• Title/Summary/Keyword: personal computer

Search Result 2,594, Processing Time 0.032 seconds

COMPARISON OF IMAGE REFORMATION USING PERSONAL COMPUTER WITH CT SCAN RECONSTRUCTION (CT 스캔 영상재구성과 개인용 컴퓨터를 이용한 영상 재형성과의 비교에 관한 연구)

  • Jung Gi-Hun;Kim Eun-Kyung;Kim Sang-Joon
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.24 no.2
    • /
    • pp.361-368
    • /
    • 1994
  • Radiographic planning is needed for implant placement in order to determine implant length, jaw bone volume, anatomical stucture and so on. Radiographic examination includes conventional radiography, conventional tomography and CT scan. The most accurate mesurement can be obtained from CT scan. For the cross-sectional view of mandible, CT scan reconstruction is generally needed. But the cross-sectional view of mandible can be reformed by personal computer. This study was performed to examine the clinical usefulness of reformed image using personal computer in comparison with CT scan reconstructed image. CT axial slices of 4 mandibles of 4 volunteers were used. Digital imaging system was composed of Macintosh Ⅱ ci computer, high resolution Sony XC-77 CCD camera, Quick Capture frame grabber board and 'NIH Image' program. Seven reconstructed cross-sectional images within CT machine(CT group) were obtained. And seven reformed cross-sectional images(PC group) after digitization of CT axial slices into the personal computer were obtained. PC group was compared with CT group in the objective and subjective aspects. The results were as follow: 1. Measurement of mandibular height & width in both group showed insignificant difference(P>0.05). 2. Subjective assessment of the mandibular canal in both group showed insignificant difference(P>0.05). 3. Image reformation using personal computer could provide panoramic view, which could not be obtained in CT scan reconstruction.

  • PDF

The Protection of Personal Information and the Principle of Proportion in Information Societies

  • Gu, Hyung-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.7
    • /
    • pp.109-114
    • /
    • 2015
  • With the realization that the police's personal information gathering activities can violate the authority to decide one's information guaranteed by the Constitution, many people are interested in the legal terms of the police's information gathering and handling. The police's personal information gathering activities imply both the purpose of public welfare and order and the risk of violation of basic rights of citizens, their effective balance is critical. In this respect, this study reviews the principle of proportion as a principle of control of personal information gathering and handling (police intelligence activities) by state to discuss its implications on legislation.

Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

  • Kim, Jeong-Wook;Choi, Chul-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.141-156
    • /
    • 2018
  • The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.

A Development of the Dynamic Absorber and Damper for Vibration and Noise Reduction of the Personal Computer (PC의 진동/소음 저감을 위한 쿨링홴의 동흡진장치 및 절연장치의 개발)

  • Jung, Won-Young;Lee, Kyu-Ho;Chung, Jin-Tai
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.21 no.4
    • /
    • pp.339-345
    • /
    • 2011
  • The purpose of this study is reduction the vibration of the personal computer by developing the vibration absorber and damper. The eccentricity of the cooling fan causes the vibration of the computer. We designed the material properties of the vibration absorber and damper by FEM model within operation frequencies of the cooling fan. We experiment the overall analysis and system analysis by using a laser vibrometer. The result shows that the proposed dynamic absorber and damper reduce the vibration of the personal computer.

마이크로 컴퓨터를 이용한 신경근 차단 감시장치의 개발에 관한 연구

  • 전계록;조진호
    • Journal of Biomedical Engineering Research
    • /
    • v.11 no.2
    • /
    • pp.257-268
    • /
    • 1990
  • A system has been developed for monitoring the effect of neuromuscular blocking frugs and the neuromuscular function during anesthesia and surgery. This system is composed of software and hardware, the latter are nerve stimulator, force transducer, interface board(preamplifier, filter, peripheral input/output) and personal computer (apple ll) , the former are programmed in ASSEMBLY and BASIC language. The nerve stimulator which is controlled by personal computer is capable of delivering single shocks at o.)Hz, train of four at 2Hz and tetanic stimulation at 30, 100, 200Hz. The response, adduction of the thumb, is sensed by the force transducer. The output of the force transducer Is amplified, filtered, converted digital signal and then processed by the per- sonal computer. The personal computer quantia4es twitch and traln of four tesponse and calculates the 74 ratio (Ta/Tl )between the first and fourth response of train of four. This ratio is used to estimate the level of the neuromuscular block. This system has reaserch potential for determining the effect of newer neuromuscular blocking drugs for comparlsion with presently used drugs of alternatively, for delerminig the effects of blocking drugs in altered physilogical states.

  • PDF

Study on video information regulation and VPIC compliance issues in GDPR

  • Ryu, Ki-Il;Cho, Young-Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.6
    • /
    • pp.41-48
    • /
    • 2017
  • All the personal information controllers or processors collecting, processing and storing personal information through the entry into force of the EU GDPR (General Data Protection Regulation) are required to provide the basic principle of privacy by design at all stages of developing products or services throughout the organization, And to ensure that the basic rights of the subject of personal information are protected and that internal control techniques are provided to prevent any abuse or leakage. We will review the regulations and countermeasures required by the GDPR for video information with serious privacy problems, and propose a solution.

Privacy-Preserving IoT Data Collection in Fog-Cloud Computing Environment

  • Lim, Jong-Hyun;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.43-49
    • /
    • 2019
  • Today, with the development of the internet of things, wearable devices related to personal health care have become widespread. Various global information and communication technology companies are developing various wearable health devices, which can collect personal health information such as heart rate, steps, and calories, using sensors built into the device. However, since individual health data includes sensitive information, the collection of irrelevant health data can lead to personal privacy issue. Therefore, there is a growing need to develop technology for collecting sensitive health data from wearable health devices, while preserving privacy. In recent years, local differential privacy (LDP), which enables sensitive data collection while preserving privacy, has attracted much attention. In this paper, we develop a technology for collecting vast amount of health data from a smartwatch device, which is one of popular wearable health devices, using local difference privacy. Experiment results with real data show that the proposed method is able to effectively collect sensitive health data from smartwatch users, while preserving privacy.

A Study on Strengthening Personal Information Sovereignty through Analysis of Domestic Service Cases and Research Projects of Self-Sovereign Identity Technology (자기주권신원기술의 국내 서비스 사례 및 연구 과제 분석을 통한 개인정보 주권 강화 방안연구)

  • Lee, Jeong-Hyeon;Kim, Ji-Won;Kim, Chul-Soo;Yang, Jin-hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.575-589
    • /
    • 2020
  • Along with the exponential growth of data businesses, the importance of data containing personal information of use have also increaseing. Particularly, in Korea, as the Data 3 Act was implemented, companies can use personal information more actively through regulatory improvement and stipulation in case of using data containing personal information. In this situation as per the service use, self-sovereign identity technology has emerged that can minimize the provision of personal information in relation to real name authentication and provision of personal information. Recently, services and studies using blockchain have been actively conducted in case of using the self-sovereign identity function for clarity and verification of records according to the use of personal information. In this thesis, by analyzing the characteristics of domestic self-sovereign identity service and the current status and contents of research related to blockchain-based self-sovereign identity technology and we suggest a research direction based on self-sovereign identity technology to reinforce the sovereignty of personal information in the era of the 3rd Data Act do.

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

A Role-play base Instructional Learning Design for Personal Information Management's Importance:Focus on the third-grade elementary students (개인정보 관리의 중요성을 교육하기 위한 역할 놀이 교수학습 설계 : 부산광역시 초등학생 3학년 대상으로)

  • Kim, Su-Jin;Rim, Hwakyung
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.73-83
    • /
    • 2005
  • Recently, Internet utilization ratio of elementary school students is urgently increasing. On the other hand, elementary school students are not doing personal information management properly in the Internet. As a result, it is causing problem of information leakage. In this paper, we proposed a instructional learning method to teach importance of personal information management to an elementary school student. Proposed method is based on role-play instructional learning method. And applied to the third-year class in elementary school. We show that proposed method is effect in education than traditional teaching method about personal information management's importance.

  • PDF