• 제목/요약/키워드: personal computer communication

검색결과 479건 처리시간 0.027초

모바일 기반 학급관리 시스템 (A Class Management System on Mobile Platform)

  • 김성준;박동규
    • 한국멀티미디어학회논문지
    • /
    • 제19권4호
    • /
    • pp.780-788
    • /
    • 2016
  • Development of information and communication technologies has given a lot of changes in the business processing methods including the school and class managements. However, many business processing systems are still based on desktop computer. In particular, most of the class management system only supports desktop computers; hence school teachers have difficulty in using their class managements systems on mobile environment. In this paper, we proposed and developed a mobile classroom management system for teachers, which will easily handle information such as personal records of students, student counseling records, student life record and so on. The implementation of the application of mobile-based class management can be managed by many school elements including student register information, student evaluation records and transcripts, counseling report, and so on.

Binary CDMA 무선통신 기반의 자동차 후방카메라 시스템의 개발방법 및 설계 (Development Methods and Design of a Car Rearview Camera System based on the Binary-CDMA Wireless Communication Technology)

  • 최재원
    • 한국정보통신학회논문지
    • /
    • 제18권8호
    • /
    • pp.1869-1876
    • /
    • 2014
  • 자동차 후방카메라 시스템은 후진시 차량 후방을 모니터 영상으로 보여주어 인명보호와 주차의 편리, 운전자의 안전 운전을 위한 다양한 서비스를 제공한다. 본 논문에서는 우리나라가 독자 개발한 개인용 무선통신 Binary CDMA 신기술을 이용하여 설치가 자유롭고 설치비용과 기술료를 절감할 수 있는 자동차 후방카메라 시스템의 개발방법 및 설계에 관해 연구하였다.

MSCC를 이용한 가속기 진공장치 감시 시스템 개발 (Vacuum Gauge Control System Using MSCC for PLS)

  • 윤종철;이태연;황정연;남상훈
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2001년도 하계학술대회 논문집 D
    • /
    • pp.2169-2171
    • /
    • 2001
  • The vacuum gauge control system has been designed and implemented using multi-serial communication controllers (MSCC) for the 2.5 Gev storage ring at the Pohang Accelerator Laboratory (PAL). There are 20 Balzers vacuum gauges and 17 Granville-Phillips vacuum gauges at the storage ring. A MSCC have two RS485 (max speed 460.8Kbps) field network port, 8 channel serial communication ports (max speed 460.8Kbps) connected to gauge controller for serial communication control. 12 MSCCs are connected to a personal computer (PC) through the RS485 field network. The PC can automatically control the MSCCs by sending set of commands through the network. The commands specify the duration of the MODBUS protocol. Upon receiving a command from a PC running under Windows2000 through the network, the MSCC communicate through the serial output ports to gauge controller. In this paper, we describe control structure and scheme of the vacuum gauge control system.

  • PDF

지능형 악성코드의 이메일 전파에 대한 효과적인 대응 방안에 관한 연구 (A Study on Effective Countermeasures against E-mail Propagation of Intelligent Malware)

  • 이은섭;김영곤
    • 한국인터넷방송통신학회논문지
    • /
    • 제20권3호
    • /
    • pp.189-194
    • /
    • 2020
  • 대부분의 사이버 침해사고는 악성코드를 이용한 APT 공격들에 의해 발생하고 있다. 해커들은 공격 대상에 침투하기 위해 이메일 시스템에 메계체로 한다. 내부로 접근하기 위한 방법으로 이메일을 이용하고, 장기간에 걸쳐 수집된 취약점을 이용해 데이터베이스를 파괴하고, 시스템 운영방해 및 랜섬웨어(Ransomware)를 통해서 개인정보를 불법으로 취득하고 있다. 이처럼 이메일시스템은 가장 친근하고 편리하지만 동시에 보안의 사각지대에서 운영되고 있는 게 현실이다. 이로 인해 개인정보 유출사고가 발생한다면 기업 및 사회 전체에 큰 피해를 줄 수 있다. 이번 연구는 기업내에서 운영 중인 이메일 시스템에 대한 보안 구성을 강화하여 APT 공격으로부터 안전하게 관리하기 위한 효과적인 방법론을 제시하고자 하였다.

Vericut으로 구현한 원격 가공 시스템 (A Study on the Remote Manufacturing System for the developing of Direct Numeric Control System using the Vericut Applications)

  • 김희중;이동훈;김정욱;정재현
    • 한국마린엔지니어링학회:학술대회논문집
    • /
    • 한국마린엔지니어링학회 2002년도 춘계학술대회논문집
    • /
    • pp.205-208
    • /
    • 2002
  • The vericut is one of the best CAM application for manufacturing data verification system. It is much applied in most manufacturing company for checking the manufacturing work. Using it a off-line manufacturing system is connected for on-line working on local area network. First, we choose the serial communication to chain an off-line manufacturing system and a personal computer which link with the server running the vericut.

  • PDF

안드로이드 기반 개인간 심부름 대행 시스템 구현 (An Implementation of Personal Errands Service System based-on Android Platform)

  • 정성효
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2012년도 춘계학술발표대회
    • /
    • pp.1345-1348
    • /
    • 2012
  • 최근 대중의 생활 속에서 스마트폰 이용이 빠르게 확산되고 있고, 그로 인해 시간과 공간의 제약을 최소화 할 수 있는 다양한 어플리케이션들이 등장하고 있다. 본 논문에서는 바쁜 현대인들의 일상에서 꼭 필요한 개인 간 심부름 대행 시스템을 제안하며, 본 시스템을 이용하면 심부름을 요청 하는 사람과 대행하는 사람의 공간적 제약을 없애서 누구나가 심부름을 대행 할수있고, 요청할수 있는 심부름 장터가 될 수 있을 것으로 기대된다.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계 (A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service)

  • 송준호;최도현;박중오
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

Multifactor Authentication Using a QR Code and a One-Time Password

  • Malik, Jyoti;Girdhar, Dhiraj;Dahiya, Ratna;Sainarayanan, G.
    • Journal of Information Processing Systems
    • /
    • 제10권3호
    • /
    • pp.483-490
    • /
    • 2014
  • In today's world, communication, the sharing of information, and money transactions are all possible to conduct via the Internet, but it is important that it these things are done by the actual person. It is possible via several means that an intruder can access user information. As such, several precautionary measures have to be taken to avoid such instances. The purpose of this paper is to introduce the idea of a one-time password (OTP), which makes unauthorized access difficult for unauthorized users. A OTP can be implemented using smart cards, time-based tokens, and short message service, but hardware based methodologies require maintenance costs and can be misplaced Therefore, the quick response code technique and personal assurance message has been added along with the OTP authentication.