• Title/Summary/Keyword: Technology user

Search Result 7,584, Processing Time 0.037 seconds

Prospect of Non-Touch User Interface Technique (비접촉식 동작인식 기반 사용자 인터페이스 기술 전망)

  • Kim, Soo-Kyun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.3
    • /
    • pp.242-247
    • /
    • 2014
  • The advancement of touch user interface technology is mostly due to the debut and success of the new user experience (UX), the iPhone. The introduction of Apple's iPhone especially made possible for the user experience to break away from the traditional input device of the mouse and keyboard. It is advancing from the current 3rd generation touch interface technology into the 4th generation non-touch user interface technology. This paper will present a non-touch interaction technology that allows interaction in a three dimensional setting through 3-D space touch. It will analyze current technologies and future emerging technologies.

Robot Driving System and Sensors Implementation for a Mobile Robot Capable of Tracking a Moving Target (이동물체 추적 가능한 이동형 로봇구동 시스템 설계 및 센서 구현)

  • Myeong, Ho Jun;Kim, Dong Hwan
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.22 no.3_1spc
    • /
    • pp.607-614
    • /
    • 2013
  • This paper proposes a robot driving system and sensor implementation for use with an education robot. This robot has multiple functions and was designed so that children could use it with interest and ease. The robot recognizes the location of a user and follows that user at a specific distance when the robot and user communicate with each other. In this work, the robot was designed and manufactured to evaluate its performance. In addition, an embedded board was installed with the purpose of communicating with a smart phone, and a camera mounted on the robot allowed it to monitor the environment. To allow the robot to follow a moving user, a set of sensors combined with an RF module and ultrasonic sensors were adopted to measure the distance between the user and the robot. With the help of this ultrasonic sensors arrangement, the location of the user couldbe identified in all directions, which allowed the robot to follow the moving user at the desired distance. Experiments were carried out to see how well the user's location could be recognized and to investigate how accurately the robot trackedthe user, which eventually yielded a satisfactory performance.

Robust $H_{\infty}$ Power Control for CDMA Systems in User-Centric and Network-Centric Manners

  • Zhao, Nan;Wu, Zhilu;Zhao, Yaqin;Quan, Taifan
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.399-407
    • /
    • 2009
  • In this paper, we present a robust $H_{\infty}$ distributed power control scheme for wireless CDMA communication systems. The proposed scheme is obtained by optimizing an objective function consisting of the user's performance degradation and the network interference, and it enables a user to address various user-centric and network-centric objectives by updating power in either a greedy or energy efficient manner. The control law is fully distributed in the sense that only its own channel variation needs to be estimated for each user. The proposed scheme is robust to channel fading due to the immediate decision of the power allocation of the next time step based on the estimations from the $H_{\infty}$ filter. Simulation results demonstrate the robustness of the scheme to the uncertainties of the channel and the excellent performance and versatility of the scheme with users adapting transmit power either in a user-centric or a network-centric efficient manner.

An Adaptive Recommendation System for Personalized Stock Trading Advice Using Artificial Neural Networks

  • Kaensar, Chayaporn;Chalidabhongse, Thanarat
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.931-934
    • /
    • 2005
  • This paper describes an adaptive recommendation system that provides real-time personalized trading advice to the investors based on their profiles and trading information environment. A proposed system integrates Stochastic technical analysis and artificial neural network that incorporates an adaptive user modeling. The user model is constructed and updated based on initial user profile and recorded user interactions with the system. The information presented to each individual user is also tailor-made to fit the user's behavior and preference. A system prototype was implemented in JAVA. Experiments used to evaluate the system's performance were done on both human subjects and synthetic users. The results show our proposed system is able to rapidly learn to provide appropriate advice to different types of users.

  • PDF

Detecting smartphone user habits using sequential pattern analysis

  • Lu, Dang Nhac;Nguyen, Thu Trang;Nguyen, Thi Hau;Nguyen, Ha Nam;Choi, Gyoo Seok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.20-22
    • /
    • 2015
  • Recently, the study of smart phone user habits has become a highly focused topic due to the rapid growth of the smart phone market. Indeed, sequential pattern analysis methods were efficiently used for web-based user habit mining long time ago. However, by means of simulations, it has been observed that these methods might fail for smart phone-based user habit mining. In this paper, we propose a novel approach that leads to a considerably increased performance of the traditional sequential pattern analysis methods by reasonably cutting off each chronological sequence of user logs on a device into shorter ones, which represent the sequential user activities in various periods of a day.

Virtual Reality-Based Library User Education Program Development

  • Lim, Seong-Kwan
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.4
    • /
    • pp.63-74
    • /
    • 2021
  • Virtual Reality (VR) is one of the core components of the fourth industrial revolution as a technology that makes the virtual world feel as if it is real. VR is being used in various fields such as entertainment, advertisement, education, medical care, training, sports, and tourism, as well as providing contents for such things as games and videos. Libraries are already looking for ways to utilize VR from various angles, such as operating experiential programs. The purpose of this thesis is to develop and propose a VR-based library user education program. In order to achieve the purpose of the study, we analyzed previous studies from a theoretical perspective to find a way to construct a user education program, and also to derive possible implications based on examples of countries such as the United States and Korea that are already introducing and applying VR technology to library services. Therefore, the user education program proposed in this study can be used as a basic building block when many libraries want to develop VR-based programs in the future.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

Intelligent information filtering using rough sets

  • Ratanapakdee, Tithiwat;Pinngern, Ouen
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1302-1306
    • /
    • 2004
  • This paper proposes a model for information filtering (IF) on the Web. The user information need is described into two levels in this model: profiles on category level, and Boolean queries on document level. To efficiently estimate the relevance between the user information need and documents by fuzzy, the user information need is treated as a rough set on the space of documents. The rough set decision theory is used to classify the new documents according to the user information need. In return for this, the new documents are divided into three parts: positive region, boundary region, and negative region. We modified user profile by the user's relevance feedback and discerning words in the documents. In experimental we compared the results of three methods, firstly is to search documents that are not passed the filtering system. Second, search documents that passed the filtering system. Lastly, search documents after modified user profile. The result from using these techniques can obtain higher precision.

  • PDF

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.

A Design of real sound recommendation service based-on User's preference, emotion and circumstance (사용자 취향, 감성 및 상황인지 기반 음원 추천 서비스 구현)

  • Jung, Jong-Jin;Lim, Tae-Beom;Lee, Seok-Pil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.689-691
    • /
    • 2011
  • Due to the rapid development of Information and communication, the technology of multimedia presentation technology is evolving into the service that user can actively, realistically enjoy and play based on user's preference and taste not only for User's passive service. Especially, the industry related the realistic multimedia service that supports targeting Human emotion with the property of Human hearing is expected to be formed of the high value-added premium market. Audio technology is affected on human's emotion and the viewing environment around than video technology. Also the audio technology compared to video technology is a research part that appeals to human emotion and emphasize on psychological aspects. With this viewpoint, the development of intelligent and realistic audio technology needs highly specialty. In this study, "intelligent real-sound presentation technology" that support high quality and realistic audio and the "core technologies" that are composing of this will be introduced.