• Title/Summary/Keyword: real-time network

Search Result 4,424, Processing Time 0.034 seconds

Indoor Air Quality Monitoring Systems in the IoT Environment (IoT 기반 실내 공기질 모니터링 시스템)

  • Oh, Chang-Se;Seo, Min-Seok;Lee, Jung-Hyuck;Kim, Sang-Hyun;Kim, Young-Don;Park, Hyun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.886-891
    • /
    • 2015
  • Recently, The World Health Organization announced that harms human health because of air pollution that are emerging as threats to human health worldwide. according to the, Seoul, 2011 According to a July 2014 - Public Facilities indoor air quality measurements, were examined to be in violation of indoor air pollution standards in most multi-use facility. Indoor air pollution resulting from this is present in the paper, and cause disease, such as pulmonary disease, asthma, bronchitis and to In this connection, the measurement of indoor air quality by using the environment sensor, analyzing the measured data to generate an actuator signal required for ventilation and improve indoor air quality by implementing a monitoring system with real-time measurement, autonomously managing the air quality in our lives so that it can be.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

A Study on the Development of the SCADA System using the Internet (인터넷을 이용한 SCADA 시스템 구축에 관한 연구)

  • Park, I.K.;Yoon, K.K.;Kim, Y.S.;Lee, S.G.;Ahn, B.W.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07g
    • /
    • pp.2373-2376
    • /
    • 1998
  • This paper describes the development of the SCADA(Supervisory Control and Data Acquisition) system which can be controlled via the Internet. In this paper, the SCADA system is composed of a number of microprocessor-based RTU(Remote Terminal Unit)s, a MMI(Man Machine Interface) host, a SCADA server, and SCADA clients. There are two protocols used in the system. Each RTU and the MMI host are connected by a RS-485 line and CSMA/CD(Carrier Sense Multiple Access / Collision Detection) protocol is used to communicate with each other. TCP/IP(Transmission Control Protocol/Internet Protocol) is used among the MMI host, the SCADA server, and SCADA clients. The equipments installed in the field are controlled by a number of RTUs. The function of the MMI host is to acquire real-time data from RTUs and control them. The SCADA server supports data transfer between the networked MMI host and the SCADA client on the web-server through TCP/lP. Data transfer is possible regardless of the type of network only if there are TCP/lP Winsock-compatible stack driver. The SCADA client is implemented as the shape of web-page by means of JAVA language. Therefore, it runs on a web-browser such as Netscape and Explorer, and allows a number of users to access this SCADA system.

  • PDF

Smart Outlet System for Single-person Household based on IoT (Internet of Things) (사물 인터넷 기반의 1인 가구를 위한 스마트 콘센트 시스템)

  • Kim, Hye-Suk;Park, Byeong-Ju;Cho, Young-Ju
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.895-904
    • /
    • 2017
  • In this paper, we propose an IoT based smart outlet system for one-person household with electric safety, electric energy consumption management and transmission of messages to the reserved contacts by connecting the emergency network. The proposed smart outlet system is implemented by parsing packet data and protocol between server, module, application and WiFi AP receiver. The WiFi AP built for communication can be used not only for the outlet but also for the gas barrier, the door lock and the like. In addition, the proposed method can provide the remote monitoring function by receiving the amount of power of the receptacle received through the AC current sensor (SCT-013) in real time. The smart outlet system is expected to be capable of automatically shutting off the power in case of emergency through automatic power use analysis in addition to the standby power cutoff function.

Development of AVL-GIS System Using IDGPS and Wireless Communication Techniques (IDGPS 와 무선통신을 이용한 AVL-GIS 시스템개발)

  • 안충현;양종윤;최종현
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.209-221
    • /
    • 1999
  • In this research, AVL-GIS(Automatic Vehicle Location System linked with Geographic Information System) system was developed using integration of core techniques of GIS engine written by Java language, GOS(Global Positioning System) and wireless telecommunication interfacing techniques. IDGPS(Inverted differential GPS) techniques was employed to estimate accurate position of mobile vehicle and to supervise their path from AVL-GLS control center system. Between mobile vehicle and AVL-GLS control center system which has spatial data analysis function, road network and rleate ddata base were connected wireless phone to communicate for position an dmessage in real time. The developed system from this research has more enhanced GIS functions rather than previous AVL oriented system which has MDT for message display and voice communication only. This system can support build-up application system such as fleet management like bus, taxi, truck, disaster and emergency and monitoring of transportation status for customer s order via web browser in filed of EC/CALS in low cost.

  • PDF

Design of Power Management System Supporting Automatic Detection and Cutoff of Standby Power for Enhancing User Convenience (사용자 편의성 향상을 위한 대기전력 자동검출 및 차단 기능을 지원하는 전원 관리 시스템 설계)

  • Hong, Suk-Il;Choi, Kwang-Soon;Hong, Ji-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.27-35
    • /
    • 2014
  • A Power Management System(PMS), which provides the functions of automatic detection and cutoff of home appliances' standby power without user intervention, is presented in this paper. A client in this system measures the power consumption of a home appliance plugged in it and transmits the information to a server in real-time over a wireless network. The server analyzes the features of the power consumption of home appliances and detects if any home appliance consumes standby power. The detected standby power information is used to create the information of the home appliance and to build a database, which will finally offer the automatic detection and cutoff of the standby power without any configuration through user intervention.

Implementation of Real-Time Network Quarter-View Battle Game Server to Make Nonstop Actions with Predicted Fire And Tussle (예측 사격과 난전을 통하여 논스톱 액션을 추구하는 실시간 네트워크 쿼터뷰 대전 게임 서버 구현)

  • Choi, Heul;Choi, Hyun-Ho;Lee, Bo-Young;Kim, Hyung-Geun;Seo, Jeong-Min;Lee, Seung-Yoon;Kim, Seul-Gi;Kim, Young-En;Shin, Bo-Ram;Lee, Chang-Heon;Kang, Myung-Ju;Kim, Sang-Jung;Lee, Jong-Won;Oh, Hyoun-Ju;Park, Chan-Il
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.293-296
    • /
    • 2014
  • 본 논문에서는 예측사격과 난전을 통하여 논스톱 액션을 추구하는 게임서버를 구현한다. 게임 서버를 구현하기 위하여 상용 엔진인 ProudNet과 Unity3D를 사용했으며, ProudNet은 강력한 상용 네트워크 엔진이며 Unity3D와 쉽게 데이터 통신을 할 수 있게 해준다. 클래스 다이어그램과 구성도를 통하여 예측 사격과 난전을 통하여 논스톱 액션을 추구하는 게임 서버 개발 방법을 제안한다.

  • PDF

Railway Timetable Considering Optimal Path Finding Method in Rail Network (Focused on Revenue Allocation) (열차스케줄을 고려한 도시철도 이용객의 통행행태 추정 (수입금 정산사례를 중심으로))

  • Lee, Chang-Hun;Shin, Seong-Il;Kim, Si-Gon
    • Journal of the Korean Society for Railway
    • /
    • v.18 no.2
    • /
    • pp.149-156
    • /
    • 2015
  • It is necessary to determine real path for urban railway users in order to allocate revenues between urban railway organizations. Out of several algorithms used to determine optimal routes, the k-path algorithm based on link-label has been utilized. However, this k-path algorithm has certain flaws. For example, optimal route can change depending on the travel and walking time, transfer penalty, and so on. Also, this algorithm cannot take into account the characteristics of users, who prefer express train to normal trains. In this paper, an algorithm is proposed to determine one single optimal route based on the traffic card data. This method also can search for an optimal path in conjunction with the railway timetable.

A study on data management policy direction for disaster safety management governance (재난안전관리 거버넌스 구축을 위한 데이터관리정책 방향에 관한 소고)

  • Kim, Young Mi
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.83-90
    • /
    • 2019
  • In addition to the proliferation of intelligent information technology, the field of disaster management is being approached from a multifaceted perspective. In particular, as the interest in establishing a disaster safety management system using data increases, there is an increasing need for a large amount of big data distribution generated in real time and a systematic management. Furthermore, efforts are being made to improve the quality of data in order to increase the prevention effect of disasters through data analysis and to make a system that can respond effectively and to predict the overall situation caused by the disasters. Disaster management should seek both precautionary measures and quick responses in the event of a disaster as well as a technical approach to establishing governance and safety. This study explores the policy implications of the significance and structure of disaster safety management governance using data.

Multiple-Class Dynamic Threshold algorithm for Multimedia Traffic (멀티미디어 트래픽을 위한 MCDT (Multiple-Class Dynamic Threshold) 알고리즘)

  • Kim, Sang-Yun;Lee, Sung-Chang;Ham, Jin-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.17-24
    • /
    • 2005
  • Traditional Internet applications such as FIP and E-mail are increasingly sharing bandwidth with newer, more demanding applications such as Web browsing, IP telephony, video conference and online games. These new applications require Quality of Service (QoS), in terms of delay, loss and throughput that are different from QoS requirements of traditional applications. Unfortunately, current Active Queue Management (AQM) approaches offer monolithic best-effort service to all Internet applications regardless of the current QoS requirements. This paper proposes and evaluates a new AQM technique, called MCDT that provides dynamic and separated buffer threshold for each Applications, those are FTP and e-mail on TCP traffic, streaming services on tagged UDP traffic, and the other services on untagged UDP traffic. Using a new QoS metric, our simulations demonstrate that MCDT yields higher QoS in terms of the delay variation and a packet loss than RED when there are heavy UDP traffics that include streaming applications and data applications. MCDT fits the current best-effort Internet environment without high complexity.