• Title/Summary/Keyword: 인터넷 모니터링

Search Result 897, Processing Time 0.034 seconds

Implementaion of Home Healthcare System for a Patient using SAW Tag (SAW 태그를 이용한 재택환자 종합관리시스템 구현)

  • Song, Jai-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.183-188
    • /
    • 2017
  • This paper is for the a study on home healthcare system for a patient using SAW Tag. This system is useful when there's a patient in home. Many patients are wounded in restroom. But restroom is very private place and nobody want to be disturbed here. The place where the patient is most injured in the house is the toilet, and it is the point where the privacy of the individual should be kept and the patient's condition should be checked and cope with in case of emergency. And using saw tag, we can calculate position and ID through reflected rf signal. Therefore we propose a general home healthcare system. The management system utilized a seat bed system to monitor at-home patients. The system mounts a bio-signal measuring unit on a toilet seat, measures a bio-signal from the bio-signal measuring unit, and the measured bio-signal is transmitted to the main server through the user's smart phone. With proposed system, we can expand operation area to silver town where many patients are cared. In this paper we developed sensor system and saw tag positioning system and showed the result.

A USN Based Mobile Object Tracking System for the Prevention of Missing Child (미아방지를 위한 USN 기반 보호대상 이동체 위치확인 시스템)

  • Cha, Maeng-Q;Jung, Dae-Kyo;Kim, Yoon-Kee;Chong, Hak-Jin
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.453-463
    • /
    • 2008
  • The missing child problem is no more a personal problem. It became a social problem that all parents must consider. To this, this study applies USN/RFID technology integrated with GIS for the prevention of missing child. Although RFID is not designed for location sensing, but now it is regarded as a device to facilitate real time location awareness. Such advantages of RFID can be integrated with 4S(GIS/GPS/LBS/GNSS) achieving much synergy effects. In order to prevent kidnapping and missing child, it is necessary to provide a missing child preventing system using a ubiquitous computing system. Therefore, the missing child preventing system has been developed using high-tech such as RFID, GPS network, CCTV, and mobile communication. The effectiveness of the missing child prevention system can be improved through an accurate location tracking technology. This study propose and test a location sensing system using the active RFID tags. This study verifies technical applied service, and presents a system configuration model. Finally, this paper confirms missing child prevention system utilization possibility.

An Analysis on the Change of Usage Behavior for Bundle Services in Korean Telecommunication Market (방송통신 결합상품서비스 이용행태 변화 분석 연구)

  • Yu, Jieun;Lee, Seong-Jun;Cho, Chanwoo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.204-215
    • /
    • 2020
  • We analyze changes of consumption behavior for bundle services for the latest three years focusing on comparing the detailed service types and service providers to understand competition structure in the market. Our major findings and implications are as follows. First, the mobile telecommunication service is certainly deemed to be a major selection criteria for bundling service provider, therefore the leading company in the mobile telecommunication has become more significant market power. Second, IPTV has an important influence for slection of bundling service provider, lately in some cases, rather than broadband Internet. Third, the individual services affecting the selection of bundling service providers clearly showed differentiation among three operators as a mobile telecommunication service of SK Group, a broadband Internet of KT, and an IPTV of LGU+. In addition, the importance of individual services in securing subscribers has been increased as the preference factors to switch a service provider were synchronized with the decision of major bundling service provider. Finally, although it is difficult to find customers' lock-In due to the latest change of their intentions to switch a provider, we find it is continuously necessary to monitor customers' lock-in as there are more long-term customers with re-contracts. Our results provide the policy implications based on the change of competition structure and usage behavior in the bundle market which is not evaluated the competiton situation.

Development on Real Time Application System for Fisheries Oceanography Information (실시간 어장정보 생산 부이시스템 개발 및 활용연구)

  • Lee, Chu;Suh, Young-Sang;Hwang, Jae-Dong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.3
    • /
    • pp.142-149
    • /
    • 2005
  • To provide observed oceanography data at coastal fish and shellfish farm in the northeastern sea of the Korean peninsula on real time base, we developed real time application system for fisheries oceanography information. The system has been made up a mooring buoy system, a server for oceanography data collection, a server for archiving data and a database system, and a web server for providing fisheries oceanography information using internet. Futhermore, to support letters service on a cellular phone, we developed the communication system from mooring buoy to cell phone on real time base. The oceanography data derived from the system are water temperature speed and direction of current in surface layer middle layer and bottom layer in hour. We were able to quantify short term variation of ocean conditions within several days at shellfish farm such as a scallop sea farm using our system. To reduce damages of fish and shellfish farm from abnormal phenomena of ocean conditions such as a broken stratification of water, an occurrence of abnormal coastal cold water and warm water we will be able to move vertically and horizontally the sea farm facilities to proper conditions using real time oceanography information derive from the system.

  • PDF

Transition of Service Paradigm from Service Recovery to Proactive Service (사후 서비스에서 선제적 서비스로 서비스 패러다임의 전환)

  • Rhee, Hyunjung;Kim, Hyangmi;Rhee, Chang Seop
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.396-405
    • /
    • 2020
  • In this study, we used the big data of Voice of Customer (VOC) related to high-speed Internet products to look at the causes of perceived quality and the possibility of proactive service. In order to verify the possibility of proactive service, we collected VOC data from 13 facilities and equipment of a mobile communication service company, and then conducted 𝒙2 test to verify that there was a statistically significant difference between the actual VOC observation values and expected values. We found statistical evidence that proactive service is possible through real-time monitoring for the six disability alarms among the 13 facilities and equipment, which are FTTH-R Equipment ON/OFF, FTTH-EV Line Error Detection, Port Faulty, FTTH-R Line Error Detection, Network Loop Detection, and Abnormal Limiting Traffic. Companies are able to adopt the proactive service to improve their market share and to reduce customer service costs. The results of this study are expected to contribute to the actual application of industry in that it has diagnosed the possibility of proactive service in the telecommunication service sector and further suggested suggestions on how to provide effective proactive service.

A Study on Complexity Analysis of Extensible Profile Verification Software for Energy Storage System (에너지저장장치용 확장성 프로파일 검증 소프트웨어 복잡도 분석에 관한 연구)

  • Kwon, Hyeokyoung;Ryu, Youngsu;Park, Jaehong;Kwon, Kiwon
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.59-65
    • /
    • 2016
  • Recently, a study has been progressed about the energy storage system for resolving energy shortage problems in the world. The energy storage system can maximize energy storage system's energy usage by monitoring and controlling about all energy infrastructures on energy network. However, compatibility problems among main components or devices of the energy storage system are obstacles to development of energy storage system products. An extensible profile and extensible profile verification software being able to verify the extensible profile have been required in order to resolve compatibility problems. In this paper, the study on complexity analysis for the extensible profile verification software for the energy storage system is performed. A XML based profile and C language structure based profile are used for analysis of the profile verification software. The complexity of complex verification structure that parses the XML based profile several times and simple verification structure that parses the C language structure based profile are analyzed and compared. Time complexity, space complexity, and cyclomatic complexity are used for complexity analysis. By using these complexity analysis, the study result that compares and analyzes the complexity of XML based and C language structure based profile verification software is presented.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Development of a Face Detection and Recognition System Using a RaspberryPi (라즈베리파이를 이용한 얼굴검출 및 인식 시스템 개발)

  • Kim, Kang-Chul;Wei, Hai-tong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.859-864
    • /
    • 2017
  • IoT is a new emerging technology to lead the $4^{th}$ industry renovation and has been widely used in industry and home to increase the quality of human being. In this paper, IoT based face detection and recognition system for a smart elevator is developed. Haar cascade classifier is used in a face detection system and a proposed PCA algorithm written in Python in the face recognition system is implemented to reduce the execution time and calculates the eigenfaces. SVM or Euclidean metric is used to recognize the faces detected in the face detection system. The proposed system runs on RaspberryPi 3. 200 sample images in ORL face database are used for training and 200 samples for testing. The simulation results show that the recognition rate is over 93% for PP+EU and over 96% for PP+SVM. The execution times of the proposed PCA and the conventional PCA are 0.11sec and 1.1sec respectively, so the proposed PCA is much faster than the conventional one. The proposed system can be suitable for an elevator monitoring system, real time home security system, etc.

A Design of Integrated Scientific Workflow Execution Environment for A Computational Scientific Application (계산 과학 응용을 위한 과학 워크플로우 통합 수행 환경 설계)

  • Kim, Seo-Young;Yoon, Kyoung-A;Kim, Yoon-Hee
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.37-44
    • /
    • 2012
  • Numerous scientists who are engaged in compute-intensive researches require more computing facilities than before, while the computing resource and techniques are increasingly becoming more advanced. For this reason, many works for e-Science environment have been actively invested and established around the world, but still the scientists look for an intuitive experimental environment, which is guaranteed the improved environmental facilities without additional configurations or installations. In this paper, we present an integrated scientific workflow execution environment for Scientific applications supporting workflow design with high performance computing infrastructure and accessibility for web browser. This portal supports automated consecutive execution of computation jobs in order of the form defined by workflow design tool and execution service concerning characteristics of each job to batch over distributed grid resources. Workflow editor of the portal presents a high-level frontend and easy-to-use interface with monitoring service, which shows the status of workflow execution in real time so that user can check the intermediate data during experiments. Therefore, the scientists can take advantages of the environment to improve the productivity of study based on HTC.

Development of GML Map Visualization Service and POI Management Tool using Tagging (GML 지도 가시화 서비스 및 태깅을 이용한 POI 관리 도구 개발)

  • Park, Yong-Jin;Song, Eun-Ha;Jeong, Young-Sik
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.141-158
    • /
    • 2008
  • In this paper, we developed the GML Map Server which visualized the map based on GML as international standard for exchanging the common format map and for interoperability of GIS information. And also, it should transmit effectively GML map into the mobile device by using dynamic map partition and caching. It manages a partition based on the visualization area of a mobile device in order to visualize the map to a mobile device in real time, and transmits the partition area by serializing it for the benefit of transmission. Also, the received partition area is compounded in a mobile device and is visualized by being partitioned again as four visible areas based on the display of a mobile device. Then, the area is managed by applying a caching algorithm in consideration of repetitiveness for a received map for the efficient operation of resources. Also, in order to prevent the delay in transmission time as regards the instance density area of the map, an adaptive map partition mechanism is proposed for maintaining the regularity of transmission time. GML Map Server can trace the position of mobile device with WIPI environment in this paper. The field emulator can be created mobile devices and mobile devices be moved and traced it's position instead of real-world. And we developed POIM(POI Management) for management hierarchically POI information and for the efficiency POI search by using the individual tagging technology with visual interface.

  • PDF