• Title/Summary/Keyword: 컴퓨터 단말기

Search Result 455, Processing Time 0.024 seconds

A Context-Aware Entertainment Information Service Framework Architecture and Knowledge Representation (상황이해 엔터테인먼트 정보 서비스 프레임워크 구조 및 지식표현)

  • Lee, Keon-Myung;Lee, Sun-A;Ryu, Keun-Ho
    • Journal of Korea Entertainment Industry Association
    • /
    • v.4 no.3
    • /
    • pp.62-69
    • /
    • 2010
  • As the information services are reachable by various terminals almost anytime, anywhere, much effort has been made to endow the users with context-aware services by utilizing available information. The increase in leisure time and wealth has made people pay more attention to hobby, entertainment, health, well-being, and so on. In these fields, the information services, if provided in a context-aware way, could largely enhance the user satisfaction. This paper identifies the essential components of context-aware entertainment service provision and proposes a service development framework. It also presents how to represent data, how to describe service selection knowledge for context-aware services, and how to conduct inference under the representation scheme.

A Point of Production System for Semiconductor Wafer Dicing Process (반도체 웨이퍼 다이싱 공정을 위한 생산시점 정보관리시스템)

  • Kim, In-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.55-61
    • /
    • 2009
  • This paper describes a point of production(POP) system which collects and manages real-time shop floor machining information in a wafer dicing process. The system are composed of POP terminal, line controller and network. In the configuration of the system, LAN and RS485 network are used for connection with the upper management system and down stratum respectively. As a bridge between POP terminal and server, a line controller is used. The real-time information which is the base of production management are collected from information resources such as machine, product and worker. The collected information are used for the calculation of optimal cutting condition. The collection of the information includes cutting speed, spout of pure water, accumulated count of cut in process for blade and wafer defect. In order to manage machining information in wafer dicing process, production planning information is delivered to the shop floor, and production result information is collected from the shop floor, delivered to the server and used for managing production plan. From the result of the system application, production progress status, work and non-working hour analysis for each machine, and wafer defect analysis are available, and they are used for quality and productivity improvements in wafer dicing process. A case study is implemented to evaluate the performance of the system.

Performance Comparison of 28 GHz Array Antennas for 5G Mobile Devices (5G 단말용 28 GHz 배열안테나의 안테나 타입별 성능 비교 연구)

  • Kim, Sun-Ryul;Hong, Young-Taek;Bang, Ji-Hoon;Choi, Jae-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.1
    • /
    • pp.45-53
    • /
    • 2019
  • In this paper, three types of array antennas for 5G mobile devices operating at 28 GHz were designed, and their performances were compared. The isolation between antenna elements was compared based on $S_{21}$. The $S_{21}$ of dipole, slot, and patch type are -13.76 dB, -16.88 dB, and -11.47 dB, respectively, with the slot-type antenna having the highest isolation. In order to compare the beam coverage performance, several characteristics such as beam width and maximum beam steering angle were analyzed. The analysis shows that the slot type has the widest steering angle of $63^{\circ}$ while the patch type has narrowest with $36^{\circ}$. In addition, to verify the performance of the antennas in the actual usage environment of the device, antenna characteristics in talk mode and data mode were analyzed through simulation. The results confirmed that the slot-type array antenna is the most suitable array antenna element for 28 GHz 5G mobile devices.

A Study on the RDP, VNC Applicaion for the computer Remote Control by Mobile (모바일 기반의 컴퓨터 원격제어를 위한 RDP, VNC Application에 관한 연구)

  • Song, Jong-gun;Jang, Won-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.459-462
    • /
    • 2009
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere so that application program development is vigorous for mobile service implementation. In particular, mobile service has a feature that can present flexible service at anytime, and anywhere. This study proposes a system which is able to make a remote control of computer by means of mobile as an example of the production of application for such mobile service. This paper researches a RDP(Remote Desktop Protocol), VNC(Virtual Network Computing) system that control screen of remote computer and input devices by using smart-phone. The advantage of this system is the function that turning on and off the computer, file transfer, file upload/download, and paperwork. Therefore users are expected to use more conveniently.

  • PDF

A Design and Implementation of Real Time Network Monitoring System(NetCop) (실시간 네트웍 감시시스템(NetCop)의 설계 및 구현)

  • Yoon, Chi-Young;Jung, Chun-Bok;Hwang, Sun-Myung
    • Journal of The Korean Association of Information Education
    • /
    • v.5 no.3
    • /
    • pp.374-379
    • /
    • 2001
  • Recently, R & D about Network Monitoring System is needed to be effective network management and to improve computer education. In this work, we propose a real time network monitoring system named NetCop to improve network management and effective use. This system is designed to show any screen to one or more students in interactive learning environment. The system also provides useful functions such as monitoring students' PCs and chat. In additions, our NetCop can provide more effective learning process to students. Finally, we expect that our system can achieve high network performance and provide high educational quality to managers.

  • PDF

Analysis of Characteristics of Finger-Print Recognition According to Computer Generated Hologram and Its Reconstructed Image (컴퓨터 형성 홀로그램 및 재생 영상에 따른 지문 인식 특성 분석)

  • Jeong, Man-Ho
    • Korean Journal of Optics and Photonics
    • /
    • v.20 no.2
    • /
    • pp.76-80
    • /
    • 2009
  • Finger-print recognition is achieved by comparing an input finger-print image with the stored images in the computer, and finally by determining agreement or disagreement. Encryption and decryption are necessary in the finger-print recognition process. In these process CGH (Computer Generated Hologram) is used, and finger-print images reconstructed from the CGHs are compared. In this paper, two methods of recognition are used, one is to compare the finger-print images of each other reconstructed from their CGHs and the other is to compare the CGHs to each other directly, to analyze the differences of finger-print recognition capability between these two methods. Experimental results show that the capability of finger-print recognition for comparing the CGHs of the two is about 150 times higher than in case of comparing the reconstructed finger-print images. Especially the changes of characteristics according to modulation types of CGH are analyzed.

Factors Influencing VDT syndrome among male adolescents with risk of digital addiction (디지털중독 위험군 남학생의 VDT 자각증상 영향요인)

  • Seomun, GyeongAe;Lee, Youngjin
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.363-370
    • /
    • 2016
  • The purpose of this study was to determine the influential factors associated with video display terminal (VDT) syndrome of male adolescents with digital device addition. The study design was cross-sectional descriptive survey. The study participants were 169 male middle school students in Seoul. A structured questionnaire was used for data collection and data were analyzed using the SPSS program. The factors most influential for the subjective symptoms of VDT were smartphone addiction, computer use time during the week, computer use environment. These factors accounted for 28.1% of the variance in subjective symptoms of VDT. In order to prevent the occurrence of VDT syndrome in students, we suggest to establish a preventive intervention against the digital addiction.

Requirement Analysis of Korean Public Alert Service using News Data (뉴스 데이터를 활용한 재난문자 요구사항 분석)

  • Lee, Hyunji;Byun, Yoonkwan;Chang, Sekchin;Choi, Seong Jong
    • Journal of Broadcast Engineering
    • /
    • v.25 no.6
    • /
    • pp.994-1003
    • /
    • 2020
  • In this paper, we investigated the current issues on the KPAS(Korean Public Alert Service) by News analysis. News articles, from May 15, 2005 to April 30, 2020, were collected with the key word of 'KPAS' through the News Big-Data System provided by the Korea Press Foundation. The results of the content analysis are as follows. First, the issues on alert presentation were categorized by alarm sound, message content, alert level, transmission frequency, delay, reception range, time of alert, and language. Issues on inability to receive KPAS messages were categorized into authority, mobile, sending standard, mobile communication infra, etc. For the last two to three years, news on the inability issues had decreased, while news on the presentation issues had increased. This tells us that the public demand for improvement in the KPAS lies in the presentation issues. The demand for societal resolutions to the presentation issues especially on message content, transmission frequency, and reception range has soared.

Design and Implementation of Office Security and Automation System Using RFID (RFID를 이용한 오피스 보안 및 자동화 시스템의 설계 및 구현)

  • Lee, Seung-Cheol;Ko, Myeong-Cheol;Kim, Jung-Hwan;Han, Deok-Soo;Yang, Kwon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.560-565
    • /
    • 2006
  • 최근 보안에 대한 사회적인 관심이 높아지면서 RFID는 기존의 스마트카드와 바코드 시스템이 갖는 여러 기능적인 한계점들을 극복함으로써 향 후 이를 대체할 보안 신기술로서 인식되고 있다. 현재 사무실 출입의 보안을 위해 대표적으로 사용되고 있는 출입문 인증시스템은 일단 출입문을 통과한 사용자들에 대해서는 사무실 내부의 모든 요소들이 무방비 상태로 노출되어 보안상의 허점이 발생한다. 또한 사무실 내 개개의 PC에 단말기를 설치하여 사용하는 스마트카드 인증시스템 역시도 빈번한 자리 이동에 따른 카드 인증 절차의 번거로움으로 인해 근거리 이동시 PC를 잠그지 않는 경우가 빈번하게 발생함으로써 사용자 PC에 저장된 보안이 필요한 데이터들에 대한 침해 우려가 발생한다. 본 논문에서는 다중사용자 환경에서 각각의 사용자가 소지한 RFID 태그를 이용하여 기존 카드시스템과 같이 복잡한 인증절차가 필요 없고 빈번한 자리 이동이 발생하더라도 추가적인 인증작업이 없이 매번 자동으로 컴퓨터 시스템을 잠금 및 해제시킴으로써 인증과정에 따른 사용자의 부담을 줄일 수 있는 보안시스템을 제시한다. 또한 사용자가 출근과 동시에 매일 일상적으로 반복되는 사무실에서의 컴퓨터 작업에 대한 효율을 높이기 위한 사무 자동화 시스템을 구현한다.

  • PDF

A Effective Method for Feature Detection and Enhancement in Fingerprint Images (지문의 특징 검출 및 향상을 위한 전처리 기법 연구)

  • Yang, Ryong;No, Jung-Seok;Lee, Sang-Bum
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1775-1784
    • /
    • 2002
  • Fingerprint recognition technology is used in many biometrics field accordingly essential feature of fingerprint image and the study is progressing. However development is not perfect in performance of the fingerprint recognition and application of the usual life. In the paper, we study various necessity of preprocessing according to algorithm and circumstances of authentication system in automatic information machine. We prove that system circumstance and optation of fingerprints image effectively is the important factor by using optical fingerprint input device and scanning the fingerprint in ID card. And then we present correct and fast computation method for improving image and feature extraction of fingerprint. Also we study effective algorithm implementation of total system.

  • PDF