• Title/Summary/Keyword: Personal information Controller

Search Result 66, Processing Time 0.028 seconds

A Design of SRM Controller using Microprocessor

  • Park, Joon-Hoon;Ahn, Jung-Soo;Han, Wun-Dong;Park, Boo-Chong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.2023-2026
    • /
    • 2002
  • This paper explains the study of controller design applied to SRM(Switched Reluctance Motor) concept. This controller executes controller algorithms via ${\mu}$-processor to increase stability and precise measurement, and VHDL (Very high speed integrated circuit Hardware Description Language) is designed to generate SRM driving signal. During initial period, SRM controller was designed to control .respective target RPM (Revolution per minutes) and PR (Proportional Integral Differential) coming from the PC(Personal Computer) monitor program, and receiving clockwise and counter-clockwise rotation signal and target RPM coming from the front panel, and receiving the location of rotational element and RPM generating from the position censor during activation period.

  • PDF

Implementation of Automatic Microphone Volume Controller and Recognition Rate Improvement (자동 입력레벨 조절기의 구현 및 인식 성능 향상)

  • 김상진;한민수
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.503-506
    • /
    • 2001
  • In this paper, we describe the implementation of a microphone input level control algorithm and the speech improvement with this level controller in personal computer environment. The volume of speech obtained through a microphone affects the speech recognition rate directly. Therefore, proper input volume level control is desired fur better recognition. We considered some conditions for the successful volume controller implementation firstly, then checked its usefulness on our speech recognition system with common office environment speech database. Cepstral mean subtraction is also utilized far the channel-effect compensation of the database. Our implemented controller achieved approximately 50% reduction, i.e., improvement in speech recognition error rate.

  • PDF

Supervised Hybrid Control Architecture for Navigation of a Personal Robot

  • Shin, Hyun-Jong;Im, Chang-Jun;Kim, Jin-Oh;Lee, Ho-Gil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1178-1183
    • /
    • 2003
  • As personal robots coexist with a person with a role to help a person, while adapting various human life and environment, the personal robots have to accommodate frequently-changing or different-from-home-to-home environment. In addition, personal robots may have many kinds of different Kinematic configurations depending on the capabilities. Some may have a mobile base and others may have arms and a head. The motivation of this study arises from this not-well-defined home environment and varying Kinematic configuration. So the goal of this study is to develop a general control architecture for personal robots. There exist three major architectures; deliberative, reactive and hybrid. We found that these are applicable only for the defined environment with a fixed Kinematic configuration. Neither could accommodate the above two requirements. For the general solution, we propose a Supervised Hybrid Architecture (SHA), in which we use double layers of deliberative and reactive controls, distributed control with a modular design of Kinematic configurations, and real-time Linux OS. Deliberative and reactive actions interact through a corresponding arbitrator. These arbitrators help a robot to choose an appropriate architecture depending on the current situation to successfully perform a given task. The distributed control modules communicate through IEEE 1394 for the easy expandability. With a personal robot platform with a mobile base, two arms, a head and a pan-tilt stereo eye system, we tested the developed SHA for static as well as dynamic environments. For this application, we developed decision-making rules for selecting appropriate control methods for several situations of navigation task. Examples are shown to show the effectiveness.

  • PDF

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

Development of PLC networking for communication with mobile phones

  • Tasapark, Jirawan;Tangsrirat, Worapong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1221-1224
    • /
    • 2004
  • This paper presents the programmable logic controller (PLC) networking development for communication with the mobile phone. The proposed technique is suitable for remote sensing control systems, which can display the operation status and monitoring fault diagnosis of a system. The system operation is based on the use of personal computer (PC) to logically analyze data from PLC, and existing internet protocol for sending information messages to mobile phones.

  • PDF

A New Scheme for Risk Assessment Based on Data Context for De-Identification of Personal Information (개인정보 비식별 조치를 위한 데이터 상황 기반의 위험도 측정에 관한 새로운 방법)

  • Kim, Dong-hyun;Kim, Soon-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.719-734
    • /
    • 2020
  • This paper proposes a new measurement scheme for estimating the processing level according to risk when performing de-identification in the use of personal information by practitioners in the organization in line with the recently revised Data 3 Act. Our proposed methods considered the surrounding circumstances surrounding the data, not just the data, for risk measurement, and divided the data situation into three categories more systematically so that it can be applied in all areas in a general-purpose environment, the data utilization environment, and the data (self) so that it can be calculated quantitatively based on each context risk according to the presented classification. The proposed method is designed to calculate the risk of existing de-identifiable information in a quantitative manner so that personal information controller in general organizations can use it in practice, not just in the qualitative judgment of experts.

Development of the remote control system for Internet-based mobile robot using Embedded Linux and Qt

  • Park, Tae-Gyu;Jeon, Jae-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.622-627
    • /
    • 2003
  • The existing remote control system have some inherent disadvantage of direct control in the limit range. In some special cases, for example, a power apparatus, an unmanned factory, a nuclear factory, a security management system, the tele-operation is needed to control remote robot without limit space. This field is based on the Internet communication. Because the Internet is constructed all over the world. And it is possible that we control remote mobile robot in the long distance. In this paper, we developed a remote control system. This system is divided into two primary parts. These are local site and remote site. There are the moving robot and web server in the remote site and there is the robot control device in local site. The moving robot is moved by two stepper motors and the robot control device consists of SA-1100 micro controller and embedded Linux. And this controller is an embedded system. Public personal computer which is connected the Internet is used for the web server. The web server provides the mobile robot control interface program to the remote controller and captures the image for feedback information. In the whole system, a robot control device is connected with moving robot and web server through the Internet. So the operator can control the moving robot in the distance through the Internet.

  • PDF

Storage and search of image metadata inside personal computers using RDF and SPARQL technology (RDF와 SPARQL을 이용한 PC내 영상 메타데이터 저장 및 검색)

  • You, Young-Jin;Lee, Byung-Rae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06c
    • /
    • pp.64-68
    • /
    • 2007
  • 본 논문은 영상의 메타데이터를 RDF를 이용하여 표현, 저장하고, SPARQL을 이용하여 검색하는 솔루션을 구현하여, RDF와 SPARQL을 통한 멀티미디어 파일의 메타데이터 관리 방안을 제시한다. 솔루션은 Jena2 프레임워크 기반으로 구현하였으며, Controller, EXIF Extractor, Metadata Schema, RDF Generator, Repository Manager, SPARQL Executor의 모듈로 구성된다.

  • PDF

Development of a Transcutaneous Information Transmission System using Transmitted Light for the Total Artificial Heart (투과광을 이용한 인공심장용 무선정보전달 장치의 개발)

  • Kang, Dong-Woo;Kim, Hee-Chan;Min, Byoung-Goo
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1993 no.05
    • /
    • pp.129-131
    • /
    • 1993
  • A transcutaneoos information transmission system using transmitted infrared light for an implantable total artificial heart(TAH) an developed and the performance of the system was tested. In an in vitro test, transmittance of the developed system was measured through various thicknesses of pig shins. In an in vivo test, a loopback test using a personal computer was performed to determine the error rate and an experiment using a mock system was taken. In this experiment, within acceptable lateral and vertical displacements, the error rate of at least 3.8E-6 was guaranteed. Monitoring signals from the internal controller(Intel 87C196) of the mock system were successfully transmitted to the external controller(IBM PC) and the operating commands from the external controller were successfully conducted by the mock system. Communication was done in half duplex mode according to RS-232 protocol at the speed of 4800 bps.

  • PDF

An Investigation of Using Practices for Universal Design of Information Technology Products (IT제품의 유니버설 디자인을 위한 사용실태조사)

  • Lee, Dong-Hun;Chung, Min-K.;Kim, Jung-Young
    • Journal of the Ergonomics Society of Korea
    • /
    • v.28 no.3
    • /
    • pp.103-114
    • /
    • 2009
  • This study investigated perceived discomfort and reasons related to use three information technology products (personal computer, mobile phone and digital television remote controller), and extracted the universal design factors. 240 people (30 females and 30 males for four age groups) participated in the one-to-one interview type of questionnaire, and replied to degree of discomfort at level of items and the reasons of discomfort at level of detailed elements for each product. As a result, almost all age groups answered that using input buttons of mobile phone and remote controller and watching display of mobile phone caused discomfort. Binary logistic regression of the detailed elements showed that response rate of discomfort mostly increased with age, except for specific elements such as shape of mouse and remote controller, and location of function button of mobile phone. Some of the detailed elements had high response rate of discomfort from all age groups. The age groups also showed similar tendency for the elements to select one alternative for the reason of discomfort, but not for sound volume and size of mobile phone and button sensitivity of remote controller. Finally, the universal design factors were extracted for each product based on the results, and divided into common factors and factors classified by the age group. Through this study, we identified using practices of various age groups and their demands for the products. It is expected that extracted detailed elements can be considered as important design factors to design the products universally.