• 제목/요약/키워드: use of computer

검색결과 10,192건 처리시간 0.059초

컴퓨터를 활용한 패션디자인 전개방법 연구 (A Study on the Development of Computer-Aided Fashion Design)

  • 이순자;박옥련;김주현
    • 복식문화연구
    • /
    • 제8권5호
    • /
    • pp.717-725
    • /
    • 2000
  • The purpose of this study was, as an experimental one, to suggest concrete ways to use computer in fashion design from information collection to design completion, and to present a real example based on the suggested ways. The first step to attain the purpose was gathering various sorts of worldwide fashion design information on the Internet, and then the collected data were inserted in a graphic file. Next, two methods of fashion design that use computer graphics were recommended : one was to produce fashion design just by altering some of the inputted Internet fashion materials, and the other was to do it after selected basic materials were put in database. Those methods could enable one to do fashion design just with rearrangement and smallest change of the prepared basic materials, without drawing directly, and at the same time, they could minimize time and efforts required for computer fashion design.

  • PDF

Quality Inspection of Dented Capsule using Curve Fitting-based Image Segmentation

  • Kwon, Ki-Hyeon;Lee, Hyung-Bong
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권12호
    • /
    • pp.125-130
    • /
    • 2016
  • Automatic quality inspection by computer vision can be applied and give a solution to the pharmaceutical industry field. Pharmaceutical capsule can be easily affected by flaws like dents, cracks, holes, etc. In order to solve the quality inspection problem, it is required computationally efficient image processing technique like thresholding, boundary edge detection and segmentation and some automated systems are available but they are very expensive to use. In this paper, we have developed a dented capsule image processing technique using edge-based image segmentation, TLS(Total Least Squares) curve fitting technique and adopted low cost camera module for capsule image capturing. We have tested and evaluated the accuracy, training and testing time of the classification recognition algorithms like PCA(Principal Component Analysis), ICA(Independent Component Analysis) and SVM(Support Vector Machine) to show the performance. With the result, PCA, ICA has low accuracy, but SVM has good accuracy to use for classifying the dented capsule.

Assessment and Access Control for Ubiquitous Environments

  • Diep, Nguyen Ngoc;Lee, Sung-Young;Lee, Young-Koo;Lee, Hee-Jo
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.1107-1109
    • /
    • 2007
  • Context-based access control is an emerging approach for modeling adaptive solution, making access control management more flexible and powerful. However, these strategies are inadequate for the increased flexibility and performance that ubiquitous computing environment requires because such systems can not utilize effectively all benefit from this environment. In this paper, we propose a solution based on risk to make use of many context parameters in order to provide good decisions for a safety environment. We design a new model for risk assessment in ubiquitous computing environment and use risk as a key component in decision-making process in our access control model.

  • PDF

개인용 컴퓨터 그래픽스를 사용한 로보트 시뮬레이터의 연구 (A Study on Robot Simulator by use of Personal Computer Graphics)

  • 전향식;최영규
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1992년도 하계학술대회 논문집 A
    • /
    • pp.351-353
    • /
    • 1992
  • Recently, robot plays an important role in factory automation and its use is rapidly increasing. In paticular, modern industry tends to need the robot to adjust itself swiftly to new workcell. But, robot is to be taught of operator through teaching box in order that it can carry out new tasks. In the process, interruption of the production line is frequent and so much time and expense are required. Computer Graphic Simulator(CGS) provides a useful tool to overcome such a problem. In this paper, CGS consists of teaching mode and execution mode. The 5-axis Rhino robot is modelled in IBM-PC/386 compatible 32-bit personal computer with 80387 co-processor and the simulator performs defined operations on the computer screen.

  • PDF

Soccer Image Sequences Mosaicing Using Reverse Affine Transform

  • Yoon, Ho-Sub;Jung Soh;Min, Byung-Woo;Yang, Young-Kyu
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -2
    • /
    • pp.877-880
    • /
    • 2000
  • In this paper, we develop an algorithm of soccer image sequences mosaicing using reverse affine transform. The continuous mosaic images of soccer ground field allows the user/viewer to view a “wide picture” of the player’s actions The first step of our algorithm is to automatic detection and tracking player, ball and some lines such as center circle, sideline, penalty line and so on. For this purpose, we use the ground field extraction algorithm using color information and player and line detection algorithm using four P-rules and two L-rules. The second step is Affine transform to map the points from image to model coordinate using predefined and pre-detected four points. General Affine transformation has many holes in target image. In order to delete these holes, we use reverse Affine transform. We tested our method in real image sequence and the experimental results are given.

  • PDF

웹서비스 보안에서 ?공격에 대한 관대한 계획 (A Tolerant Scheme for SOAP Attacks in Web Services Security)

  • 밤복흥;아지즈 나스리디노프;림청;변정용
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 추계학술발표대회
    • /
    • pp.613-616
    • /
    • 2011
  • Nowadays Web Services are one of the most rapidly developed technologies and have become platform for e-ecommerce as well as B2B model. Therefore, when Web Services use SOAP as a protocol for communication, their security should be considered. However, those SOAP messages are prone to XML attacks that can create a foundation for typical faults and make it vulnerable to use. Unfortunately, recent researches established that solutions to deal with these problems have several limitations. In this paper, we explore attacks on SOAP messages and also provide confidentiality and integrity solutions. It is a tolerant scheme which is able to automatically detect and fix typical faults occurred in SOAP messages to combat with the security threats in order to improve its reliability.

Predictive Analysis of Problematic Smartphone Use by Machine Learning Technique

  • Kim, Yu Jeong;Lee, Dong Su
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권2호
    • /
    • pp.213-219
    • /
    • 2020
  • 본 연구는 스마트폰 과의존을 진단하고 예측하기 위하여 할 수 있는 분류분석 방법과 스마트폰 과의존 분류율에 영향을 미치는 중요변수를 규명하고자 시도되었다. 이를 위해 인공지능의 방법인 기계학습 분석 기법 중 의사결정트리, 랜덤포레스트, 서포트벡터머신의 분류율을 비교하였다. 자료는 한국정보화진흥원에서 제공한 '2018년 스마트폰 과의존 실태조사'에 응답한 25,465명의 데이터였고, R 통계패키지(ver. 3.6.2)를 사용하여 분석하였다. 분석한 결과, 3가지 분류분석 기법은 정분류율이 유사하게 나타났으며, 모델에 대한 과적합 문제가 발생되지 않았다. 3가지 분류분석 방법 중 서포트벡터머신의 분류율이 가장 높게 나타났고, 다음으로 의사결정트리 기법, 랜덤포레스트 기법 순이었다. 스마트폰 이용 유형 중 분류율에 영향을 미치는 상위 3개 변수는 생활서비스형, 정보검색형, 여가추구형이었다.

Smart Deaf Emergency Application Based on Human-Computer Interaction Principles

  • Ahmed, Thowiba E;Almadan, Naba Abdulraouf;Elsadek, Alma Nabil;Albishi, Haya Zayed;Al-Qahtani, Norah Eid;Alghamdi, arah Khaled
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.284-288
    • /
    • 2021
  • Human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive systems for human use. In this paper we suggest designing a smart deaf emergency application based on Human-Computer Interaction (HCI) principles whereas nowadays everything around us is becoming smart, People already have smartphones, smartwatches, smart cars, smart houses, and many other technologies that offer a wide range of useful options. So, a smart mobile application using Text Telephone or TeleTYpe technology (TTY) has been proposed to help people with deafness or impaired hearing to communicate and seek help in emergencies. Deaf people find it difficult to communicate with people, especially in emergency status. It is stipulated that deaf people In all societies must have equal rights to use emergency services as other people. With the proposed application the deafness or impaired hearing can request help with one touch, and the location will be determined, also the user status will be sent to the emergency services through the application, making it easier to reach them and provide them with assistance. The application contains several classifications and emergency status (traffic, police, road safety, ambulance, fire fighting). The expected results from this design are interactive, experiential, efficient, and comprehensive features of human-computer interactive technology which may achieve user satisfaction.

학습자의 원격교육시스템 이용 의도와 성과에 대한 원격교육 자기효능감의 역할 (Role of Distance Learning Self-Efficacy in Predicting User Intention to Use and Performance of Distance Learning System)

  • 유일;황준하
    • Asia pacific journal of information systems
    • /
    • 제12권3호
    • /
    • pp.45-70
    • /
    • 2002
  • This paper examines the role of distance learning self-efficacy, belief in one's capabilities of using a system in the accomplishment of web-based distance learning, in predicting user intention to use and performance of distance learning system. It used self-efficacy theory and technology acceptance model(TAM) to build a model that predicts relationships between antecedents to students' distance learning self-efficacy assessments and their behavioral and attitudinal consequences. The model was tested using LISREL analysis on the sample of 250 students who have worked with the Distance Learning System. The results indicated partial support for the conceptual model. In accordance with TAM, perceived usefulness had strong direct effects on intention to use and performance, while perceived ease of use had both direct and indirect effects on intention to use, but not performance. Distance learning self-efficacy had only direct effect on perceived ease of use to use. Computer experience was found to have a strong positive effect on distance learning self-efficacy, and computer anxiety had a negative effect on distance learning self-efficacy. Implications of these findings are discussed for researchers and practitioners.

직무외 스마트폰 사용 행동에 영향을 미치는 요인에 대한 실증적 연구 (An Empirical Study on Factors Influencing Non-Work Related Use Behavior of Smartphone)

  • 이종만
    • 한국컴퓨터정보학회논문지
    • /
    • 제17권8호
    • /
    • pp.115-121
    • /
    • 2012
  • 본 연구의 주된 목적은 조직구성원들이 왜 업무 중에 직무와 무관하게 스마트폰을 사용하는지를 파악하는 것이다. 이를 위해 본 연구에서는 습관, 사용의향, 사회적 영향, 업무 상호의존성, 사용행동으로 구성된 직무외 스마트폰 사용행동 영향 요인에 관한 연구 모형을 개발하였다. 그리고 스마트폰을 사용하는 직장인들을 대상으로 설문조사를 실시하여 분석하였다. 분석결과 첫째, 습관과 사회적 영향은 직무외 스마트폰 사용행동을 예측할 수 있는 주요 요인들로 나타났다. 둘째, 직무외 스마트폰 사용에 있어서 사용의향과 사용행동간의 관계는 업무 상호의존성에 의해서 긍정적으로 조절되는 것으로 밝혀졌다.