• Title/Summary/Keyword: Access Monitoring System

Search Result 396, Processing Time 0.031 seconds

Business Collaborative System Based on Social Network Using MOXMDR-DAI+

  • Lee, Jong-Sub;Moon, Seok-Jae
    • International Journal of Advanced Culture Technology
    • /
    • 제8권3호
    • /
    • pp.223-230
    • /
    • 2020
  • Companies have made an investment of cost and time to optimize processing of a new business model in a cloud environment, applying collaboration technology utilizing business processes in a social network. The collaborative processing method changed from traditional BPM to the cloud and a mobile cloud environment. We proposed a collaborative system for operating processes in social networks using MOXMDR-DAI+ (eXtended Metadata Registry-Data Access & Integration based multimedia ontology). The system operating cloud-based collaborative processes in application of MOXMDR-DAI+, which was suitable for data interoperation. MOXMDR-DAI+ applied to this system was an agent effectively supporting access and integration between multimedia content metadata schema and instance, which were necessary for data interoperation, of individual local system in the cloud environment, operating collaborative processes in the social network. In operating the social network-based collaborative processes, there occurred heterogeneousness such as schema structure and semantic collision due to queries in the processes and unit conversion between instances. It aimed to solve the occurrence of heterogeneousness in the process of metadata mapping using MOXMDR-DAI+ in the system. The system proposed in this study can visualize business processes. And it makes it easier to operate the collaboration process through mobile support. Real-time status monitoring of the operation process is possible through the dashboard, and it is possible to perform a collaborative process through expert search using a community in a social network environment.

오픈 소스 환경의 노천광산 모니터링시스템 개발을 위한 데이터베이스 고도화 방안 (Database Enhancement for Development of Open-pit Mine Monitoring System in Open Source Environments)

  • 김세열;유지호;유영걸;이현직
    • 한국측량학회지
    • /
    • 제34권1호
    • /
    • pp.21-32
    • /
    • 2016
  • 노천광산(open-pit mine)은 자원의 확보차원에서 매우 중요한 기반시설이지만 운영과정에서 지형 및 환경변화나 안전 문제 등이 발생되기 때문에 지속적인 모니터링이 요구되고 있다. 그러나 국내 노천광산에서 개발 및 복원에 따른 지형 변화에 대한 현황 자료는 수치지형도와 현장측량 성과에 의존하여 전문가 이외에는 노천광산의 변화에 대한 정보를 용이하게 확인할 수 없다. 이에 노천광산에 대한 효율적인 관리 및 일반인의 접근이 원활하게 노천광산을 대상으로 오픈소스 공간정보 소프트웨어를 활용한 웹기반 3차원 모니터링시스템을 구축하여, 일반인들도 쉽게 광산의 운영에 따른 지형 및 환경변화 등을 모니터링하고 친환경 생태학적 개발 및 복원을 지원하는 노천광산모니터링시스템을 개발하고자 한다.

Kinect V2를 이용한 모바일 장치 실시간 알림 모니터링 시스템 (Real-time monitoring system with Kinect v2 using notifications on mobile devices)

  • 니욘사바 에릭;장종욱
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.277-280
    • /
    • 2016
  • 실시간 원격 감지 시스템은 많은 감시 상황에서 중요한 가치를 지니고 있다. 실시간 원격 감지 시스템은 누군가가 그의 장소에서 무슨 일이 일어나고 있는지를 알 수 있게 한다. Kinect의 V2는 컴퓨터에게 눈의 역할을 제공하며 컬러와 깊이 이미지, 오디오 입력과 골격 데이터 등 다양한 데이터를 생성 할 수 있는 새로운 유형의 카메라이다. 본 논문에서는 깊이 이미지와 함께 Kinect V2의 센서를 사용하여, Kinect에 의해 덮인 공간에서의 모니터링 시스템을 제공한다. 따라서 Kinect 카메라에 의해 덮인 공간에 기초하여, 최소 및 최대 거리를 설정함으로써, 깊이의 범위를 이용하여 감시하는 대상 지역을 정의한다. 대상 공간에서 추적 개체가 있는 경우, 컴퓨터 비전 라이브러리(Emgu CV)에서 Kinect 카메라는 이미지 전체의 색상을 캡처하고, 이를 데이터베이스로 전송함으로써 인터넷이 있으면 어디서나 사용자가 자신의 모바일 장치를 통해 접속할 수 있다.

  • PDF

The development of a ship's network monitoring system using SNMP based on standard IEC 61162-460

  • Wu, Zu-Xin;Rind, Sobia;Yu, Yung-Ho;Cho, Seok-Je
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제40권10호
    • /
    • pp.906-915
    • /
    • 2016
  • In this study, a network monitoring system, including a secure 460-Network and a 460-Gateway, is designed and developed according with the requirements of the IEC (International Electro-Technical Commission) 61162-460 network standard for the safety and security of networks on board ships. At present, internal or external unauthorized access to or malicious attack on a ship's on board systems are possible threats to the safe operation of a ship's network. To secure the ship's network, a 460-Network was designed and implemented by using a 460-Switch, 460-Nodes, and a 460-Gateway that contains firewalls and a DMZ (Demilitarized Zone) with various application servers. In addition, a 460-firewall was used to block all traffic from unauthorized networks. 460-NMS (Network Monitoring System) is a network-monitoring software application that was developed by using an simple network management protocol (SNMP) SharpNet library with the .Net 4.5 framework and a backhand SQLite database management system, which is used to manage network information. 460-NMS receives network information from a 460-Switch by utilizing SNMP, SNMP Trap, and Syslog. 460-NMS monitors the 460-Network load, traffic flow, current network status, network failure, and unknown devices connected to the network. It notifies the network administrator via alarms, notifications, or warnings in case any network problem occurs. Once developed, 460-NMS was tested both in a laboratory environment and for a real ship network that had been installed by the manufacturer and was confirmed to comply with the IEC 61162-460 requirements. Network safety and security issues onboard ships could be solved by designing a secure 460-Network along with a 460-Gateway and by constantly monitoring the 460-Network according to the requirements of the IEC 61162-460 network standard.

Selection of a Competent Wireless Access Point for High Wireless Bandwidth

  • Park, Ji-Yeon;Hwang, Ki-Tae
    • Journal of Information Processing Systems
    • /
    • 제2권3호
    • /
    • pp.159-162
    • /
    • 2006
  • Wireless LANs are becoming more widespread because of the rapid advance of wireless technologies and mobile computers. In this paper, we present the design and implementation of a system to help mobile users to select the most competent AP. By monitoring the network traffic of APs within the local LAN in real time, this system offers the mobile user the network utilizations, locations, and signal strengths of APs online. Based on the information, the user can select a competent AP with a high wireless bandwidth. Finally, we verified the accuracy of monitoring and calculating with regard to the utilizations of APs through real experiments.

Knowledge-Based Control via the Internet

  • Tang, Kok-Zuea;Goh, Han-Leong;Tan, Kok-Kiong;Lee, Tong-Heng
    • International Journal of Control, Automation, and Systems
    • /
    • 제2권2호
    • /
    • pp.207-219
    • /
    • 2004
  • This paper presents the development of a knowledge-based control system operating via the Internet. With the synergy provided by the Internet, the central expert controller with its knowledge-base has the potential to serve a multitude of front-end clients located anywhere in the world provided they have Internet access. In this way, the operational span of the knowledge-based control system can be expanded to virtually anyplace within the reach of the Internet. This configuration has positive implications in improving the efficiency of distributed operations, thereby enabling plantwide optimization and costs savings. Datasocket technology is adopted to facilitate a more efficient data exchange between the knowledge-based central server and the front-end clients. A specific application in the remote monitoring and fault diagnosis of machines using the proposed control configuration is presented in the paper.

Modeling and Performance Analysis of MAC Protocol for WBAN with Finite Buffer

  • Shu, Minglei;Yuan, Dongfeng;Chen, Changfang;Wang, Yinglong;Zhang, Chongqing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4436-4452
    • /
    • 2015
  • The IEEE 802.15.6 standard is introduced to satisfy all the requirements for monitoring systems operating in, on, or around the human body. In this paper, analytical models are developed for evaluating the performance of the IEEE 802.15.6 CSMA/CA-based medium access control protocol for wireless body area networks (WBAN) under unsaturation condition. We employ a three-dimensional Markov chain to model the backoff procedure, and an M/G/1/K queuing system to describe the packet queues in the buffer. The throughput and delay performances of WBAN operating in the beacon mode are analyzed in heterogeneous network comprised of different user priorities. Simulation results are included to demonstrate the accuracy of the proposed analytical model.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

INTRODUCTION OF DATELLITE COMMUNICATION SYSTEM TEST LANGUNGE

  • Ahn, Dong-Hyun;Jung, Won-Chan
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1994년도 Proceedings of the Korea Automatic Control Conference, 9th (KACC) ; Taejeon, Korea; 17-20 Oct. 1994
    • /
    • pp.229-231
    • /
    • 1994
  • For the effective use of satellite communication transponder, tests for the payload system such as IOT(In-Orbit Test), RPM(Routine Payload Monitoring), CSM(Communicatios System Monitoring), and REV(Remote Earth-Station Verification) have to be conducted. Those tests are used in order to verify the condition and generic design of the satellite, to provide a database for operational calculations, and to maintain the quality of communication services. As the satellite communication system gets with wider expansion with higher complexity of operation, tests for the communication system also need more complex operation that usesophisticated computer-controlled measuring system. For and C language based measurement functions, which uses GPIB protocol and SCPI commands. But SICL requires knowledge of BASIC and C language as well as GPIB and SCPL system. This paper introduces a new language called CALSTEP-Control and Access Language for the Systems of Test Equipment and Payload. This language is designed for the operator to perform the tests for the satellite communication system without any special knowledge that is mentioned above. This language has very limited number of commands which are to be used to control the payload system and test equipments to perform IOT and CSM, and those commands are very readable and easy to understand, so an operator without any knowledge of BASIC and C programming language, or SICL and SCPI command can use it.

  • PDF

디지털 저작권 보호를 위한 라이센스 에이전트의 설계 (The Design of License Agent Rights Protection)

  • 이광형;이근왕;김희숙
    • 한국사이버테러정보전학회:학술대회논문집
    • /
    • 한국사이버테러정보전학회 2004년도 제1회 춘계학술발표대회
    • /
    • pp.275-282
    • /
    • 2004
  • 디지털 저작물의 전송환경이 빠른 속도로 바뀜에 따라서 디지털 저작물의 저작권 보호가 중요한 이슈로 부각되고 있다. DRM(Digital Right Management)은 디지털 저작자나 출판업자, 그리고 인터넷 서비스 제공자들에게 디지털 저작물을 접근하고 사용하는데 있어서 신뢰할수 있는 환경을 만들수 있는 관심있는 분야이다. 본 논문에서는 라이선스 에이전트를 이용하여 기존의 DRM 기법이 가지고 있는 정적인 DRM이나 온라인환경에 제한된 어플리케이션의 단점을 개선한 디지털 저작물의 보호기법에 대하여 제안한다. 제안된 논문은 동적인 DRM기법으로 동적인 요구 제어 기술을 바탕으로 라이선스 에이전트를 이용하여 온라인과 오프라인 환경에서 동시에 모니터링과 추적을 수행한다. 제안된 시스템은 PKI 보안 환경에서 사용자의 행동이나 데이터 보안을 실시간으로 감시하여 불법적인 접근과 사용을 막는다.

  • PDF