• Title/Summary/Keyword: Paper keyboard

Search Result 235, Processing Time 0.019 seconds

A Study on Video Search Method using the Image map (이미지 맵을 이용한 동영상 검색 제공방법에 관한 연구 - IPTV 환경을 중심으로)

  • Lee, Ju-Hwan;Lea, Jong-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.298-303
    • /
    • 2008
  • Watching a program on IPTV among the numerous choices from the internet requires a burden of searching and browsing for a favorite one. This paper introduces a new concept called Mosaic Map and presents how it provides preview information of image map links to other programs. In Mosaic Map the pixels in the still image are used both as shading the background and as thumbnails which can link up with other programs. This kind of contextualized preview of choices can help IPTV users to associate the image with related programs without making visual saccades between watching IPTV and browsing many choices. The experiments showed that the Mosaic Map reduces the time to complete search and browsing, comparing to the legacy menu and web search.

  • PDF

Computer Vision Based Efficient Control of Presentation Slides (컴퓨터비전에 기반한 효율적인 프리젠테이션 슬라이드 제어)

  • 박정우;석민수;이준호
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.4
    • /
    • pp.232-239
    • /
    • 2003
  • This paper discusses the design and implementation of a human-oriented interface based on computer vision that efficiently controls presentation slides. The user does not have to be confined to a keyboard or mouse any more, and can move around more freely because slides for presentation can be up and down using a general laser pointer that is used for presentation. Regions for virtual buttons are set on the slide so that the user can conveniently point the buttons using the laser pointer. We have proposed a simple and efficient method that computes the button areas in the image without complicated calibration. The proposed method has been implemented based on Microsoft PowerPoint ; moreover it can be applied to other PowerPoint-like presentation softwares. Our method for human-centered slide control enables the user to give audiences a more interactive presentation in a natural way.

Implementation of Digital Light Drawing System based on Stereo Vision (스테레오 비전 기반 Light Drawing 시스템 구현)

  • Park, Won-Bae;Park, Chang-Bum;Paik, Doo-Won
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.130-137
    • /
    • 2010
  • Light Drawing is a photographic technique which exposures are made at night or in a darkened room usually by moving a hand-held light source[1]. Due to the limitations of equipment and environment, users having difficulty in drawing a picture in 3D space. If user take a light drawing, they need a camera that have function and darkened environment. Alternative solution is that we can make a light drawing picture by using the computer drawing tool as in Photoshop. Nevertheless, this solution will let the User lose their interest in drawing because this solution cannot synchronize between the real action of human hand motion and the electronic input devices such as mouse and keyboard. This paper proposed a digital content that can make light drawing easier. We used a digital content that will facility Light Drawing easier. We can measure the light spot position by using the stereo camera. Based on the measured position of the light spot, we reproduce light drawing in virtual space by using drawing effect method.

Analysis of Users' Gestures by Application in Smartphone Touch Interfaces (스마트폰 터치 인터페이스에서 애플리케이션별 사용자 제스처의 분석)

  • Kim, Jisun;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.9-14
    • /
    • 2015
  • Touch interface is widely used in a smartphone instead of a keyboard or a keypad interface that has been adopted in a PC or a featurephone, respectively. Touch interface can recognize a variety of gestures that clearly represent the distinct features of each application's input. This paper analyzes users' gesture of each application captured by the touch interface of a smartphone. Specifically, we extract touch input traces from various application categories such as game, web browser, youtube, image and e-book viewer, video player, camera, and map applications, and then analyzed them. Through this analysis, we observed a certain unique characteristics of each application's touch input, and this can be utilized in various useful areas such as identification of an application user, prevention of running an application by an illegal user, or design of a new interface convenient to a specific user.

Study for Operation Teaching Machine Using 3D Virtual Reality System (3D가상 현실방식을 사용한 수술교육시스템의 연구)

  • Kang, Byung-Hoon;Kim, Ji-Sook;Kim, Han-Woong
    • Journal of Digital Contents Society
    • /
    • v.17 no.4
    • /
    • pp.287-293
    • /
    • 2016
  • Some studies require sufficient amount of time, spaces, and financial condition for practical exercises and training. In particular for the Medical education, time and space limitation is very high and difficulties occurs, since the practices are done with cadavers (deceased human body). Many alternate 3D Virtual surgery training system exist currently, however the burdensome of obtaining those costly equipments is problematic. Providing the surgical environment as similar to real as possible using 3D Virtual Reality can be a solution to current problems. The effectiveness of training could be maximized with minimized costs without the general interfaces such as keyboard and mouse, but with Oculus Rift and Leap Motion. This paper will develop and practice the 3D Virtual Operation System with two devices to investigate the possibility and expand to other Simulation fields.

Secure Configuration Scheme for Internet of Things using NFC as OOB Channel (NFC를 OOB 채널로 활용한 사물인터넷 보안 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.13-19
    • /
    • 2016
  • The PSK (Pre-shared Secret Key) based method is appropriate for the IoT environment consisting of lightweight devices since this method requires less computing time and energy than the method to configure the session key based on the public key algorithm. A fundamental prerequisite for the PSK based method is that PSK should have been configured between the communication entities safely in advance. However, in case of a small sensor or actuator, no input and output interface such as keyboard and monitor required for configuration exists, so it is more difficult to configure PSK for such lightweight devices safely in the IoT environment than the previous Internet devices. Especially, normal users lack expertise in security so they face difficulty in configuration. Therefore, the default value configured at the time of manufacturing at factories is used or the device installer configures PSK in most cases. In such case, it is a matter for consideration whether all installers and manufacturers can be trusted or not. In order to solve such problem, this paper proposes a secure bootstrapping scheme, which utilizes the NFC (Near Field Communication) as an OOB (Out-Of-Band) channel, for lightweight devices with limited resources.

A Study on Equation Recognition Using Tree Structure (트리 구조를 이용한 수식 인식 연구)

  • Park, Byung-Joon;Kim, Hyun-Sik;Kim, Wan-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.340-345
    • /
    • 2018
  • The Compared to general sentences, the Equation uses a complex structure and various characters and symbols, so that it is not possible to input all the character sets by simply inputting a keyboard. Therefore, the editor is implemented in a text editor such as Hangul or Word. In order to express the Equation properly, it is necessary to have the learner information which can be meaningful to interpret the syntax. Even if a character is input, it can be represented by another expression depending on the relationship between the size and the position. In other words, the form of the expression is expressed as a tree model considering the relationship between characters and symbols such as the position and size to be expressed. As a field of character recognition application, a technique of recognizing characters or symbols(code) has been widely known, but a method of inputting and interpreting a Equation requires a more complicated analysis process than a general text. In this paper, we have implemented a Equation recognizer that recognizes characters in expressions and quickly analyzes the position and size of expressions.

The Problem and Prospect of Developing a RFID-based Digital Board Game by Initial Developers (초기 개발자를 통해 본 RFID 디지털 보드게임 개발의 문제점 및 전망)

  • Lee, Kyoung-Mi;Lee, Kyung-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.132-140
    • /
    • 2010
  • RFID-based games, which use a RFID reader and RFID chips, will expand existing computer games, which use a computer screen, a keyboard or a mouse. This paper presents 4 RFID digital board game contents which are conducted by initial developers; the three of them use the screen and control the games with RFID chips and, one is a different attempted game which can exclude the screen and be immersed to the board. While initial developers use object recognition of RFID, we need to develop game contents and game interface which can recognize positions of the objects. According to the initial developer"s developing process, the cooperative system between the game technical developers and the contents developers should be necessary. Also, the interface should be developed for young children to participate and operate.

Adaptive Keystroke Authentication Method for Online Test (온라인 시험을 위한 적응적 키보드 인증방법)

  • Ko, Joo-Young;Shim, Jae-Chang;Kim, Hyen-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1129-1137
    • /
    • 2008
  • E-learning as a new education trend is being applied not only to cyber school but also various education fields such as employee training for companies or interactive learning for consumers. Users of the E-learning can take online tests individually anywhere, to evaluate their achievement level. Because users who are taking the online tests may show their own IDs or passwords to others, the possibility of cheating is very high. Therefore, it is very important to authenticate the users. In this paper, we propose an adaptive-keyboard authentication method which depends on user behavior patterns through the use of IDs and passwords. This method does not need any additional devices or special effort. An adaptive method to update patterns in which IDs and passwords are entered was previously suggested and this new method has proved to be better than previous methods through simulations and implementation.

  • PDF

Crossword Game Using Speech Technology (음성기술을 이용한 십자말 게임)

  • Yu, Il-Soo;Kim, Dong-Ju;Hong, Kwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.2
    • /
    • pp.213-218
    • /
    • 2003
  • In this paper, we implement a crossword game, which operate by speech. The CAA (Cross Array Algorithm) produces the crossword array randomly and automatically using an domain-dictionary. For producing the crossword array, we construct seven domain-dictionaries. The crossword game is operated by a mouse and a keyboard and is also operated by speech. For the user interface by speech, we use a speech recognizer and a speech synthesizer and this provide more comfortable interface to the user. The efficiency evaluation of CAA is performed by estimating the processing times of producing the crossword array and the generation ratio of the crossword array. As the results of the CAA's efficiency evaluation, the processing times is about 10ms and the generation ratio of the crossword array is about 50%. Also, the recognition rates were 95.5%, 97.6% and 96.2% for the window sizes of "$7{\times}7$", "$9{\times}9$," and "$11{\times}11$" respectively.}11$" respectively.vely.