• Title/Summary/Keyword: Hand Phone

Search Result 211, Processing Time 0.048 seconds

Enhancing Immersiveness in Video see-through HMD based Immersive Model Realization (Video see-through HMD 기반 실감 모델 재현시의 몰입감 향상 방법론)

  • Ha, Tae-Jin;Kim, Yeong-Mi;Ryu, Je-Ha;Woo, Woon-Tack
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.685-686
    • /
    • 2006
  • Recently, various AR-based product design methodologies have been introduced. In this paper, we propose technologies for enhancing robust augmentation and immersive realization of virtual objects. A robust augmentation technology is developed for various lighting conditions and a partial solution is proposed for the hand occlusion problem that occurs when the virtual objects overlay the user' hands. It provides more immersive or natural images to the users. Finally, vibratory haptic cues by page motors as well as button clicking force feedback by modulating pneumatic pressures are proposed while interacting with virtual widgets. Also our system reduces gabs between modeling spaces and user spaces. An immersive game-phone model is selected to demonstrate that the users can control the direction of the car in the racing game by tilting a tangible object with the proposed augmented haptic and robust non-occluded visual feedback. The proposed methodologies will be contributed to the immersive realization of the conventional AR system.

  • PDF

Contact between Never Married Children and Their Parents: Moderating Effects of Children's Gender (비혼자녀와 부모의 접촉: 자녀의 성별에 따른 차이)

  • Choi, Heejeong
    • Journal of Families and Better Life
    • /
    • v.34 no.5
    • /
    • pp.151-166
    • /
    • 2016
  • This study examined frequency of contact between parents and their non-coresident, never-married daughters and sons compared to children in other marital statuses. Despite an increasing number of never married adults, little is known about the extent to which they may be willing to remain connected to and exchange support with their parents. The data were drawn from first wave of the Korean Longitudinal Study of Ageing (KLoSA, 2006). For analyses, respondents who had at least one non-coresident child aged 40 or older were selected, resulting in the analytic sample of 2,755 parents with 7,741 children. Both sibling fixed effects regression models and regression models with robust standard errors were estimated using the xtreg and reg procedures in STATA. Findings revealed significant marital status by gender interaction effects on face-to-face contact. Never-married daughters were more likely to see their parents compared to their married, divorced, or widowed counterparts. Never-marred sons, on the other hand, reported slightly lower levels of in-person contact with their parents in comparison to married sons and lower levels of contact compared to divorced or widowed sons. More frequent contact via phone, mail, or email was reported in daughter-parent relationship compared to son-parent relationship, but no significant marital status by gender interactions were observed.

A Study on the Dual-band VCO for Mobile Communication Terminal using Oscillation Part Switching Circuit (발진부 귀환 스위칭회로를 이용한 이동통신 단말기용 듀얼대역 전압제어 발진기 특성에 관한 연구)

  • 오태성;이영훈
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.1
    • /
    • pp.60-67
    • /
    • 2002
  • In this paper, the dual band VCO of mobile communication terminal using oscillation part switching circuit is proposed. In order to model the VCO accurately, the resonator is converted the equivalent circuit which is analyzed to use numerical method and designed optimal the dual band VCO operating GSM and DCS band. In order to demonstrate the objective theory of the proposed VCO, the dual band VCO is designed and experimented. The results of experiment, it is conformed that the VCO can be used mobile communication hand phone and components of three generation mobile communication systems.

A Survey of the Index Schemes based on Flash Memory (NAND 플래쉬메모리 기반 색인에 관한 연구)

  • Kim, Dong-Hyun;Ban, Chae-Hoon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1529-1534
    • /
    • 2013
  • Since a NAND-flash memory is able to store mass data in a small sized chip and consumes low power, it is exploited on various hand-held devices, such as a smart phone and a sensor node, etc. To process efficiently mass data stored in the flash memory, it is required to use an index. However, since the write operation of the flash memory is slower than the read operation and an overwrite operation is not supported, the usage of existing index schemes degrades the performance of the index. In this paper, we survey the previous researches of index schemes for the flash memory and classify the researches by the methods to solve problems. We also present the performance factor to be considered when we design the index scheme on the flash memory.

Transmission Performance of VoIP Traffic under Blackhole Attacks on MANET (블랙홀 공격이 있는 MANET에서 VoIP 트래픽의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.637-640
    • /
    • 2011
  • Recently, rapid spreading of smart-phone make an expectation for increase of practical application for MANET(Mobile Ad-Hoc Network) which is not used infrastructure like as base-station. One of important application for MANET will be VoIP(Voice over Internet Protocol) known as Internet telephony. On the other hand, information intrusions causing serious problems is not allowed exception of MANET. Especially, there are some dangerous problems of intrusions to MANET, differently to other networks, because of it's usage of military purpose or emergency application of rescue. In this paper, to analyze this intrusion problem on MANET with blackhohe attacks, effect of intrusion to transmission performance is studied. VoIP traffic is assumed as an application service on MANET, computer simulation with NS-2 is used for this analysis.

  • PDF

Relative Risk Evaluation of Front-to-Rear-End Collision when Drivers Using Electronic Devices: A Simulation Study (추출가능 상황에서 전자기기 사용유형에 따른 상대적 위험성평가: 운전 시뮬레이션 연구)

  • Lee, Se-Won;Lee, Jae-Sik
    • Journal of the Korean Society of Safety
    • /
    • v.24 no.4
    • /
    • pp.104-110
    • /
    • 2009
  • In this driving simulation study, the impairing effects of various types of electronic devices usage(i. e., destination search by using in-vehicle navigation system, TV watching and dialing cellular phone) during driving on front-to-rear-end collision avoidance were investigated. Percentage of collisions, driving speeds when the drivers collided, and initial reaction time for collision avoidance were analyzed and compared as the dependent measures. The results indicated that (1) any types of electronic devices usage during driving induced more serious collision-related impairment than control condition where no additional task was required, and (2) in general, destination search task appeared to impair drivers collision avoidance performance more than the other task requirements in terms of percentage of collisions and initial reaction time for collision avoidance, but TV watching induced most serious collision impact. These results suggested that any types of electronic device usage could distract drivers attention from the primary task of driving, and be resulted in serious outcome in potentially risky situation of front-to-rear-end collision. In particular, mandatory use of eye-hand coordination and receiving feedback seemed to one of essential factor leading the drivers visual attentional distraction.

The optimal control technology on complex environment in horticulture based on artificial intelligence (인공지능 기반 시설원예 최적 복합 환경 제어 기술)

  • Min, Jae Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.756-759
    • /
    • 2017
  • The productivity of cultivated crops in Korea is low compared to the Netherlands, which is an advanced agricultural country. In addition, modernization of facility and complex environmental control technology are needed to overcome poor growth and productivity deterioration caused by shortage of sunshine, abnormal temperature and high temperature due to abnormal climate. On the other hand, domestic facility horticulture complex environmental control is a level of machine automation that can check the internal situation of a green house with a cell phone and remotely operate a sprinkler, heat cover, curtain, ventilator, Therefore, this paper suggests the development of optimum environment control technology for facility horticulture based on the growth model and the cultivation technology knowledge base in order to realize the automation of optimal complex environment control and contribute to improvement of quality and productivity of cultivated crops.

  • PDF

Improvement of an Automatic Segmentation for TTS Using Voiced/Unvoiced/Silence Information (유/무성/묵음 정보를 이용한 TTS용 자동음소분할기 성능향상)

  • Kim Min-Je;Lee Jung-Chul;Kim Jong-Jin
    • MALSORI
    • /
    • no.58
    • /
    • pp.67-81
    • /
    • 2006
  • For a large corpus of time-aligned data, HMM based approaches are most widely used for automatic segmentation, providing a consistent and accurate phone labeling scheme. There are two methods for training in HMM. Flat starting method has a property that human interference is minimized but it has low accuracy. Bootstrap method has a high accuracy, but it has a defect that manual segmentation is required In this paper, a new algorithm is proposed to minimize manual work and to improve the performance of automatic segmentation. At first phase, voiced, unvoiced and silence classification is performed for each speech data frame. At second phase, the phoneme sequence is aligned dynamically to the voiced/unvoiced/silence sequence according to the acoustic phonetic rules. Finally, using these segmented speech data as a bootstrap, phoneme model parameters based on HMM are trained. For the performance test, hand labeled ETRI speech DB was used. The experiment results showed that our algorithm achieved 10% improvement of segmentation accuracy within 20 ms tolerable error range. Especially for the unvoiced consonants, it showed 30% improvement.

  • PDF

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.