• Title/Summary/Keyword: Personal computer

Search Result 2,603, Processing Time 0.026 seconds

A Study on the Harmonics and Voltage Sags Effect by the Series Resonant Filter Application for Personal Computer Loads (개인용 컴퓨터 부하의 직렬동조필터 적용에 의한 고조파 및 순간전압강하 영향에 관한 연구)

  • Seo, Beom-Gwan;Kim, Kyung-Chul;Lee, Il-Moo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.8
    • /
    • pp.36-41
    • /
    • 2006
  • Computer Loads can be found in all of modern society. The switching mode power supplies used in personal computers are major sources of harmonic currents. Harmonic currents can cause lots of harmonic problems such as disruption in computer performance. A series resonant filter is very effective in harmonic reduction for personal computer loads. Voltage sags are short duration reductions in rms voltage. The main causes of voltage sags at faults, motor starting, and transformer energizing. Personal computers are another example of devices sensitive to voltage sags. A serious voltage sag at the terminals way lead mis-operation of the equipment. This paper presents an in depth analysis to evaluate the effect of harmonics reduction based on the IEC 61000-3-2 and the effect of voltage sag using ITI curve by applying a series resonant filter for personal computer loads.

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.

A Study on the process planning of Deep drawing using personal computer (퍼스널 컴퓨터에 의한 디이프드로잉 공정설계의 전산화에 관한 연구 (I))

  • Choi, Jae-Chan;Jin, In-Tai
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.5 no.3
    • /
    • pp.31-42
    • /
    • 1988
  • This paper describes a computer aided process planning system called "Deep-Drawing", "Deep-Drawing" is designed for the drawing sequence of cylindrical and rectangular cups with or without taper and flange. The computer program has written in BASIC language with personal computer. Design Rules for process planning are formulated from process limitation, plasticity theory and experimental results including the know-how of many manufacturing factories. "Deep-Drawing" Capabilities include the analysis of drawing sequence by the determination of optimal drawing ratio, the determination of intermediate shape, dimensions, punch and die radius etc., the calculation of drawing loads and blank holder force to perform each drawing step, and the graphic outputs for the operation sheet.tputs for the operation sheet.

  • PDF

Design and Implementation of Mobile App for Remote Control of Personal Computer (퍼스널 컴퓨터의 원격제어를 위한 모바일 앱의 설계 및 구현)

  • Choi, Joong-Woon;Song, Je-O;Lee, Sang-Moon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.01a
    • /
    • pp.435-436
    • /
    • 2019
  • 무선 인터넷은 무선 데이터 통신망을 이용하여 데이터 통신 및 인터넷 서비스를 이용하는 것을 말한다. 무선 통신 기술의 비약적인 발전은 다양한 단말기를 통해서 무선 인터넷 접속을 가능하게 하고있으며, 공간의 제약을 받지 않고 이기종의 단말기 간 통신까지 가능해지고 있다. 본 논문에서는 PC(Personal Computer)와 스마트폰 간의 무선통신을 통한 PC 원격제어가 가능한 모바일 기반의 리모콘 프로그램을 제안한다.

  • PDF

A Study on the Development of Air Pollution Dispersion Model for Personal Computer (特定地域의 大氣汚染 擴散모델 開發에 關한 硏究)

  • 송기유;임흥재;윤명희
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.2 no.2
    • /
    • pp.19-30
    • /
    • 1986
  • This study was performed to develop a long-term air pollution dispersion model based on CDM program for use in the personal computer. The model CDM.PC, developmented for use of this study, simplified the plum equation of point pollution source in a windy state and sindless state. We used the classified 8 class stability, 16 wind direction and 4 class wind speed for the computer input climatological data. The plum rise equation is applied for CONCAWE's equation above 2,000 Kcal/sec of the exhaust calorie and Moses-Carson's equation below 2,000Kcal/sec at windy state, and Brigg's equation at calm. The time required is 200 minutes for drawing the air pollution contour for treating ten stacks under the above-stated conditions. It is the weakness of using personal computer that the operation time is longer than a large-size computer. But it strength is that the personal computer is used widely. To compare the treatment results of CDM.PC with TCM, we comfirmed that the shape of $SO_2$ pollution contour is similar but the concentration distribution is quite different because of characteristics of each models. Estimated and measured $SO_2$ concentration were similar, namely, Cest/Cob ratio of CDM.PC and TCM were respectively $0.96 \pm 0.25 (mean\pmS.D)$ and $1.08\pm0.26$.

  • PDF

Privacy Level Indicating Data Leakage Prevention System

  • Kim, Jinhyung;Park, Choonsik;Hwang, Jun;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.558-575
    • /
    • 2013
  • The purpose of a data leakage prevention system is to protect corporate information assets. The system monitors the packet exchanges between internal systems and the Internet, filters packets according to the data security policy defined by each company, or discretionarily deletes important data included in packets in order to prevent leakage of corporate information. However, the problem arises that the system may monitor employees' personal information, thus allowing their privacy to be violated. Therefore, it is necessary to find not only a solution for detecting leakage of significant information, but also a way to minimize the leakage of internal users' personal information. In this paper, we propose two models for representing the level of personal information disclosure during data leakage detection. One model measures only the disclosure frequencies of keywords that are defined as personal data. These frequencies are used to indicate the privacy violation level. The other model represents the context of privacy violation using a private data matrix. Each row of the matrix represents the disclosure counts for personal data keywords in a given time period, and each column represents the disclosure count of a certain keyword during the entire observation interval. Using the suggested matrix model, we can represent an abstracted context of the privacy violation situation. Experiments on the privacy violation situation to demonstrate the usability of the suggested models are also presented.

Web Document Analysis based Personal Information Hazard Classification System (웹 문서 분석 기반 개인정보 위험도 분류 시스템)

  • Lee, Hyoungseon;Lim, Jaedon;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.69-74
    • /
    • 2018
  • Recently, personal information leakage has caused phishing and spam. Previously developed systems focus on preventing personal information leakage. Therefore, there is a problem that the leakage of personal information can not be discriminated if there is already leaked personal information. In this paper, we propose a personal information hazard classification system based on web document analysis that calculates the hazard. The system collects web documents from the Twitter server and checks whether there are any user-entered search terms in the web documents. And we calculate the hazard classification weighting of the personal information leaked in the web documents and confirm the authority of the Twitter account that distributed the personal information. Based on this, the hazard can be derived and the user can be informed of the leakage of personal information of the web document.

Evaluating AI Techniques for Blind Students Using Voice-Activated Personal Assistants

  • Almurayziq, Tariq S;Alshammari, Gharbi Khamis;Alshammari, Abdullah;Alsaffar, Mohammad;Aljaloud, Saud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.61-68
    • /
    • 2022
  • The present study was based on developing an AI based model to facilitate the academic registration needs of blind students. The model was developed to enable blind students to submit academic service requests and tasks with ease. The findings from previous studies formed the basis of the study where functionality gaps from the literary research identified by blind students were utilized when the system was devised. Primary simulation data were composed based on several thousand cases. As such, the current study develops a model based on archival insight. Given that the model is theoretical, it was partially applied to help determine how efficient the associated AI tools are and determine how effective they are in real-world settings by incorporating them into the portal that institutions currently use. In this paper, we argue that voice-activated personal assistant (VAPA), text mining, bag of words, and case-based reasoning (CBR) perform better together, compared with other classifiers for analyzing and classifying the text in academic request submission through the VAPA.

Architecture of Streaming Layer as Core of Personal Robot's Middleware.

  • Li, Vitaly;Choo, Seong-Ho;Jung, Ki-Duk;Choi, Dong-Hee;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.98-100
    • /
    • 2005
  • This paper, proposes concept of personal robot middleware core also called streaming layer. Based on openness and portability, the streaming layer is proposed in order to meet requirements of different kinds of applications. The streaming layer architecture provides effective management of data flows and allows integration of different systems with ease regardless software of hardware platform. With extensibility support additional features can be build in without affect to performance. Therefore, heterogeneous network support, real-time communications, embedded boards support can be easily achieved. In order to achieve high performance together with portability into different platforms, the most functions has to be implemented in C language, while critical parts, such as scheduling, priority assignment has to be made using native functions of tested platforms.

  • PDF

Disposition of the obsolete Personal Computers (폐PC 처리방안에 관한 고찰)

  • 이성호
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.3
    • /
    • pp.28-36
    • /
    • 1999
  • Environmental problems arise from the rapidly developing personal computers and are gradually becoming a significant part of problems. Computer industry are usually viewed as relatively clean. However, discarded personal computer and related equipment which are piling up at warehouse, or going to landfills has on the negative effects of hazardous substance on health and the ecosystem are growing problems which did not trouble society a few years ago. This paper will estimate the quantity of the obsolete personal computer in 1999 and suggest the alternatives of its disposition.

  • PDF