• Title/Summary/Keyword: personal computer communication

Search Result 479, Processing Time 0.032 seconds

A Development of Modular Monitoring System for Wind Turbine Test Site (풍력 실증단지를 위한 분산 형 모니터링 시스템 개발)

  • Lee Jeong Wan;Yoo Neung Soo;Nam Yoon Su;Cho Byung Ha
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.9-12
    • /
    • 2005
  • In this paper. we offer a new monitoring system that controls all of the windfar. it can also apply use general wind turbine systems and real meteorological tower. We propose a hierarchical releiable monitoring system connected by wireless communication channels between monitoring host computer and modular slave measuring subsystems. Our system has two hierarchical subsystems: slave measuring systems, and supervisory host computer. We design and implement that the slave measuring subsystems is placed in meteorological tower and wind turbines, and the supervisory host computer in safety zone, The micro-controller in slave measuring system is duplicated using cold-standby method for reliability. The host computer and slave system constructs a feedback system, with wireless communication channel between them. For monitoring and command function, the supervisory computer is implemented with a Personal Computer using graphic user interface. Consequently. we can get a reliable but economic system.

  • PDF

A Study on Open of Information Data and Privacy Rights

  • Kim, Taek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.11
    • /
    • pp.73-78
    • /
    • 2016
  • All citizens will not be infringed communications rub. That can be seen to have the privacy freedom.lot (Internet of things) have released a security system in the era of information privacy appear that public safety and threat. Currently, Information and communication devices can be use criminal investigation, including search and seizure confirmed the fact communication of the communication restriction information storage medium for the common purpose of providing material system, the system provides data and communications. This paper focused on Privacy and open of information data by the Prosecutor and Police in korea. Privacy rights include that transparency information, communication, and protections for the rights of the individuals. It is necessary to be lawfulness of processing, individuals consent while Prosecutors investigations. especially we need explicit condition and National agency need to obtain in order to legitimize their processing of personal information data. The author emphasize are as follows: first, to examine Privacy rights information' necessity and problem, second, to understand Privacy rights and limits, third, to suggest improvements for the purpose of Transparency, codes of conduct and Democracy of information.

A Study on Analysis and Countermeasure of Security threat in NFC (NFC 서비스 보안 위협 분석 및 대응방안 연구)

  • Kim, Hyung-Uk;Kim, Hyung-joo;Kang, Jung-ho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.183-191
    • /
    • 2016
  • Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.

A new password authentication scheme using two-way password in Smartphone Banking (이중 패스워드 방식을 이용한 스마트폰 뱅킹 관리)

  • Song, Jong-Gun;Kim, Tae-Yong;Lee, Hoon-Jae;Jang, Won-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.195-200
    • /
    • 2012
  • Smart Phone devices offer convenience for users, but present a new set of security issues due to loss or malicious code. In this paper, a mobile cloud system environment is used with existing smart phones in an attempt to solve the problems in a banking environment. In order to prevent financial damages due to loss or personal information leakage by malicious code, a mobile cloud computing service that provides control and protection of personal information in environment that ensures individual authentication is used. Existing ID / Password with certificate, with the way smart phone dual password authentication scheme using the gyro sensors proposed.

Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

  • Osman Goni;Md. Abu Shameem
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.141-146
    • /
    • 2024
  • A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

A Study on The Personal Wallet Management System Using Beacon Signal Processing (비콘 신호 처리를 활용한 개인소지품 지갑 관리 시스템에 대한 연구)

  • Kim, Dong-Ik;Nam, Kang-Hyun;Lee, Hyeon-Yeong;Ahn, Tae-Uk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1109-1116
    • /
    • 2018
  • The purpose of this study is to solve the loss of personal belongings by utilizing monitoring function of IoT platform. The beacon to combined with personal belongings are registered with the application server, the trigger processing function according to the occurrence of the lost event is performed intelligently through the device, the app, the IoT network, and the application server.

The Analysis on the Psychological Traits of the Usage Pattern on the Online Communication Media (온라인 커뮤니케이션 매체 이용패턴의 심리적 특성 분석)

  • 조남재;박상혁
    • Journal of Information Technology Application
    • /
    • v.3 no.4
    • /
    • pp.93-117
    • /
    • 2001
  • Computer-based on-line communications help to exchange easily information for us. For this reason, on-line communication expands personal computer users'information availability and furnishes users with interactive communication capability. This research focused on the pattern the use of on-line communication and such individual-level factors that are believed to affect on the use of this technology as personal psychological traits and perceived usefulness of the technology. Data were collected from randomly selected samples out of registered college or office worker members of Korean on-line communication services such HiTel, Chollian, Nownuri, and Unitel. The result of the study showed that perceived usefulness of the on-line services affects the level of use most strongly. Individual psychological style was also related to some aspects of the use of on-line communication. Specifically, the more introvert the users, the higher was the level of use of on-line communication.

  • PDF

Research on Framework and Inspection Method to Strengthen Personal Information Protection of Trustees (수탁사 개인정보보호 강화를 위한 프레임워크 및 점검방법 연구)

  • Yurim Bak;Yongtae Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.329-336
    • /
    • 2023
  • This paper analyzes the Personal Information Protection Act and related legal guides revised in 2023, proposes a framework for a consignment contract through the items necessary in the consignment relationship for personal information work, and inspects the status of personal information protection for consignees that are absent in Korea. By proposing common items that must be included, we prevent the occurrence of personal information leakage incidents by strengthening the basic personal information protection capabilities of trustees handling personal information work and alleviating the burden of essential personal information protection inspections. I want to do it.

Implementation of anti-screen capture modules for privacy protection (개인 정보 보호를 위한 화면 캡쳐 방지 모듈 구현)

  • Lee, Jong-Hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.91-96
    • /
    • 2014
  • According to the spread of computers and the development of the information society, people are focused on privacy information. As the development of its associated policy and technology, it has been tried various attempts to protect their personal information. In this paper, we proposed anti-screen capture modules to protect personal information or a company's confidential information for agencies and departments that keeps top security. As a result, we can prevent an illegal use or a stealing of another person's information in a public agency or personal computer. Also modules can stop exposures of top security data and personal information during they communicate with others in their institution's sever system.

Development of Emotion Inference Application with Location Information and User's Heartbeat Rate (심박 정보 기반 위치 정보 융합형 감정 추론 어플리케이션 개발)

  • Cha, Kyung-Ae;Choi, Hyun-Su;Hong, Won-Kee;Park, Se Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.8
    • /
    • pp.83-88
    • /
    • 2017
  • The personal activity information is expanding as a way to utilize wearable devices that are emerging as next generation smart devices. This paper develops an application for collecting heartbeat rate and location information of a user using SmartWatch, which is a smartphone and wearable device, and analyzing it through machine learning to infer user's emotion information. By using smart phone and smart watch, developed application can collect biometric data and location information by simply executing application and doing everyday life. In addition, adding the location information to the hearbit rate data, it proves higher utilization than existing ones.