• Title/Summary/Keyword: Region Server

Search Result 88, Processing Time 0.029 seconds

Using PHP on the Internet Design and Implementation of Used Transaction System (인터넷 상에서 PHP를 이용한 중고거래 시스템의 설계 및 구현)

  • Hwang, Ho-yeon;kwon, Se-hyun;Jo, Su-jang;Hwang, Seung-jin;Yoo, Ji-yeon;Shin, Seong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.353-355
    • /
    • 2018
  • The system of this paper designs and implements a used trading system that is commonly used on the Internet. In order to pursue local transactions based on location, we designed the system by dividing the region in consideration of the general characteristics of used transactions that are restricted by transactions through distance and location. To do this, I used MySQL as the database engine and I used PHP, an Internet server-based scripting language, for database interworking. Due to the characteristics of secondary transactions, information security and design of each product are considered.

  • PDF

AMV: A k-anonymization technique minimizing the cloaking region (AMV: 클로킹 영역을 최소화하는 k-익명화 기법)

  • Song, Doohee;Heo, Minjae;Sim, Jongwon;Hwang, Sori;Song, Moonbae;Park, Kwangjin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.9-14
    • /
    • 2014
  • In this paper, we propose AMV scheme which supports k-anonymization by using vectors for mobile clients. AMV can produces the minimal cloaking area using motion vector information of users (clients). The main reason for minimizing cloaking area is a server has to send the object information to all users who request the spatial queries. The experimental results show that the proposed AMV has superior performance over existing methods.

GTVseq: A Web-based Genotyping Tool for Viral Sequences

  • Shin, Jae-Min;Park, Ho-Eun;Ahn, Yong-Ju;Cho, Doo-Ho;Kim, Ji-Han;Kee, Mee-Kyung;Kim, Sung-Soon;Lee, Joo-Shil;Kim, Sang-Soo
    • Genomics & Informatics
    • /
    • v.6 no.1
    • /
    • pp.54-58
    • /
    • 2008
  • Genotyping Tool for Viral SEQuences (GTVseq) provides scientists with the genotype information on the viral genome sequences including HIV-1, HIV-2, HBV, HCV, HTLV-1, HTLV-2, poliovirus, enterovirus, flavivirus, Hantavirus, and rotavirus. GTVseq produces alternative and additive genotype information for the query viral sequences based on two different, but related, scoring methods. The genotype information produced is reported in a graphical manner for the reference genotype matches and each graphical output is linked to the detailed sequence alignments between the query and the matched reference sequences. GTVseq also reports the potential 'repeats' and/or 'recombination' sequence region in a separated window. GTVseq does not replace completely other well-known genotyping tools such as NCBI's virus sequence genotyping tool (http://www.ncbi. nlm.nih.gov/projects/genotyping/formpage.cgi), but provides additional information useful in the confirmation or for further investigation of the genotype(s) for the newly isolated viral sequences.

Implementation of Location-Based Traffic Information Service System (위치기반 교통정보 서비스 시스템 구현)

  • Kim, Hyeock-Jin;Jean, Byoung-Chan
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.3
    • /
    • pp.121-128
    • /
    • 2008
  • This paper suggested a location-based traffic information service system using TPEG and GIS. Measurement technique, location server, applied service technique, and linkage technique with database were used to provide the location-based traffic information service. In particular, TPEG-RTM includes location information and load traffic message. The location information to be included in each message displayed a specific point, section or region limit of the load. Actually, because it was impossible to receive data using TPEG receiver, a proposed program included in this paper was used to produce an arbitrary database and read it, Also, TPEG event happened time was indicated on the map for matching test of a TPEG message and WGS84 coordinate, and finally it was verified with art example of a vehicle approaching to an event happened place.

  • PDF

A Design of Proactive Authentication Technique for Stable Roaming In Wireless LAN Environment (무선 랜 환경에서 안정적인 로밍을 위한 선행 인증기법 설계)

  • Hong, Soon-Ja;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.33-41
    • /
    • 2006
  • Wireless LAN is intrinsically weak in security of transmissions. WPKI (Wireless Public Key Infrastructure) is a well known Method to deal with the security issues in wireless LAN. The authentication required by the method becomes a source of unrellability of the hand-off performance. This paper suggests a solution to overcome the instability while using the WPKI technique, Prior to getting into the next region, a station is provided with the keys of the surrounding regions so that the possible delay problem can be avoided during the actual hand-off time. Thereby the hand-off instability can be solved in the WPKI framework.

  • PDF

A Study on the Standardization of Operation System for Road Tunnels (터널운영시스템 표준화 연구)

  • Kim, Tae-Hyung;Kim, Jin;Keum, Jae-Sung;Tae, Jae-Ho;Kim, Sun-Hong;Hong, Dae-Hie
    • Proceedings of the SAREK Conference
    • /
    • 2008.11a
    • /
    • pp.75-79
    • /
    • 2008
  • Since tunnel construction order was placed one by one, various sensors and actuators installed at the RTU and higher level system in each tunnel maintenance office had their own protocols depending on construction company. The TGMS testbed established on the extended region of Yong-dong Highway, for example, did not have consistent protocol between each automation levels and management levels without considering the functions and/or roles of each level. The management sever in each tunnel was simply networked to the TGMS server. Therefore, it is impossible to implement a new control algorithm as well as to integrate each other since each tunnel was constructed by different company. So, if the construction company is out of business, there is no way to maintain the corresponding tunnel effectively. In order to solve this problem, all the necessary standard protocols was established between automation level and management levels. These interface standards provide the clear classification between individual tunnel system and tunnel management system. So, even if construction company is different, its effect is minimized, so that it is expected to successfully establish PC based TGMS.

  • PDF

An Automatic ROI Extraction and Its Mask Generation based on Wavelet of Low DOF Image (피사계 심도가 낮은 이미지에서 웨이블릿 기반의 자동 ROI 추출 및 마스크 생성)

  • Park, Sun-Hwa;Seo, Yeong-Geon;Lee, Bu-Kweon;Kang, Ki-Jun;Kim, Ho-Yong;Kim, Hyung-Jun;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.93-101
    • /
    • 2009
  • This paper suggests a new algorithm automatically searching for Region-of-Interest(ROI) with high speed, using the edge information of high frequency subband transformed with wavelet. The proposed method executes a searching algorithm of 4-direction object boundary by the unit of block using the edge information, and detects ROIs. The whole image is splitted by $64{\times}64$ or $32{\times}32$ sized blocks and the blocks can be ROI block or background block according to taking the edges or not. The 4-directions searche the image from the outside to the center and the algorithm uses a feature that the low-DOF image has some edges as one goes to center. After searching all the edges, the method regards the inner blocks of the edges as ROI, and makes the ROI masks and sends them to server. This is one of the dynamic ROI method. The existing methods have had some problems of complicated filtering and region merge, but this method improved considerably the problems. Also, it was possible to apply to an application requiring real-time processing caused by the process of the unit of block.

Spatial View Materialization Technique by using R-Tree Reconstruction (R-tree 재구성 방법을 이용한 공간 뷰 실체화 기법)

  • Jeong, Bo-Heung;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.377-386
    • /
    • 2001
  • In spatial database system, spatial view is supported for efficient access method to spatial database and is managed by materialization and non-materialization technique. In non-materialization technique, repeated execution on the same query makes problems such as the bottle-neck effect of server-side and overloads on a network. In materialization technique, view maintenance technique is very difficult and maintenance cost is too high when the base table has been changed. In this paper, the SVMT (Spatial View Materialization Technique) is proposed by using R-tree re-construction. The SVMT is a technique which constructs a spatial index according to the distribution ratio of objects in spatial view. This ratio is computed by using a SVHR (Spatial View Height in R-tree) and SVOC (Spatial View Object Count). If the ratio is higher than the average, a spatial view is materialized and the R-tree index is re-used. In this case, the root node of this index is exchanged a node which has a MBR (Minimum Boundary Rectangle) value that can contains the whole region of spatial view at a minimum size. Otherwise, a spatial view is materialized and the R-tree is re-constructed. In this technique, the information of spatial view is managed by using a SVIT (Spatial View Information Table) and is stored on the record of this table. The proposed technique increases the speed of response time through fast query processing on a materialized view and eliminates additional costs occurred from repeatable query modification on the same query. With these advantages, it can greatly minimize the network overloads and the bottle-neck effect on the server.

  • PDF

Cloning of Notl-linked DNA Detected by Restriction Landmark Genomic Scanning of Human Genome

  • Kim Jeong-Hwan;Lee Kyung-Tae;Kim Hyung-Chul;Yang Jin-Ok;Hahn Yoon-Soo;Kim Sang-Soo;Kim Seon-Young;Yoo Hyang-Sook;Kim Yong-Sung
    • Genomics & Informatics
    • /
    • v.4 no.1
    • /
    • pp.1-10
    • /
    • 2006
  • Epigenetic alterations are common features of human solid tumors, though global DNA methylation has been difficult to assess. Restriction Landmark Genomic Scanning (RLGS) is one of technology to examine epigenetic alterations at several thousand Notl sites of promoter regions in tumor genome. To assess sequence information for Notl sequences in RLGS gel, we cloned 1,161 unique Notl-linked clones, compromising about 60% of the spots in the soluble region of RLGS profile, and performed BLAT searches on the UCSC genome server, May 2004 Freeze. 1,023 (88%) unique sequences were matched to the CpG islands of human genome showing a large bias of RLGS toward identifying potential genes or CpG islands. The cloned Notl-loci had a high frequency (71%) of occurrence within CpG islands near the 5' ends of known genes rather than within CpG islands near the 3' ends or intragenic regions, making RLGS a potent tool for the identification of gene-associated methylation events. By mixing RLGS gels with all Notl-linked clones, we addressed 151 Notl sequences onto a standard RLGS gel and compared them with previous reports from several types of tumors. We hope our sequence information will be useful to identify novel epigenetic targets in any types of tumor genome.

Real-Time Object Tracking Algorithm based on Minimal Contour in Surveillance Networks (서베일런스 네트워크에서 최소 윤곽을 기초로 하는 실시간 객체 추적 알고리즘)

  • Kang, Sung-Kwan;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.337-343
    • /
    • 2014
  • This paper proposes a minimal contour tracking algorithm that reduces transmission of data for tracking mobile objects in surveillance networks in terms of detection and communication load. This algorithm perform detection for object tracking and when it transmit image data to server from camera, it minimized communication load by reducing quantity of transmission data. This algorithm use minimal tracking area based on the kinematics of the object. The modeling of object's kinematics allows for pruning out part of the tracking area that cannot be mechanically visited by the mobile object within scheduled time. In applications to detect an object in real time,when transmitting a large amount of image data it is possible to reduce the transmission load.