• Title/Summary/Keyword: Management Server

Search Result 1,827, Processing Time 0.026 seconds

A Production Traceability Information Gathering System based on Handwritten Data Digitalization Technology in Agro-livestock Products (수기정보 전자화 기술 기반의 농축산물 생산이력정보 수집 시스템)

  • Son, Bong-Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4632-4641
    • /
    • 2011
  • The detailed production traceability information is a fundamental element in successful introduction and revitalization of traceability system. In this paper, we propose a production traceability information gathering system which is based on handwritten data digitalization technology in agro-livestock products. By the proposed system, we can effectively gather the detailed production traceability information with digital pen and the management ledger of paper document type by only writing the ledger. The server of the system generates the same digital image as the ledger and converts the handwritten data into digital text to insert the data into the database. Because the system is superior to data gathering system based on PC, PDA and touch screen in mobility, usability, data input speed, suitability in agro-livestock environment, it is possible to effectively gather traceability information of high quality by users even if they have low information ability and insufficient time to input data. We expect that the handwritten data digitalization technology is used to gather document based information in stage of manufacturing, distribution and marketing. In addition, this technology is applied to implementing advanced traceability system with RFID/USN based systems.

Loan/Redemption Scheme for I/O performance improvement of Virtual Machine Scheduler (가상머신 스케줄러의 I/O 성능 향상을 위한 대출/상환 기법)

  • Kim, Kisu;Jang, Joonhyouk;Hong, Jiman
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.18-25
    • /
    • 2016
  • Virtualized hardware resources provides efficiency in use and easy of management. Based on the benefits, virtualization techniques are used to build large server clusters and cloud systems. The performance of a virtualized system is significantly affected by the virtual machine scheduler. However, the existing virtual machine scheduler have a problem in that the I/O response is reduced in accordance with the scheduling delay becomes longer. In this paper, we introduce the Loan/Redemption mechanism of a virtual machine scheduler in order to improve the responsiveness to I/O events. The proposed scheme gives additional credits for to virtual machines and classifies the task characteristics of each virtual machine by analyzing the credit consumption pattern. When an I/O event arrives, the scheduling priority of a virtual machine is temporally increased based on the analysis. The evaluation based on the implementation shows that the proposed scheme improves the I/O response 60% and bandwidth of virtual machines 62% compared to those of the existing virtual machine scheduler.

The Development and Implementation of Ward Monitoring Service Using Bluetooth Low Energy Scanners for Infectious Disease Response (감염병 대응 비콘 스캐너 기반의 병실 모니터링 서비스 개발)

  • Lee, Kyu-Man;Park, Ju-young
    • Journal of Digital Convergence
    • /
    • v.15 no.3
    • /
    • pp.287-294
    • /
    • 2017
  • This study attempted to develop a beacon scanner based ward monitoring service in order to respond to the new paradigm of medical environment which is trying to introduce ICT technology as medical service to track and manage the spread path of large infectious diseases such as MERS. The study also included beacon hardware development, firmware development for the beacon low-power bluetooth 4.0, and server and web-based dashboard UI development. Using these, we have developed a customized monitoring system that provides functions such as locating patients by location based service and monitoring based on web UI. It is possible to maximize the efficiency of offline hospital services and to value active infection control and patient safety by integrating online technology into the area where online technologies such as beacons are not properly integrated.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.

Program Construction of slope Spatial Information Acquistion in Mobile Environment (모바일 환경의 경사지 공간정보획득 프로그램 구축)

  • Kang, In-Joon;Kang, Ho-Yun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.3
    • /
    • pp.367-374
    • /
    • 2009
  • Every year there are great socio-economic loss and damage caused by landslides in steep slopes. According to recent statistics, the percentage of casualty due to breakdown in steep slopes was 27.3% of all natural disasters occurring over the past decade($1998{\sim}2007$). Therefore, the nationwide scale survey on the landslide susceptibility was made to recognize the status quo for appropriate troubleshooting measure against the collapse of steep slopes. Nevertheless, few dent that the data collected is not sufficient to grasp the overall understanding of the onsite situation due to lack of spatial information. As a result, the study aims to develop a program enabling to send on site topological data and prefixed data-gather criteria directly to the central management server in real-time basis. It will be conducted through mobile devices and portable GPS system, accordingly. This program is expected to be implemented as an efficient application tool of slope spatial information acquisition.

A Distributed Trust Model Based on Reputation Management of Peers for P2P VoD Services

  • Huang, Guimin;Hu, Min;Zhou, Ya;Liu, Pingshan;Zhang, Yanchun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2285-2301
    • /
    • 2012
  • Peer-to-Peer (P2P) networks are becoming more and more popular in video content delivery services, such as Video on Demand (VoD). Scalability feature of P2P allows a higher number of simultaneous users at a given server load and bandwidth to use stream service. However, the quality of service (QoS) in these networks is difficult to be guaranteed because of the free-riding problem that nodes download the recourses while never uploading recourses, which degrades the performance of P2P VoD networks. In this paper, a distributed trust model is designed to reduce node's free-riding phenomenon in P2P VoD networks. In this model, the P2P network is abstracted to be a super node hierarchical structure to monitor the reputation of nodes. In order to calculate the reputation of nodes, the Hidden Markov Model (HMM) is introduced in this paper. Besides, a distinction algorithm is proposed to distinguish the free-riders and malicious nodes. The free-riders are the nodes which have a low frequency to free-ride. And the malicious nodes have a high frequency to free-ride. The distinction algorithm takes different measures to response to the request of these two kinds of free-riders. The simulation results demonstrate that this proposed trust model can improve QoS effectively in P2P VoD networks.

A Development of Trend Analysis Models and a Process Integrating with GIS for Industrial Water Consumption Using Realtime Sensing Data (실시간 공업용수 추세패턴 모형개발 및 GIS 연계방안)

  • Kim, Seong-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.3
    • /
    • pp.83-90
    • /
    • 2011
  • The purpose of this study is to develop a series of trend analysis models for industrial water consumption and to propose a blueprint for the integration of the developed models with GIS. For the consumption data acquisition, a real-time sensing technique was adopted. Data were transformed from the field equipments to the management server in every 5 minutes. The data acquired were substituted to a polynomial formula selected. As a result, a series of models were developed for the consumption of each day. A series of validation processes were applied to the developed models and the models were finalized. Then the finalized models were transformed to the average models representing a day's average consumption or an average daily consumption of each month. Demand pattern analyses were fulfilled through the visualization of the finally derived models. It has founded out that the demand patterns show great consistency and, therefore, it is concluded that high probability of demand forecasting for a day or for a season is available. Also proposed is the integration with GIS as an IT tool by which the developed forecasting models are utilized.

Design and Implementation of an MPEG-2 AAC Format-based Audio Streaming System (MPEG-2 AAC 포맷 기반의 오디오 스트리밍 시스템 설계 및 구현)

  • 이승재;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1251-1264
    • /
    • 2002
  • Currently, audio streaming services such as on-demand service and live service support only a limited number of clients. They also suffer from a lack of stability and degradation of service quality due to their inefficient use of network resources. Futhermore, since the streaming services usually do not consider dynamic services, they are very inconvenience to use. In order to resolve these drawbacks, we propose a novel audio streaming system based on MPEG-2 AAC file format which are facilitated with the network bandwidths efficiently. The proposed system supports QoS for audio streaming as well as guarantees a stability while streaming service is undergoing. Moreover, the system provides a dynamic interface which enables us to use the streaming service more easily and to manage streaming servers with convenient manner. On the contrary, most of the current available static interface streaming services are mainly depending only on a single fixed web page between client and server, which in consequence lead us to use unflexible static service environment. Our implementation results show the proposed system improves the performance compared to those of the currently existing systems that use MP3 file format. It also provides some benefits such as a stability of service and a easy to management of streaming servers.

Design of A Generic and Scalable DRM Scheme using HC-256 Stream Cipher (HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.923-930
    • /
    • 2009
  • Digital Rights Management(DRM) is a term that refers technologies for imposing limitations on the use of digital content for protecting media copyright holders. This paper proposes a generic scheme for digital media copy protection that can be applied to any digital media such as audio, video, etc. The scheme will make it very hard to play a copied content on a foreign platform and to guess secret content encryption keys. Unlike other DRM techniques, the scheme uses the stream cipher HC-256 only for encrypting media content and it allows a client to start content playback immediately following its streamed decryption. As to the encryption, it requires to generate several secret keys for each new client(player copy), rather than for each media content, which makes it scalable in terms of managed keys. Also, for simplicity, the scheme supports the popular unlimited-play-after-download policy only, which would eliminate the necessity for deploying separate server or process for licensing.

Design of DRM System for Contents Redistribution in Home Domain (홈 도메인에서의 콘텐츠 재배포를 위한 DRM 시스템 설계)

  • Moon, Ju-Young;Lee, Chang-Bo;Kim, Jung-Jae;Jun, Moon-Seog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2007
  • In this paper, we proposed the DRM(Digital Rights Management) system that allows to redistribute contents safely based on home domain. This DRM system for contents redistribution within home domain can solve the restriction and the inconvenience occuring in using contents and at the same time protect the right of contents producer and provider as well. To play contents using home digital device, we must build home domain for contents redistribution among devices. That is to say, devices that are registered with home domain can redistribute contents to other devices at same domain. The domain must send redistribution-specifics to DRM server, so that user can pay reasonable amount for using the contents. Futhermore, by restricting within domain the right of contents redistribution, one can strictly prohibit the illegal redistribution.

  • PDF