected to play an important role on CPS research. All of CPS applications need to be designed considering the cutting-edge technologies, necessary system-level requirements, and overall impact on the real world.

A Study on The Controllability Function and Sevice Design for Disaster Damage Reduction in the IoT Environment

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.43-49
    • /
    • 2016
  • In this paper, we propose the controllability function and service design to efficiently implement the control of the disaster communication network, using Internet of Things(IoT) Technology. In accordance with the spread of Information Communication Technology(ICT), the era for building a disaster communications system without exclusion over the entire areas has emerged. National wireless mesh networks for public safety and disaster relief have been evolving to strengthen the pre-disaster response system using the latest technologies through the convergence of various technologies and services from the viewpoint of the command and control between disaster response agencies. In line with such a technological paradigm shift, the controllability of the objects in the IoT has been emerging as a key quality requirement of a disaster communications system. In this study, the objects are classified by the subject of control according to the IoT component, such as data, network resources and services in order to effectively implement their controllability. In addition, based on the destination of this controllability, technologies and services have been designed that can reduce the damage caused by disasters. Technologies and services that were derived from this study must be implemented in the current disaster safety network systems together with the establishment of an infrastructure for the networks in order that all persons are able to effectively utilize the disaster communications system for their safety.

Emerging Technologies for Sustainable Smart City Network Security: Issues, Challenges, and Countermeasures

  • Jo, Jeong Hoon;Sharma, Pradip Kumar;Sicato, Jose Costa Sapalo;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.765-784
    • /
    • 2019
  • The smart city is one of the most promising, prominent, and challenging applications of the Internet of Things (IoT). Smart cities rely on everything connected to each other. This in turn depends heavily on technology. Technology literacy is essential to transform a city into a smart, connected, sustainable, and resilient city where information is not only available but can also be found. The smart city vision combines emerging technologies such as edge computing, blockchain, artificial intelligence, etc. to create a sustainable ecosystem by dramatically reducing latency, bandwidth usage, and power consumption of smart devices running various applications. In this research, we present a comprehensive survey of emerging technologies for a sustainable smart city network. We discuss the requirements and challenges for a sustainable network and the role of heterogeneous integrated technologies in providing smart city solutions. We also discuss different network architectures from a security perspective to create an ecosystem. Finally, we discuss the open issues and challenges of the smart city network and provide suitable recommendations to resolve them.

The Introduction of Modern Technologies in Public Administration in the Context of Globalization

  • Dragomyretska, Natalia;Palagnyuk, Yuliana;Andriyash, Viktoria;Matvieienko, Iryna;Samofalov, Dmytro
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.334-340
    • /
    • 2022
  • The main purpose of the study is to determine the main aspects of the introduction of modern technologies in the public administration system in the context of globalization. Public administration is inherent in all known models of representation of social systems, characteristic management and other sciences of social management. This allows using the methods and technologies of management, marketing, social partnership and others in public administration and administration at a modern level. One of the main directions of public management and administration is social engineering, aimed at the development and development of the country's social system, and the tool is appropriate technologies. Based on the results of the analysis, the key modern technologies of the public administration system were identified in the context of the impact of globalization.

Didactic Principles Of Education Students 3D-printing

  • Lukianchuk, Iurii;Tulashvili, Yurii;Podolyak, Volodymyr;Horbariuk, Roman;Kovalchuk, Vasyl;Bazyl, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.443-450
    • /
    • 2022
  • The method of studying 3D-technologies abroad and in Ukraine is considered. The analysis of educational resources and experience of use of the equipment in branch is carried out. The didactic principles of the educational process for 3D-printing specialists are determined. The use of FDM technology and the ability to minimize the occurrence of defects in the future have been studied. An analysis of the international experience of the educational process of relevant specialists in the field. The content of training for 3D printing specialists has been developed. The experience of using 3D-technologies is described and the list of recommendations for elimination of defects during production of products by means of additive technologies is made. The recommendations will be useful not only for beginners, but also for experienced professionals in additive technologies. The need to study such experience is the main condition for the development of enterprises in Ukraine that plan to automate their own production. A 3D printing engineer must know the basics of economics and marketing, because his responsibilities include optimizing workflows to reduce the cost and speed up printing. Therefore, the knowledge gained from practical experience presented and in building for learning 3D printing engineers by the authors will be important.

Sensor Network Implementation of using Embedded Web Sever

  • Lee Jeong Gi;Shin Myung Souk;Park Do Joon;Lee Cheol Seung;Kim Choong Woon;Lee Joon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.532-535
    • /
    • 2004
  • Architecture generation is the first step in the design of software systems. Most of the qualities that the final software system possesses are usually decided at the architecture development stage itself. Thus, if the final system should be usable, testable, secure, high performance, mobile and adaptable, then these qualities or non­functional requirements should be engineered into the architecture itself. In particular, adaptability is emerging as an important attribute required by almost all software systems. The machinery and tools in the remote site surveillance and connects intelligence information machinery and tools at Internet. We need the server which uses different embedded operating system to become private use. With the progress of information-oriented society, many device with advanced technologies invented by many companies. However, the current firmware technologies have many problems to meet such high level of new technologies. In this paper, we have successfully ported linux on an embedded system, which is based on intel StrongARM SA-1 1 10 processor, then written several network modules for internet-based network devices.

  • PDF

Studying The Topic Of The Function Extremum Of Two Variables In The Conditions Of Remote Learning And Application Of Digital Technologies

  • Krupskyi Yaroslav;Tiytiynnyk Oksana;Kosovets Olena;Soia Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • In contemporary education, the rapid advancement of digital technologies elevates demands for integrating the latest tools into the learning process. Mathematical analysis, as a discipline, benefits from computer mathematics in distance education, enhancing practical aspects and enabling individualized learning. This article addresses the integration of the Maple computer mathematics system into higher education, specifically in teaching "Mathematical Analysis." Emphasizing its role in distance learning, computer mathematics optimizes the educational environment, reducing the time required for knowledge acquisition. The article showcases the application of Maple in finding extremum points and introduces an educational software simulator, enabling students to practice the method. The simulator, developed within Maple, facilitates self-checking and enhances the study of functions. Conclusions drawn from the study highlight the positive impact of these tools on distance education, affirming Maple's role in enhancing professional training and information culture among higher education students.

Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks

  • Alruwaili, Rahaf Hamoud;Alanazi, Haifa Khaled;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.303-309
    • /
    • 2022
  • Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.