• Title/Summary/Keyword: Mobile Personal Assistant

Search Result 69, Processing Time 0.025 seconds

Design and Implementation of user centric pavilion information guide system based on commercial mobile device (모바일 기기 기반 사용자 중심형 전시관 정보 안내 시스템의 설계 및 구현)

  • Yun Hyun-Joo;Bu So-Young;Choi Yoo-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.187-199
    • /
    • 2006
  • This paper proposes the design of user centric pavilion information guide system based on mobile device such as PDA. which is composed of system interface factors as user wants. The suggested information guide system is convenient for user carrying because it is based on PDA mobile device and the used liquid browser system makes all data information displayed on a small screen in contrast with the other browser system. Indeed, factors of system interface can be re-composed by user interaction. And this system can effectively provide the detail information about the exhibited objects as various media data such as text, image, voice, music, video etc. The proposed system is made up of media database server. mobile system control server and mobile system interface which accepts user interaction and displays the information. Each system is networked based on TCP/IP and uses XML (extensible Markup Language) and JAVA 2 micro edition to be able to update data. This feature enhances a wide use to be able to load this system on the any mobile device.

  • PDF

PDA-based Text Extraction System using Client/Server Architecture (Client/Server구조를 이용한 PDA기반의 문자 추출 시스템)

  • Park Anjin;Jung Keechul
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.2
    • /
    • pp.85-98
    • /
    • 2005
  • Recently, a lot of researches about mobile vision using Personal Digital Assistant(PDA) has been attempted. Many CPUs for PDA are integer CPUs, which have no floating-computation component. It results in slow computation of the algorithms peformed by vision system or image processing, which have much floating-computation. In this paper, in order to resolve this weakness, we propose the Client(PDA)/server(PC) architecture which is connected to each other with a wireless LAN, and we construct the system with pipelining processing using two CPUs of the Client(PDA) and the Server(PC) in image sequence. The Client(PDA) extracts tentative text regions using Edge Density(ED). The Server(PC) uses both the Multi-1.aver Perceptron(MLP)-based texture classifier and Connected Component(CC)-based filtering for a definite text extraction based on the Client(PDA)'s tentativel99-y extracted results. The proposed method leads to not only efficient text extraction by using both the MLP and the CC, but also fast running time using Client(PDA)/server(PC) architecture with the pipelining processing.

An Application for Management of National Geodetic Control Points on the Web 2.0 (Web 2.0 기반 국가기준점 어플리케이션 설계)

  • Kim, Tae-Woo;Kim, Jyung-Wuk;Suh, Yong-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.3
    • /
    • pp.79-84
    • /
    • 2009
  • As a surveying standard of a nation, the Korean geodetic control points such as triangulation points and benchmarks require continuous and effective management toward a spatially enabled society. As the developments of information technologies, use of mobile devices like PDA (personal digital assistant) has been increasing and the Web 2.0 environment became an important part of GIS. In this context, the management systems for national geodetic control points should be upgraded in accordance with the current trend, particularly for more interactive user-interface on the Web 2.0. This paper describes the framework design and prototype implementation of a Web 2.0 GIS application for the management of Korean geodetic control points. Our system enables a real-time update of the control point information and provides aerial photos on vector maps using Ajax(Asynchronous JavaScript and XML) techniques.

  • PDF

Study of an Accurate and Efficient Data Integration for Decision Making in Data Management of Ubiquitous (유비쿼터스 데이터 관리에서 의사결정을 위한 정확하고 효율적인 데이터 통합 연구)

  • Lee Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.145-151
    • /
    • 2006
  • In conjunction with the rapid progress of IT(information technology) an increasing amount of data are being generated. The amount of new data is so big and the type of new data generated from clients or sensor devices needed to be in ubiquitous environment is so various that it is hard to manage and control them. Especially data to be occurred in ubiquitous environment are generated through PDA(personal digital assistant) smart phone, mobile device or sensor units etc. Therefore, to manage and control them generated from ubiquitous devices for decision making, we can use data warehouse as an integrated storage. A data warehouse integrates and aggregates data of several different DBMS into one DBMS. Also the updated data from source data have to be effectively propagated to the data warehouse. Therefore, in this paper, we proposed a mode) for an exact and efficient data management methodology in new IT paradigm environment, ubiquitous computing environment, to apply updated data on the warehouse to make decision. We also show brief result compared to conventional methodology.

  • PDF

The input method of the Hangul and Alphanumeric characters for the PDAs (휴대형 정보기기의 한글 및 영숫자 필기 입력 방안)

  • 홍성민;국일호;조원경
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.3
    • /
    • pp.53-60
    • /
    • 1998
  • In this paper, we proposed a set of ANSI-Korean character patterns for handwriting recognition that can be used as an input method of mobile computers like PDA (Personal Digital Assistant). In the case of bilinguals, two kinds of alphabets are written alternatively So the method of input character mode change must be provided, and this cause discomfort of writing. Our proposed written character patterns have some constraint but permit ANSI-Korean mixed writing without mode change keeping original form of alphabets and can be recognized with simple algorithm relatively. For ANSI character we analysis Graffiti and propose new writing pattern, which is more similar to original form. There are many researches about input method of unpacking Korean character and writing patterns. But they are not widely used because it's excessively contrary to original form of Korean characters. To show our proposed writing patterns usefulness, we studied the satisfaction and easiness of writing and the recognition rates. Writers are divided into two groups; PDA users, familiar to Graffiti, and others. The results satisfy usefulness in the both groups.

  • PDF

Design of RFID Mobile Antenna by Using Parasitic Element (기생 소자를 이용한 휴대 단말기용 RFID 리더 안테나)

  • Woo, Duk-Jae;Kim, Sung-Jin;Kim, Sang-Su;Kim, Yo-Sik;Lee, Kwang-Jae;Lee, Taek-Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.72-78
    • /
    • 2007
  • In this paper, the wide-band monopole antenna with a parasitic element on the ground plane for application in Cellular, GSM and RFID mobile terminals such as the mobile phone or Personal Digital Assistant(PDA) phone is presented. The VSWR of the designed antenna is 2:1 over the frequency range of 820 MHz to 1040 MHz(bandwidth of 23.6 %). Therefore, the designed antenna can provide wide bandwidth covering the Cellular(824 MHz~894 MHz), RFID(908.5 MHz~914 MHz) and GSM(Tx:880 MHz~915 MHz, Rx:925 MHz~960 MHz). The radiation characteristics of the fabricated antenna were also studied. According to the measured radiation patterns, the maximum gains at 859 MHz and 911.25 MHz(center frequencies of the Cellualr and RFID bands) are -0.7 dBi and 0.16 dBi, respectively. The measured maximum gains of GSM bands are -0.48 dBi(897.5 MHz, the center frequency of Tx) and 1.69 dBi(942.5 MHz, the center frequency of Rx).

  • PDF

Development of JPEG2000 Viewer for Mobile Image System (이동형 의료영상 장치를 위한 JPEG2000 영상 뷰어 개발)

  • 김새롬;정해조;강원석;이재훈;이상호;신성범;유선국;김희중
    • Progress in Medical Physics
    • /
    • v.14 no.2
    • /
    • pp.124-130
    • /
    • 2003
  • Currently, as a consequence of PACS (Picture Archiving Communication System) implementation many hospitals are replacing conventional film-type interpretations of diagnostic medical images with new digital-format interpretations that can also be saved, and retrieve However, the big limitation in PACS is considered to be the lack of mobility. The purpose of this study is to determine the optimal communication packet size. This was done by considering the terms occurred in the wireless communication. After encoding medical image using JPGE2000 image compression method, This method embodied auto-error correction technique preventing the loss of packets occurred during wireless communication. A PC class server, with capabilities to load, collect data, save images, and connect with other network, was installed. Image data were compressed using JPEG2000 algorithm which supports the capability of high energy density and compression ratio, to communicate through a wireless network. Image data were also transmitted in block units coeded by JPEG2000 to prevent the loss of the packets in a wireless network. When JPGE2000 image data were decoded in a PUA (Personal Digital Assistant), it was instantaneous for a MR (Magnetic Resonance) head image of 256${\times}$256 pixels, while it took approximately 5 seconds to decode a CR (Computed Radiography) chest image of 800${\times}$790 pixels. In the transmission of the image data using a CDMA 1X module (Code-Division Multiple Access 1st Generation), 256 byte/sec was considered a stable transmission rate, but packets were lost in the intervals at the transmission rate of 1Kbyte/sec. However, even with a transmission rate above 1 Kbyte/sec, packets were not lost in wireless LAN. Current PACS are not compatible with wireless networks. because it does not have an interface between wired and wireless. Thus, the mobile JPEG2000 image viewing system was developed in order to complement mobility-a limitation in PACS. Moreover, the weak-connections of the wireless network was enhanced by re-transmitting image data within a limitations The results of this study are expected to play an interface role between the current wired-networks PACS and the mobile devices.

  • PDF

Wearable Computers

  • Cho, Gil-Soo;Barfield, Woodrow;Baird, Kevin
    • Fiber Technology and Industry
    • /
    • v.2 no.4
    • /
    • pp.490-508
    • /
    • 1998
  • One of the latest fields of research in the area of output devices is tactual display devices [13,31]. These tactual or haptic devices allow the user to receive haptic feedback output from a variety of sources. This allows the user to actually feel virtual objects and manipulate them by touch. This is an emerging technology and will be instrumental in enhancing the realism of wearable augmented environments for certain applications. Tactual displays have previously been used for scientific visualization in virtual environments by chemists and engineers to improve perception and understanding of force fields and of world models populated with the impenetrable. In addition to tactual displays, the use of wearable audio displays that allow sound to be spatialized are being developed. With wearable computers, designers will soon be able to pair spatialized sound to virtual representations of objects when appropriate to make the wearable computer experience even more realistic to the user. Furthermore, as the number and complexity of wearable computing applications continues to grow, there will be increasing needs for systems that are faster, lighter, and have higher resolution displays. Better networking technology will also need to be developed to allow all users of wearable computers to have high bandwidth connections for real time information gathering and collaboration. In addition to the technology advances that make users need to wear computers in everyday life, there is also the desire to have users want to wear their computers. In order to do this, wearable computing needs to be unobtrusive and socially acceptable. By making wearables smaller and lighter, or actually embedding them in clothing, users can conceal them easily and wear them comfortably. The military is currently working on the development of the Personal Information Carrier (PIC) or digital dog tag. The PIC is a small electronic storage device containing medical information about the wearer. While old military dog tags contained only 5 lines of information, the digital tags may contain volumes of multi-media information including medical history, X-rays, and cardiograms. Using hand held devices in the field, medics would be able to call this information up in real time for better treatment. A fully functional transmittable device is still years off, but this technology once developed in the military, could be adapted tp civilian users and provide ant information, medical or otherwise, in a portable, not obstructive, and fashionable way. Another future device that could increase safety and well being of its users is the nose on-a-chip developed by the Oak Ridge National Lab in Tennessee. This tiny digital silicon chip about the size of a dime, is capable of 'smelling' natural gas leaks in stoves, heaters, and other appliances. It can also detect dangerous levels of carbon monoxide. This device can also be configured to notify the fire department when a leak is detected. This nose chip should be commercially available within 2 years, and is inexpensive, requires low power, and is very sensitive. Along with gas detection capabilities, this device may someday also be configured to detect smoke and other harmful gases. By embedding this chip into workers uniforms, name tags, etc., this could be a lifesaving computational accessory. In addition to the future safety technology soon to be available as accessories are devices that are for entertainment and security. The LCI computer group is developing a Smartpen, that electronically verifies a user's signature. With the increase in credit card use and the rise in forgeries, is the need for commercial industries to constantly verify signatures. This Smartpen writes like a normal pen but uses sensors to detect the motion of the pen as the user signs their name to authenticate the signature. This computational accessory should be available in 1999, and would bring increased peace of mind to consumers and vendors alike. In the entertainment domain, Panasonic is creating the first portable hand-held DVD player. This device weight less than 3 pounds and has a screen about 6' across. The color LCD has the same 16:9 aspect ratio of a cinema screen and supports a high resolution of 280,000 pixels and stereo sound. The player can play standard DVD movies and has a hour battery life for mobile use. To summarize, in this paper we presented concepts related to the design and use of wearable computers with extensions to smart spaces. For some time, researchers in telerobotics have used computer graphics to enhance remote scenes. Recent advances in augmented reality displays make it possible to enhance the user's local environment with 'information'. As shown in this paper, there are many application areas for this technology such as medicine, manufacturing, training, and recreation. Wearable computers allow a much closer association of information with the user. By embedding sensors in the wearable to allow it to see what the user sees, hear what the user hears, sense the user's physical state, and analyze what the user is typing, an intelligent agent may be able to analyze what the user is doing and try to predict the resources he will need next or in the near future. Using this information, the agent may download files, reserve communications bandwidth, post reminders, or automatically send updates to colleagues to help facilitate the user's daily interactions. This intelligent wearable computer would be able to act as a personal assistant, who is always around, knows the user's personal preferences and tastes, and tries to streamline interactions with the rest of the world.

  • PDF

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF