• Title/Summary/Keyword: DB Server

Search Result 280, Processing Time 0.022 seconds

An Implementation of Smart Laundry Management System Using Wrieless RFID Reader (무선 RFID 리더기를 이용한 스마트 세탁물 관리 시스템 개발)

  • Lee, Seung-Joon;Lee, Chang-Won;Nghia, Troung Van;Kim, Joo-Woong;Jung, Kyung-Kwon;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.811-814
    • /
    • 2011
  • This paper presents smart laundry management system using wireless Radio Frequnecy Identification (RFID) reader for efficient managing a large amount of laundry and clothing. The proposed system is comprised of wireless RFID hanger, base module connected on PC, and server system. The wireless RFID hanger with RFID reader read RFID tag attached on clothes and transmit tag information using wireless communication. The server system manage customers and his clothing using Database (DB) and display the information on the web page and smart phone devices. Since the proposed system operates with battery, we can evaluate its lifetime to measure current consumption. The designed system can be utilized to manage quantities of clothes and also it will be a good service to improve efficiency of laundry process.

  • PDF

Comparison of Search Performance of SQLite3 Database by Linux File Systems (Linux File Systems에 따른 SQLite3 데이터베이스의 검색 성능 비교)

  • Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.1-6
    • /
    • 2022
  • Recently, IoT sensors are often used to produce stream data locally and they are provided for edge computing applications. Mass-produced data are stored in the mobile device's database for real-time processing and then synchronized with the server when needed. Many mobile databases are developed to support those applications. They are CloudScape, DB2 Everyplace, ASA, PointBase Mobile, etc, and the most widely used database is SQLite3 on Linux. In this paper, we focused on the performance required for synchronization with the server. The search performance required to retrieve SQLite3 was compared and analyzed according to the type of each Linux file system in which the database is stored. Thus, performance differences were checked for each file system according to various search query types, and criteria for applying the more appropriate Linux file system according to the index use environment and table scan environment were prepared and presented.

Implementation of a DB-Based Virtual File System for Lightweight IoT Clouds (경량 사물 인터넷 클라우드를 위한 DB 기반 가상 파일 시스템 구현)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.311-322
    • /
    • 2014
  • IoT(Internet of Things) is a concept of connected internet pursuing direct access to devices or sensors in fused environment of personal, industrial and public area. In IoT environment, it is possible to access realtime data, and the data format and topology of devices are diverse. Also, there are bidirectional communications between users and devices to control actuators in IoT. In this point, IoT is different from the conventional internet in which data are produced by human desktops and gathered in server systems by way of one-sided simple internet communications. For the cloud or portal service of IoT, there should be a file management framework supporting systematic naming service and unified data access interface encompassing the variety of IoT things. This paper implements a DB-based virtual file system maintaining attributes of IoT things in a UNIX-styled file system view. Users who logged in the virtual shell are able to explore IoT things by navigating the virtual file system, and able to access IoT things directly via UNIX-styled file I O APIs. The implemented virtual file system is lightweight and flexible because it maintains only directory structure and descriptors for the distributed IoT things. The result of a test for the virtual shell primitives such as mkdir() or chdir() shows the smooth functionality of the virtual file system, Also, the exploring performance of the file system is better than that of Window file system in case of adopting a simple directory cache mechanism.

The Design and Implementation of Two-Way Search Algorithm using Mobile Instant Messenger (모바일 인스턴스 메신저를 이용한 양방향 검색 알고리즘의 설계 및 구현)

  • Lee, Daesik;Jang, Chungryong;Lee, Yongkwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.55-66
    • /
    • 2015
  • In this paper, we design and implement a two-way search algorithm that can provide a customized service through the user with real-time two-way communication using a mobile instant messaging service. Therefore, we design and implement the automative search system which enables delivering message to each user mobile terminal from a plurality of relay mobile terminals by utilizing the mobile instant messenger, not to deliver a message from the main server to the mobile instant messenger user directly. Two-way search system using the mobile instant messenger can be immediately collect the user's response is easy to identify the orientation of each user, and thus can be provided to establish a differentiated service plan. Also, It provides a number of services(text, photos, videos, etc) in real-time information to the user by utilizing the mobile instant messenger service without the need to install a separate application. Experiment results, data processing speed of the category processing way to search for the data of the DB server from a user mobile terminal is about 7.06sec, data processing number per minute is about 13 times. The data processing speed of the instruction processing way is about 3.10sec, data processing number per minute is about 10 times. The data processing speed of the natural language processing way is about 5.13sec, per data processing number per minute is about 7 times. Therefore in category processing way, command processing way and natural language processing way, instruction processing way is the most excellent in aspect of data processing speed, otherwise in aspect of per data processing number per minute, the category processing way is the best method.

Drone Flight Path for Countacting of Industry Disaster (산업 재해 대응 드론 비행경로 설정 방법)

  • Choo, Sang-Mok;Chong, Ui-Pil;Lee, Jung-Chul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.2
    • /
    • pp.132-137
    • /
    • 2017
  • Drone is currently used for wide application areas in our real life. Also it performs more important functions. We propose a method of drone operation system for the prevention of industrial disaster. In normal operation of drone system the drone monitors the industrial sites according to the planned flight path with acquiring the monitored images and send the image information to the server. The server analyzes and compares the images to DB information by calculating the similarity based on the threshold. Then the system decides whether the industrial sites has problems or not. If the abnormal condition is occurred, the drone change the flight path to abnormal flight path and keep monitoring the industrial sites with measuring the air status by sensors and sends all information to server system on the ground. If the emergency case is occurred, drone approaches the closest position of accident points and acquiring the all information and send them to server and 119 center.

Study on Collecting Server Information through Banner Grabbing (배너 그래빙을 통한 서버 정보 수집에 관한 연구)

  • Kang, HongGoo;Kim, HyeonHak;Lee, HyunSeung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1317-1330
    • /
    • 2017
  • To collect server information and construct network map enable us to prevent security breach, prepare for national cyber warfare and make effective policies. In this paper, we analyze well-known network scanners, Nmap and ZMap, and construct network map using banner grabbing. We use multiple threads in order to increase scanning speed and arrange IP lists by specific order to reduce the load on information gathering targets. Also, we applied performance tests to compare the real-time banner grabbing tool with the existing network scanners. As a result, we gathered server information from domestic and overseas servers and derived a risk index based on the collected database. Although there are slight differences among countries, we can identify the risky situation that many users in every country are exposed to several security breaches.

Construction of Indoor and Outdoor Spatial Information Integration Service System based on Vector Model

  • Kim, Jun Hyun;Kwon, Kee Wook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.36 no.3
    • /
    • pp.185-196
    • /
    • 2018
  • In order to overcome the problem that outdoor and indoor spatial information service are separately utilized, an integration service system of spatial information that is linked from outdoor to indoor has been implemented. As a result of the study, "0001.xml" corresponding to the file index key value, which is the service connection information in the building information of the destination, was extracted from the prototype verification of the system, the search word of 'Kim AB' was transmitted to the indoor map server and converted from the outdoor map service to the indoor map service through confirmation of the navigation service connected information, using service linkage information and search words of the indoor map service was confirmed that the route was displayed from the entrance of the building to the destination in the building through the linkage search DB (Database) table and the search query. Therefore, through this study was examined the possibility of linking indoor and outdoor DB through vector spatial information integration service system. The indoor map and the map engine were implemented based on the same vector map format as the outdoor map engine, it was confirmed that the connectivity of the map engine can be applied.

A Speech Recognition in a Wineless Network Environment (무선 네트워크 환경 하에서의 음성인식에 관한 고찰)

  • Lim Soo-Ho;Shen Guang-Hu;Hahm Seong-Jun;Kim Joo-Gon;Jung Ho-Youl;Chung Hyun-Yeol
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • autumn
    • /
    • pp.61-64
    • /
    • 2004
  • 최근 PDA(Personal Digital Assistants)와 같은 휴대형 단말기들은 다양한 멀티미디어 기술과 무선 인터넷 기술의 영향으로 정보단말기로서 각광을 받고 있다. 그러나 현재의 단말기는 프로세서와 메모리의 한계로 인하여 원활한 음성인식 시스템을 구축하기에는 한계가 있다. 이를 보완하는 방법으로 본 논문에서는 Client/server로 분리된 음성 인식 시스템을 구축하였다. 구축한 시스템은 무선 네트워크 환경을 이용하여 PDA(Personal Digital Assistants)에서 음성 파일 또는 특징 파라미터를 Serve 측으로 전송하여 Server측에서 음성 인식을 수행한 후 그 결과를 모바일 단말기로 되돌려 주는 시스템이다. 구성된 시스템을 평가하기 위해서는 국어 공학센터의 음성 DB(KLE 452DB)를 이용하여 음향 모델을 생성한 후 다양한 환경(연구실, 복도, 주차장 도서관 로비)에서 발성한 후 이를 교내 무선 인터넷망(Nespot)을 통하여 송신하여 실시간 인식하였다. 실험 결과, 각각 $84.04\%\;72.28\%\;69.47\%\;67.61\%$의 평균 인식률을 얻을 수 있었다.

  • PDF

Performance Analysis of an On-line Game Abuse Pattern Monitoring Method (온라인 게임 악용 패턴 모니터링 방법의 성능 분석)

  • Roh, Chang-Hyun;Son, Han-Seong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.71-77
    • /
    • 2011
  • CEP(Complex Event Processing) is a technique to find complex event pattern in a massive information system. Based on CEP technique, an abuse pattern monitoring method has been developed to provide an real-time detection. In the method, the events occurred by game-play are observed to be against the rules using CEP. User abuse patterns are pre-registered in CEP engine. And CEP engine monitors user abuse after aggregating the game data transferred by game logging server. This article provides the performance analysis results of the abuse pattern monitoring method using real game DB. We results that the method proposed in previous study is effective to monitor abusing users.

Study of Speech Recognition System Using the Java (자바를 이용한 음성인식 시스템에 관한 연구)

  • Choi, Kwang-Kook;Kim, Cheol;Choi, Seung-Ho;Kim, Jin-Young
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.6
    • /
    • pp.41-46
    • /
    • 2000
  • In this paper, we implement the speech recognition system based on the continuous distribution HMM and Browser-embedded model using the Java. That is developed for the speech analysis, processing and recognition on the Web. Client sends server through the socket to the speech informations that extracting of end-point detection, MFCC, energy and delta coefficients using the Java Applet. The sewer consists of the HMM recognizer and trained DB which recognizes the speech and display the recognized text back to the client. Because of speech recognition system using the java is high error rate, the platform is independent of system on the network. But the meaning of implemented system is merged into multi-media parts and shows new information and communication service possibility in the future.

  • PDF