• Title/Summary/Keyword: Computer application

Search Result 7,919, Processing Time 0.034 seconds

Development of Shoulder Wheel with Adjustable Rotating Speed and Rotating Angle and Application Contents

  • Lee, Jae-Heui;Kim, Jae-Hoon;Chung, Sung-Taek
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.129-140
    • /
    • 2022
  • The purpose of this study to improve the shoulder wheel that is used frequently during shoulder circumduction exercise in a park, to link the shoulder wheel to a game application comprising various shoulder circumduction exercise and shoulder ROM exercise, and to enjoy the game during the exercises. A step motor was added to the shoulder wheel, and the rotating speed and rotating angle, and rotating direction can be controlled. The shoulder height, different for different people, can be controlled as well, so that any user can use this device. The developed application content includes the game elements, to enjoy the repetitive and boring exercise with fun and interest, and the control to adjust the degree of difficulty. This was to help users heighten their desire to rehabilitate by inducing active participation during repetitive shoulder rehabilitation exercise because the game vests users with intrinsic motivation and immersion. If the shoulder wheel and application contents proposed in this study are used, shoulder diseases can be prevented in advance by performing muscle strengthening exercises required in an aging society. This study is expected to contribute to the field of research related to serious games and rehabilitation.

Efficient UML Modeling Method for Remote University Application EJB Component Extraction (원격대학 애플리케이션용 EJB 컴포넌트 추출을 위한 UML 설계에 관한 연구)

  • 반길우;최유순;박종구
    • KSCI Review
    • /
    • v.8 no.1
    • /
    • pp.29-36
    • /
    • 2001
  • EJB application development environment is developing component support Object-Oriented distributed processing, it is component architecture for distributed arrangement. Application developed using EJB is component coupled for business program development easily. EJB is automatically sovled to security. resource Pooling, persistency, concurrency. transaction transparency. This Paper illustrate for EJB extract to EJB sufficient flexibility its development environment, and it was applicated remote university application domain.

  • PDF

Wearable Computer (패션으로 만나는 컴퓨터)

  • Ahn, Young-Moo
    • Journal of Fashion Business
    • /
    • v.11 no.4
    • /
    • pp.173-182
    • /
    • 2007
  • The concept of wearable computer says to be able to connect to network freely without restrict of place and time through the garment that contain the wire and circuit. Thereby we can realize the ubiquitous circumstances. Wearable computer plays a role of center in controlling the electronic equipments under the ubiquitous circumstances and also it will become the main stream of the future computer development. The current wearable computer displays ugly appearance by attaching the parts of computer on the garment instead of installing them in the box. However, as size of computer components are minimized and it's speed is getting faster, it is certain that wearable computer will evolve as fashionable computer, still retaining garment's original purpose such as fitting and fasion even though the computer is being installed to the clothing. This study reviewed about components, future market share, developed goods, human-being becoming cyborg, application area, restrict and on-going research of wearable computer.

A Meta-Model for Development Process of IoT Application by Using UML

  • Cho, Eun-Sook;Song, Chee-Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.121-128
    • /
    • 2019
  • An Internet of Things(IoT) technology which provides intelligent services by combining context-awareness based intelligences, inter-communication is made of between things and things or between things and person through the network connected with intelligent things is spreading rapidly. Especially as this technology is converged into smart device, mobile, cloud, big data technologies, it is applied into various domains. Therefore, this is different from existing Web or Mobile Application. New types of IoT applications are emerging by adapting IoT into Web or mobile. Because IoT application is not only focused on software but also considering hardware or things aspect, there are limitations existing development process. Existing development processes don't consider analysis and design techniques considering both hardware and things. We propose not only a meta-model for development process which can support IoT application's development but also meta-models for main activities in this paper. Especially we define modeling elements by using UML's extension mechanisms, provide development process, and suggest design techniques how to apply those elements into IoT application's modeling phase. Because there are many types of IoT application's type, we propose an Android and Arduino-based on IoT application as a case study. We expect that proposed technique can be applied into many of various IoT application development and design with a form of flexible and extensible as well as main functionalities or elements are more concretely described. As a result, it brings IoT application's flexibility and the effect of quality improvement.

Preparation and Characterization of Barium Zirconate Titanate Thin Films

  • Park, Won-Seok;Jang, Bum-Sik;Yonghan Roh;Junsin Yi;Byungyou Hong
    • Journal of the Korean institute of surface engineering
    • /
    • v.34 no.5
    • /
    • pp.481-485
    • /
    • 2001
  • We investigated the structural and electrical properties of the Ba ($Zr_{x}$ $T_{il-x}$ )$O_3$ (BZT thin films with a mole fraction of x=0.2 and thickness 150 nm for the application in MLCC (Multilayer Ceramic Capacitor). BZT films were prepared on $Pt/SiO_2$/Si substrate at various substrate temperatures by the RF-magnetron sputtering system. When the substrate temperature was above $500^{\circ}C$, we could obtain multi-crystalline BZT films oriented at (110), (111), and (200) directions. The crystallization of the film and high dielectric constant were observed with the increase of substrate temperature. Capacitance of the film deposited at high temperature is more sensitive to the applied voltage than that of the film deposited at low temperature. This paper reports surface morphology, dielectric constant, dissipation factor, and C-V characteristics for BZT films deposited at three different temperatures. The BZT film deposited at 40$0^{\circ}C$ shows stable electrical properties but a little small dielectric constant for MLCC application.

  • PDF

A Study of Development and Application on Play-based Algorithm Learning for Improvement of Logical Thinking Ability (놀이를 통한 논리적 사고력 신장 알고리즘 학습 프로그램 개발 및 적용 연구)

  • Kim, Eun-Gil;Kim, Hyang-Hee;Hyun, Dong-Lim;Kim, Jong-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.1
    • /
    • pp.119-127
    • /
    • 2011
  • We selected algorithm learning subjects and developed the play-based algorithm learning program for elementary school students. In addition, we analyzed a positive effect of improve on logical thinking by the field application. We found that the developed learning program was helpful in growing logical thinking skills. It means that the play-based algorithm learning program helps learners to improve on logical thinking.

  • PDF

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution

  • Singh, Manmeet Mahinderjit;Ng, Ping Jie;Ya, Kar Ming;Husin, Mohd Heikal;Malim, Nurul Hashimah Ahamed Hassain
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.559-572
    • /
    • 2017
  • Cyberbullying has been an emerging issue in recent years where research has revealed that users generally spend an increasing amount of time in social networks and forums to keep connected with each other. However, issue arises when cyberbullies are able to reach their victims through these social media platforms. There are different types of cyberbullying and like traditional bullying; it causes victims to feel overly selfconscious, increases their tendency to self-harm and generally affects their mental state negatively. Such situations occur due to security issues such as user anonymity and the lack of content restrictions in some social networks or web forums. In this paper, we highlight the existing solutions, which are Intrusion Prevention System and Intrusion Detection System from a number of researchers. However, even with such solutions, cyberbullying acts still occurs at an alarming rate. As such, we proposed an alternative solution that aims to prevent cyberbullying activities at a younger age, e.g., young children. The application would provide an alternative method to preventing cyberbullying activities among the younger generations in the future.

A Novel Scheme for Seamless Hand-off in WMNs

  • Vo, Hung Quoc;Kim, Dae-Sun;Hong, Choong-Seon;Lee, Sung-Won;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.4
    • /
    • pp.399-422
    • /
    • 2009
  • Although current wireless mesh network (WMN) applications experience a perceptually uninterrupted hand-off, their throughput after the hand-off event may be significantly degraded due to the low available bandwidth of the mobile client's new master. In this paper, we propose a novel mobility management scheme for 802.11-based WMNs that enables both seamless hand-off for transparent communications, and bandwidth awareness for stable application performance after the hand-off process. To facilitate this, we (i) present a new buffer moment in support of the fast Layer-2 hand-off mechanism to cut the packet loss incurred in the hand-off process to zero and (ii) design a dynamic admission control to grant joining accepts to mesh clients. We evaluate the benefits and drawbacks of the proposal for both UDP and TCP traffic, as well as the fairness of the proposal. Our results show that the new scheme can not only minimize hand-off latency, but also maintain the current application rates of roaming users by choosing an appropriate new master for joining.

Recognition of the 3-D motion of a human arm with HIGIPS

  • Yao, Feng-Hui;Tamaki, Akikazu;Kato, Kiyoshi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10b
    • /
    • pp.1724-1729
    • /
    • 1991
  • This paper gives an overview of HIGIPS design concepts and prototype HIGIPS configuration, and discusses its application to recognition of the 3-D motion of a human arm. HIGIPS which employs the combination of pipeline architecture and multiprocessor architecture, is a high-speed, high-performance and low cost N * M multimicroprocessor parallel machine, where N is the number of pipeline stages and M is the number of processors in each stage. The algorithm to recognize the motion of a human arm with a single TV camera was developed on personal computer (NEC PC9801 series). As a constraint condition, some simple ring marks are used. Each joint of the arm is attached with a ring mark to obtain its centroid position when the arm moves. These centroid positions in the three-dimensional space are linked at each of the successive pictures of the moving arm to recover its overall motion. This algorithm takes about 2 seconds to process one image frame on the general-purpose personal computer. This paper mainly discuses how to partition this algorithm and execute on HIGIPS, and shows the speed up. From this application, it is clear that HIGIPS is an efficient machine for image processing and recognizing.

  • PDF

Data Source Management using weight table in u-GIS DSMS

  • Kim, Sang-Ki;Baek, Sung-Ha;Lee, Dong-Wook;Chung, Warn-Il;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.27-33
    • /
    • 2009
  • The emergences of GeoSensor and researches about GIS have promoted many researches of u-GIS. The disaster application coupled in the u-GIS can apply to monitor accident area and to prevent spread of accident. The application needs the u-GIS DSMS technique to acquire, to process GeoSensor data and to integrate them with GIS data. The u-GIS DSMS must process big and large-volume data stream such as spatial data and multimedia data. Due to the feature of the data stream, in u-GIS DSMS, query processing can be delayed. Moreover, as increasing the input rate of data in the area generating events, the network traffic is increased. To solve this problem, in this paper we describe TRIGGER ACTION clause in CQ on the u-GIS DSMS environment and proposes data source management. Data source weight table controls GES information and incoming data rate. It controls incoming data rate as increasing weight at GES of disaster area. Consequently, it can contribute query processing rate and accuracy

  • PDF