• Title/Summary/Keyword: personal computer

Search Result 2,594, Processing Time 0.032 seconds

A Study on the Application of the Real-Time Simulator (실시간 모의시험기의 적용에 관한 연구)

  • 장성욱;이진걸
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.191-191
    • /
    • 2000
  • Hydraulic servo system is difficult to be made up and each component is very expensive, it takes long for actual system to make and test and it costs a high price. Because of these characteristics of hydraulic servo system, a real time simulator that could describe behavior of real system is highly demanded, without composing real hydraulic system. So, many studies have been (lone on these subjects and many simulators are developed with superiority. Since the nonlinearity of a hydraulic system common simulator have composed of many calculative times byusing DSP(Digital Signal processing) and have made it possible to find the situations of the system in real time, calculating hydraulic simulation and controller separately. In this study, we suggest real-time simulator that could describe real system without ordinary DSP card. This simulator is composed of 80196kc and personal computer. DSP card that has calculated complex numerical equation is supplanted by personal computer and 80196kc generates control signals independently out of the personal computer. In all process, personal computer is synchronized with one-board microprocessor within sampling time in the closed loop system. This makes it possible to be described in hydraulic servo system in real time. And to make a comparison between the result of the real-time simulator and a hydraulic servo system.

  • PDF

A Study on Filtering Method for E-mail Documents Based on Personal Profile (Personal Profiles 기반의 E-mail 문서 필터링 방법에 관한 연구)

  • Choi, Kyu-Jung;Lee, Tae-Hun;Kim, Myoung-Ki;Park, Ki-Hong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.245-248
    • /
    • 2002
  • 요즘 E-mail은 중요한 통신수단 중 하나로 사용되고 있다. 그러나 상당수의 E-mail 문서들이 상업성 광고 E-mail과 같은 불필요한 정보를 포함한 채 우리들의 컴퓨터에 분포되어 있다. 본 논문에서는 이러한 문제를 해결하기 위하여 각각의 E-mail 문서들의 내용을 판단함으로써 불필요한 문서들을 자동적으로 필터링 하는 방법을 제안하고자 한다. 전통적인 필터링 방법들은 단어의 빈도수와 같은 단일 속성만을 다루기 때문에 놀은 정확도를 얻을 수 없다. 따라서 본 논문에서는 각각의 사용자에 의해 이미 수신되어진 E-mail 문서들로부터 Personal Profile을 만들고, 이 Personal Profile를 사용함으로써 새로운 E-mail 문서가 사용자에게 중요한지의 여부를 구별하여 주는 방법에 관하여 제안하고자 한다. 이러한 Profile은 E-mail 문서의 송신자, 테마, 유형과 같은 다중 속성 값으로 구성되어 있다. 실험결과로부터 본 논문에서 제안하는 방법이 전통적인 방법보다 더 나은 정확성을 보이고 있음을 알 수 있다.

  • PDF

CNN-based Visual/Auditory Feature Fusion Method with Frame Selection for Classifying Video Events

  • Choe, Giseok;Lee, Seungbin;Nang, Jongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1689-1701
    • /
    • 2019
  • In recent years, personal videos have been shared online due to the popular uses of portable devices, such as smartphones and action cameras. A recent report predicted that 80% of the Internet traffic will be video content by the year 2021. Several studies have been conducted on the detection of main video events to manage a large scale of videos. These studies show fairly good performance in certain genres. However, the methods used in previous studies have difficulty in detecting events of personal video. This is because the characteristics and genres of personal videos vary widely. In a research, we found that adding a dataset with the right perspective in the study improved performance. It has also been shown that performance improves depending on how you extract keyframes from the video. we selected frame segments that can represent video considering the characteristics of this personal video. In each frame segment, object, location, food and audio features were extracted, and representative vectors were generated through a CNN-based recurrent model and a fusion module. The proposed method showed mAP 78.4% performance through experiments using LSVC data.

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

A Strategy Study on Sensitive Information Filtering for Personal Information Protect in Big Data Analyze

  • Koo, Gun-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.12
    • /
    • pp.101-108
    • /
    • 2017
  • The study proposed a system that filters the data that is entered when analyzing big data such as SNS and BLOG. Personal information includes impersonal personal information, but there is also personal information that distinguishes it from personal information, such as religious institution, personal feelings, thoughts, or beliefs. Define these personally identifiable information as sensitive information. In order to prevent this, Article 23 of the Privacy Act has clauses on the collection and utilization of the information. The proposed system structure is divided into two stages, including Big Data Processing Processes and Sensitive Information Filtering Processes, and Big Data processing is analyzed and applied in Big Data collection in four stages. Big Data Processing Processes include data collection and storage, vocabulary analysis and parsing and semantics. Sensitive Information Filtering Processes includes sensitive information questionnaires, establishing sensitive information DB, qualifying information, filtering sensitive information, and reliability analysis. As a result, the number of Big Data performed in the experiment was carried out at 84.13%, until 7553 of 8978 was produced to create the Ontology Generation. There is considerable significan ce to the point that Performing a sensitive information cut phase was carried out by 98%.

The Personal Data Protection Mechanism in the European Union

  • Syroid, Tetiana L.;Kaganovska, Tetiana Y.;Shamraieva, Valentyna M.;Perederiі, Оlexander S.;Titov, Ievgen B.;Varunts, Larysa D.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2021
  • The adoption of the General Data Protection Regulation (EU) 2016/679 transformed approaches and concepts to the implementation of the personal data protection mechanism in the European Union. Within the EU, almost all countries have adapted a new protection mechanism, which requires a study of the specifics of its use. The article intends to assess the legal provisions of the current mechanism of personal data protection in the EU. The author studied the mechanism of personal data protection under the General Data Protection Regulation (EU) 2016/679 (GDPR) based on the concept of contextual integrity and analysis of EU legislation on personal data protection. The scientific publications for 2016-2020 were reviewed for the formation of ideas of a new personal data protection mechanism in the EU, informative and transparent analysis of legal provisions. The article notes that the personal data privacy and protection is increasing, there is an ongoing unification of the legal status of personal data protection and the formation of a digital market for dissemination, exchange, control, and supervision of data. Cross-border cooperation is part of the personal data protection mechanism. The author proved that the GDPR has changed approach to personal data protection: the emphasis is now shifting to the formation of a digital market, where the EU's role in ensuring regulation is crucial. The article identifies the emergence of a new protectionist legal system and strengthening of legal provisions regarding privacy. This legal system needs unification and harmonization in accordance with national legislation, is territorially fragmented and differentiated within the EU.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Study on the development of a personal computer aided 3-D geometric modelling system (PC를 이용한 3차원 입체형상 모델링 시스템 개발 연구)

  • 변문현;오익수
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1988.10a
    • /
    • pp.562-566
    • /
    • 1988
  • The purpose of this study is to develop a personal computer aided 3-D geometric modeller. To perform this study, we set up a cube, a cylinder, and a prism as a primitive in the first segment of this study. By modelling the 3-D object through their transformation, addition, and subtraction, we proved the validity of the developed algorithm and its computer program. Some examples show the results of applying the program to modelling a few simple shape of the machine parts. These results met the first aim of this study.

  • PDF

Research on Personal Information Safety Condition and Improvements in Welfare Center for the Disabled (장애인복지관 개인정보보호 실태와 개선 방안)

  • Kim, Sung-Jin;Kweon, Jae-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.262-274
    • /
    • 2010
  • In Welfare Center for the disabled, under the Government's information acceleration plan, the computer system has been developed starting from work standardization in 2001 but it has been emphasized only on the technical and customer convenience side leaving out preparation for the side effects of them. Therefore this article will seek the necessity of personal information protection, legal basis in the Welfare Center for the disabled. Additionally after analyzing current status for the personal security of Welfare Center for the disabled, establishing an alternative plan for personal security policy's way could be addressed. Increasing education for awareness stress of personal information security, and preparing institutional protection apparatus from applying life cycle of personal information would be an alternative plan for personal information protection for Welfare Center for the disabled. Also frequent monitoring of accessing personal information from the computerized system should be achieved. It is impossible to recover damage caused by leak of personal information although post actions are progressed. From this essay, awareness of personal information protection should be newly revised for both the Social Welfare Organization and the Disabled welfare center, and also technical, institutional strategy's action should be arranged.

3-D Radiosurgery Planning Using Personal Computer (Personal Computer를 이용한 3차원적 뇌정위적 방사선 치료계획)

  • 서태석;서덕영;박찬일;하성환;강위생
    • Progress in Medical Physics
    • /
    • v.3 no.1
    • /
    • pp.63-69
    • /
    • 1992
  • Recently, stereotactic radiosurgery plan is required with the information of 3-D image and dose distribution. The purpose of this research is to develop 3-D radiosurgery planning system using personal computer. The procedure of this research is based on three steps. The first step is to input the image information of the patient obtained from CT or MR scan into personal computer through on-line or digitizer. The position and shape of target are also transferred into computer using Angio or CT localization. The second step is to compute dose distribution on image plane, which is transformed into stereotactic frame coordinate. and to optimize dose distribution through the selection of optimal treatment parameters. The third step is to display both isodose distribution and patient image simultaneously using superimpose technique. This prototype of radiosurgery planning system was applied recently for several clinical cases. It was shown that our planning system is fast, accurate and efficient while making it possible to handle various kinds of image modelities such as angio, CT and MRI. It is also possible to develop 3-D planning system in radiation therapy using beam's eye view or CT simulation in future.

  • PDF