• Title/Summary/Keyword: web-monitoring system

Search Result 670, Processing Time 0.031 seconds

Rice variety IPB3S and IPB prima production technology to support food self-sufficiency in Indonesia

  • Aswidinnoor, Hajrial;Guntoro, Dwi;Sugiyanta, Sugiyanta;Wiyono, Suryo;Widodo, Suryo;Wijaya, Hermanu;Nindita, Anggi;Furqoni, Hafith
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.61-61
    • /
    • 2017
  • Dissemination of IPB3S rice variety combined with cultivation technology named IPB Prima was aimed to introduce IPB research product particularly for IPB rice variety with high-yield character that is IPB3S. The rice variety IPB3S and IPB Prima cultivation technology was expected to be one of solution to improve rice productivity and accelerate to food self-sufficiency in Indonesia. Research sctivity was consist of three main research unit i.e. (1) Dissemination of IPB3S rice variety and IPB Prima production technology; (2) The development of Information and management web-based system (IMS) for planning and monitoring IPB3S and IPB Prima application distribution; and (3) The development of High-capacity grain drying system in Fluidized-bed drying ang in-store drying system. The objective of main research i.e. to introduce IPB high-yield rice variety, to accelerate rice productivity to support self-sufficiency, to develop integrated system model through fluidized and in-store drying, and to develop web-based management-information system in result analyzing IPB3S and IPB Prima distribution and technology application. The dissemination activities was arranged in two location. The first location was in Banyuwangi, East Java with total area 10.87 ha, consist of 8.91 ha planting area for IPB3S and 1.96 ha planting area for Ciherang. The second location is in Tegal, Middle Java with total planting area in 5 ha. The experiment was arranged in different treatment of varieties and cultivation method. The experiment consist of (1) rice variety Ciherang with conventional cultivation technology (P0); (2) rice variety Ciherang with IPB Prima cultivation technology (P1); (3) rice variety IPB3S with conventional cultivation technology (P2); (4) rice variety IPB3S with IPB Prima cultivation technology (P3). Planting distance for twin rows system is $50cm{\times}25cm{\times}12.5cm$. Planting distance for single row system is $25cm{\times}25{\times}cm$. The research result elucidated that productivity result in two location has different grades in similar trend. Experiment in Tegal resulted P0 result is $6.18ton\;ha^{-1}$, P1 result is $630ton\;ha^{-1}$, P2 result is $6.82ton\;ha^{-1}$, P3 result is $7.31ton\;ha^{-1}$. Experiment in Banyuwangi resulted optimum production of IPB3S variety productivity number are 7.29 ton ha-1, while Ciherang are $6.73ton\;ha^{-1}$.

  • PDF

A Semantics-based protocol for Business Process Transactions (비즈니스 프로세스 트랜잭션을 위한 시맨틱스 기반의 프로토콜)

  • Kang, Dong-Woo;Lee, Sun-Jae;Lee, Jae-Yeol;Kim, Kwang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.93-110
    • /
    • 2006
  • A Business Process Management System(BPMS) requires transaction management to guarantee reliability for transactions. Though several transaction protocols have been suggested for the transaction management, the difference of transaction protocols interrupts interoperability among transaction management systems. In this paper, a business process transaction based on semantics is suggested. It is defined based on the static semantics and the operational semantics. As the static semantics defines the ontologies for transaction states and transaction messages using Web Ontology Language(OWL), it solves the difference of expression for the concepts of transaction protocols. As the operational semantics defines state transitions of business process transactions using Abstract State Machine(ASM), it can guarantee formalism for transaction operations. The operational semantics refers to the state ontology and message ontology defined in the static semantics. This approach can enhance interoperability among various transaction protocols, increase the understandability for the transaction protocols, and support autonomous transaction execution and systematic transaction monitoring.

  • PDF

Digital Epidemiology: Use of Digital Data Collected for Non-epidemiological Purposes in Epidemiological Studies

  • Park, Hyeoun-Ae;Jung, Hyesil;On, Jeongah;Park, Seul Ki;Kang, Hannah
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.253-262
    • /
    • 2018
  • Objectives: We reviewed digital epidemiological studies to characterize how researchers are using digital data by topic domain, study purpose, data source, and analytic method. Methods: We reviewed research articles published within the last decade that used digital data to answer epidemiological research questions. Data were abstracted from these articles using a data collection tool that we developed. Finally, we summarized the characteristics of the digital epidemiological studies. Results: We identified six main topic domains: infectious diseases (58.7%), non-communicable diseases (29.4%), mental health and substance use (8.3%), general population behavior (4.6%), environmental, dietary, and lifestyle (4.6%), and vital status (0.9%). We identified four categories for the study purpose: description (22.9%), exploration (34.9%), explanation (27.5%), and prediction and control (14.7%). We identified eight categories for the data sources: web search query (52.3%), social media posts (31.2%), web portal posts (11.9%), webpage access logs (7.3%), images (7.3%), mobile phone network data (1.8%), global positioning system data (1.8%), and others (2.8%). Of these, 50.5% used correlation analyses, 41.3% regression analyses, 25.6% machine learning, and 19.3% descriptive analyses. Conclusions: Digital data collected for non-epidemiological purposes are being used to study health phenomena in a variety of topic domains. Digital epidemiology requires access to large datasets and advanced analytics. Ensuring open access is clearly at odds with the desire to have as little personal data as possible in these large datasets to protect privacy. Establishment of data cooperatives with restricted access may be a solution to this dilemma.

A Technique for Detecting Malicious Java Applet Using Java-Methods Substitution (메서드 치환을 이용한 악성 자바 애플릿 탐지 기법)

  • 이승수;오형근;배병철;고재영;박춘식
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.15-22
    • /
    • 2002
  • Java applet, executed in user's web browsers which is via proxy server on web sever, can approach client files or resources, so it is necessary to secure against malicious java applet. Currently, the previous security countermeasures against malicious java applet use two ways: one is making a filter system to detect malicious java applet hewn in proxy, the other is that establishes another security java virtual machine. However, the first one can not detect unknown malicious java applet, and the other one nay increase loads, because it decides whether there is malicious or not after implementing java applet on proxy server. In this paper, after inserting monitoring function to java applet on proxy server using java-methods substitution and transfer it to user to detect malicious java applet, we propose a technique for detecting malicious java applet that can detect the unknown malicious java applet with reducing loads

Real-time Monitoring System for Rotating Machinery with IoT-based Cloud Platform (회전기계류 상태 실시간 진단을 위한 IoT 기반 클라우드 플랫폼 개발)

  • Jeong, Haedong;Kim, Suhyun;Woo, Sunhee;Kim, Songhyun;Lee, Seungchul
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.6
    • /
    • pp.517-524
    • /
    • 2017
  • The objective of this research is to improve the efficiency of data collection from many machine components on smart factory floors using IoT(Internet of things) techniques and cloud platform, and to make it easy to update outdated diagnostic schemes through online deployment methods from cloud resources. The short-term analysis is implemented by a micro-controller, and it includes machine-learning algorithms for inferring snapshot information of the machine components. For long-term analysis, time-series and high-dimension data are used for root cause analysis by combining a cloud platform and multivariate analysis techniques. The diagnostic results are visualized in a web-based display dashboard for an unconstrained user access. The implementation is demonstrated to identify its performance in data acquisition and analysis for rotating machinery.

Implementation of u-Care System Based on Multi-Sensor in u-Home Environment (u-Home 환경에서 멀티센서 기반 u-Care System 구현)

  • Lee, Hee-Jeong;Kang, Sin-Jae;Jang, Hyung-Geun;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.135-147
    • /
    • 2011
  • As the number of elderly people living alone has been increasing in the recent years, systems for their safety have been required, and some related services or pilot systems have been operating. These systems provide the monitoring service for the activities of the elderly people living alone with indoor location tracking technology using the various sensors. However, most systems provide services on expensive infrastructure such as attached tags and mobile devices. In this point, this paper attempts to suggest a system based on low cost sensors to collect event data in home environment. And a main characteristic of the system is that people can monitor the results of provided services through web browser in real time and the system can provide related context information to guardians and health care managers through SMS of mobile phone.

A Design on Radio-Communications Operation of the Fishery VMS by VHF DSC in the East Sea Area (VHF DSC에 의한 동해권 어업 VMS의 통신운용 설계)

  • Choi, Jo-Cheon;Jeong, Young-Cheol;Kim, Jeong Uk;Choi, Myeong Soo;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.4
    • /
    • pp.371-377
    • /
    • 2013
  • Fishing boats more than 5 tons is obliged to VHF DSC by Fishing Vessels Act and Vessel Safety Act. The owner of the fishing vessel is equipped to the automatic position reporting device in accordance with the Notice of the Minister of Land, Transport and Maritime Affairs to regulations, shall be ensure to navigations safety and in order to respond quickly in the event of maritime accidents on fishing vessels. East sea set up to start in 2012, which is now underway the annual install plain to the yellow sea and the south sea for VHF coast stations. It is web-based remote operation of DSC on the remote control and monitoring in Fishery Information Communication Station for the coastal VMS construction project. All fishing vessels is VHF DSC in conjunction with the GPS that location information transmitted to the coast station. automatically by the DSC call. This paper has been studied on the communications coverage set up and traffic operation for realization a roaming service by navigation route tracking and RSSI techniques in parallel algorithm refer to VHF DSC coast stations in east sea.

(A study on the Telemetry monitoring and control of the multi environment factor) (다중 환경요소의 원격감시 및 제어에 대한 연구)

  • Ju, Gwi-Yeong;Choe, Jo-Cheon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.1
    • /
    • pp.7-15
    • /
    • 2002
  • This paper is concerned with remote environment monitoring & control for the breeding house as scattering far and wide. The environment data is detected in the breeding house that is collected to one processor. It's adapted to the PSTN(public switch tele-phone network) and multi-processing for exchange the environment data and the control data in between the manager and a breeding house by micro-processor. We have designed the algorithm of the communication sequence through the experimental research. This system is composed of sensor interface, FSK communications, LED display, data latch and MCS-51 single-chip. The S/W is composed with data acquisition by multi-processing, data communication and interrupt. And this paper is Proposed the DB structure algorithm concern to a mount scale using web design. The subject is a performance of effective management for the breeding house.

Fabrication of smart alarm service system using a tiny flame detection sensor based on a Raspberry Pi (라즈베리파이 기반 미소 불꽃 감지를 이용한 스마트 경보 서비스 시스템 구현)

  • Lee, Young-Min;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.953-958
    • /
    • 2015
  • Raspberry Pi is a credit card-sized computer with support for a large number of input and output peripherals. This makes it the perfect platform for interaction with many different devices and for usage in a wide range of applications. When combined with Wi-Fi, it can communicate remotely, therefore increasing its suitability for the construction of wireless sensor nodes. In addition, data processing and decision-making can be based on artificial intelligence, what is performed in developed testbed on the example of monitoring and determining the confidence of fire. In this paper, we demonstrated the usage of Raspberry Pi as a sensor web node for fire-safety monitoring in a building. When the UV-flame sensors detect a flame as thin as that of a candle, the Raspberry Pi sends a push-message to notify the assigned smartphone of the on-site situation through the GCM server. A mobile app was developed to provide a real-time video streaming service in order to determine a false alarm. If an emergency occurs, one can immediately call for help.

A Study on Management Method of Infectious Wastes Applying RFID (감염성 폐기물 관리를 위한 RFID 적용에 관한 연구)

  • Joung, Lyang-Jae;Sung, Nak-Chang;Kang, Hean-Chan;Kang, Dae-Seong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.63-72
    • /
    • 2007
  • Recently, as recognizing the risk about the infection of an infectious wastes, the problems about the management and treatment of the infectious wastes stand out socially. In this paper, as being possible monitoring whole processing from the origin of the infectious waste to the processing plant, using the RFID which is the kernel technology of the next generation, we tried to solve the second infection problem by inefficient treatment of the infectious wastes. Through the research suggesting in this paper, as storing and monitoring the procedural business articles and the problem about miss-writing and input error being found in management system like documentary writing by the existing manager and computation input by the web application, we can understand the management state, immediately. And the Bio information for the personal authentication is carried out through storing the feature vector calculation by the PCA algorithm, into the tag. It suggested more systematic and safer management plan than previous thing, as giving attention about the wastes to manager.

  • PDF