• Title/Summary/Keyword: end user

Search Result 1,226, Processing Time 0.027 seconds

Image Processing Based Virtual Reality Input Method using Gesture (영상처리 기반의 제스처를 이용한 가상현실 입력기)

  • Hong, Dong-Gyun;Cheon, Mi-Hyeon;Lee, Donghwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.5
    • /
    • pp.129-137
    • /
    • 2019
  • Ubiquitous computing technology is emerging as information technology advances. In line with this, a number of studies are being carried out to increase device miniaturization and user convenience. Some of the proposed devices are user-friendly and uncomfortable with hand-held operation. To address these inconveniences, this paper proposed a virtual button that could be used in watching television. When watching a video on television, a camera is installed at the top of the TV, using the fact that the user watches the video from the front, so that the camera takes a picture of the top of the head. Extract the background and hand area separately from the filmed image, extract the outline to the extracted hand area, and detect the tip point of the finger. Detection of the end point of the finger produces a virtual button interface at the top of the image being filmed in front, and the button activates when the end point of the detected finger becomes a pointer and is located inside the button.

Developing and Applying a New Methodology for Value-Centered HCI: Focusing on User Experience Structure of Mobile Data Service (가치 중심적 HCI를 위한 새로운 방법론의 개발 및 적용: 모바일 데이터 서비스의 사용자 경험 구조를 중심으로)

  • Lee, In-Seong;Choi, Bo-Reum;Kim, Jin-Woo;Lee, Ki-Ho;Jung, Seung-Ki
    • Journal of the HCI Society of Korea
    • /
    • v.2 no.1
    • /
    • pp.13-24
    • /
    • 2007
  • For many years, human-computer interaction (HCI) practitioners have focused on usability in order to enhance the user experience, and companies have seen it as an area where they can gain advantages over their competitors. However, a focus on usability limits the potential of HCI research because it restricts the concept of user experience to just an implemented functionality of the information technology (IT). Therefore, it is necessary to expand the boundary of user experience research into a holistic dimension. We suggest that one of the most powerful ways to broadly understand user experience with an IT is to investigate the attributes of an IT and users' perceived values and to construct a user experience structure, a hierarchical structure between the attributes of an IT and users' perceived values. This study thus undertakes two research tasks: to develop a specific methodology, which is the visual probing, for constructing a user experience structure with the attributes of an IT and users' perceived values, and then to build a user experience structure practically by conducting a case study to a specific IT: mobile data service.

  • PDF

Design and Implementation of IPC Network using Ethernet Switch In ATM (ATM 교환기내 Ethernet Switch를 이용한 IPC망 구현)

  • 김법중;나지하;오정훈;안병준
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.255-258
    • /
    • 2000
  • This paper presents an Interprocessor Communication Network(IPC net) in ATM switching system. In order to supply stable and independent path for processor communication, additional network i.e., Ethernet, is suggested. An Ethernet switch centered on Ethernet binds each processor into a work range. IPC net proposed in this paper assures end-to-end inter-processor connection, uniform 100Mbps Ethernet bandwidth and enhanced user cell throughput of ATM switch with minimum Ethernet supporting block integrated into ATM system

  • PDF

A Study on the Effects of the Selection of Relevant Documents over Retrieval Documents (검색문헌의 적합문헌 선정에 있어 영향을 미치는 요인에 관한 연구)

  • 이상렬;최성진
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 1996.08a
    • /
    • pp.11-14
    • /
    • 1996
  • The purpose of this study is to verify the hypothesis that the end-user's standards of the selection over retrieved documents affect the selecting of relevant documents after online bibliographic databases searching. To achieve the above-mentioned purpose, online-questionnaires were distributed, via e-mail, to end-users of using online bibliographic databases.

  • PDF

A Study on System for Supporting Software Development Environment -On the Design of Meta System Supporting the Development of Information System- (소프트웨어 개발 방법론 지원 시스템에 관한 연구 -정보시스템 개발을 위한 메타시스템의 설계를 주로-)

  • 이숙희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.10
    • /
    • pp.811-818
    • /
    • 1990
  • The objective of this paper is to design and implement FLA(Front-end Language Analyzer) storing information to database, and BIS(Back-end Information System) analyzing completeness and consistency of database and generating all kinds of documents needed by user. By using this system to develop systems, we expect enhancement of software productivity and reliability.

  • PDF

QoS Policy Management Architecture for End-Users in Distributed Network (분산 망에서 종단 사용자를 위한 QoS 정책 관리 구조)

  • Chang, Kyung-Ah;Lee, Byung-Rae;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.469-472
    • /
    • 2000
  • 인터넷 사용자의 급속한 증가와 전자 상거래의 발전은 다양한 시스템 및 네트워크의 설계 및 관리를 매우 복잡하게 변화시켰다. 본 연구에서는 인터넷/ 인트라넷과 같은 분산 망에서의 서비스 보장을 위해 종단 시스템(End-to-End System)에서의 QoS(Quality of Service) 지원과 QoS 제어 메커니즘을 분석하여 분산 망에서의 종단 사용자(End-User)를 위한 QoS 정책 관리 구조를 제안하였다. 이 구조는 종단 호스트 모델과 네트워크 모델의 통합 지원 구조로 구성되며, 각 모델의 해당 자원에 대한 서비스를 구분하여 사용자 정책을 관리하며, 분산 망에 대해서는 단위 네트워크의 QoS 관리 서버를 통하여 종단 시스템간의 QoS 정책을 관리하게 된다. 본 논문에서 제안한 구조는 분산 망에서의 종단 사용자 정책을 관리하는데 있어 응용 서비스 고유의 특성을 보장하며 사용자 정책에 따른 서비스 자원을 통합 관리할 수 있다.

  • PDF

PN Code Acquisition in a DS/CDMA Overlay Environment

  • Kim, Jin-Young
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.185-188
    • /
    • 2000
  • In this paper, performance of a PN code acquisition scheme is analyzed and simulated for a DS/CDMA overlay system where a CDMA user and a narrowband user coexist in the same frequency band. To suppress the NBI, an interference suppression filter is employed at the receiver front-end. From the simulation results, it is shown that the interference suppression filter is very effective for suppression of the NBI and rapid PN code acquisition in a DS/CDMA overlay environment. It is also shown that the one-sided tap number of 5 fur interference suppression filter is sufficient to suppress the NBI.

  • PDF

Technique of Information Security for Users against Phishing Attacks (피싱 공격에 대한 사용자 정보보호 방안)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.736-739
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attacks. To this end, AntiPhish tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a web site today requires only the server to be hat is considered untrusted.

  • PDF

A study on Model-based user interface modules (모델기반 사용자 인터페이스 모델에 관한 연구)

  • Zhujiang, Zhujiang;Kim, Tae-Seung;Kim, Sung-Han;Lee, Seung-Yun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.709-711
    • /
    • 2012
  • Recently the research convenient for the user interface for the user interface technology that can be applied to the UI according to user's choice being made. To this end, the W3C is underway in a variety of devices from N-Screen service, consistent service delivery and the user's preferences according to UI to support adaptive services for a variety of research environments. In this paper, we studied the basic model-based user interface technology to develop a UI for the user's convenience. Web application applications apply measures will be used to apply the technology acquisition, and next-generation Web applications.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.