• Title/Summary/Keyword: Computer application

Search Result 7,919, Processing Time 0.046 seconds

A Computer Vision-based Assistive Mobile Application for the Visually Impaired (컴퓨터 비전 기반 시각 장애 지원 모바일 응용)

  • Secondes, Arnel A.;Otero, Nikki Anne Dominique D.;Elijorde, Frank I.;Byun, Yung-Cheol
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.12
    • /
    • pp.2138-2144
    • /
    • 2016
  • People with visual disabilities suffer environmentally, socially, and technologically. Navigating through places and recognizing objects are already a big challenge for them who require assistance. This study aimed to develop an android-based assistive application for the visually impaired. Specifically, the study aimed to create a system that could aid visually impaired individuals performs significant tasks through object recognition and identifying locations through GPS and Google Maps. In this study, the researchers used an android phone allowing a visually impaired individual to go from one place to another with the aid of the application. Google Maps is integrated to utilize GPS in identifying locations and giving distance directions and the system has a cloud server used for storing pinned locations. Furthermore, Haar-like features were used in object recognition.

Design and Implementation for Web based Enterprise Application System (Web 기반 기업 Application 시스템을 위한 보안환경 설계 및 구현)

  • Jeong, Kyung-Hee;Shin, Dong-Gyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2165-2168
    • /
    • 2003
  • 인터넷을 기반으로 기업 활동이 점차로 넘어지면서, 동적이면서 실시간의 데이터를 제공하기 위하여 거미줄처럼 여러 개의 시스템이 연계되기도 하고, ERP, CRM, EAI등으로 기업 내 Application을 통합하기도 한다. Backend System의 통합으로 얻을 수 있는 기대효과에 맞서서 이의 인터넷 서비스 위험은 더 커져 정보 보안 문제가 중요한 이슈가 되었다. 이에 본 논문에서는 웹 기반 사용자의 정보를 안전하게 보호하고, 여러 가지 보안 문제를 해결할 수 있는 안전한 애플리케이션 보안 구조에 대한 설계 및 구현에 대해 기술하였다. 기업의 웹 서비스는 B2B 와 B2E 로 구분되는 데, 특히 B2B 거래 시의 법적 증명력을 가지기 위한 전자 거래 법 규정에 따른 정보 시스템의 보안 구성 요건을 철저히 분석하여, 시스템 구현에 적용하였다. 아울러 향후 기업의 웹 기반 애플리케이션 시스템 보안 구조의 발전방향을 살펴보면서 웹 기반 정보 시스템의 보안 환경을 검토하거나, 추진할 때 도움이 될 수 있고자 한다.

  • PDF

A Design of Mute Application by Using Android Platform (안드로이드 플랫폼 기반의 음소거 응용 프로그램 설계)

  • Cho, Hyun-Woong;Park, Joo-Yong;Kim, Hye-Won;Park, Se-Hee;Kim, Woo-Je
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.299-302
    • /
    • 2014
  • 현대사회에서 인간은 스마트폰에서 발생하는 디지털 효과음과 함께 살아간다. 그러나 이러한 디지털 소음때문에 자의와 상관없이 타인에게 피해를 주고 있다. 이러한 디지털 소음공해를 방지하기 위해 이미 몇몇 응용프로그램이 존재한다. 하지만 사용자의 욕구를 만족시켜주는 것은 없었다. 이러한 연유로, 사용자들의 요구사항을 충분히 반영하여 디지털 소음공해 방지를 위한 안드로이드 플랫폼 기반의 새로운 모바일 응용프로그램을 제시한다. 본 응용프로그램의 사용으로 인하여 타인의 생활에 방해를 주는 행동이 줄어들 것으로 예상된다.

  • PDF

Study of Online activities of NGOs and Donation Application (NGO 단체의 온라인 활동과 기부 앱에 관한 연구)

  • Ha, Yan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.181-185
    • /
    • 2015
  • This paper proposes a simple, approachable game via mobile application in order to change the attitudes of the general public towards donation. This game can become one of many representative online activities of NGOs(Non Government Organization). Also, as it is a song game, the public can enjoy it rather than feeling pressure. This study is expected to energize the industry of donation applications and contribute to the settlement of a popular giving culture through NGOs, corporations, and SNS(Social Networking System).

GCaaS: A Light-weight Grid Computing Web Application

  • Liu, Xiao;Woo, Gyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.121-124
    • /
    • 2015
  • Recent global and cloud computing render the Internet and Web application to be a paramount field since it is uncomplicated to access and less time and space limitation. On the other hand, a growing number of computations using grid computing techniques indicates the requirements and quantities of large-scale computations are becoming foremost progressively. Therefore, that will be much practicable if there is a Web-based service that could provide Grid computing functions. In this paper, Several similar Web-based cloud and parallel computing systems will be discussed and a model of Web application termed GCaaS which supports grid computing services will be introduced.

Problems of Regulatory and Legal Support of Polygraph Application in Ukraine

  • Irkha, Yurii;Butenko, Oleksii;Pogrebytskyi, Mykola;Manzhai, Oleksandr;Krushynskyi, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.203-206
    • /
    • 2021
  • The article is devoted to the study of the problems of polygraphic research to obtain forensically significant information. An analysis of the legal basis for the use of the polygraph in Ukraine. Problematic issues concerning the appropriateness of using a polygraph in the investigation and detection of crimes have been studied. The domestic legal norms that regulate this issue, as well as foreign experience are analyzed. The article reveals the essence of the polygraph, the legal basis and requirements for its use. Attention is drawn to the main difficulties of using a polygraph and ways to solve them.

"How can you live without using Snapchat?" Practical Study for the Usage of Facebook and Snapchat in the Kingdom of Saudi Arabia

  • Alghamdi, Deena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.579-585
    • /
    • 2021
  • This study aims to provide an in-depth description of the practices of social media users in the Kingdom of Saudi Arabia (KSA)-specifically the users of Facebook and Snapchat-and the reasons for these practices, the decisions made, and the people involved. Qualitative methods were used to collect data in two rounds from 53 participants. The data analysis shows a clear preference for Snapchat over Facebook among the participants, as shown in their using the application many times daily and in the creation and use of new words derived from the application's name. On the other hand, one of the main reasons mentioned by the participants for not preferring Facebook was the unclear policy of security and privacy used in the application. This reason is important for all social media users, but, in particular, it is crucial for female users, as shown in the data. This is important for the designers and policymakers of the social media applications to understand and consider, as it would help them improve the current applications and create new ones.

Towards the Acceptance of Functional Requirements in M-Learning Application for KSA University Students

  • Badwelan, Alaa;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.145-166
    • /
    • 2021
  • M-learning is one of the most important modern learning environments in developed countries, especially in the context of the COVID-19 pandemic. According to the Ministry of Education policies in Saudi Arabia, gender segregation in education reflects the country's religious values, which are a part of the national policy. Thus, it will help many in the target audience to accept online learning more easily in Saudi society. The literature review indicates the importance to use the UTAUT conceptual framework to study the level of acceptance through adding a new construct to the model which is Mobile Application Quality. The study focuses on the end user's requirements to use M-learning applications. It is conducted with a qualitative method to find out the students' and companies' opinions who working in the M-learning field to determine the requirements for the development of M-learning applications that are compatible with the aspirations of conservative societies.

Extension of Minimal Codes for Application to Distributed Learning (분산 학습으로의 적용을 위한 극소 부호의 확장 기법)

  • Jo, Dongsik;Chung, Jin-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.479-482
    • /
    • 2022
  • Recently, various artificial intelligence technologies are being applied to smart factory, finance, healthcare, and so on. When handling data requiring protection of privacy, distributed learning techniques are used. For distribution of information with privacy protection, encoding private information is required. Minimal codes has been used in such a secret-sharing scheme. In this paper, we explain the relationship between the characteristics of the minimal codes for application in distributed systems. We briefly deals with previously known construction methods, and presents extension methods for minimal codes. The new codes provide flexibility in distribution of private information. Furthermore, we discuss application scenarios for the extended codes.

Efficient Super-Resolution of 2D Smoke Data with Optimized Quadtree (최적화된 쿼드트리를 이용한 2차원 연기 데이터의 효율적인 슈퍼 해상도 기법)

  • Choe, YooYeon;Kim, Donghui;Kim, Jong-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.01a
    • /
    • pp.261-264
    • /
    • 2021
  • 본 논문에서는 SR(Super-Resolution)을 계산하는데 필요한 데이터를 효율적으로 분류하고 분할하여 빠르게 SR연산을 가능하게 하는 쿼드트리 기반 최적화 기법을 제안한다. 제안하는 방법은 입력 데이터로 사용하는 연기 데이터를 다운스케일링(Downscaling)하여 쿼드트리 연산 소요 시간을 감소시키며, 이때 연기의 밀도를 이진화함으로써, 다운스케일링 과정에서 밀도가 손실되는 문제를 피한다. 학습에 사용된 데이터는 COCO 2017 Dataset이며, 인공신경망은 VGG19 기반 네트워크를 사용한다. 컨볼루션 계층을 거칠 때 데이터의 손실을 막기 위해 잔차(Residual)방식과 유사하게 이전 계층의 출력 값을 더해주며 학습한다. 결과적으로 제안하는 방법은 이전 결과 기법에 비해 약15~18배 정도의 속도향상을 얻었다.

  • PDF