• Title/Summary/Keyword: Computer application

Search Result 7,861, Processing Time 0.036 seconds

NATURAL INTERACTION WITH VIRTUAL PET ON YOUR PALM

  • Choi, Jun-Yeong;Han, Jae-Hyek;Seo, Byung-Kuk;Park, Han-Hoon;Park, Jong-Il
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.341-345
    • /
    • 2009
  • We present an augmented reality (AR) application for cell phone where users put a virtual pet on their palms and play/interact with the pet by moving their hands and fingers naturally. The application is fundamentally based on hand/palm pose recognition and finger motion estimation, which is the main concern in this paper. We propose a fast and efficient hand/palm pose recognition method which uses natural features (e.g. direction, width, contour shape of hand region) extracted from a hand image with prior knowledge for hand shape or geometry (e.g. its approximated shape when a palm is open, length ratio between palm width and pal height). We also propose a natural interaction method which recognizes natural motion of fingers such as opening/closing palm based on fingertip tracking. Based on the proposed methods, we developed and tested the AR application on an ultra-mobile PC (UMPC).

  • PDF

A Study on the Effect of the Women Farmers Information Project (여성농업인 정보화 시범사업 효과 평가)

  • Shim, Mi Ok;Kim, Hwa Nim
    • Journal of Agricultural Extension & Community Development
    • /
    • v.8 no.1
    • /
    • pp.107-119
    • /
    • 2001
  • As the information gap between rural and urban area, and between men and women has been widening, the Rural Development Administration(RDA) has initiated the women farmers information project from 2000. The aims of this project are; 1) to facilitate women farmers' computer and information application in agriculture and income generating activities, and 2) to make them to be leaders to popularize computer application in rural area and agricultural sector. For these, RDA has provided not only PC, software, computer training but also the post support of extension educator to target group. This paper focused on evaluating the effect of the project, clarifying the related variables with the effect, and providing suggestions to enhance the effect. The data were gathered from 310 target women farmers and 166 extension educators in charge of the project all over the country by mailing survey with questionnaire. The main findings of this study were as follows; 1) The level of computer application of the target group was improved drastically, 2) As their self-assessment, they could improve psychological fear on the computer, recognition about information, and attitude to seek information, 3) This project was helpful for them in terms of information gathering and farm(or income generating activities) management, 4) They tried to disseminate the benefit of computer application to neighbors, so that the neighbors' interest in computer and attendance of computer training were improved, 5) Variables such as the computer training hours, the number of interaction with extension educator, formal schooling and farming history were significantly related to the project's effect. To enhance the project's effect the following strategies should be carried out; 1) The period of the computer training course should be standardized and the subjects should attend to the computer training course for the standardized period. 2) Through continuous interaction with the subjects, the extension educator should support them to use computer well and to overcome some difficulties as a beginner. 3) In selecting the subjects, the priority should be given to the person who graduated high school at least. 4) The subjects should focus on using management software, gathering useful information for their business, and selling their products directly to the consumer. 5) So as to enhance the abilities mentioned above, RDA should strengthen learning opportunities through on-line training and providing educational software, besides of existing off-line training.

  • PDF

VotingRank: A Case Study of e-Commerce Recommender Application Using MapReduce

  • Ren, Jian-Ji;Lee, Jae-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.834-837
    • /
    • 2009
  • There is a growing need for ad-hoc analysis of extremely large data sets, especially at e-Commerce companies which depend on recommender application. Nowadays, as the number of e-Commerce web pages grow to a tremendous proportion; vertical recommender services can help customers to find what they need. Recommender application is one of the reasons for e-Commerce success in today's world. Compared with general e-Commerce recommender application, obviously, general e-Commerce recommender application's processing scope is greatly narrowed down. MapReduce is emerging as an important programming model for large-scale data-parallel applications such as web indexing, data mining, and scientific simulation. The objective of this paper is to explore MapReduce framework for the e-Commerce recommender application on major general and dedicated link analysis for e-Commerce recommender application, and thus the responding time has been decreased and the recommender application's accuracy has been improved.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

Using SQLMAP to Detect SQLI Vulnerabilities

  • Almadhy, Waad;Alruwaili, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.234-240
    • /
    • 2022
  • One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.

A Study on Large Data File Management Using Buffer Cache and Virtual Memory File (가상메모리 화일과 버퍼캐쉬를 이용한 대형 데이타 화일의 처리에 관한 연구)

  • Kim, Byeong-Chul;Shin, Byeong-Seok;Hwang, Hee-Yeung
    • Proceedings of the KIEE Conference
    • /
    • 1991.11a
    • /
    • pp.185-188
    • /
    • 1991
  • In this paper we have designed and implemented a method of using extended memory and hard disk space as a data buffer for application programs to allow handling of large data files in DOS environment. We use a part of the conventional DOS memory as a buffer cache which allows the application program to use extended memory and hard disks transparently. Using buffer cache also allows some speed improvement for the application program. We have also implemented a number of functions to allow easier handling of pointer operations used by application programs.

  • PDF

Teaching-Learning Method for Calculus Education with Maplet (Maplet을 이용한 미적분학 교수-학습 방법)

  • 한동숭
    • Journal of the Korean School Mathematics Society
    • /
    • v.6 no.2
    • /
    • pp.71-85
    • /
    • 2003
  • In this paper we study the usefulness of Maple in school calculus education. The use of computer and calculator is debated in many aspect in mathematics education. By the computer visualization of mathematical image and proper use of computer we can teach inductively and intuitively the mathematical concept and give rise to the students' interest. Maple is very popular in college but is not in middle school because of language. Maple application which is made by Maplet is very useful multimedia teaching-learning tools. We introduce the use of Maplet and some application of the calculus course which we made.

  • PDF

A Log Management Service Model based on AOP for Efficient Development of Android Applications

  • Choi, Yun-seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.3
    • /
    • pp.39-45
    • /
    • 2016
  • In this paper, we propose a log management service model for efficient developments of android applications. The proposed model consists of two major parts which are the log collector and the log manager service. The log collector can capture the log information of a target application without modifications, because the collector is composed by aspect-oriented programming. The collected logs are transformed to chunk of data, and the chunk of data is sent to the log management service. The log management service is an android service component and an independent application in another process. So, the log management service can reduce the workload of logging in the target application. Through a case study, we show that the proposed log management service model can reduce the log processing time compared to other models without modifications of a target application.

Design of Tourism Application Based on RFID Technology

  • Lee, JiHyun;Lee, JoonGoo;Kim, SeonWook
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.74-82
    • /
    • 2014
  • Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.

A Study on Smart Phone GPS Traceback Application of Current Location (Smart Phone의 현재위치 GPS 역추적 애플리케이션 연구)

  • Pyo, Seong-Bae;Kim, Min-Gi;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.79-82
    • /
    • 2011
  • Smart Phone의 사용이 증대되고, 서비스가 향상되면서, Smart Phone 사용자의 요구를 반영한 다양한 애플리케이션이 개발되고 있다. 또한, Smart Phone에 탑재되어 있는 GPS 모듈을 이용한 애플리케이션도 개발되고 있다. 본 논문에서는 Smart Phone의 국제 기기 식별번호(IMEI)를 이용하여, GPS 신호로부터 분석된 위도좌표, 경도좌표를 서버로 전송하고, 특정 Smart Phone의 현재 위치를 역추적 할 수 있는 Smart Phone 위치 역추적 애플리케이션을 연구한다.

  • PDF