• Title/Summary/Keyword: Human computer

Search Result 5,011, Processing Time 0.034 seconds

Design and Evaluation of Wireless Sensor Node Application for u-Healthcare (u-헬스케어를 위한 무선센서노드 어플리케이션 구현 및 성능 평가)

  • Lee, Dae-Seok;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.518-521
    • /
    • 2007
  • The functional wireless sensor node for u-healthcare application was developed. The developed sensor node can check the abnormality of ECG in some simple software in ROM of microprocess in the sensor node. The ECG signal is one of very important health signal form human body, and wavelike signal which is sampled as a sampling frequency between 100 and 400 Hz for digitalization, so the wireless data dor ECG signal is some heavy in Zigbee communication. Thus the sensor send the ECG signal to other sensor nodes or base station when it find abnormality in ECG signal is key technology to reduce the traffic between sensor nodes in wireless sensor network for u-healthcare, The sensor node does not need to transmit ECG data all time in wireless sensor network and to server. Using these sensor nodes, the healthcare system can dramatically reduce wireless data packet overload, the power consumption of battery in the sensor nodes and thus increase the reliability of the wireless system.

  • PDF

Elliptic Curve AMP Protocol (타원곡선을 이용한 AMP 프로토콜)

  • Ahn, Chang-Sup;Heu, Shin
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.11
    • /
    • pp.622-633
    • /
    • 2002
  • Authentication and Key Agreement using password provide convenience and amenity, but what human can remember has extremely low entropy. To overcome its defects, AMP(Authentiration and key agreement via Memorable Password) which performs authentication and key agreement securely via low entropy password are presented. AMP uses Diffie-Hellman problem that depends on discrete logarithm problem. Otherwise, this thesis applies elliptic curve cryptosystem to AMP for further efficiency That is, this thesis presents EC-AMP(Elliptic Curve-AMP) protocol based on elliptic curve discrete logarithm problem instead of discrete logarithm problem, and shows its high performance through the implementation. EC-AMP secures against various attacks in the random oracle model just as AMP Thus, we nay supply EC-AMP to the network environment that requires authentication and key agreement to get both convenience and security from elliptic curve discrete logarithm problem.

TMCS : Tangible Media Control System (감각형 미디어 제어 시스템)

  • 오세진;장세이;우운택
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1356-1363
    • /
    • 2004
  • We propose Tangible Media Control System (TMCS), which allows users to manipulate media contents with physical objects in an intuitive way. Currently, most people access digital media contents by exploiting GUI. However, It provides limited manipulations of the media contents. The proposed system, instead of mouse and keyboard, adopts two types of tangible objects, i.e RFID-enabled object and tracker-embedded object. The TMCS enables users to easily access and control digital media contents with the tangible objects. In addition, it supports an interactive media controller which users can synthesize media contents and generate new media contents according to users' taste. It also offers personalized contents, which is suitable for users' preferences, by exploiting context such as user's profile and situational information. Therefore. the proposed system can be applied to various interactive applications such as multimedia education, entertainment and multimedia editor.

Development of an Organism-specific Protein Interaction Database with Supplementary Data from the Web Sources (다양한 웹 데이터를 이용한 특정 유기체의 단백질 상호작용 데이터베이스 개발)

  • Hwang, Doo-Sung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1091-1096
    • /
    • 2002
  • This paper presents the development of a protein interaction database. The developed system is characterized as follows. First, the proposed system not only maintains interaction data collected by an experiment, but also the genomic information of the protein data. Secondly, the system can extract details on interacting proteins through the developed wrappers. Thirdly, the system is based on wrapper-based system in order to extract the biologically meaningful data from various web sources and integrate them into a relational database. The system inherits a layered-modular architecture by introducing a wrapper-mediator approach in order to solve the syntactic and semantic heterogeneity among multiple data sources. Currently the system has wrapped the relevant data for about 40% of about 11,500 proteins on average from various accessible sources. A wrapper-mediator approach makes a protein interaction data comprehensive and useful with support of data interoperability and integration. The developing database will be useful for mining further knowledge and analysis of human life in proteomics studies.

Experiment and Implementation of a Machine-Learning Based k-Value Prediction Scheme in a k-Anonymity Algorithm (k-익명화 알고리즘에서 기계학습 기반의 k값 예측 기법 실험 및 구현)

  • Muh, Kumbayoni Lalu;Jang, Sung-Bong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.1
    • /
    • pp.9-16
    • /
    • 2020
  • The k-anonymity scheme has been widely used to protect private information when Big Data are distributed to a third party for research purposes. When the scheme is applied, an optimal k value determination is one of difficult problems to be resolved because many factors should be considered. Currently, the determination has been done almost manually by human experts with their intuition. This leads to degrade performance of the anonymization, and it takes much time and cost for them to do a task. To overcome this problem, a simple idea has been proposed that is based on machine learning. This paper describes implementations and experiments to realize the proposed idea. In thi work, a deep neural network (DNN) is implemented using tensorflow libraries, and it is trained and tested using input dataset. The experiment results show that a trend of training errors follows a typical pattern in DNN, but for validation errors, our model represents a different pattern from one shown in typical training process. The advantage of the proposed approach is that it can reduce time and cost for experts to determine k value because it can be done semi-automatically.

Improvement of ITSM IT Service Efficiency in Military Electronic Service

  • Woo, Hanchul;Jeong, Suk-Jae;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.246-260
    • /
    • 2020
  • IT Service Management (ITSM) achieves consolidated management for the IT services supporting the acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q&A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM. Currently, diverse innovative technologies are being used in electronics and ubiquitous computing environments. This allows us to create a better world by providing the backbone for remarkable development in our human society in the fields of electronics, devices, computer science, and engineering. Following the expansion of IT services in the military acquisition sector such as Defense Electronic Procurement, military export/import support system, etc., customers' dependence on IT for conducting business with the military or related companies is increasing, including the military's dependence on the same technology for services to the public. Nonetheless, issues pertaining to the simplified/integrated management of complex IT service management systems, including slow system recovery, lack of integrated customer service window, and insufficient information sharing, have become the priority problems that IT managers are required to solve. Therefore, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on the existing system IT Infrastructure Library (ITIL) v2, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

Development of Customized Prosthetic Hand Using 3D Printing (3D프린팅을 이용한 사용자 맞춤형 의수 개발)

  • Moon, Mikyeong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.3
    • /
    • pp.110-117
    • /
    • 2018
  • The development of prosthetic hand or prosthetic leg equipment is steadily taking place globally. Though it would be difficult to create or feel the same way as a human hand, it would be a great for the amputated person if they can pick things up or do some movement as they want. It has become possible to develop low-cost prosthetic hand according to development of 3D printing technology. If people can develop personalized prosthetic equipment at similar prices to meet this trend, the utilization and penetration rate will be much higher. In this study, it describes how to develop a user-customizable prosthetic hand using 3D printing. To do this, the transformational parameters of prosthetic hand shape modeling are extracted as variability values, and the functions for controlling prosthetic hand motion are designed as software design patterns. This allows people who need a prosthetic hand to have their own prosthetic hand at a fast and affordable price.

From Computing Distribution of Email Responses for Each User Cluster To Construct User Preference based Anti-spam Mail System (사용자 클러스터별 이메일 반응 분포 계산 및 사용자 선호 스팸 메일 대응 시스템 구축)

  • Kim, Jong-Wan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.3
    • /
    • pp.343-349
    • /
    • 2009
  • In this paper, it would be shown that individuals can have different responses to the same email based on their preferences through computing the distributions of user clusters' email responses from clustering results based on email users' preference information. This paper presents an approach that incorporates user preferences to construct an anti-spam mail system, which is different from the conventional content-based ones. We consider email category information derived from the email content as well as user preference information. We also build a user preference ontology to formally represent the important concepts and rules derived from a data mining process and then apply a rule optimization procedure to exclude unnecessary rules. Experimental results show that our user preference based system achieves good performance in terms of accuracy, the rules derived from the system and human comprehensibility.

Research of Education Program for Autistic Children the Clay (흙 놀이를 통한 유아자폐증치료과정 연구)

  • Kim, Sung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.3
    • /
    • pp.91-98
    • /
    • 2009
  • The structure of modern society are complex, fast, overflowing of individualism and losing of independence through the standardization of human relationship. The frequency increased that children watch television and play computer game alone through this structure. Also, the mental disorder like as autism tend to be increase for childhood because, parents overprotect, unmethodical bringing up children, emotional disturbance and effect of genetic. Therefore, research and case study of art therapy publish that illustrates a tendency of developing and growing. On the base of this situation art therapy realize more important than before and gain power. Therefore, this research consider that clay therapy effect for autistic just children and investigate function of catharsis through the case study. Also, make study that social rappot and function of catharsis develop for children who has autism. The suggest effect of synergy which come from clay therapy(education of ceramic) and development of education program.

Can Information Technology Revive Rural Economies?: The Cases of E-villages in Korea and Japan (정보통신기술과 농촌 경제: 한국과 일본 정보화마을의 사례 연구)

  • Huh, Woo-Kung
    • Journal of the Korean Geographical Society
    • /
    • v.43 no.5
    • /
    • pp.728-742
    • /
    • 2008
  • There has been a high expectation that information technology (IT) can do something good for the rural perils. Efforts thus have been made in many countries to 'informatize' rural areas, namely to roll out IT infrastructure into remote areas and to enhance the computer literacy of rural residents. The present study examines the 'e-village' projects implemented in Korea and Japan. It evaluates the business models employed by the e-villages such as e-shops of local products and tour guide programs, the ways in which rural residents have managed their business models, the practices of information exchange within and outside of the villages, and the monetary gains of the business models. The study collects data mainly from the e-village web pages of both countries. The study reveals that the e-village business models have performed less than expected in general, and that Japanese e-villages are better off than the Korean counterparts. The study identifies the factors responsible for such mediocre performances of the business models including a lack of retail business experiences and capabilities of the rural people. The study findings highlight the importance of human resources, rather than the new technology per se, for rural development.