• Title/Summary/Keyword: User Monitoring Policy

Search Result 30, Processing Time 0.023 seconds

Households' Characteristics in Energy Consumption Data from Carbon Emission Monitoring System (CEMS) in Sejong City, Korea (가구 탄소모니터링 시스템에 의한 탄소배출특성 - 세종시 첫마을을 대상으로 -)

  • Leem, Yountaik;Lee, Sang Ho
    • KIEAE Journal
    • /
    • v.13 no.6
    • /
    • pp.55-65
    • /
    • 2013
  • Korean Government has developed Sejong City as a new administration city. This city of future was planned and designed toward one of the most eco-friendly city on the basis of ICTs. To attain this object, a carbon emission monitoring system (CEMS) was designed and installed as a part of u-city service which provides various information anytime and anywhere to enrich the people's quality of life. In this paper, at first, the structure and functions of CEMS are introduced. This system is consist of 5 parts - data collection from user and linked public DBs, transforming data into meaningful information for the policy makers, system-user interfacing via statistical tables and graphs, and system maintenance. This system can be operated by the citizen participation through whole the process. With the help of GIS map and graphic interface, statistics of monitored data for both citizen and decision maker provided and after feed-back, they have affected on the behaviour of citizen's energy consumption and related policy as well. By the CEMS, energy consumption data of 124 agreed households were collected during 9 months in 2012. Electricity, gas and water consumption were remote-metered automatically by the system and analysed. This showed that more than 85% of CO2 emission is rely on electricity usage. Furthermore, number of family members and size of house influences on the emission of CO2 by each household together with the life-style of the occupants. Electricity and water consumption showed the seasonal factor while gas consumption represents the number of family members. Even this paper has limitations caused by 9 months of data collection, it shows the policy directions to reduce the emission of CO2 focusing on the house size and number of family members of each households. With the result of this research, life-style of the generation of dwellers should be investigated and the CO2 emission characteristics of other housing type as well for the data building for future policy making.

A Design of Policy-Based Composite Web Services QoS Monitoring System (정책 기반의 합성된 웹 서비스 품질 모니터링 시스템의 설계)

  • Yeom, Gwy-Duk;Jeong, Choong-Kyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.189-197
    • /
    • 2009
  • As the web service technology matures. research is focused on the composite web services that combine individual web services within an enterprise or between enterprises. Quality of service is the critical competitiveness factor in this mature technology stage where there are many services with similar functionalities differing only in some non-functional properties. Monitoring is the key component for the service quality management of a web service. A service quality monitoring system design using a broker is presented in this paper. OWL-S is used to specify the composite service process and a service policy (inputs and outputs of each service, quality attributes and values, etc.) built by WS-Policy is applied to the composite service process. If there is any discrepancy between the service policy and the monitored data, the service provider and the user are notified of it so as to take necessary measures. We have implemented a travel reservation system as an example of the presented design and the experimental results are shown. Average response time was monitored and the timeout policy was applied in the experiment.

Remote Healthcare Monitoring System Using Attribute based Encryption (속성기반 암호화를 이용한 원격 헬스케어 모니터링 시스템)

  • Song, You-Jin;Do, Jeong-Min
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.63-70
    • /
    • 2012
  • To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.

An Integrated Architecture for Control and Monitoring Systems on Naval Surface Combatants (함정 통제체계의 통합 아키텍쳐 연구)

  • Oh, Seongwon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.1
    • /
    • pp.103-114
    • /
    • 2018
  • The operational concept of control systems on surface combatants has been changed from individual control for each system to integrated control for all systems due to computing technology development and crew reduction policy of navy. The purpose of this study is to identify current status of control technology, to analyze user requirement and to develop an architecture to support the conceptual change of ship control. An architecture, which integrates several control and monitoring systems on naval surface combatant, is proposed. The proposed architecture is focused on sharing network and computing resources related to user command, and reducing systems complexity. The architecture can be adopted to next surface combatants in Korean navy.

Implementation of Real-Time Wireless Web Server Load Monitoring System

  • Park, Hong-Jin;Kwon, Chang-Hee
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2004.11a
    • /
    • pp.211-219
    • /
    • 2004
  • Due to rapid increases in Internet users, it becomes essential to provide well-established web services and monitor web server's load for the sake of reliable web server management. The existing web server load monitoring has been based on such cable methods as RPC, RMI, CORBA and etc. But it has the limitation in bringing information both anywhere and anytime over the Internet. This thesis is aimed to realize real-time wireless web server monitoring system based on Wireless Application Protocol (WAP). As any user can log on wirelessly to the Internet at any time through wireless terminals like PDA, the realization will make possible instant and real-time web server monitoring.

  • PDF

Real-Time File Access Event Collection Methodology for Zero Trust Environment (제로 트러스트 환경의 실시간 파일 접근 이벤트 수집 방법에 관한 연구)

  • Han, Sung-Hwa;Lee, Hoo-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1391-1396
    • /
    • 2021
  • The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.

An User-Friendly Method of Image Warping for Traffic Monitoring System (실시간 교통상황 모니터링 시스템을 위한 유저 친화적인 영상 변형 방법)

  • Yi, Chuho;Cho, Jungwon
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.231-236
    • /
    • 2016
  • Currently, a traffic monitoring service using a surveillance camera is provided through internet. In general, if the user points a certain location on a map, then this service shows the real-time image of the camera where it is mounted. In this paper, we proposed the intuitive surveillance monitoring system which displays a real-time camera image on the map by warping with bird's-eye view and with the top of image as the north. In order to robustly estimate the road plane using camera image, we used the motion vectors which can be detected to changes in brightness. We applied a re-adjustment process to have the same directivity with a map and presented a user-friendly interface that can be displayed on the map. In the experiment, the proposed method was presented as the result of warping image that the user can easily perceive like a map.

Designing a Healthcare Service Model for IoB Environments (IoB 환경을 위한 헬스케어 서비스 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Policy
    • /
    • v.1 no.1
    • /
    • pp.15-20
    • /
    • 2022
  • Recently, the healthcare field is trying to develop a model that can improve service quality by reflecting the requirements of various industrial fields. In this paper, we propose an Internet of Behavior (IoB) environment model that can process users' healthcare information in real time in a 5G environment to improve healthcare services. The purpose of the proposed model is to analyze the user's healthcare information through deep learning and then check the health status in real time. In this case, the biometric information of the user is transmitted through communication equipment attached to the portable medical equipment, and user authentication is performed through information previously input to the attached IoB device. The difference from the existing IoT healthcare service is that it analyzes the user's habits and behavior patterns and converts them into digital data, and it can induce user-specific behaviors to improve the user's healthcare service based on the collected data.

Kernel Level Power Management Solution for Multi-Core (멀티코어 환경에서 커널 수준의 전력 관리 솔루션)

  • Ahn, Youngho;Hwang, Young-Si;Chung, Ki-Seok
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.4 no.2
    • /
    • pp.50-54
    • /
    • 2009
  • In this paper, we address a novel system-level power management technique which is specifically targeted for an ARM 11 MPCore system. Our proposed solution is a DPM technique which includes process monitoring, real time power analysis, and policy application to reduce the power consumption while meeting the performance requirement. One of the main contributions of this paper is that we systematically infer QoS requirements of processes without getting any additional information from the application. When multiple processes are running under various user level policies, priorities of the policy application are determined in such a way that the overall system performance is maintained while power consumption is effectively managed. Experimental results show that our DPM technique is very effective in reducing power consumption without violating system's QoS requirements.

  • PDF

A Performance Monitoring System for Heterogeneous SOAP Nodes (이기종 SOAP 노드의 실시간 성능 모니터링 시스템)

  • Lee Woo-Joong;Kim Jungsun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.484-498
    • /
    • 2004
  • In this paper. we propose a novel performance monitoring scheme for heterogeneous SOAP nodes. The scheme is basically based on two-level (kernel-level and user-level) packet filtering of TCP flows. By TCP flow, we mean a sequence of raw packet streams on a TCP transaction. In this scheme, we detect and extract SOAP operations embedded in SOAP messages from TCP flows. Therefore, it becomes possible to monitor heterogeneous SOAP nodes deployed on diverse SOAP-based middlewares such as .Net and Apache AXIS. We present two implementation mechanisms for the proposed scheme. The first mechanism tries to identify SOAP operations by analyzing all fragmented SOAP messages on TCP flows. However, a naive policy would incur untolerable overhead since it needs to copy all packets from kernel to user space. The second mechanism overcomes this problem by selectively copying packets from kernel to user space. For selective copying, we use a kernel-level packet filtering method that makes use of some representative TCP flags.(e.g. SIN, FIN and PSH). In this mechanism, we can detect SOAP operations only from the last fragment of SOAP messages in most cases. Finally, we implement a SOAP monitoring system using a component ca]led SOAP Sniffer that realizes our proposed scheme, and show experimental results. We strongly believe that our system will play a vital role as a tool for various services such as transaction monitoring and load balancing among heterogeneous SOAP nodes.