• 제목/요약/키워드: Tool server

검색결과 282건 처리시간 0.033초

라즈베리파이 서버 & SEN Remote HMI 앱 기반의 스마트 홈 제어 (Smart Home Control based on Raspberry Pi Server & SEN Remote HMI App)

  • 김남성
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 춘계학술대회
    • /
    • pp.533-536
    • /
    • 2016
  • 본 논문에서는 스마트 홈 제어를 위해서 라즈베리파이 서버 기반으로 SEN Remote HMI 앱 툴을 활용하였다. 스마트 홈 구현을 위한 관련된 많은 제품들이 출시되어 있지만 대기업에서 주도하여 구축한 스마트 홈 시스템의 폐쇄성 및 인터넷 서비스 회사(ISP)의 관련 제품들의 연동성 부족으로 인해서 활용성이 제한적이다. 이에 개방형이며 저가인 라즈베리파이를 서버로 구축하고, 안드로이드 기반의 그래픽 프로그래밍 소프트웨어인 SEN Remote HMI를 활용한 스마트 홈 제어 시스템을 구축하였다. 이를 기반으로 라즈베리파이와 아두이노의 인터페이스를 통한 시스템 확장 및 추가적인 연동을 구축하면, 스마트 홈 구현을 위한 사물인터넷(IoT) 환경으로 확대가 가능해 질 것으로 기대된다.

  • PDF

P2P 개요 및 P2P-based Collaborative Machine의 Scheme (Scheme of P2P and P2P-based Collaborative Machine)

  • 김동훈;송준엽
    • 한국공작기계학회:학술대회논문집
    • /
    • 한국공작기계학회 2005년도 춘계학술대회 논문집
    • /
    • pp.477-482
    • /
    • 2005
  • Recently, client computing trend has been changed from server oriented information application to network based P2P(Peer to Peer) services. The conventional client/server method has the merit of accessing abundant information, on the other side P2P has the merit of synchronized community support and information exchange. P2P has four meaning of point to point, peer to peer, person to person and path to profitability. In manufacturing system field, the second meaning is interested. P2P is classified to three type such as conventional client/server, hybrid P2P and pure P2P. The third is really peer to peer concept. The related technologies with P2P are P2P searching, XML, cooperation, IPv6, computing sharing and P2P communication. This paper describes the scheme of P2P and related contents. And through the P2P based technology, a P2P-based collaborative machine and a vertical portal machine are introduced in this paper. The scheme of the machines mentioned above is suggested for cooperation in manufacturing system and u-Manufacturing.

  • PDF

임베디드 리눅스 기반의 IEEE 802.15.4 패킷 분석기 설계 및 구현 (Design and Implementation of IEEE 802.15.4 Packet Analyzer Based on Embedded Linux)

  • 이창우;조현우;반성준;김상우
    • 제어로봇시스템학회논문지
    • /
    • 제13권12호
    • /
    • pp.1173-1178
    • /
    • 2007
  • Ubiquitous sensor network (USN) is composed of many sensor nodes which are one of the simplest form of embedded system. In developing the sensor network system, a debugging tool is necessary to test and verify the system. Recently, a so-called packet analyzer has been developed for this purpose, and it supports IEEE 802.15.4 which is considered as the standard for the sensor network protocols. The major function of the packet analyzer is to take RF packets from sensor nodes and show the structure and the data of the packets graphically to the user. However, the conventional packet analyzers do not support remote control because they require a USB interface along with a personal computer. To make it available for remote control, we propose a new packet analyzer based on a server-client scheme in which a server program is implemented on embedded Linux and a client program is implemented on Windows for convenient use.

Factors Affecting Restaurant Consumers' Tipping Behavior

  • Cho, Sun Bai
    • 품질경영학회지
    • /
    • 제42권1호
    • /
    • pp.15-32
    • /
    • 2014
  • This study examines the relationship between tip amount and its possible antecedents: bill size, the Big Five personality types, meal type, food quality, atmosphere, service quality, consumer gender, server gender, customer hospitality experience, race, and alcohol consumption. A survey of southeastern undergraduate students was conducted to collect information about the customer, server and customer tipping habits. While the analysis suggests that service is an important factor, it shows that other factors affect tip amount. Furthermore, these factors affect tip amounts in many different ways. Some examples of these factors include bill size, alcohol consumption, gender dynamics, meal type, food quality, and personality type. The conclusion suggests the intuition behind these factors by providing a dissection of their meaning and their importance to servers, customers, and managers alike. Purpose: This study tests restaurant customer tipping habits and some personality traits that have received limited previous attention as predictors of tipping. Methods: This study is that the tip amount was self-reported, business students at a university in a large southeastern city of USA were asked to complete a tipping journal. Results: This study was able to replicate the service-tipping relationship. Moreover, this study reiterated that server friendliness is a very powerful tool to increasing tips. Conclusion: This study strongly indicate that service has a positive relationship with tip amount, and also produce a positive relationship with emotional stability and a negative relationship to conscientiousness.

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권3호
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

Optimization of a Composite Laminated Structure by Network-Based Genetic Algorithm

  • Park, Jung-Sun;Song, Seok-Bong
    • Journal of Mechanical Science and Technology
    • /
    • 제16권8호
    • /
    • pp.1033-1038
    • /
    • 2002
  • Genetic alsorithm (GA) , compared to the gradient-based optimization, has advantages of convergence to a global optimized solution. The genetic algorithm requires so many number of analyses that may cause high computational cost for genetic search. This paper proposes a personal computer network programming based on TCP/IP protocol and client-server model using socket, to improve processing speed of the genetic algorithm for optimization of composite laminated structures. By distributed processing for the generated population, improvement in processing speed has been obtained. Consequently, usage of network-based genetic algorithm with the faster network communication speed will be a very valuable tool for the discrete optimization of large scale and complex structures requiring high computational cost.

화상처리 및 무선네트워크를 이용한 무인 측정 지점에서의 원격 계측 자동화에 관한 연구 (A Study on the Automatic Measurement at an Unmanned Measuring Station Using Image Processing and Wireless Networks)

  • 이한준;차명석;이충훈
    • 한국공작기계학회논문집
    • /
    • 제16권3호
    • /
    • pp.15-22
    • /
    • 2007
  • An automatic measurement system which collects experimental data at an unmanned station where the networking to the internet could not be accessed was developed. With a Robo-rail accessing to the unmanned station, wireless local networking between server PC at the Rob-rail and client PC at the unmanned station is possible within 30 m from an access point equipment located at the unmanned station. An algorithm for transferring the data file which is saved in the client PC at the unmanned station to the server PC in the Robo-rail was proposed. IEEE-1394 camera was used to collect the data at the client PC. An extracting program from the IEEE-1394 captured images to character data and number data was developed using image processing technique, which drastically reduces the size of data file comparing to that of the raw image file.

기술정보시스템 개발

  • 용석균;유병훈;김용삼;노호창
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 1993년도 춘계공동학술대회 발표논문 및 초록집; 계명대학교, 대구; 30 Apr.-1 May 1993
    • /
    • pp.369-378
    • /
    • 1993
  • 현대의 극심한 경쟁체제속에서 제조업체의 생존여부는, 얼마나 좋은제품을 신속히 시장에 출시하느냐에 달려있으며, 이러한 경쟁력을 갖추기 위해서는 제품개발에 관련된 각종정보의 부문간 공유 및 흐름의 제어가 그 성패의 관건이라 할 수 있다. 따라서 본 연구의 목적은 삼성전자의 제품개발과정에서 발생되는 모든 기술정보를 효율적으로 관리할 수 있는 체계를 확립하고, 이 체계를 System적으로 구현하여 각종 기술정보를 생성하고, 조회하는 개발자들의 현업에 이 System을 적용하고자 하는데 있다. 본 연구에 사용된 개발 Tool은 X-terminal과 HP EWS이었고, 실제 사용자들의 운용기종은 선진각국의 Server & Client추세에 따라, DB Server로는 HP9000/865S를 채택하고, Client로는 HP EWS, X-terminal, PC386등의 기종을 적용하였다. 또한 개발언어는 'C'language를 사용하였고 DBMS는 IBM MIS와의 연계를 위해, Oracle을 이용하였다. 본 연구의 결과로써 나타나는 효과는, 외형적으로 각종 기술정보의 공유로 인한 설계품질향상과 개발 납기 단축이라 할 수 있으며, 그 내면에 있는 개발관련 각종자료 및 업무의 표준화와 도면관리System의 개발 기술확보 또한 중요한 성과라 할 수 있다.

  • PDF

출구 릴레이 방법론을 이용한 Tor 보안 정책 (A Tor Security Policy using Exit Relay Methodology)

  • 장덕성;박소연;최두영
    • 한국멀티미디어학회논문지
    • /
    • 제20권6호
    • /
    • pp.911-917
    • /
    • 2017
  • Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

A Potential Target of Tanshinone IIA for Acute Promyelocytic Leukemia Revealed by Inverse Docking and Drug Repurposing

  • Chen, Shao-Jun
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권10호
    • /
    • pp.4301-4305
    • /
    • 2014
  • Tanshinone IIA is a pharmacologically active ingredient extracted from Danshen, a Chinese traditional medicine. Its molecular mechanisms are still unclear. The present study utilized computational approaches to uncover the potential targets of this compound. In this research, PharmMapper server was used as the inverse docking tool andnd the results were verified by Autodock vina in PyRx 0.8, and by DRAR-CPI, a server for drug repositioning via the chemical-protein interactome. Results showed that the retinoic acid receptor alpha ($RAR{\alpha}$), a target protein in acute promyelocytic leukemia (APL), was in the top rank, with a pharmacophore model matching well the molecular features of Tanshinone IIA. Moreover, molecular docking and drug repurposing results showed that the complex was also matched in terms of structure and chemical-protein interactions. These results indicated that $RAR{\alpha}$ may be a potential target of Tanshinone IIA for APL. The study can provide useful information for further biological and biochemical research on natural compounds.