• 제목/요약/키워드: Personal information control

검색결과 688건 처리시간 0.028초

무인 소형궤도열차의 차량제어 알고리즘 (Vehicle Control Algorithm for PRT (Personal Rapid Transit) System)

  • 최규웅;이진수;원진명;최효정
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2006년도 하계종합학술대회
    • /
    • pp.827-828
    • /
    • 2006
  • This paper presents a vehicle control algorithm for Personal Rapid Transit (PRT) system. PRT system is a one-way direction network system which is composed of guideway branches, merging/diverging points. Vehicle control algorithm can be divided into two kinds. Those are merging control algorithm and the other. We emphasized on the merging control algorithm. For that, we first devised a front/virtual front vehicle finding strategies. Properly determined front/virtual front vehicle is the starting point of vehicle control. The objects of merging control are to avoid collision and to pass the merging point fluently. Which implies that jerk constraint and limits of acceleration and deceleration etc. are should be considered. To verify the validation of the vehicle algorithm, we executed simulations and presented test results.

  • PDF

Intelligent Robot Control using Personal Digital Assistants

  • Jaeyong Seo;Kim, Seongjoo;Kim, Yongtaek;Hongtae Jeon
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.304-306
    • /
    • 2003
  • In this paper, we propose the intelligent robot control technique for mobile robot using personal digital assistants (PDA). With the proposed technique, the mobile rebot can trace human at regular intervals by the remote control method with PDA. The mobile robot can recognize the distances between it and human whom the robot must follow with both multi-ultrasonic sensors and PC-camera and then, can inference the direction and velocity of itself to keep the given regular distances. In the first place, the mobile robot acquires the information about circumstances using ultrasonic sensor and PC-camera then secondly, transmits the data to PDA using wireless LAN communication. Finally, PDA recognizes the status of circumstances using the fuzzy logic and neural network and gives the command to mobile robot again.

  • PDF

혈액투석 환자의 치료에 대한 믿음, 질병 통제감과 우울, 건강 관련 삶의 질과의 관계 (Relationships between Treatment Belief, Personal Control, Depressive Mood and Health-related Quality of Life in Patients with Hemodialysis)

  • 차지은;이명선
    • 성인간호학회지
    • /
    • 제26권6호
    • /
    • pp.693-702
    • /
    • 2014
  • Purpose: The purpose of this study was to examine the relationships between treatment belief, personal control, depressive mood, and health-related quality of life in patients with hemodialysis based on self-regulation theory. Methods: Data were collected from 220 patients at 27 local hemodialysis clinics in Seoul during 2013 and 2014. The Revised Illness Perception Questionnaire, the Hospital Anxiety and Depression Scale, and Medical Outcomes Study Short Form-12 were used to measure outcome variables. Data were analyzed using descriptive statistics, t-tests, ANOVA, Pearson correlation, and multiple regression using the 'enter' method. Results: Treatment belief and personal control scored 3.58 and 3.54 out of 5 points respectively, on average. Treatment belief and personal control of kidney disease were negatively correlated with depressive mood and positively correlated with health-related quality of life. According to the regression analysis, treatment belief, monthly income, and personal control were discovered to account for 21.8% of the variance in depressive mood, where as depressive mood, monthly income, treatment belief, and age were found out to account for 40.6% of the variance in health-related quality of life. Conclusion: Our study demonstrated significant positive relationships between treatment belief and illness outcome in hemodialysis patients. Interventions aimed to provide the necessary information and trust to maximize the effectiveness of treatment need be developed to improve patients outcomes.

Relationship between Airline's Distribution Services SNS Content and Customer Satisfaction

  • YOO, Eunji;PARK, Soyeon
    • 유통과학연구
    • /
    • 제18권8호
    • /
    • pp.5-14
    • /
    • 2020
  • This study aims to examine the impact of characteristics of SNS content provided by airlines on customer satisfaction and to explore the effect of the personal characteristics of the customers which have a modulating effect on the relationship between content characteristics of SNS and customer satisfaction. The data were collected over a period of April 21. 2019. to July 21. 2019. for three months from the people who have experience using SNS provided by airlines. 225 samples were selected and used as final samples from a collection rate of 93.4 percent. Findings suggest that the characteristics of airline's SNS content which include a promotion, information, and communication showed a positive impact on customer satisfaction. The analysis of a modulating effect of individual characteristics on the relationship between the airline's SNS content characteristics showed that diversity pursuit propensity, innovation propensity, and information-seeking propensity control the relationship between characteristics of airline's SNS content which are publicity, information and customer satisfaction. And it was found that all three personal characteristics do not control the relationship between communication and customer satisfaction. Thus, airlines should use SNS more effectively to generate customer satisfaction and present marketing measures to help generate profits through consumer purchasing behavior. It is expected that the findings of this study will help airlines to utilize marketing implications for effective and practical marketing methods.

사물인터넷 시대의 정보 프라이버시 염려에 대한 실증 연구 (An Empirical Research on Information Privacy Concern in the IoT Era)

  • 박천웅;김준우
    • 디지털융복합연구
    • /
    • 제14권2호
    • /
    • pp.65-72
    • /
    • 2016
  • 사물인터넷(IoT), 빅데이터 등 새로운 IT 환경시대가 도래한 지금 우리는 법 테두리 안에서 개인의 정보가 포함되지 않은 정보를 제공하더라도, 다양한 정보와 결합하여 개인 식별이 가능한 시대에 살고 있다. 이로 인하여, 개인정보 피해가 발생할 수 있으며, 또한 2차 피해로 발전 될 수 있다. 특히, IoT를 통해 수집되는 데이터에는 단기간에는 개인을 식별할 수 없지만, 시간이 지남에 따라 축적된 데이터를 기반으로 특정 개인을 인식 할 수 있는 위험성이 존재한다. 이에 따라 본 연구는 IoT 시대에 개인정보 제공에 대한 염려를 낮추는데 영향을 주는 요인들을 도출하여 실제로 개인정보 제공의도와 연결될 수 있도록 하기위해 실증적으로 분석하여 검증하고자 하였다. 이를 바탕으로 정보 프라이버시가 개인정보 제공의도에 어떠한 영향을 미치는지에 대한 영향도를 분석하였다. 연구 결과, 정보프라이버시 위험이 정보 프라이버시 염려에 가장 큰 설명력을 보였으며, 정보 프라이버시 정책, 정보 통제 그리고 침해 경험 순으로 설명력을 보였다. 따라서 소비자에게 정보 프라이버시 염려를 낮추는 정책이나 제도개선 및 기술 개발을 통해 안전한 환경을 제공하면 개인정보를 제공할 것이다.

데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현 (Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control)

  • 이병엽;박준호;김미경;유재수
    • 한국콘텐츠학회논문지
    • /
    • 제11권2호
    • /
    • pp.61-68
    • /
    • 2011
  • 인터넷의 급격한 발달로 인해 수많은 기업에서 다양한 어플리케이션들이 불특정 다수의 사용자에게 개방되어 있는 현재의 비즈니스 환경에서 최근 개인정보의 보안에 대한 이슈가 자주 언급되며, 그 중요도 측면에서 기업의 최우선 과제가 되었다. 얼마 전 정부에서도 정보통신망법 상의 개인정보 보호 강화조치를 법률로 제정하고 이를 다양한 산업군에 적용하고 있다. 기업은 개인정보의 보호를 위해 다양한 방안들을 마련해 이러한 규제를 준수하여, 내부에 관리중인 개인정보에 대해 보안을 강화하기 위해 빠르게 보안 솔루션을 도입하고 있다. 이에 수많은 데이터들이 저장되어 사용되고 있는 DBMS 측면에서 규제를 준수하는 동시에 효과적으로 데이터 보안을 확보하기 위한 방안을 암호화, 접근제어, 감사로 구분하여 각각에 대한 구현방법 및 해당 솔루션들을 비교 및 검토하여 이를 통해 최적의 데이터베이스 보안 방안을 모색할 수 있도록 체크리스트를 구현하였다.

Enhancement of Internal Control by expanding Security Information Event Management System

  • Im, DongSung;Kim, Yongmin
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권8호
    • /
    • pp.35-43
    • /
    • 2015
  • Recently, internal information leaks is increasing rapidly by internal employees and authorized outsourcing personnel. In this paper, we propose a method to integrate internal control systems like system access control system and Digital Rights Managements and so on through expansion model of SIEM(Security Information Event Management system). this model performs a analysis step of security event link type and validation process. It develops unit scenarios to react illegal acts for personal information processing system and acts to bypass the internal security system through 5W1H view. It has a feature that derives systematic integration scenarios by integrating unit scenarios. we integrated internal control systems like access control system and Digital Rights Managements and so on through expansion model of Security Information Event Management system to defend leakage of internal information and customer information. We compared existing defense system with the case of the expansion model construction. It shows that expanding SIEM was more effectively.

전산화된 작업환경에서 인간의 오류성향에 관한 기초연구 (A basic study on human error proneness in computerized work environment)

  • 정광태;이용희
    • 대한인간공학회지
    • /
    • 제19권1호
    • /
    • pp.1-9
    • /
    • 2000
  • This study was performed to investigate some characteristics on human error proneness in the computerized work environment. Our concerning theme was on human error likelihood according to personal temperament. Two experiments were performed. The first experiment was to study the effect of field- independence/dependence on error likelihood. The second experiment was on error proneness. These experiments were performed in information search task. which was most frequent task in computerized work environment such as the control room of nuclear power plant. Ten subjects were participated in this study. Analyzed results are as follows. Field-independence/dependence had a significant effect in both information search time and error frequency. Error proneness had a significant effect in both factors, too. And, a positive correlation was found between error frequency and information search time. These results will be utilized as a basis to study operator's error proneness in the computerized control room of nuclear power plant. later on.

  • PDF

개선된 RFID 보안 및 비밀성을 위한 프레임워크의 분석 (Analyses of Framework for Enhanced RFID Security and Privacy)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 추계학술대회
    • /
    • pp.885-888
    • /
    • 2009
  • Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this paper we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy model a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her/his control, authenticated requests, release tags, transfer them to new owners, and so on. In this paper, we analyses a new type of simple a framework for enhancing RFID security by means of a proxy, a personal device that assumes control of a user's tags.

  • PDF

모바일 환경에서 사용자 중심의 전자ID지갑 운용 메커니즘 (A Digital ID Wallet User-oriented Mechanism in a Mobile Environment)

  • 송동호;임선희;임종인;이옥연
    • 정보보호학회논문지
    • /
    • 제17권6호
    • /
    • pp.57-64
    • /
    • 2007
  • 유비쿼터스 환경이 도래함에 따라 모바일 단말을 이용한 무선 인터넷의 이용이 증가하고 있다. 그 결과 사용자가 관리해야 하는 Digital Identity 정보가 기하 급수적으로 증가하고 있다. 또한 사용자가 가입 시 SP(Service provider)에게 등록한 개인정보는 기초적인 신상정보부터 금융정보에 이르기까지 다양한 정보들을 포함하고 있다. 따라서 개인 정보를 사용자 스스로가 통제가 가능하며 전자ID지갑에 단순한 인증정보뿐만 아니라 금융, 결제 등 다양한 정보를 포함한 Ticket을 전자ID지갑에서 간단하게 선택해 자신의 정보를 안전하게 관리할 수 있어야 한다. 이를 위하여 사용자 스스로가 개인정보의 활용을 통제할 수 있는 모바일 환경에서의 사용자 중심의 Digital Identity 운용 메커니즘을 제안한다.