• 제목/요약/키워드: Computer Information

검색결과 54,636건 처리시간 0.071초

노인정보복지 수준 제고를 위한 컴퓨터교육 모형정립 (A Computer Education Model for Better Quality Information Welfare for the Elderly)

  • 조우홍
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2015년도 제52차 하계학술대회논문집 23권2호
    • /
    • pp.125-126
    • /
    • 2015
  • This study analysed the needs of the elderly in computer education, their preference and demands for computer education to enhance the quality of information welfare for the elderly, and presented a computer education model for higher quality information welfare for the elderly to maximize the effect of computer education. For this study, variables were selected from previous studies and by the researcher to present a computer education model for the elderly.

  • PDF

스쿨존에서 WSN 기반의 어린이 범죄 안전관리 시스템 설계 (A WSN-based Safety Management System Design for Children-Crime in School-Zoon)

  • 이창복;노시영;박덕규;박상준;이종찬;박기홍
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2008년도 제39차 동계학술발표논문집 16권2호
    • /
    • pp.385-390
    • /
    • 2009
  • 본 연구에서는 최근 학교 주변에서 발생하는 어린이 범죄 사고의 관리 및 예방을 위한 무선 센서 네트워크 기반의 스쿨존 안전관리 시스템을 제안한다. 학교 주변 무선센서네트워크 망 구축과 어린이들에게 부착되는 센서들을 통해 환경 및 위치 영상 센싱 정보들을 공간 지식화하여 안전과 관련된 서비스를 제공한다. 또한 스쿨존 망을 벗어나 통신이 되지 않는 어린이의 경우 기회주의적 네트워크를 통하여 관리할 수 있는 전략적 안전관리 방안을 제안한다.

  • PDF

자바 기반의 임베디드 리눅스 소프트웨어 개발 환경 구축 (JAVA Based a Software Development Environment for Embedded Linux Systems)

  • 이진관;노시영;박덕규;박상준;이종찬;박기홍
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2008년도 제39차 동계학술발표논문집 16권2호
    • /
    • pp.263-266
    • /
    • 2009
  • 임베디드 시스템을 지원하는 JAVA API를 개발하면 임베디드 시스템을 개발자가 JAVA를 사용함으로서 코드의 재사용, 객체지향 개념의 시스템 개발들을 가능하게 한다. JAVA API를 구현하는데 있어 시스템에 의존적인 부분들이 존재하게 되는데, 이는 native 함수에서 구현한다. 본 논문에서는 리눅스 기반의 임베디드 시스템 디바이스를 제어하기 위한 JAVA API를 구현하는데 있어 플랫폼 독립적인 자바 부분과 의존적인 native 부분으로 나눠 설계 및 구현하였고, 임베디드 시스템 디바이스의 JAVA API를 통한 제어에 초점을 두었다.

  • PDF

무선 공유기 크래킹을 통한 보안성 분석 (A Security Analysis by Cracking in Wireless Routers)

  • 한상훈;구교림;고은식;박한솔;김현태;송두용
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2017년도 제56차 하계학술대회논문집 25권2호
    • /
    • pp.399-400
    • /
    • 2017
  • 모바일기기들의 폭발적인 확장에 따라 무선 인터넷의 이용율이 기하급수적으로 늘어나고 있다. 특히 무선 공유기를 이용하여 가정이나 중소기업 등이 사설 네트워크를 구성하여 무선 랜 환경이 매우 확대되고 있다. 본 논문에서는 무선 랜 환경에서의 취약점에 대한 분석을 하고, 공개 소프트웨어를 이용하여 무선 공유기에서 지원하는 암호화 방식에 따른 크래킹과 키 값의 난이도에 따른 크래킹 과정을 실험을 통하여 확인하고 이에 대한 대응 방안을 제시한다.

  • PDF

A Proposed Model for Supply Chain using Blockchain Framework

  • Zenab AlSadeq;Haya Alubaidan;Alanoud Aldweesh;Atta-ur-Rahman ;Tahir Iqbal
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.91-98
    • /
    • 2023
  • The rapid increase in the use of new technology known as 'blockchain technologies' has addressed many challenges in different areas and provided benefits to users, in this paper we discuss the field of supply chains, improve confidence and transparency between participants and stakeholders significantly also in this paper we Compare between different blockchain frameworks focusing on most popular frameworks. Moreover, we proposed a model in the supply chain using a blockchain framework, the proposed supply chain model included many different resources that help to exchange information over the network. The proposed model also includes smart contracts that maintain all rules for transactions. using blockchain technology information such as transaction details, time and money are recorded and stored within the system from the beginning of the transaction entry.

디지털정보의 사용허락계약 (A Study on the License Agreement of digital information - focusing on the UCITA -)

  • 한병완;서민교
    • 통상정보연구
    • /
    • 제11권1호
    • /
    • pp.45-66
    • /
    • 2009
  • Licensing of information is the standard of the computer information business today. The huge bulk of vendors license their computer information products. The Uniform Computer Information Transactions Act(UCITA), therefore, does not originate licensing contracts. UCITA was developed to provide basic, recognizable default rules for the existing licensing activity that goes on and expands as commerce in computer information expands. UCITA's rules govern licensing of contracts for computer information from formation through performance, including remedies if there is a breach of contract. Included in UCITA are rules for warranties, both implied and express, and rules pertaining to risk of loss in a computer information transaction. Most of the rules in UCITA are the traditional and familiar rules of contract from the law of sales and from the common law, but adapted to the special nature of computer information licensing contracts. Freedom of contract is a dominating underlying policy for UCITA, exactly as that principle is the foundation for the law of commercial transactions, generally, and exactly as that law has served all commercial transactions in the United States and has contributed to the economic growth and health of the United States.

  • PDF

Applications of 5G and 6G in Smart Health Services

  • Al-Jawad, Fatimah;Alessa, Raghad;Alhammad, Sukainah;Ali, Batoola;Al-Qanbar, Majd;Rahman, Atta-ur
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.173-182
    • /
    • 2022
  • Healthcare organizations are overwhelmingly embracing smart value-based care strategies, which focuses on providing superior treatment at a significantly lower cost and quality of service (QoS). For these purposes, fifth generation (5G) of mobile service provides an innumerable improvement that clearly outperforms previous generations e.g., 3G and 4G. However, as with most advancements, 5G is projected to introduce new challenges, prompting the community to think about what comes next. This research was conducted to examine the most recent smart 5G technology applications and the solutions they provide to the healthcare industry. Finally, the paper discusses how the upcoming 6G technology has the potential to transform the future of healthcare sector even beyond the current 5G systems.

Challenges and solutions for Internet of Things Driven by IPv6

  • Emad-ul-Haq, Qazi;Aboalsamh, Hatim;Belghith, Abdelfettah;Hussain, Muhammad;Abdul, Wadood;Dahshan, Mostafa H.;Ghouzali, Sanaa
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4739-4758
    • /
    • 2015
  • The IPv4 addressing scheme, which was proposed by IETF in 1981, provides 4.3 billion unique 32-bit IP addresses but has been fully exhausted in Feb, 2011. This exhaustion of unique IP addresses poses significant challenges to the addition of new devices to the Internet as well as offering new services. Internet of Things, which provides interconnected uniquely identifiable devices in the existing Internet infrastructure, will be greatly affected by the lack of unique IP addresses. In order to connect to the existing Internet infrastructure, every new device needs a uniquely identified IP address for communication. It has been estimated that by the year 2020 more than 30 billion devices would be connected to the Internet. In order to meet the challenge of such vast requirement of unique IP addresses, the devices in IoT will have to adopt IPv6, which is the latest version of Internet Protocol. IPv6 uses 128-bit IP addresses and offers 2128 unique IP addresses. Therefore, it expands IPv4 and provides new features of end to end connections as well as new services. In this paper, the various challenges with respect to providing connectivity, security, mobility, etc., have been discussed and how IPv6 helps in meeting those challenges.

빅 데이터 기반의 요식업계 POS 데이터 분석 시스템 (POS Data Analysis System of Foodservice Industry based on Big Data)

  • 윤다영;박윤수;박재운;엄상근;김유철;최형택;이상문
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2014년도 제49차 동계학술대회논문집 22권1호
    • /
    • pp.209-210
    • /
    • 2014
  • 최근 요식업계의 성장과 기업화 과정을 통하여 POS 시스템 사용이 일반화되었으며 관련 데이터 생산량이 급증하고 있다. 이러한 경향에 따라 종래와 다른 영업정보의 분석 생산을 위한 빅 데이터 기반의 요식업계 POS 데이터 분석시스템으로, 지역별 업계 영업현황 분석정보를 제공함으로써, 요식업계는 물론 정책 생성에 유용한 정보를 제공하는 시스템을 설계 구현하여 제안한다.

  • PDF

Implement Static Analysis Tool using JavaCC

  • Kim, Byeongcheol;Kim, Changjin;Yun, Seongcheol;Han, Kyungsook
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.89-94
    • /
    • 2018
  • In this paper, we implemented a static analysis tool for weakness. We implemented on JavaCC using syntax information and control flow information among various information. We also tested the performance of the tool using Juliet-test suite on Eclipse. We were classified using information necessary for diagnosis and diagnostic methods were studied and implemented. By mapping the information obtained at each compiler phase the security weakness, we expected to link the diagnostic method with the program analysis information to the security weakness. In the future, we will extend to implement diagnostic tools using other analysis information.