• 제목/요약/키워드: 사용자 모니터링

Search Result 1,135, Processing Time 0.029 seconds

Development of an Reader Framework for Transparency in RFID Reader (RFID 리더 투명성 지원을 위한 리더 프레임워크 개발)

  • Baek, Sun-Jae;Moon, Mi-Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.404-412
    • /
    • 2011
  • More recently, variety RFID (Radio Frequency Identification) readers are produced by RFID equipment manufactures. Although a transmission standard instituted by EPCglobal is proposed for data transmission between the RFID readers and tags, other RFID reader protocols and the communication connection methods are be in use in other RFID companies. To replace or add the RFID readers of an RFID system, the developers should make changes to the core of the application and/or middleware. In this paper, we propose an RFID reader framework which can manage RFID readers without having to make changes the code of the application in environment with the growing number of heterogeneous RFID readers.This framework that sits on the layer between the RFID readers and the applications provides transparency to the RFID readers. Additionally, it can be used for monitoring the state and the property of all connected RFID, and for recording the RFID tag event logs and system logs. By using this framework, heterogeneous readers can be replaced and added without writing additional code in the applications. Consequently the readers can be easily managed and controlled by the RFID system administrator.

ICT based Wireless Power Transmission System Development (ICT 기반의 무선전력전송 시스템 개발)

  • Lee, Jong-Hee;Bang, Junho;Chun, Hyun-Jun;Seo, Beom-Geun;Ryu, In-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.67-73
    • /
    • 2016
  • Recently, wireless power transmission has attracted much interest and is the subject of much research in industry and academia. As its name implies, it is a technology which involves transferring power without wires. This paper presents the design of an ICT-based wireless power transmission system. The proposed system consists of a wireless transceiver unit and high-efficiency coil unit, which can increase both the transmission efficiency and the effective power distance. In particular, the wireless transceiver unit was designed to work with the ICT technique to enable real-time remote monitoring. Also, studies were done relating to the effect of reducing the standby power. The optimal frequency of IGBT devices used in industrial wireless power systems of 20[KHz] was utilized. The values of $23.9[{\mu}H]$ and $2.64[{\mu}F]$ were selected for L and C, respectively, through many field experiments designed to optimize the system design. In addition, an output current controlling algorithm was developed for the purpose of reducing the standby power. The results presented in this paper represent a 75[%] to 85[%] higher power transmission efficiency with a 10[%] increase in the effective power transmission distance compared with the existing systems. As a result, the proposed system exhibits a lower standby power and maintenance costs. Also, the designed wireless transceiver unit facilitates fault detection by means of user acquired data with the development of the ICT applied program.

A Java Distributed Batch-processing System using Network of Workstation (워크스테이션 네트워크를 이용한 자바 분산 배치 처리 시스템)

  • Jeon, Jin-Su;Kim, Jeong-Seon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.583-594
    • /
    • 1999
  • With the advance of VLSI and network technologies, it has now become a common practice to deploy a various forms of distributed computing environments. A study shows that a lot of network-aware computers are in an idle state for considerable amount of time depending on the types of users and time frames of the day. If we can take the full advantage of those idle computers, we can obtain the enormous combined processing power without further costly investment. In this paper, we present a distributed batch-processing system, called the Java Distributed Batch-processing System (JDBS), which allows us to execute CPU-intensive, independent jobs across a pool of idle workstations on top of extant distributed computing environments. Since JDBS is implemented using a Java programming language, it not only extends the scope of machine types that can be joined to the pool, but makes it a lot easier to build an entire system. Besides, JDBS is scalable and fault-tolerant due to its multi-cluster organization and intelligent strategies. A graphical user interface is also provided to facilitate the registration and unregistration, job submission, and job monitoring.

A Process Programming Language and Its Runtime Support System for the SEED Process-centered Software Engineering Environment (SEED 프로세스 중심 소프트웨어 개발 환경을 위한 프로세스 프로그래밍 언어 및 수행지원 시스템)

  • Kim, Yeong-Gon;Choe, Hyeok-Jae;Lee, Myeong-Jun;Im, Chae-Deok;Han, U-Yong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.6
    • /
    • pp.727-737
    • /
    • 1999
  • 프로세스 중심 소프트웨어 개발 환경(PSEE : Process-centered Software Engineering Environment)은 소프트웨어 개발자를 위한 여러가지 정보의 제공과 타스크의 수행, 소프트웨어 개발 도구의 수행 및 제어, 필수적인 규칙이나 업무의 수행등과 같은 다양한 행위를 제공하는 프로세스 모형의 수행을 통하여 소프트웨어 개발 행위를 지원한다. SEED(Software Engineering Environment for Development)는 효율적인 소프트웨어 개발과 프로세스 모형의 수행을 제어하기 위해 ETRI에서 개발된 PSEE이다.본 논문에서는 SEED에서 프로세스 모형을 설계하기 위해 사용되는 SimFlex 프로세스 프로그래밍 언어와, 수행지원시스템인 SEED Engine의 구현에 대하여 기술한다. SimFlex는 간단한 언어 구조를 가진 프로세스 프로그래밍 언어이며, 적절한 적합화를 통하여 다른 PSEE에서 사용될 수 있다. SimFlex 컴파일러는 SimFlex에 의해 기술된 프로세스 모형을 분석하고, 모형의 오류를 검사하며, SEED Engine에 의해 참조되는 중간 프로세스 모형을 생성한다. 중간 프로세스 모형을 사용하여 SEED Engine은 외부 모니터링 도구와 연관하여 사용자를 위한 유용한 정보뿐만 아니라 SimFlex에 의해 기술된 프로세스 모형의 자동적인 수행을 제공한다. SimFlex 언어와 수행지원 시스템의 지원을 통하여 소프트웨어 프로세스를 모형화하는데 드는 비용과 시간을 줄일 수 있으며, 편리하게 프로젝트를 관리하여 양질의 소프트웨어 생산물을 도출할 수 있다. Abstract Process-centered Software Engineering Environments(PSEEs) support software development activities through the enaction of process models, providing a variety of activities such as supply of various information for software developers, automation of routine tasks, invocation and control of software development tools, and enforcement of mandatory rules and practices. The SEED(Software Engineering Environment for Development) system is a PSEE which was developed for effective software process development and controlling the enactment of process models by ETRI.In this paper, we describe the implementation of the SimFlex process programming language used to design process models in SEED, and its runtime support system called by SEED Engine. SimFlex is a software process programming language to describe process models with simple language constructs, and it could be embedded into other PSEEs through appropriate customization. The SimFlex compiler analyzes process models described by SimFlex, check errors in the models, and produce intermediate process models referenced by the SEED Engine. Using the intermediate process models, the SEED Engine provides automatic enactment of the process models described by SimFlex as well as useful information for agents linked to the external monitoring tool. With the help of the SimFlex language and its runtime support system, we can reduce cost and time in modeling software processes and perform convenient project management, producing well-qualified software products.

The Unified Wireless Control System for the Vibration Control of Bridge (교량의 진동제어를 위한 통합 무선제어 시스템)

  • Heo, Gwang Hee;Kim, Chung Gil;Oh, Ju Won
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.16 no.2
    • /
    • pp.65-74
    • /
    • 2012
  • This paper aimed at the development of a unified wireless control system in order to control various forms of vibration of bridges. This unified wireless control system unified all different systems each of which functioned for difference purpose such as measurement, analysis, judgement, and control of data acquired from the movement of structure. It was designed to control structures with feedback which was returned according to each different situation after analyzing various signals measured about the structure. In this system, every information in each step from measurement to control was wirelessly transmitted to its central system so that a manager was able to effectively monitor the whole process. Just for the case when any system control need to intervene occurred, a graph user interface was designed for better access. In order to evaluate its basic performance, an experiment was carried out to see how signal input and output were done by comparing its results with those of a wired system. On the basis of the experiment, a vibration control experiment was performed on a model of cable-stayed bridge to see if the unified wireless control system worked well in realtime. This was carried out under four conditions, and the graph and quantitative result under each condition were compared each other. All experiments proved that the unified wireless control system functioned as well as the wired one in terms of its basic performance and vibration control.

A Study on the Measurement Method of Cold Chain Service Quality Using Smart Contract of Blockchain (블록체인의 스마트계약을 이용한 콜드체인 서비스 품질 측정 방안에 대한 연구)

  • Kim, ChangHyun;Shin, KwangSup
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.1-18
    • /
    • 2019
  • Due to the great advances in e-Marketplace and changes in type of items purchased from the online market, it has been dramatically increased the demand of the storage and transportation under the special conditions such as restricted temperature. Especially, the cold chain needs the way to transparently measure and monitor the entire network in realtime because it has a very complicated structure and requires totally different criteria at the every different steps and items. In this research, it has been presented the performance evaluation metrics to make contract using service level agreement (SLA), the way to apply the smart contract based on blockchain, the structure of blocks, service platform and application in order to build cold chain which can prevent the risk factors by measuring and sharing information in realtime using block chain technology. In addition, we have proposed the way to store the measured performance and reputation of each player in the block using smart contract based on SLA. With the presented framework, all players including service providers as well as users can secure the information for making the rational decisions. When the service platform is actually built and operated, it seems possible to secure the information in transparently and realtime. Also, it is possible to prevent the risk factors or prepare the preemptive plans to react on them.

A Secure and Lightweight Authentication Scheme for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 안전하고 경량화 된 인증기법)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.77-83
    • /
    • 2019
  • With the increase in population, the number of such senior citizens is increasing day by day. These senior citizens have a variety of care needs, but there are not enough health workers to look after them. Ambient Assisted Living (AAL) aims at ensuring the safety and health quality of the older adults and extending the number of years the senior citizens can live independently in an environment of their own preference. AAL provides a system comprising of smart devices, medical sensors, wireless networks, computer and software applications for healthcare monitoring. AAL can be used for various purposes like preventing, curing, and improving wellness and health conditions of older adults. While information security and privacy are critical to providing assurance that users of AAL systems are protected, few studies take into account this feature. In this paper, we propose a secure and lightweight authentication scheme for the AAL systems. The proposed authentication scheme not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. Also, the security analysis results are presented to show the proposed authentication scheme is more secure and efficient rather than existing authentication schemes.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

A Study on the Smart Elderly Support System in response to the New Virus Disease (신종 바이러스에 대응하는 스마트 고령자지원 시스템의 연구)

  • Myeon-Gyun Cho
    • Journal of Industrial Convergence
    • /
    • v.21 no.1
    • /
    • pp.175-185
    • /
    • 2023
  • Recently, novel viral infections such as COVID-19 have spread and pose a serious public health problem. In particular, these diseases have a fatal effect on the elderly, threatening life and causing serious social and economic losses. Accordingly, applications such as telemedicine, healthcare, and disease prevention using the Internet of Things (IoT) and artificial intelligence (AI) have been introduced in many industries to improve disease detection, monitoring, and quarantine performance. However, since existing technologies are not applied quickly and comprehensively to the sudden emergence of infectious diseases, they have not been able to prevent large-scale infection and the nationwide spread of infectious diseases in society. Therefore, in this paper, we try to predict the spread of infection by collecting various infection information with regional limitations through a virus disease information collector and performing AI analysis and severity matching through an AI broker. Finally, through the Korea Centers for Disease Control and Prevention, danger alerts are issued to the elderly, messages are sent to block the spread, and information on evacuation from infected areas is quickly provided. A realistic elderly support system compares the location information of the elderly with the information of the infected area and provides an intuitive danger area (infected area) avoidance function with an augmented reality-based smartphone application. When the elderly visit an infected area is confirmed, quarantine management services are provided automatically. In the future, the proposed system can be used as a method of preventing a crushing accident due to sudden crowd concentration in advance by identifying the location-based user density.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.