• Title/Summary/Keyword: touch paper

Search Result 673, Processing Time 0.026 seconds

The Conceptual Design and User Requirement Analysis of the HCI Multi-function Console for Ship (HCI 기반 선박용 다기능 콘솔의 사용자 요구조건 분석 및 개념 설계)

  • Han, Jeong-Hee;Park, Jong-Won;Choi, Young-Chol;Yun, Chang-Ho;Cho, A-Ra;Lim, Yong-Kon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.674-682
    • /
    • 2011
  • The multi-function console system in ships has currently exposed operational difficulties due to its complex interfaces although it supports a variety of functionalities. In this paper the concept of a human computer interaction (HCI) based multi-function console system is proposed, which can support intuitive operation environments by the analysis of users' needs to shipboard systems. Expert interviews and surveys are carried out in order to obtain users' requirements. Through the survey results, the HCI based multi-function console system is conceptually designed, which is optimized to the input of multi-touch screen. It is expected that the HCI based multi-function console system can provide ship operators with easy interfaces to the console system as well as safe operation in a rough ocean environment.

Low-Frequency Electromagnetic Leakage Signal Analysis According to Fundamental Operations of Smartphones (스마트폰 기본 동작 모드에 따른 저주파 대역 누설 전자파 신호 특성 분석)

  • Lee, Young-Jun;Park, Heesun;Kwon, YoungHyoun;Lee, Jaeki;Choi, Ji-Eun;Cho, Sangwoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1108-1119
    • /
    • 2016
  • This paper presents the spectral analysis and radiation pattern of low-frequency electromagnetic(EM) leakage signals according to the fundamental operations of smartphones. The EM leakage signals generated by the activation of four I/O sensor modules such as a touch-screen, a camera, a microphone and a speaker are captured by the commercial near-field magnetic probe with 1cm spatial resolution. The analysis results show that the leakage of the EM wave occurs strongly around the activated I/O sensor modules, AP(Application Processor) and memory modules. Also, the distinguishable frequency characteristic is shown in each spectrum of EM leakage signals.

Digital Mirror System with Machine Learning and Microservices (머신 러닝과 Microservice 기반 디지털 미러 시스템)

  • Song, Myeong Ho;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.9
    • /
    • pp.267-280
    • /
    • 2020
  • Mirror is a physical reflective surface, typically of glass coated with a metal amalgam, and it is to reflect an image clearly. They are available everywhere anytime and become an essential tool for us to observe our faces and appearances. With the advent of modern software technology, we are motivated to enhance the reflection capability of mirrors with the convenience and intelligence of realtime processing, microservices, and machine learning. In this paper, we present a development of Digital Mirror System that provides the realtime reflection functionality as mirror while providing additional convenience and intelligence including personal information retrieval, public information retrieval, appearance age detection, and emotion detection. Moreover, it provides a multi-model user interface of touch-based, voice-based, and gesture-based. We present our design and discuss how it can be implemented with current technology to deliver the realtime mirror reflection while providing useful information and machine learning intelligence.

Design of Face Recognition System for Authentication of Internet Banking User (인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.193-205
    • /
    • 2003
  • In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

  • PDF

Study on Effective contents Implementation Method that Make use of WPF/E (WPF/E를 활용한 효율적인 콘텐츠 제작 방법 연구)

  • Oh, KyeongSug;Ryu, NamHoon;Han, JaeJeong;Kim, EungKon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.658-662
    • /
    • 2008
  • In the past days, analysis of data that derived from various routes were enough as presentation of numbers and letters or 2D forms. But because of the development of computer graphics techniques, users of nowadays can come in contact with user interface of diverse forms. Because they are able to touch such things readily, their requirements are increased as time goes on. The programs in earlier days laid stress on skillful side for data analysis, but users of nowadays demand screens that satisfy their visual and emotional feelings and can be analyzed immediately. This paper will look over WPF/E that are able to implement various multimedia data such as graph of 2D and 3D forms, sounds, animations and so on, and present effective contents making method with this.

  • PDF

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.

Design and Implementation of Education Contents for Prevention of Child Sexual Violence (아동 성폭력 예방을 위한 교육 콘텐츠의 설계 및 구현)

  • Kim, Hee-joo;Shin, Hye-won;Lee, yoon-ji;Won, Hye-mi;Park, Su e;Park, Jung Kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.179-181
    • /
    • 2017
  • In this paper, we propose the contents of the visual content of the child's own boundaries and implement the contents based on active learning using touch method. The images consist of four modules, each of which consists of content developments, learning concepts, and learning content. The notion of sexual violence is also aimed at fostering awareness that sexual violence is also an extension of the child's safety. Moreover, the learning content of a learning game improves learning outcomes by receiving a 'compliment' if the game succeeds and receives a 'reward' on the game.

  • PDF

Implementation of Virtual Violin with a Kinect (키넥트를 이용한 가상 바이올린 구현)

  • Shin, Young-Kyu;Kang, Dong-Gil;Lee, Jung-Chul
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.3
    • /
    • pp.85-90
    • /
    • 2014
  • In this paper, we propose a virtual violin implementation using the detection of bowing and finger dropping position from the estimated finger tip and finger board information with the 3D image data from a Kinect. Violin finger board pattern and depth information are extracted from the color image and depth image to detect the touch event on the violin finger board and to identify the touched position. Final decision of activated musical alphabet is carried out with the finger drop position and bowing information. Our virtual violin uses PC MIDI to output synthesized violin sound. The experimental results showed that the proposed method can detect finger drop position and bowing detection with high accuracy. Virtual violin can be utilized for the easy and convenient interface for a beginner to learn playing violin with the PC-based learning software.

MissingFound: An Assistant System for Finding Missing Companions via Mobile Crowdsourcing

  • Liu, Weiqing;Li, Jing;Zhou, Zhiqiang;He, Jiling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4766-4786
    • /
    • 2016
  • Looking for missing companions who are out of touch in public places might suffer a long and painful process. With the help of mobile crowdsourcing, the missing person's location may be reported in a short time. In this paper, we propose MissingFound, an assistant system that applies mobile crowdsourcing for finding missing companions. Discovering valuable users who have chances to see the missing person is the most important task of MissingFound but also a big challenge with the requirements of saving battery and protecting users' location privacy. A customized metric is designed to measure the probability of seeing, according to users' movement traces represented by WiFi RSSI fingerprints. Since WiFi RSSI fingerprints provide no knowledge of users' physical locations, the computation of probability is too complex for practical use. By parallelizing the original sequential algorithms under MapReduce framework, the selecting process can be accomplished within a few minutes for 10 thousand users with records of several days. Experimental evaluation with 23 volunteers shows that MissingFound can select out the potential witnesses in reality and achieves a high accuracy (76.75% on average). We believe that MissingFound can help not only find missing companions, but other public services (e.g., controlling communicable diseases).

A Study on the Windows Application Control Model Based on Leap Motion (립모션 기반의 윈도우즈 애플리케이션 제어 모델에 관한 연구)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.111-116
    • /
    • 2019
  • With recent rapid development of computer capabilities, various technologies that can facilitate the interaction between humans and computers are being studied. The paradigm tends to change to NUI using the body such as 3D motion, haptics, and multi-touch with GUI using traditional input devices. Various studies have been conducted on transferring human movements to computers using sensors. In addition to the development of optical sensors that can acquire 3D objects, the range of applications in the industrial, medical, and user interface fields has been expanded. In this paper, I provide a model that can execute other programs through gestures instead of the mouse, which is the default input device, and control Windows based on the lip motion. To propose a model which converges with an Android application and can be controlled by various media and voice instruction functions using voice recognition and buttons through connection with a main client. It is expected that Internet media such as video and music can be controlled not only by a client computer but also by an application at a long distance and that convenient media viewing can be performed through the proposal model.