• Title/Summary/Keyword: 영역서버

Search Result 382, Processing Time 0.022 seconds

Implementation of Telepathology System Based on Internet (인터넷 기반에서의 원격병리진단 시스템의 구현)

  • 손병환;이병일;최흥국;남상희
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.208-211
    • /
    • 2001
  • 최근 병원에서의 전산화가 급속도로 이루어지고 있는 가운데 각종 병리 영상을 이용한 원격 병리 진단 시스템의 필요성이 높아지고 있다. 본 논문에서는 병리분석을 위해 병리 영상을 인터넷 환경에서 Component기반으로 진단 보조하는 원격병리진단 시스템을 구현하였다. 서버의 부하를 줄이기 위해서 병리 진단에 필요한 영상처리 영역은 Component 내에서 처리되도록 하였다. 서버에서는 database에 대한 접근과 처리된 영상의 전송/채팅을 담당하도록 하였다. 원거리에 있는 병리학자들이 병리 세포조직 영상으로 상호 의전교환 및 영상 송수신, 영상처리를 통해 정확한 병리 진단을 할 수 있도록 도와주는 본 시스템은 시간과 공간의 한계를 극복하여 병리학자들의 진단 효율성을 높이게 될 것으로 기대한다.

  • PDF

An Implementation of Mobile Business Application Server (모바일 비즈니스 응용서버의 개발)

  • 장철수;노명찬;김수형;박중기;김중배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.718-720
    • /
    • 2004
  • 이동통신 기술의 발전에 힘입어 비교적 넓은 대역폭을 갖는 핸드폰/PDA 등과 같은 모바일 단말기들이 광범위하게 보급되고 활용되고 있다. 이를 바탕으로 새로운 형태의 모바일 서비스가 등장하고 있으며, 증가하는 무선인터넷 서비스 업체와 무선영역으로 비즈니스를 확장하고자 하는 인터넷 서비스 업체에게 서비스 컴포넌트의 신속한 개발/테스트/배포 및 유지보수 비용을 최적화할 수 있는 미들웨어 기술이 절대적으로 요구되는 상황이다. 본 논문은 모바일 환경에 적응된 새로운 모바일 응용 서비스를 제공할 수 있도록 개발된 모바일 비즈니스 응용서버 시스템에 대해 설명하고자 한다.

  • PDF

A Study on AOI for Massively Multiplayer Online Role-Playing Games (대용량 롤-플레잉 게임을 위한 AOI에 관한 연구)

  • Jeon, Il-Gon;Oh, Sam-Kweon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.135-138
    • /
    • 2004
  • MMORPG(Massively Multiplayer Online Role Playing Game)에서의 게임 서버는 모든 플레이어에게 게임 정보(오브젝트, NPC, 이벤트, 다른 플레이어들의 정보 등)를 실시간으로 전송해야 한다. 그러나, MMORPG에 참여하는 플레이어의 증가로 인해 전송되는 정보의 양이 많아지면 네트워크 전송 지연과 서버의 부담으로 인해 플레이어들간 정보 전송의 문제가 발생한다. 이를 해결하기 위해 본 논문에서는 AOI(Area Of Interest, 관심영역)를 이용하여 자원 이동 및 동기화를 효율적으로 관리할 수 있는 구성요소들과 적용방안을 제시한다.

  • PDF

A Technique Getting Fast Masks Using Rough Division in Dynamic ROI Coding of JPEG2000 (JPEG2000의 동적 ROI 코딩에서 개략적인 분할을 이용한 빠른 마스크 생성 기법)

  • Park, Jae-Heung;Lee, Jum-Sook;Seo, Yeong-Geon;Hong, Do-Soon;Kim, Hyun-Joo
    • The KIPS Transactions:PartB
    • /
    • v.17B no.6
    • /
    • pp.421-428
    • /
    • 2010
  • It takes a long time for the users to view a whole image from the image server under the low-bandwidth internet environments or in case of a big sized image. In this case, as there needs a technique that preferentially transfers a part of image, JPEG2000 offers a ROI(Region-of-Interest) coding. In ROI coding, the users see the thumbnail of image from the server and specifies some regions that they want to see first. And then if an information about the regions are informed to the server, the server preferentially transfers the regions of the image. The existing methods requested a huge time to compute the mask information, but this thesis approximately computes the regions and reduces the creating time of the ROI masks. If each code block is a mixed block which ROI and background are mixed, the proper boundary points should be acquired. Searching the edges of the block, getting the two points on the edge, to get the boundary point inside the code block, the method searches a mid point between the two edge points. The proposed method doesn't have a big difference compared to the existing methods in quality, but the processing time is more speedy than the ones.

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

Continuous Discovery of Dense Regions in the Database of Moving Objects (이동객체 데이터베이스에서의 밀집 영역 연속 탐색)

  • Lee, Young-Koo;Kim, Won-Young
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.115-131
    • /
    • 2008
  • Small mobile devices have become commonplace in our everyday life, from cellular phones to PDAs. Discovering dense regions for the mobile devices is one of the problems of grate practical importance. It can be used in monitoring movement of vehicles, concentration of troops, etc. In this paper, we propose a novel algorithm on continuously clustering a large set of mobile objects. We assume that a mobile object reports its position only if it is too far away from the expected position and thus the location data received may be imprecise. To compute the location of each individual object could be costly especially when the number of objects is large. To reduce the complexity of the computation, we want to first cluster objects that are in proximity into a group and treat the members in a group indistinguishable. Each individual object will be examined only when the inaccuracy causes ambiguity in the final results. We conduct extensive experiments on various data sets and analyze the sensitivity and scalability of our algorithms.

  • PDF

The Design of Proxy for CORBA Traffic Monitoring Using OSI management technology (OSI 관리 기술을 이용한 CORBA 트래픽 모니터링 프록시 설계)

  • 박재성;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.355-362
    • /
    • 1999
  • Traffic monitoring, a part of the system management, is a vital function lot the proper operation of a system in use. Currently OMG has been trying to standardize CORBA system management. Besides, many companies and research laboratories have been developing and studying CORBA system management. In this paper, we have designed the proxy to monitor the CORBA traffic using the OSI management technology. To manage CORBA traffic resources, 6 parameters have been made into managed objects. The monitoring system consists of a CORBA server, a proxy object and an MIB. The CORBA server is made up of a service provider, a proxy server, and a event sewer. The proxy object acts as a process of a CORBA object, and is made up of a proxy client, a event client, and an IPC server.

  • PDF

A Design of Naming and Directory Management for EJB Container (EJB 서버 시스템의 네미밍 관리 시스템 설계)

  • Kim, Sung-Hoon;Jang, Choul-Soo;Roh, Myung-Chan;Seo, Beom-Su;Ham, Ho-Sang;Kim, Jung-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.401-404
    • /
    • 2002
  • EJB 는 분산 트랜잭션 기반의 엔터프라이즈 어플리케이션을 위한 컴포넌트 컴퓨팅을 위한 아키텍처이다. EJB 는 J2EE 플랫폼을 위한 서버 측 컴포넌트 아키텍처이며, J2EE 플랫폼의 재사용 가능하고 J2EE 기술 중에서 다중 플랫폼 또는 다중 서버에 이식 가능한 비즈니스 로직을 표현하는 코어 기술이다. EJB 기술을 사용하게 되면 응용 로직 개발자들은 시스템 영역의 서비스들 즉, 트랜잭션, 보안, 생명주기, 쓰레딩, 영속성_등의 기능을 직접 구현하지 않고 손쉽게 응용 로직을 개발할 수 있다. 본 논문에서는 J2EE 의 핵심 서버인 EJB 서버 시스템의 설계 사상과 네이밍 및 디렉토리 관리 모듈에 대한 구체적인 설계 방안을 제시한다.

  • PDF

A Cache Management Technique for an Efficient Video Proxy Server (효율적인 비디오 프록시 서버를 위한 캐시 관리 방법)

  • Lee, Jun-Pyo;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.82-88
    • /
    • 2009
  • Video proxy server which is located near clients can store the frequently requested video data in storage space in order to minimize initial latency and network traffic significantly. However, due to the limited storage space in video proxy server, an appropriate video selection method is needed to store the videos which are frequently requested by users. Thus, we present a virtual caching technique to efficiently store the video in video proxy server. For this purpose, we employ a virtual memory in video poky server. If the video is requested by user, it is loaded in virtual memory first and then, delivered to the user. A video which is loaded in virtual memory is deleted or moved into the storage space of video poxy sewer depending on the request condition. In addition, virtual memory is divided into each segment area in order to store the segments efficiently and to avoid the fragmentation. The simulation results show that the proposed method performs better than other methods in terms of the block hit rate and the number of block deletion.

Performance Evaluation of Web Image Server for sharing e-Commerce System's Image (전자 상거래의 이미지 공유를 위한 웹 이미지 서버의 성능 평가)

  • Kim, Myoung-Eun;Cho, Dong-Sub
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.533-540
    • /
    • 2002
  • We can buy products everywhere from Web-based shopping mall using desktop, cellular phone or PDA. To guarantee the various services for different equipment, shopping mail systems should allow a lot of different size or quality of images to provide a good service to their customers. Despite of same product image, each shopping mall saves the image in its storage space individually. Furthermore, all the product images in each shopping mall are stored as images of different quality. It may waste resources of shopping mail server and bring us developmental overhead. It is difficult to update all the images for product that is used by distributed e-catalog in everywhere. In this paper, we extended the proposed Web Image Server (WIS) for sharing one image with all clients and processing Image dynamically, so that we strengthened the function of managing shopping mall as a client of WIS and added the function of recording clients'log file and image catalog for shopping mall. We measured the response time from WIS and conventional e-Commerce site using by WAS which is one of the stress test tools for Web application. Furthermore, we measured WIS responses image requests in reasonable time when the current user is increased.