• Title/Summary/Keyword: E-Mail transfer system

Search Result 27, Processing Time 0.028 seconds

Implementation of Picture Surveillance System using xHTML (xHTML을 이용한 화상 감시 시스템 구현)

  • 정경택;송병만;마석주;전용일;정동수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1421-1426
    • /
    • 2003
  • In this paper, we implement a picture surveillance system using IBM-compatible PC with web camera. The reflex RGB data captured from WebCam is stored to HDD through USB port at every 5 seconds intervals. Also, if strangers are detected through Motion Detection routine, warning voice message is broadcasted and invasion message is transmitted by e-mail and transmit the e-mail title to mobile phone through WAP(Wireless Application Protocol) push. The detected image is stored to hard-disk in ‘month-day-hour-minute-second. jpg’ data type. And the image data is transmitted to web server through FTP(File Transfer Protocol) because invader can deletes or destroys the image data on hard-disk We implement a surveillance system which is able to utilize through internet regardless of time and space.

Realization of a Remote Management System for Process Inspection of Chip-Mounter

  • Lim, Sun-Jong;Joon Lyon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.91.4-91
    • /
    • 2002
  • Today, Internal offers WWW(World Wide Web), remote control, file transfer and e-mail service. Among the services, WWW takes large portion because of convenient GUI, easy information search and unlimited information registration. WWW service gives the comfort in life such as goods purchase, information search, real-time news, internet TV and medical diagnosis. Remote Monitoring Server(RMS) Ssystem that uses internet and WWW is constructed for chip mounter. Hardware base consists of RMS, chip mounter and C/S(Customer Service) service. Software includes DBMS and various modules in server home page. Web browser provide product num her, bad product number, troubl...

  • PDF

A Design and Implementation of 3-tier Large Scale E-mail Transfer System (3-tier 방식을 적용한 대규모 전자메일 전송 시스템의 설계 및 구현)

  • 임두욱;박정환;지석진;신동규;신동일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.169-171
    • /
    • 2000
  • 전자메일이 현대 정보시스템에서 가장 필수적인 도구 중 한가지라는 것은 이제 더 이상 말할 필요가 없을 정도다. 전자메일은 그것을 잘 활용함으로써 생산 효율을 몇 배로 향상시킬 수 있는 반면, 능숙하게 사용하지 못할 경우 수신인과 발신인 상호간의 커뮤니케이션을 혼란시켜 생산성을 저하시킬 위험성을 내포하고 있다. 본 논문에서는 대량의 전자메일을 가입자에게 발송해야 하는 기업환경에서 대량의 메일 전송시에 메일 서버에 걸리는 부하를 3-tier 방식을 적용하여 효율적으로 관리하는 방법에 대하여 고찰하고, 이의 구현에 대하여 논의한다.

  • PDF

Image Security System Using Push Server and Smart Device (푸시 서버와 스마트 디바이스를 이용한 영상보안 시스템)

  • Park, Seung-Hwan;Oh, U-Chul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.588-593
    • /
    • 2014
  • Recently, the smart devices has been possessed by a large majority of the adult, and offered various personalization services. This paper proposed the lightweight Intelligent Image Security System that notice the existence of any intruder in real time at the place of requiring the security by using smart device. The proposed image security system recognized whether or not intruder exists using the difference frame on the basis of Integral Image and the dynamic background updating algorithms. The intrusion notification is achieved by using the GCM push server that send massages in the application unit of user mobile device, and the SMTP mail server which is use of e-mail standard protocol. In case of the occurrence of intruder, GCM push server send an push-massage by the private mobile device, and SMTP mail server send the intruder's photograph and intrusion time. By the convergence of the various image processing algorithms and the performance of smart device, The proposed image security system can be applied to the various Intelligent Image Security field.

Twitter Crawling System

  • Ganiev, Saydiolim;Nasridinov, Aziz;Byun, Jeong-Yong
    • Journal of Multimedia Information System
    • /
    • v.2 no.3
    • /
    • pp.287-294
    • /
    • 2015
  • We are living in epoch of information when Internet touches all aspects of our lives. Therefore, it provides a plenty of services each of which benefits people in different ways. Electronic Mail (E-mail), File Transfer Protocol (FTP), Voice/Video Communication, Search Engines are bright examples of Internet services. Between them Social Network Services (SNS) continuously gain its popularity over the past years. Most popular SNSs like Facebook, Weibo and Twitter generate millions of data every minute. Twitter is one of SNS which allows its users post short instant messages. They, 100 million, posted 340 million tweets per day (2012)[1]. Often big amount of data contains lots of noisy data which can be defined as uninteresting and unclassifiable data. However, researchers can take advantage of such huge information in order to analyze and extract meaningful and interesting features. The way to collect SNS data as well as tweets is handled by crawlers. Twitter crawler has recently emerged as a great tool to crawl Twitter data as well as tweets. In this project, we develop Twitter Crawler system which enables us to extract Twitter data. We implemented our system in Java language along with MySQL. We use Twitter4J which is a java library for communicating with Twitter API. The application, first, connects to Twitter API, then retrieves tweets, and stores them into database. We also develop crawling strategies to efficiently extract tweets in terms of time and amount.

A Study of Logical Network Partition and Behavior-based Detection System Using FTS (FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구)

  • Kim, MinSu;Shin, SangIl;Ahn, ChungJoon;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.109-115
    • /
    • 2013
  • Security threats through e-mail service, a representative tool to convey information on the internet, are on the sharp rise. The security threats are made in the path where malicious codes are inserted into documents files attached and infect users' systems by taking advantage of the weak points of relevant application programs. Therefore, to block infection of camouflaged malicious codes in the course of file transfer, this work proposed an integrity-checking and behavior-based detection system using File Transfer System (FTS), logical network partition, and conducted a comparison analysis with the conventional security techniques.

The Coordinates Computation of the GPS Base Station by Precise Point Positioning (정밀절대측위(PPP)기법에 의한 GPS 기준점 좌표의 산정)

  • 이용창
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.2
    • /
    • pp.145-152
    • /
    • 1999
  • JPL(Jet Propulsion Laboratory) has been routinely produced the precise GPS ephemeris and clock's correction parameter using data collected from globally distributed permanent GPS tracking stations, and has been offering the automated GPS data analysis(Precise Point Positioning: PPP) service by using them. In this study, after investigating the potential capacity of JPL's PPP service, the coordinates computation of the GPS base station by this service were investigated. For this, the dual frequency P codes data of 24 hours were observed from continuously operating four reference stations in USA. sent to the JPL's main computer through E-mail and/or ftp, and then were processed by Gipsy/Oasis-II (GOA-II) software with the precise GPS transmitter parameters. Centimeter-level positioning results were available to obtain in X, Y, Z geocentric rectangular coordinate system.

  • PDF

Design and Development of an XML/EDI System (XML/EDI 시스템의 설계 및 구현)

  • Sin, Dong-Gyu;Sin, Dong-Il
    • The KIPS Transactions:PartD
    • /
    • v.8D no.2
    • /
    • pp.181-192
    • /
    • 2001
  • XML/EDI is different from traditional EDI because it offers the framework necessary for electronic commerce and extends the scope of the traditional EDI which focuses on data transfer. Since existing EDI services are moved to Internet platform and again to Web platform, users can use EDI in the integrated environment without inconvenience of using different EDI softwares, which have their own configurations. This paper describes the overall design and implementation of a Web-based XML/EDI system that is a core component for the electronic commerce. The constructed XML/EDI system in this paper is comprised of document generation module, document storage module, document search module, document management module, template document management module and e-mail transmission module. Requirements and design goal of XML/EDI system are introduced, detailed functionalities of modules and design facts are described and execution and execution procedures of the implemented system are explained.

  • PDF

An Implementation of Automatic Transmission System of Traffic Event Information (교통이벤트 정보의 자동 전송시스템 구현)

  • Jeong, Yeong-Rae;Jang, Jae-Hoon;Kang, Seog Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.987-994
    • /
    • 2018
  • In this paper, an automatic transmission system of traffic information is presented. Here, a traffic event is defined as an obstacle to an emergency vehicle such as an ambulance or a fire truck. When a traffic event is detected from a video recorded by a black box installed in a vehicle, the implemented system automatically transmits a proof image and corresponding information to the control center through an e-mail. For this purpose, we realize an algorithm of identifying the numbers and a character from the license plate, and an algorithm for determining the occurrence of a traffic event. To report the event, a function for automatic transmission of the text and image files through e-mail and file transfer protocol (FTP) is also appended. Therefore, if the traffic event is extended and applied to the presented system, it will be possible to establish a convenient reporting system for the violation of various traffic regulations. In addition, it will contribute to significantly reduce the number of traffic violations against the regulations.

Design and Implementation of A Large Scale E-mail Transfer System for Business Environment (기업환경을 위한 대용량 전자메일 전송 시스템의 설계 및 구현)

  • Im, Doo-Wook;Park, Jung-Hwan;Jee, Seok-Jin;Shin, Dong-Kyoo;Shin, Dong-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1501-1504
    • /
    • 2000
  • 인터넷을 통하여 광범위한 사람과 기업이 연결되어 있는 현대 정보시스템에서, 전자메일은 그들을 연결하는데 가장 효율적인 도구 중 한가지라는 것은 이제 더 이상 말할 필요가 없을 정도다. 전자메일은 그것을 잘 활용함으로써 생산 효율을 몇 배로 향상시킬 수 있는 반면, 능숙하게 사용하지 못할 경우 수신인과 발신인 상호간의 커뮤니케이션을 혼란시켜 생산성을 저하시킬 위험성을 내포하고 있다. 본 논문에서는 대량의 전자메일을 가입자에게 발송해야 하는 기업환경에서 대량의 메일 전송시에 메일서버에 걸리는 부하를 3-tier 방식을 적용하여 효율적으로 관리하는 방법에 대하여 고찰하고, 이의 구현에 대하여 논의한다.

  • PDF