• Title/Summary/Keyword: personal computer

Search Result 2,604, Processing Time 0.029 seconds

Ubiquitous intelligent lesson management system (유비쿼터스 지능형 교육관리 시스템)

  • Hong, Sung-Moon;Oh, Suk-Kyung;Lim, Hyung-Min;Cho, Jae-Min;Kim, Dong-Suk;Park, Sang-Gug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.739-742
    • /
    • 2011
  • This paper describes system design and realization to the ubiquitous intelligent lesson management. This system includes students management by utilizing RFID and web-cam, personal security certification by fingerprint recognition, keyboard locking of PC by hooking technology, personal data management by cloud system, internet block access by a packet monitoring. We have design and realize this system, In the future, we will applicate our system to the classes using computer.

  • PDF

Effectiveness of Computer-tailored Intervention Program;Focused on the Program to Promote Breast-Feeding (컴퓨터-맞춤형 중재 프로그램의 효과;모유수유 증진을 위한 프로그램을 중심으로)

  • Kim, Jung-A
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.13 no.2
    • /
    • pp.242-253
    • /
    • 2007
  • Purpose: The aim of this study is to examine the effectiveness of an computer-tailored intervention program to promote breast-feeding. Method: A quasi-experimental design was used assigning forty pregnant women to the experimental group (computer-tailored intervention condition) and the control group (no-intervention control condition). Thirty-three participants completed pretest and posttest questionnaires and 19 participants assigned to intervention condition received personal feedback tailored by computer program. Result: Participants in the experimental group showed higher mean score of 'perception of the importance of breast-feeding'. Significant differences in internal health locus of control was found between the participants in the experimental group and the control group. Participants in the experimental group exceeded controls on intention of breast-feeding. Participants in the control group more often felt that the length of program contents they received was somehow longer. Conclusions: The use of a computer-tailored intervention improved the perception of the importance of breast-feeding and the internal health locus of control. The intention of breast-feeding was increased through the personal feedback tailored by computer even though participants felt that the length of program contents of tailored feedback was not longer.

  • PDF

Mutual Friendly Force Identification Protocol based on Hash-Chain for Personal Combat Systems

  • Lee, Jongkwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3858-3869
    • /
    • 2020
  • In this paper, we propose a hash-chain based friendly force identification protocol for personal combatants equipped with a personal combat system in a tactical wireless network. It is imperative in military operations to effectively and quickly identify friendly forces. If the identification of friendly forces is not correct, this can cause friendly fire. In current ground operations, the identification of friendly forces by personal combatants is neither secure nor safe. To address this issue, the proposed protocol uses a hash-chain to determine if a detected person is friendly. Only friendly forces with the same materials that are assigned before they deploy can construct an initial hash-chain. Moreover, the hash-chain is changed at specific times. The performance of the proposed protocol is evaluated on the assumption that the secret key is leaked, which is the worst scenario in the security research field. We verify that the proposed protocol is secure for the various attack scenarios, such as message replay attack, fabrication attack, and Denial of Service attack.

Selections and applications of statistical packages for personal computers (개인용 컴퓨터에서의 통계페키지의 선택과 활용)

  • 김병천
    • The Korean Journal of Applied Statistics
    • /
    • v.1 no.1
    • /
    • pp.75-90
    • /
    • 1987
  • Statistical data analysis using the statisticaal packages can be performed on the personal computers. But it is not easy to select a personal computer in which statisticians could run statistical packages. The paper discusses some of the minimum requirements of the personal computers to use statistical packages and how to choose good statistical packages with better numerical results and introduces the statistical packages which are available in the personal computers.

Exploring the contents of personal information protection education in the pre-director education

  • Choi, Dea-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.177-182
    • /
    • 2021
  • This study was carried out for the purpose of selecting and structuring educational content for personal information protection education in supplementary education for childcare workers. Prior research and literature data were collected and analyzed to select educational content, and a preliminary survey was conducted for 125 applicants for education. Based on the surveyed data, the educational content was structured through focus group interview. In the focus group interview analysis, the person in charge of personal information of the institution and those who have completed education participated. Group interviews and individual interviews through e-mail, etc. were conducted, and the final contents were selected after reviewing the appropriateness of the derived opinions by two educational experts. It was found that the direction of the search for personal information protection education contents should be added to the contents of practical work in each stage of information management and practice such as document writing.

A Monitoring Tool for Personal Information Leakage Prevention in Network Packets (네트워크 패킷 내 개인정보 유출 방지를 위한 모니터링 도구 개발)

  • Ju, Tea Kyung;Hong, Chong Min;Shin, Weon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.489-494
    • /
    • 2013
  • Personal information has been transmitted in a variety of services of Internet environment, but individual users do not know what information is sent. In this paper, we aim to develop a monitoring tool that continuously monitors personal sensitive information in network packets and informs the user whether or not to leak. So we implement a monitoring tool of personal information and analyze the experiment results. In addition, we introduce a prevention of confidential information in company and a leakage prevention of medical information, for applications that take direct advantage. The results of this study, by contributing to prevent leakage of personal information, can help reduce cyber threats variously targeting personal information of users.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Improvement Method of Education for Personal Information Protection through Survey on Perception in College Students (대학생 개인정보보호 인식조사를 통한 교육 개선방안 연구)

  • Kim, Ju-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.349-355
    • /
    • 2019
  • In the trend of continuously increasing collection and use of personal information, there are legal grounds for protecting personal information and various policies and systems are implemented, but there is insufficient analysis about education and its effect of personal information protection. In this study, we surveyed and analyzed the degree of awareness and actual perception level in the protection of personal information of college students, and investigated the satisfaction of personal information protection education. The results of the analysis showed that students' interest in privacy protection and concern about personal information exposure was very high, but the efforts to protect personal information and the perception level of rights and systems for protecting personal information was very low. In addition, the experience and satisfaction of education for personal information protection were found to be very low. Students felt that the necessity of education for personal information protection was strongly agreed and preferred regular and continuous education rather than one-time education.

A Study on Detecting Personal Information from Image Files (이미지파일에 포함된 개인정보추출에 관한 연구)

  • Lee, Minsuk;Kim, Sukhyeon;Yoon, Jiae;Won, Yoojae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.209-212
    • /
    • 2017
  • 최근 정보통신기술의 비약적 발전에 따라 문서 제작 과정 또한 디지털 방식의 형태가 주를 이루게 되었다. 하지만 이와 더불어 문서를 통한 개인 정보 유출의 문제 또한 대두되게 되었다. 본 논문에서는 이미지 형식의 문서의 유출 방지를 위해 광학문자인식(OCR)을 활용한 문자인식 기능과 개인정보 검출 기능을 통합적으로 수행 한하여 기존 OCR엔진과의 차별점을 두었다. 또한 원하는 경로의 파일 탐색을 가능하도록 하고, 선택한 경로에 저장되어 있는 이미지파일 내의 검출 문자들을 정규표현식을 사용해 특정한 개인정보 패턴과 매칭하여 문서 내 포함된 개인정보를 반환하여 출력한다. 이러한 개인정보 검출 결과 중요 개인정보가 포함된 파일을 사용자에게 별도로 통보하도록 한다. 따라서 본 논문에서는 기존의 개인정보 검출 과정의 번거로움을 극복하여 사용자의 편의 향상과 더불어 문서를 통한 개인정보의 유출을 사전에 방지 할 수 있도록 하였다.

  • PDF

A Study on the Analysis and Design of Nonlinear Control Systems using Personal Computer (개인용 컴퓨터를 이용한 비선형 제어 시스템의 해석 및 설계에 관한 연구)

  • Nam, Moon-Hyun;Jeong, Cheol
    • Proceedings of the KIEE Conference
    • /
    • 1987.11a
    • /
    • pp.82-85
    • /
    • 1987
  • The objective of this paper is to develop computer programs to aid in the design and analysis of control systems in which nonlinear characteristics exist. Control systems are dynamic systems, which can be described using various mathematical models. A convenient model for digital computer simulation is the state model in which described using a set of linear and non linear first order differential equations. The digital simulation was performed on a IBM PC/XT personal computer, and the computer language was BASIC. There are four possible configurations from which a user may choose. When running a program, the user is asked to enter the system parameters according to a specified control system configurations are; 1. A control system with a nonlinear element followed by a plant in a feedback configurations(NLSVF1). 2. A control system with a nonlinear device situated between two plants in a feedback configurations(NLSVF2). 3. A control system with a nonlinear element followed by a plant, followed by a the dealy in feedback configurations(TLAG). 4. A motor and load with a backlash nonlinearity between dynamic portions of the motor/load configurations (BACKLASH). The matrix from state equations are integrated using combination the trapezoidal method and fixed point iteration. Several cases which have nonlinearity were implemented on the computer and the results were discussed.

  • PDF