• Title/Summary/Keyword: computers

Search Result 3,643, Processing Time 0.033 seconds

Technology Requirements for Wearable User Interface

  • Cho, Il-Yeon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.5
    • /
    • pp.531-540
    • /
    • 2015
  • Objective: The objective of this research is to investigate the fundamentals of human computer interaction for wearable computers and derive technology requirements. Background: A wearable computer can be worn anytime with the support of unrestricted communications and a variety of services which provide maximum capability of information use. Key challenges in developing such wearable computers are the level of comfort that users do not feel what they wear, and easy and intuitive user interface. The research presented in this paper examines user interfaces for wearable computers. Method: In this research, we have classified the wearable user interface technologies and analyzed the advantages and disadvantages from the user's point of view. Based on this analysis, we issued a user interface technology to conduct research and development for commercialization. Results: Technology requirements are drawn to make wearable computers commercialized. Conclusion: The user interface technology for wearable system must start from the understanding of the ergonomic aspects of the end user, because users wear the system on their body. Developers do not try to develop a state-of-the-art technology without the requirement analysis of the end users. If people do not use the technology, it can't survive in the market. Currently, there is no dominant wearable user interface in the world. So, this area might try a new challenge for the technology beyond the traditional interface paradigm through various approaches and attempts. Application: The findings in this study are expected to be used for designing user interface for wearable systems, such as digital clothes and fashion apparel.

Multi-Screen Virtual Reality System : VROOM - Hi-Resolution and four-screen Stereo Image Projection System -

  • NAKAJIMA, Masayuki;TAKAHASHI, Hiroki
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1997.06a
    • /
    • pp.95-100
    • /
    • 1997
  • In this paper, we report a system specifications of Hi-resolution and four-screen stereo image projection system which was established in VBL(Venture Business Laboratory) at Tokyo Institute of Technology on 3rd July 1996. The system is 3m $\times$ 3m $\times$2.2m rectangular parallelepiped composed of three 150inch side screens and floor. Host computers can generate virtual environment s in real-time and four projecters project these images to the screens. Viewers are, therefore, surrounded by these screens and an illusion of immersion can be created. Because, the views of users are completely covered with the projection images and many kinds of interactive devices can be used in this system. Moreover, many users can have experience the virtual environments at the same time. Usually, this kind of system uses hi-performance graphics workstations for host computers. One is SGI(Silicon Graphics, Inc.) Onyx with 3 Reality Engines. The other system is 4 personal computers. Because hi-performance and low price graphics accelerators for personal computer have been developed in these years, the abilities of VR(Virtual Reality) systems based on personal computers should be investigated.

  • PDF

The Influence of CAI(Computer-Assisted Instruction)Programs On Learner's Attitudes toward Computer and Science (CAI(Computer Assisted Instruction) 프로그램이 컴퓨터와 과학교과에 대한 학습자의 태도에 미치는 영향)

  • Jeong, Jin-Woo
    • Journal of The Korean Association For Science Education
    • /
    • v.12 no.1
    • /
    • pp.47-60
    • /
    • 1992
  • The purpose of this study was to investigate studesnts' attitudes toward computers and science subject using CAI(Computer-Assisted Instruction) as an instructional strategy in the elementary school level of science and computer literacy course. The influence of CAI programs on learner's attitudes toward computers and science varied according to the variables of,(l)sex (2)experience by computer learning, (3)learner's attitudes toward computers and science. Eighty nine samples were divided into the two groups.One group(48 studesnts)which is in the experimental group took a science instruction using CAI programs and computer literacy course, another group which is in the control group took only a science instruction using CAI programs. Data were collected and compared the experimental group with the control group. The results indicate as follows:(l) studesnts took science instruction using the CAI programs appeared a positive attitudes toward science. (2) the science attitudes of science instruction using the CAI programs was more effective in the lower group than in the upper group. (3) computer literacy course produced the positive attitude toward computers regardless of the experience by computer learning. (4) students using CAI programs with computer literacy course were more effective than students using CAI program only. (5) science instruction using the CAI programs was not found a meaningful difference by sex.

  • PDF

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

Upcycling strategies for waste electronic and electrical equipment based on material flow analysis

  • Yi, Sora;Lee, Hisun;Lee, Jeongmin;Kim, Woong
    • Environmental Engineering Research
    • /
    • v.24 no.1
    • /
    • pp.74-81
    • /
    • 2019
  • Upcycling generally refers to the conversion of waste materials to something useful or valuable and is a useful concept that can be applied not only to the waste design industry but also to waste recycling and resource circulation. Our study highlights upcycling as the key concept for improving the value of waste by redefining the concept as "the recycling of waste materials and discarded products in ways that enhance their value." Four upcycling strategies are linked to material flow analyses conducted on waste electronic and electrical equipment, specifically waste refrigerators and waste computers, to examine the technologies available for implementation and suggest guidelines for the promotion of upcycling. The amount of waste refrigerators collected by the formal sector was 121,642 tons/y and the informal sector, 63,823 tons/y. The current recycling ratio of waste refrigerators was estimated as 88.53%. A total of 7,585 tons/y of waste computers were collected by the formal sector and 3,807 tons/y by the informal sector after discharge. Meanwhile, the current recycling ratio of waste computers was estimated as 77.43%. We found that it is possible to introduce 28 upcycling technologies in the case of refrigerators, and 15 technologies are available to promote upcycling in the case of computers. By refining the broad concept of upcycling and looking at the stages of material flow, our approach presents universally applicable directions for incorporating upcycling in resource recovery and recirculation plans.

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.184-191
    • /
    • 2021
  • The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

IOT Intelligent Watering Sensor For Indoor Plant

  • Hana, Mujlid;Haneen Daifallah, Alghamdi;Hind Abdulaziz, Alkharashi;Marah Awadh, Alkhaldi
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.171-177
    • /
    • 2022
  • The number of people who own indoor plants is growing today, but as a result of their busy lifestyles-such as work or travel-as well as a lack of enthusiasm in caring for their plants, their plants wither. The use of an irrigation control system with a surveillance camera can assist such folks in taking care of their plants. Such a device can assist in remotely watering plants at predetermined times and checking on the health of the plants. The proprietors would be able to live comfortably without feeling bad thanks to this change. Internet access is required for this technology in order to monitor the plants and control the watering through apps. A sensor is installed in the soil to monitor soil humidity and send data to the microcontroller for irrigation, allowing the owner to schedule irrigation as they see fit and keep an eye on their plants all day. With the use of a remote irrigation control system, the plants will grow properly and be irrigated with the proper amount of water, and the owners will be so glad and delighted to watch their plants. Knowing the time and quantity of water are vital parts of the plant growth.

Predicting Brain Tumor Using Transfer Learning

  • Mustafa Abdul Salam;Sanaa Taha;Sameh Alahmady;Alwan Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.73-88
    • /
    • 2023
  • Brain tumors can also be an abnormal collection or accumulation of cells in the brain that can be life-threatening due to their ability to invade and metastasize to nearby tissues. Accurate diagnosis is critical to the success of treatment planning, and resonant imaging is the primary diagnostic imaging method used to diagnose brain tumors and their extent. Deep learning methods for computer vision applications have shown significant improvements in recent years, primarily due to the undeniable fact that there is a large amount of data on the market to teach models. Therefore, improvements within the model architecture perform better approximations in the monitored configuration. Tumor classification using these deep learning techniques has made great strides by providing reliable, annotated open data sets. Reduce computational effort and learn specific spatial and temporal relationships. This white paper describes transfer models such as the MobileNet model, VGG19 model, InceptionResNetV2 model, Inception model, and DenseNet201 model. The model uses three different optimizers, Adam, SGD, and RMSprop. Finally, the pre-trained MobileNet with RMSprop optimizer is the best model in this paper, with 0.995 accuracies, 0.99 sensitivity, and 1.00 specificity, while at the same time having the lowest computational cost.

Multi-level Analysis on the Using ICT Ability and Using Computers for Learning through PISA 2009 Data (PISA 2009에서 ICT 활용능력과 학습목적 컴퓨터 사용 영향요인에 대한 다층분석)

  • Heo, Gyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.51-61
    • /
    • 2013
  • This study is to investigate the effecting factors on using ICT ability, and using computers for learning through PISA 2009 Korean data. Multi-level analysis is adapted to hierarchical nested data. Results show as follows: First, using ICT ability is affected by variables on the student level, but not on the school level, except in ESCS. Second, using computers for the purpose of learning at home is also affected by variables on the student level, but not on the school level, except in ESCS and in the size of region. Third, using computers for learning at the school is more influenced by variables on the school level like ESCS, the size of region, the ratio of computers, and the student-teacher ratio. The results suggest planning a computer education policy with considering both personal and school differences based on the multi-level approach.

  • PDF

A Study on the Application of Computers to the Development of Humor Image Fashion Design (컴퓨터를 활용한 유머 이미지 패션디자인 개발에 관한 연구)

  • 우세희;최현숙
    • Journal of the Korean Society of Costume
    • /
    • v.53 no.5
    • /
    • pp.65-77
    • /
    • 2003
  • Due to the rapid changes occurring in many aspects of contemporary society, the need for a means to actively combat widespread feelings of emptiness and alienation among the public, while satisfying its visual pleasure, is increasing. Thus the need for humorous elements which bring freedom to the human psyche is urgently requested. Of course, the field of fashion cannot be left out in this trend, and humor image design is a good example of this. Humor image in fashion endeavors to release the tension accumulated in the modern world, while trying to find a way to recover the original pureness of mankind. Another aspect currently important is computers. The creation of images in modern visual art relies a lot upon computers. Traditional visual processes such as painting, photography and video are now merged within digital technology. and are now quite symbiotic to each other. With the development of computers came computer art. which uses all applicable functions of a computer to create art. Any artistic action which uses a computer in any stage of its creation can be called computer art. The common factor in humor and computer art in modern fashion can be classified as follows : repetition, deformation and distortion. exaggeration and abridgement. juxtaposition. and Tromp l'oeil. This study has placed its objective on the fusion of humor image fashion and computer art, by manufacturing a work with humor and computers, two important aspects of modern culture. Expanding the field of fashion design while promoting creativity In fashion by finding a verging point between art and science is also necessary. I have designed and made five costumes using the above cited techniques in computer humor images, on a theoretical basis.