• Title/Summary/Keyword: monitoring server

Search Result 865, Processing Time 0.025 seconds

Auto ABLB Audiometry System Supporting One-to-many Model (일 대 다 모델을 지원하는 자동 ABLB 청력 검사 시스템)

  • Song, Bok-Deuk;Kang, Deok-Hun;Shin, Bum-Joo;Kim, Jin-Dong;Jeon, Gye-Rok;Wang, Soo-Geun
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.24 no.6
    • /
    • pp.519-524
    • /
    • 2011
  • ABLB (alternate binaural loudness balance) test is one of the medical assessments to diagnose detailed lesion of sensory-neural hearing loss based on a recruitment phenomenon. However, current ABLB audiometry takes an operational model, so called face-to-face model, in which model one audiometrist can assess only one subject at a time. As a result, this face-to-face model leads to expensive audiometrist's labor cost and lengthy wait when there exist many subjects. As a solution, this paper suggests an ABLB audiometry system supporting one-to-many model in which model an audiometrist enables to assess several subjects concurrently. By providing such capabilities as real-time transfer of assessment result, video monitoring of subject and video chat, this solution can provide same effect as face-to-face model but overcome weakness of the existing face-to-face model.

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Channel Transition Analysis of Smart HLS with Dynamic Single Buffering Scheme (동적 단일 버퍼링 기법을 적용한 스마트 HLS의 채널변경 분석)

  • Kim, Chong-il;Kang, Min-goo;Kim, Dong-hyun;Kim, In-ki;Han, Kyung-sik
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.9-15
    • /
    • 2016
  • In this paper, we propose a smart HLS(HTTP Live Stream) platform with dynamic single buffering for the best transmission of adaptive video bit-rates. This smart HLS can optimizes the channel transition zapping-time with the monitoring of bandwidth between HLS server and OTT(Over The Top) client. This platform is designed through the control of video stream due to proper multi-bitrates and bandwidths. This proposed OTT can decode the live and VOD(Video On Demand) videos with the buffering of optimumal bitrate. And, the HLS can be cooperated with a smart OTT, and segmented for the m3u8 files of H.265 MPEG-2 TS(Transport Stream) videos. As a resullt, this single buffer based smart OTT can transmit optimal videos with the maximum data buffering according to the adaptive bit-rate depending on the network bandwidth efficiency and the decoded VOD video, too.

A Research on the Development of a GIS-based Real-time Urban Water Management System (GIS기반 실시간 도시용수 관리시스템 구현에 관한 연구)

  • Kim, Seong-Hoon;Kim, Eui-Myoung;Lim, Yong-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5290-5299
    • /
    • 2011
  • The ultimate purpose of this research is to propose a method to improve water supply management efficiency. As an effort to solve this comprehensive problem, the purposes of this paper are summarized into the following two main subjects. One is the development of a series of demand forecasting models targeting for each theme of urban water such as residential, commercial, industrial water. The other is the suggestion on the development and utilization plan of a GIS-based information system where the developed models are incorporated. For these, a series of efforts were performed such as evaluating and choosing of the candidate field areas, selecting a proper sensor and an installation point for each theme. Installed are sensors, a wireless communication infrastructure, and a field data acquisition and management server. Developed are a protocol for the wireless communication and a real-time data monitoring system. Nextly, the urban water facility-related and other necessary data were handled to make those into a series of GIS-ready databases. Finally, a GIS-based management system was designed and a blueprint for the implementation is suggested.

Implementation of Ubiquitous Application based on Context-Awareness (상황 인식 기반의 유비쿼터스 어플리케이션 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.744-751
    • /
    • 2008
  • Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.

A intelligent network weather map framework using mobile agent (이동 에이전트 기반 지능형 네트워크 weather map 프레임워크)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.203-211
    • /
    • 2006
  • Today, Internet covers a world wide range and most appliances of our life are linked to network from enterprise server to household electric appliance. Therefore, the importances of administrable framework that can grasp network state by real-time is increasing day by day. Our objective in this paper is to describe a network weather report framework that monitors network traffic and performance state to report a network situation including traffic status in real-time. We also describe a mobile agent architecture that collects state information in each network segment. The framework could inform a network manager of the network situation. Through the framework. network manager accumulates network data and increases network operating efficiency.

  • PDF

Autonomous evaluation of ambient vibration of underground spaces induced by adjacent subway trains using high-sensitivity wireless smart sensors

  • Sun, Ke;Zhang, Wei;Ding, Huaping;Kim, Robin E.;Spencer, Billie F. Jr.
    • Smart Structures and Systems
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • The operation of subway trains induces secondary structure-borne vibrations in the nearby underground spaces. The vibration, along with the associated noise, can cause annoyance and adverse physical, physiological, and psychological effects on humans in dense urban environments. Traditional tethered instruments restrict the rapid measurement and assessment on such vibration effect. This paper presents a novel approach for Wireless Smart Sensor (WSS)-based autonomous evaluation system for the subway train-induced vibrations. The system was implemented on a MEMSIC's Imote2 platform, using a SHM-H high-sensitivity accelerometer board stacked on top. A new embedded application VibrationLevelCalculation, which determines the International Organization for Standardization defined weighted acceleration level, was added into the Illinois Structural Health Monitoring Project Service Toolsuite. The system was verified in a large underground space, where a nearby subway station is a good source of ground excitation caused by the running subway trains. Using an on-board processor, each sensor calculated the distribution of vibration levels within the testing zone, and sent the distribution of vibration level by radio to display it on the central server. Also, the raw time-histories and frequency spectrum were retrieved from the WSS leaf nodes. Subsequently, spectral vibration levels in the one-third octave band, characterizing the vibrating influence of different frequency components on human bodies, was also calculated from each sensor node. Experimental validation demonstrates that the proposed system is efficient for autonomously evaluating the subway train-induced ambient vibration of underground spaces, and the system holds the potential of greatly reducing the laboring of dynamic field testing.

Implementation of fluid flow measuring and warning alarm system using an WeMos and an fluid flow sensor (WeMos와 유량 센서를 이용한 유속 모니터링 및 경보 알림 시스템 구현)

  • Yoo, Moonsung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.139-143
    • /
    • 2019
  • Measurement of flow rate is required in various fields. Water meters are often used at home, and flow meters are used in water and sewage plants, petrochemical industries and so on.. A system is needed to monitor the flow rate in real time and notify immediately when flow rate is abnormal. Recently, with the development of the IoT it is possible to construct such devices at low cost. WeMos can be programmed with Arduino IDE as a mini wifii IoT module. The flow sensor can output a digital pulse proportional to the flow rate. In this paper, we developed the flow monitoring and warning system using WeMos and IoT technology. When the system operates, it calculates the flow rate, sends the value as JSON format to the server, monitors the flow rate as graph from the remote with the smartphone. We also implement the system to promptly send alert message to the smart phone using Pushbullet when the flow rate is abnormal.

A Study on System Tracing User Activities in the Windows Operating System (윈도우 운영체제 상의 사용자 행위 추적에 관한 연구)

  • Jung, Chang-Sung;Kim, Young-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.101-114
    • /
    • 2011
  • As it seems like critical information leakages have been increasing due to industrial espionage and malicious internal users, the importance of introducing audit and log security technology is growing every now and then. In this paper, we suggest the session logging system for the company's internal control to meet the SOX legislation level, by monitoring and analyzing users behaviors connecting to the business-critical Operating System. The system proposed in this paper aims to monitor the user's illegal activities in the Operating System, and to present the clear evidence of purpose of those activities by detailed logs. For this purpose, we modified Operating System by adding multiple services suggested in this paper. These services utilize interfaces provided by the existing Operating System and add functions to control access and get logs. The system saves and manages session logs of users or administrators connected to the server with centralized log storage. And the system supports session log searching and lookup features required by SOX legislation for the company's internal controls with the level of computer forensics and logging technology.

Comparison and analysis of compression algorithms to improve transmission efficiency of manufacturing data (제조 현장 데이터 전송효율 향상을 위한 압축 알고리즘 비교 및 분석)

  • Lee, Min Jeong;Oh, Sung Bhin;Kim, Jin Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.94-103
    • /
    • 2022
  • As a large amount of data generated by sensors or devices at the manufacturing site is transmitted to the server or client, problems arise in network processing time delay and storage resource cost increase. To solve this problem, considering the manufacturing site, where real-time responsiveness and non-disruptive processes are essential, QRC (Quotient Remainder Compression) and BL_beta compression algorithms that enable real-time and lossless compression were applied to actual manufacturing site sensor data for the first time. As a result of the experiment, BL_beta had a higher compression rate than QRC. As a result of experimenting with the same data by slightly adjusting the data size of QRC, the compression rate of the QRC algorithm with the adjusted data size was 35.48% and 20.3% higher than the existing QRC and BL_beta compression algorithms.