• Title/Summary/Keyword: Client-side

Search Result 232, Processing Time 0.03 seconds

Web-based Parking Lot Management System by Vehicle Movement (차량 영상을 이용한 웹기반 주차관리 시스템)

  • Lee, Hyo-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.12
    • /
    • pp.95-101
    • /
    • 2009
  • s economic development has been achieved and society gets complicated, problems of traffic system have been also exposed. Due to these problems, drivers have to endure economic loss and delayed time. A web-based parking lot management system has been proposed to solve this problem. Because a parking lot is an important resource of traffic system, efficient management of parking lots can be means to solve critical problems of traffic system. In this study a simple method is introduced to detect moving vehicles with geometric information of moving objects that has been computed from surveillance cameras installed in a parking lot. Statistical information processed from image data is also stored on a server side, such as total number of parking lots, a number of parked cars and a number of available parking spots. A client who wants to know the nearest parking place can share the information via a mobile device and shorten his or her driving time. Great benefit to both drivers and society is expected if many parking lots are equipped with this system.

A Study on the Design of Interlibrary Loan System Linked with IRS (정보검색시스템과 연계된 상호대차시스템 설계에 관한 연구: 의학도서관을 중심으로)

  • 최흥식
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.165-186
    • /
    • 2001
  • The purpose of this study is to explore practical methods of interlibrary loan system, linked with information retrieval system. The process and current status of interlibrary loan was investigated and analyzed at medical libraries in this study. In order to find the way of utilizing data from information retrieval and document request at the same time, the author tries to develop a way of linking PubMed, Union Catalog and ILL system. This study shows that hit record of information retrieval was saved in type of MEDLINE, XMLJSGML and reused for document delivery services. It seems to be efficient that the maintenance of Union Catalog was managed by all of member libraries, and data were retrieved at server and client side at once. In addition, it was found that user information can be checked by the IP and ILL system can be used for requested document by the saved result.

  • PDF

Optimistic Concurrency Control Using Time-stamp Ordering in Mobile Databases (이동 데이터베이스 시스템에서 타임스탬프를 이용한 낙관적 동시성 제어 기법)

  • Kim Dae-Ho;Jeong Byeong-Soo;Lee Young-Koo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.79-90
    • /
    • 2006
  • Data broadcasting is an efficient method for disseminating data, and is widely accepted in the database applications of mobile computing environments because of its asymmetric communication bandwidth between a server and mobile clients. This requires new types of concurrency control mechanism to support mobile transactions executed in the mobile clients, which have low-bandwidths toward the server. In this paper, we propose an OCC/DTA (Optimistic Concurrency Control with Dynamic Time-stamp Adjustment) protocol that can be efficiently adapted to mobile computing environments. The protocol reduces communication overhead by using client-side validation procedure and enhances transaction throughput by adjusting serialization order without violating transaction semantics. We show that the proposed protocol satisfies data consistency requirements, and simulate that this protocol can improve the performance of mobile transactions in data broadcasting environments.

  • PDF

An Efficient Adaptive Bitmap-based Selective Tuning Scheme for Spatial Queries in Broadcast Environments

  • Song, Doo-Hee;Park, Kwang-Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1862-1878
    • /
    • 2011
  • With the advances in wireless communication technology and the advent of smartphones, research on location-based services (LBSs) is being actively carried out. In particular, several spatial index methods have been proposed to provide efficient LBSs. However, finding an optimal indexing method that balances query performance and index size remains a challenge in the case of wireless environments that have limited channel bandwidths and device resources (computational power, memory, and battery power). Thus, mechanisms that make existing spatial indexing techniques more efficient and highly applicable in resource-limited environments should be studied. Bitmap-based Spatial Indexing (BSI) has been designed to support LBSs, especially in wireless broadcast environments. However, the access latency in BSI is extremely large because of the large size of the bitmap, and this may lead to increases in the search time. In this paper, we introduce a Selective Bitmap-based Spatial Indexing (SBSI) technique. Then, we propose an Adaptive Bitmap-based Spatial Indexing (ABSI) to improve the tuning time in the proposed SBSI scheme. The ABSI is applied to the distribution of geographical objects in a grid by using the Hilbert curve (HC). With the information in the ABSI, grid cells that have no objects placed, (i.e., 0-bit information in the spatial bitmap index) are not tuned during a search. This leads to an improvement in the tuning time on the client side. We have carried out a performance evaluation and demonstrated that our SBSI and ABSI techniques outperform the existing bitmap-based DSI (B DSI) technique.

A Study on Hacking E-Mail Detection using Indicators of Compromise (침해지표를 활용한 해킹 이메일 탐지에 관한 연구)

  • Lee, Hoo-Ki
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.21-28
    • /
    • 2020
  • In recent years, hacking and malware techniques have evolved and become sophisticated and complex, and numerous cyber-attacks are constantly occurring in various fields. Among them, the most widely used route for compromise incidents such as information leakage and system destruction was found to be E-Mails. In particular, it is still difficult to detect and identify E-Mail APT attacks that employ zero-day vulnerabilities and social engineering hacking techniques by detecting signatures and conducting dynamic analysis only. Thus, there has been an increased demand for indicators of compromise (IOC) to identify the causes of malicious activities and quickly respond to similar compromise incidents by sharing the information. In this study, we propose a method of extracting various forensic artifacts required for detecting and investigating Hacking E-Mails, which account for large portion of damages in security incidents. To achieve this, we employed a digital forensic indicator method that was previously utilized to collect information of client-side incidents.

HIV/AIDS Management: Dolutegravir Based Antiretroviral Drug Therapy

  • John, Ikpeama Osita;Emmanuel, Okoh Emeka;Anthonia, Ikpeama Chizoba;Joy, Ikpeama Chinwe;Adimabua, Okafor Patrick;Osazuwa, Igbineweka Osa;Andrew, Ikpeama Emeka;Mariam, Onuzulike Nonye;Gami, Hilary Tumba
    • The Korean Journal of Food & Health Convergence
    • /
    • v.6 no.4
    • /
    • pp.17-19
    • /
    • 2020
  • HIV/AIDS disease still remain a global pandemic and it's management has undergone series of treatment changes and improvement although there is still no permanent cure.Dolutegravir belongs to a group of HIV drugs called integrase inhibitors. Integrase inhibitors block an HIV enzyme called integrase. By blocking integrase, integrase inhibitors prevent HIV from multiplying and can reduce the amount of HIV in the body.Dolutegravir combination based regimen has turned out to be very effective (antiviral) with negligible rare side effects on clients. This drug (Dolutegravir based regimen) combination has successfully increased the appetite for food of all the clients, unlike others and has shown to reduce viral load in the most shortest period ever. It can be deduced that development of resistant mutant virus will be reduced if not eliminated with dolutogravir based regimen.The role of Continuous adherence counseling has shown to improve clients treatment management. It is important to note that the availability of food has direct effect on the economic status or financial weight on the client. Hence the progress that is increase in body mass index (BMI) is a direct impact of the availability of food for the clients.

A Web-based Education System with Remote Experimentation Environment for Embedded Systems Education (원격실험실 환경을 제공하는 임베디드 시스템 활용 교육을 위한 웹기반 교육 시스템)

  • Moon, Il-Hyeun;Jeon, Jae-Wook;Lee, You-Sang;Choi, kwan-Sun;Kim, Dong-Sik;Jeon, Chang-Wan;Lee, Sun-heum
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.6
    • /
    • pp.39-49
    • /
    • 2007
  • In this paper, a web-based, advanced education system for embedded systems have been implemented, which provide students reality through remote controlled experiment environment when they conduct experiments through web, in addition to the creative multimedia contents. Students can use the server-side remote experiment environment through telnet client using Java technology to conduct a variety of experiments on the embedded system remotely. Our system can be used as economical education tools for expensive experiment equipments in shared fashion through web as well as effective and convenient ones for embedded systems anywhere and anytime when internet access is available, compensating for lack in reality of virtual educations.

  • PDF

Relevance of the Cyclomatic Complexity Threshold for the Web Programming (웹 프로그래밍을 위한 복잡도 한계값의 적정성)

  • Kim, Jee-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.153-161
    • /
    • 2012
  • In this empirical study at the Web environment based on the frequency distribution of the cyclomatic complexity number of the application, the relevance of the threshold has been analyzed with the next two assumptions. The upper bound established by McCabe in the procedural programming equals 10 and the upper bound established by Lopez in the Java programming equals 5. Which numerical value can be adapted to Web application contexts? In order to answer this 10 web site projects have been collected and a sample of more than 4,000 ASP files has been measured. After analyzing the frequency distribution of the cyclomatic complexity of the Web application, experiment result is that more than 90% of Web application have a complexity less than 50 and also 50 is proposed as threshold of Web application. Web application has the complex architecture with Server, Client and HTML, and the HTML side has the high complexity 35~40. The reason of high complexity is that HTML program is usually made of menu type for home page or site map, and the relevance of that has been explained. In the near future we need to find out if there exist some hidden properties of the Web application architecture related to complexity.

Fake GPS Detection for the Online Game Service on Server-Side (모의 위치 서비스를 이용한 온라인 게임 악용 탐지 방안)

  • Han, Jaehyeok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1069-1076
    • /
    • 2017
  • Recently $Pok\acute{e}mon$ GO implements an online game with location-based real time augmented reality on mobile. The correct play of this game should be based on collecting the $Pok\acute{e}mon$ that appears as the user moves around by foot, but as the popularity increases, it appears an abuse to play easily. Many people have used an application that provides a mock location service such as Fake GPS, and these applications can be judged to be cheating in online games because they can play games in the house without moving. Detection of such cheating from a client point of view (mobile device) can consume a large amount of resources, which can reduce the speed of the game. It is difficult for developers to apply detection methods that negatively affect game usage and user's satisfaction. Therefore, in this paper, we propose a method to detect users abusing mock location service in online game by route analysis using GPS location record from the server point of view.

Design of IoT Gateway based Event-Driven Approach for IoT related Applications (IoT 게이트웨이 기반의 이벤트 중심 접근 방식 응용프로그램 설계)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2119-2124
    • /
    • 2016
  • The Internet of things (IoT) needs to be an event-driven approach for efficient related time response and processing. The growth of mobile devices in Internet of Things (IoT) leads to a number of intelligent buildings related IoT applications. For instance, home automation controlling system uses client system such web apps on smartphone or web service to access the home server by sending control commands. The gateway based RESTful technology responsible for handling clients'requests attests an internet latency in case a large number of clients' requests submit toward the gateway increases. In this paper, we propose the design tasks of the IoT gateway for handling concurrency events. The gateway based event-driven architecture is designed for building IoT gateway using node.js on one side and communication protocol based message-oriented middleware known as XMPP to handle communications of intelligent building control devices connected to the gateway through a centralized hub.