• Title/Summary/Keyword: desktop

Search Result 621, Processing Time 0.023 seconds

Understanding Three-dimensional Printing Technology, Evaluation, and Control of Hazardous Exposure Agents (3D 프린팅 기술의 이해, 유해 인자 노출 평가와 제어)

  • Park, Jihoon;Jeon, Haejoon;Oh, Youngseok;Park, Kyungho;Yoon, Chungsik
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.28 no.3
    • /
    • pp.241-256
    • /
    • 2018
  • Objectives: This study aimed to review the characteristics of three-dimensional printing technology focusing on printing types, materials, and health hazards. We discussed the methodologies for exposure assessment on hazardous substances emitted from 3D printing through article reviews. Methods: Previous researches on 3D printing technology and exposure assessment were collected through a literature review of public reports and research articles reported up to July 2018. We mainly focused on introducing the technologies, printing materials, hazardous emissions during 3D printing, and the methodologies for evaluation. Results: 3D printing technologies can be categorized by laminating type. Fused deposition modeling(FDM) is the most widely used, and most studies have conducted exposure assessment using this type. The printing materials involved were diverse, including plastic polymer, metal, resin, and more. In the FDM types, the most commonly used material was polymers, such as acrylonitrile-butadiene-styrene(ABS) and polylactic acids(PLA). These materials are operated under high-temperature conditions, so high levels of ultrafine particles(mainly nanoparticle size) and chemical compounds such as organic compounds, aldehydes, and toxic gases were identified as being emitted during 3D printing. Conclusions: Personal desktop 3D printers are widely used and expected to be constantly distributed in the future. In particular, hazardous emissions, including nano sized particles and various thermal byproducts, can be released under operation at high temperatures, so it is important to identify the health effects by emissions from 3D printing. Furthermore, appropriate control strategies should be also considered for 3D printing technology.

Handwriting and Voice Input using Transparent Input Overlay (투명한 입력오버레이를 이용한 필기 및 음성 입력)

  • Kim, Dae-Hyun;Kim, Myoung-Jun;Lee, Zin-O
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.4
    • /
    • pp.245-254
    • /
    • 2008
  • This paper proposes a unified multi-modal input framework to interface the recognition engines such as IBM ViaVoice and Microsoft handwriting-recognition system with general window applications, particularly, for pen-input displays. As soon as user pushes a hardware button attached to the pin-input display with one hand, the current window of focus such as a internet search window and a word processor is overlaid with a transparent window covering the whole desktop; upon which user inputs handwriting with the other hand, without losing the focus of attention on working context. As well as freeform handwriting on this transparent input overlay as a sketch pad, the user can dictate some words and draw diagrams to communicate with the system.

The Effect of VDI Technical Characteristics on Interaction and Work Performance (VDI 기술특성이 상호작용과 업무성과에 미치는 영향에 관한 실증적 연구)

  • Kwak, Young;Shin, Min Soo
    • Journal of Information Technology Services
    • /
    • v.20 no.4
    • /
    • pp.95-111
    • /
    • 2021
  • Recently, many organizations are actively adopting VDI (Virtual Desktop Infrastructure), an IT-based business system, to build a non-face-to-face business environment for smart-work. However, most of the existing research on VDI has focused on the satisfaction of system service quality or the use of IT resources and investment for VDI introduction. However, research on effective management and utilization of factors according to the characteristics of VDI technology is urgently required. This study is an empirical research study on how VDI technology characteristics affect interactions and work performance by identifying differences in utilization factors between general organization members and IT managers, presenting standards for business utilization and management. This study proposed a model and hypothesis that the system technology characteristics for VDI use are mediated by interactions in which users respond to functions appropriate to their work. In order to verify the hypothesis, a questionnaire survey was conducted on 188 people of companies and institutions that have adopted and used VDI through a questionnaire survey. Data analysis was performed with partial least squares (PLS), a structural equation modeling (SEM) technique that uses a component-based approach to estimation. As a result of the empirical analysis, the same environmental function for performing work, N-th security, and remote access function factors for non-face-to-face work have a significant effect on interactivity, and IT managers have an additional significant effect on the management technology characteristics of resource reallocation. Has been shown to affect. The results of this study aim to minimize trial and error due to new introduction by presenting considerations for future VDI introduction through case analysis.

AdvanSSD-Insider: Performance Improvement of SSD-Insider using BloomFilter with Optimization (블룸 필터와 최적화를 이용한 SSD-Insider 알고리즘의 탐지 성능 향상)

  • Kim, JeongHyeon;Jung, ChangHoon;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.5
    • /
    • pp.7-19
    • /
    • 2019
  • Ransomware is a malicious program that requires the cost of decryption after encrypting files on the user's desktop. Since the frequency and the financial damage of ransomware attacks are increasing each year, ransomware prevention, detection and recovery system are needed. Baek et al. proposed SSD-Insider, an algorithm for detecting ransomware within SSD. In this paper, we propose an AdvanSSD-Insider algorithm that substitutes a hash table used for the overwriting check with a bloom filter in the SSD-Insider. Experimental results show that the AdvanSSD-Insider algorithm reduces memory usage by up to 90% and execution time by up to 77% compared to the SSD-Insider algorithm and achieves the same detection accuracy. In addition, the AdvanSSD-Insider algorithm can monitor 10 times longer than the SSD-Insider algorithm in same memory condition. As a result, detection accuracy is increased for some ransomware which was difficult to detect using previous algorithm.

Augmented Reality to Localize Individual Organ in Surgical Procedure

  • Lee, Dongheon;Yi, Jin Wook;Hong, Jeeyoung;Chai, Young Jun;Kim, Hee Chan;Kong, Hyoun-Joong
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.394-401
    • /
    • 2018
  • Objectives: Augmented reality (AR) technology has become rapidly available and is suitable for various medical applications since it can provide effective visualization of intricate anatomical structures inside the human body. This paper describes the procedure to develop an AR app with Unity3D and Vuforia software development kit and publish it to a smartphone for the localization of critical tissues or organs that cannot be seen easily by the naked eye during surgery. Methods: In this study, Vuforia version 6.5 integrated with the Unity Editor was installed on a desktop computer and configured to develop the Android AR app for the visualization of internal organs. Three-dimensional segmented human organs were extracted from a computerized tomography file using Seg3D software, and overlaid on a target body surface through the developed app with an artificial marker. Results: To aid beginners in using the AR technology for medical applications, a 3D model of the thyroid and surrounding structures was created from a thyroid cancer patient's DICOM file, and was visualized on the neck of a medical training mannequin through the developed AR app. The individual organs, including the thyroid, trachea, carotid artery, jugular vein, and esophagus were localized by the surgeon's Android smartphone. Conclusions: Vuforia software can help even researchers, students, or surgeons who do not possess computer vision expertise to easily develop an AR app in a user-friendly manner and use it to visualize and localize critical internal organs without incision. It could allow AR technology to be extensively utilized for various medical applications.

Multiple Method Authentication System Using Embedded Device (임베디드 기기를 활용한 다중 방식 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.7-14
    • /
    • 2019
  • Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.

Design Android-based image processing system using the Around-View (안드로이드 기반 영상처리를 이용한 Around-View 시스템 설계)

  • Kim, Gyu-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.421-424
    • /
    • 2014
  • Currently, car black box, and CCTV products, such as image processing are prevalent on the market giving convenience to users.In particular, the black box of the driver driving a vehicle accident that occurred at the time to help identify the cause of the accident is gaining. Black box, the front or rear of the vehicle can check the image only. Because of the angle of view of the driver's vision or the black box can not determine a non-scene. In order to solve this problem by a more advanced system, the black box AVM (Around-View Monitoring) systems have been developed. AVM system to the vehicle's top-view images obtained before and after, left and right of the image, ie, $360^{\circ}$ image of the vehicle can be secured. AVM system must be installed on the vehicle, a desktop that you can acquire images Cling conditions. In this paper, we propose an Android-based tablet using the AVM system of the vehicle can achieve a $360^{\circ}$ image you want to design the system.

  • PDF

Military Application of Two-factor Authentication to Data Leakage and Access Prevention (데이터 유출 및 접근방지를 위한 이중 인증방식의 군(軍) 적용방안)

  • Jung, Ui Seob;Kim, Jee Won;Kim, Jae Hyun;Jeong, Chan ki
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.21-27
    • /
    • 2018
  • Most of the Internet users in Korea are issued certificates and use them for various tasks. For this reason, it is recommended that accredited certification authorities and security related companies and use public certificates on USB memory and portable storage devices rather than on the user's desktop. Despite these efforts, the hacking of the certificate has been continuously occurring and the financial damage has been continuing. Also, for security reasons, our military has disabled USB to general military users. Therefore, this study proposes a two-factor method using the unique information of the USB memory and the PC which is owned by the user, and suggests a method of managing the private key file secure to the general user. Furthermore, it will be applied to national defense to contribute to the prevention of important data and prevention of access by unauthorized persons.

  • PDF

How to create mixed reality educational contents using Hololens (홀로렌즈를 활용한 혼합현실 교육 콘텐츠 제작 방법)

  • Song, Eun-Jee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.391-397
    • /
    • 2020
  • Realistic content such as virtual reality, augmented reality, and mixed reality is emerging as an innovative technology in the education field in that it allows people to safely and efficiently experience dangerous, expensive or impossible situations, such as disaster training or space travel. Recently, as government agencies have supported a lot for producing virtual augmented reality contents about education, various educational contents using virtual augmented reality technology have been developed through the Edutech industry. Many virtual augmented reality-based educational contents are being developed, but mixed reality-based educational contents are very limited which could be more effective for education. This study examines the basic method of producing mixed reality educational contents using Hololens and, on the basis of this, it proposes the method for producing scientific experiment contents. Hololens made it possible to share information in real time without a regular desktop PC, and it is effective for teachers to manage and evaluate students in real time.

A study on an investigation procedure of digital forensics for VMware Workstation's virtual machine and a method for a corrupted image recovery (VMware Workstation 가상 머신 이미지에 대한 디지털 포렌식 조사 절차 및 손상된 이미지 복구 방안)

  • Lim, Sung-Su;Yoo, Byeong-Yeong;Park, Jung-Heum;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.61-70
    • /
    • 2011
  • Virtualization is a technology that uses a logical environment to overcome physical limitations in hardware. As a part of cost savings and green IT policies, there is a tendency in which recent businesses increase the adoption of such virtualization. In particular, regarding the virtualization in desktop, it is one of the most widely used technology at the present time. Because it is able to efficiently use various types of operating systems in a physical computer. A virtual machine image that is a key component of virtualization is difficult to investigate. because the structure of virtual machine image is different from hard disk image. Therefore, we need researches about appropriate investigation procedure and method based on technical understanding of a virtual machine. In this research, we suggest a procedure of investigation on a virtual machine image and a method for a corrupted image of the VMware Workstation that has the largest number of users.