• 제목/요약/키워드: use of computer technologies

검색결과 647건 처리시간 0.022초

A Study on Factors Affecting the Use Intention of Virtual Reality(VR) Devices: Based on UTAUT and VAM Model

  • Li, Zhou-Yang;Yoon, Sung-Joon;Liu, Zi-Yang
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.35-43
    • /
    • 2019
  • The purposes of this study is to derive the influence factors of Virtual Reality(VR) technologies acceptance based on the study of unified theory of acceptance and use of technology and value-based acceptance model to test the use and acceptance of VR devices. The survey methods were used for this study, and the data from a total of 400 consumers were used for the analysis. And the structural equation model was used to analyze the data. The results of the study are as follows: First, benefit components perceived enjoyment(EN) and sacrifice components personal innovative(PI) of VR devices were positively related to perceived values and use intention of VR devices, although the benefit components performance expectancy(PE) was positively related to perceived values(PV) but was not positively related to the use intention of VR devices. Second, sacrifice components perceived cost(PC) and anxiety(ANX) of VR devices were negatively related to perceived value(PV), but were not negatively related to the use intention of VR devices. Third, perceived values was not obvious related to the use intention(UI) of VR devices. The results of this study contribute to the literature as a new attempt to examining the effect on consumer use intention in VR technology areas.

A Systematic Mapping Study on Artificial Intelligence Tools Used in Video Editing

  • Bieda, Igor;Panchenko, Taras
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.312-318
    • /
    • 2022
  • From the past two eras, artificial intelligence has gained the attention of researchers of all research areas. Video editing is a task in the list that starts leveraging the blessing of Artificial Intelligence (AI). Since AI promises to make technology better use of human life although video editing technology is not new yet it is adopting new technologies like AI to become more powerful and sophisticated for video editors as well as users. Like other technologies, video editing will also be facilitated by the majestic power of AI in near future. There has been a lot of research that uses AI in video editing, yet there is no comprehensive literature review that systematically finds all of this work on one page so that new researchers can find research gaps in that area. In this research we conducted a statically approach called, systematic mapping study, to find answers to pre-proposed research questions. The aim and objective of this research are to find research gaps in our topic under discussion.

Design and Implementation of the Recording Processing Supporting System using RFID

  • Baek, Mi-Hye;Kim, Bong-Gi;Kim, Hyun-Ju
    • Journal of information and communication convergence engineering
    • /
    • 제9권6호
    • /
    • pp.629-632
    • /
    • 2011
  • RFID technology is one of the verification technology that use radio frequency. Use and study of RFID are on the increase because RFID is a one of main technologies in ubiquitous. In this paper, we address to develop a Record Processing System using RFID. The purpose of this paper is improvement of accuracy and efficiency on Record Processing System by applying RFID. Later, this paper will be able to help to establish of u-Campus.

Context-based Authentication Service for The Mobile Office

  • Yang, Jiyoung;Lee, Hyundong;Rhyoo, Shi-Kook;Chung, Mokdong
    • 한국멀티미디어학회논문지
    • /
    • 제15권12호
    • /
    • pp.1475-1484
    • /
    • 2012
  • Today many companies introduce new mobile office environments evolved from the recent rapid development in mobile device technologies. Most of the recent mobile office systems use a simple authentication scheme such as ID/Password. This method is easy to use, but it does not consider the user's context. Thus it cannot provide appropriate security service required by the user's proper contexts. Therefore, this paper proposes a context based authentication system which applies security level verification and uses fuzzy algorithm based on the importance of access authority control.

A Systematic Approach to Improve Fuzzy C-Mean Method based on Genetic Algorithm

  • Ye, Xiao-Yun;Han, Myung-Mook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제13권3호
    • /
    • pp.178-185
    • /
    • 2013
  • As computer technology continues to develop, computer networks are now widely used. As a result, there are many new intrusion types appearing and information security is becoming increasingly important. Although there are many kinds of intrusion detection systems deployed to protect our modern networks, we are constantly hearing reports of hackers causing major disruptions. Since existing technologies all have some disadvantages, we utilize algorithms, such as the fuzzy C-means (FCM) and the support vector machine (SVM) algorithms to improve these technologies. Using these two algorithms alone has some disadvantages leading to a low classification accuracy rate. In the case of FCM, self-adaptability is weak, and the algorithm is sensitive to the initial value, vulnerable to the impact of noise and isolated points, and can easily converge to local extrema among other defects. These weaknesses may yield an unsatisfactory detection result with a low detection rate. We use a genetic algorithm (GA) to help resolve these problems. Our experimental results show that the combined GA and FCM algorithm's accuracy rate is approximately 30% higher than that of the standard FCM thereby demonstrating that our approach is substantially more effective.

국내외 슈퍼컴퓨팅 동향 (CURRENT STATUS OF SUPERCOMPUTING TRENDS)

  • 조금원
    • 한국전산유체공학회:학술대회논문집
    • /
    • 한국전산유체공학회 2006년도 추계 학술대회논문집
    • /
    • pp.210-210
    • /
    • 2006
  • IT technologies(Chips, Grid and e-Science) are rapidly changed from 1965. In 1965, Intel co-founder Gordon Mooresaq the future. His prediction popularly known as Moore's law, state that the computer chips double in power every 18 months Grid computing offers a model for solving massive computational problems by making use of the unused resources of large numbers of disparate, often desktop, computers treated as a virtual cluster embedded in a distributed telecommunications infrastructure. In this paper, I will discuss current status of supercomputing technology and haw we can use these on CFD. Functionally, one can classify Grids into several types:

  • PDF

UbiqBIOPARC: A Wireless and Sensor Based Context-Aware System for an Enhanced Guide Experience

  • Sorribes, Jose-Vicente;Cano, Juan-Carlos;Calafate, Carlos T.;Manzoni, Pietro
    • Journal of Multimedia Information System
    • /
    • 제1권1호
    • /
    • pp.11-22
    • /
    • 2014
  • This work discusses and evaluates the use of wireless and multi-sensor based technologies to develop UbiqBIOPARC, a new generation zoological park that has been created based on the zoo-immersion concept. It offers appropriate contextual information to zoo visitors, depending on their preferences and the environment in which they are positioned. It combines the flexibility of the iPhone SDK, the connectivity provided by 3G technologies, the location capabilities of GPS, and the orientation offered by a digital compass integrated in the device. In this document the overall architecture and the implementation steps followed to create this context-aware application are presented. We compare our system with respect to previous ones and demonstrate that UbiqBIOPARC is an example of how innovative context-aware applications can be built with the aid of GPS and compass features. Several real experiments have been carried out in order to evaluate performance and system behavior, and numerical results demonstrate the practicality offered by our application, while providing a quite reasonable performance in terms of delay, usability, and energy efficiency.

  • PDF

Use Of Interactive Internet Services In Education

  • Moskalenko-Vysotska, Olena;Melnyk, Emiliia;Tovstenko-Zabelin, Serhii;Lehka, Svitlana;Didenko, Maryna;Hrubych, Kostiantyn
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.218-224
    • /
    • 2022
  • The article describes the concept of a Web-portal of an educational institution; the technical conditions for the creation of the Web-portal of the educational institution were determined; the features of the use of the Web-portal in the educational process and its organization are revealed. The scientific and practical value of the article lies in the fact that the use of portals in education will improve the management of an educational institution, activate and bring the educational process to the level of modern technologies at all its stages, as well as enhance the interaction of parents and students with employees of the educational institution.

DIGITAL TECHNOLOGIES AND RANKINGS AS TOOLS OF THE COMPETITIVENESS IN THE EDUCATIONAL SERVICES MARKET

  • Djakona, Antonina;Lavrov, Ruslan;Anisimova, Liudmyla;Koval, Oksana;Polkhovska, Maryna;Shumaieva, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.49-58
    • /
    • 2021
  • Globalization of higher education deepens the competition in the global educational services market. Competition between higher education institutions is based on the use of a wide range of activities and tools that are constantly evolving and becoming more complex. Digitalization significantly transforms the approaches to competition between universities in educational, research and marketing activities. Digital technologies are becoming an integral part of this competition. In addition, in the current conditions of globalization of the scientific and educational space, numerous rankings of universities have become an important tool of the competition; the most significant rankings of universities are as follows: Academic Ranking of World Universities (China), Times Higher Education Rankings of Universities (Great Britain), Webometrics (Spain). In the article, the key principles of the formation of world rankings of universities are analyzed, the main sources of information resources for their compilation are determined. The authors have concluded that the improvement of the position of educational institutions in the world rankings of universities should be implemented within the framework of the state educational policy. The key positive effects of universities due to increasing the competitiveness level of the national higher education system are specified.

XML기반의 포괄적인 망 관리 시스템의 설계 및 구현 (Design and Implementation of An XML-based Universal Network Management System)

  • 차시호;김규호
    • 한국컴퓨터정보학회논문지
    • /
    • 제7권1호
    • /
    • pp.103-111
    • /
    • 2002
  • XMAN은 3-계층 구조를 가지며, 웹, XML 및 서버 측 자바 기술들의 확장에 기반하여 구현된다. Currently. network managers are making use of expensive, vendor-specific management consoles to view and manipulate network data. And more and more systems are transferred to web environment. Therefore, network managers want to get information at anywhere, anytime. This requires an access of management information to be unified, cost-effective, and easy-to-use. This paper presents the implementation of an XML-based universal network management system (XMAN), which supports multiple internet devices as management console. XMAN has 3-tire architecture, and the implementation is based on an extensive use of emerging Web, XML, and Java technologies.

  • PDF