• Title/Summary/Keyword: Administrator

Search Result 573, Processing Time 0.023 seconds

Real-time Reagent Management System Using NFC / Sensor (NFC/센서를 이용한 실시간 시약 관리 시스템)

  • Kim, Ho-Sung;Jang, Jae-Myung;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.421-426
    • /
    • 2016
  • Recent developments in internet technologies has enabled widespread growth of embedded systems like Arduino, Raspberry Pi and other smart home systems. A research in the industrial sector on the utilization of the board has been made. The development needs of the embedded board in a reagent bottle case system has been highlighted. Current reagent Management System has to hold and manage the reagent itself is mostly to save the program using handwritten or machine. In addition, there is a risk to the system during the vulnerable zone administrator to manage the situation of the reagent bottle case can lead to a massive fire. In this paper, reagent bottle case RFID readers and data in real-time is monitored by attaching a sensor management through the database and sends a warning message to the mobile device of the administrator in real time during hazardous situations in the reagent bottle case. This is improve the reliability and efficiency of reagent bottle case.

Design and Implementation of Monitoring System for Stable ATSC Mobile DTV (안정적인 ATSC Mobile DTV 방송을 위한 모니터링 시스템 설계 및 구현)

  • Yu, Saet-Byeol;Cho, Min-Ju;Sohn, Ye-Jin;Chon, Sung-Hee;Lee, Jae-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.41-49
    • /
    • 2010
  • Digital broadcasting system has various affecting factors unlike analog broadcasting system, and has possibility of no signal reception in case of errors due to characteristics of digital system. And, digital broadcasting system has monitoring system for error occurrences handling various factors. ATSC mobile DTV system uses legacy frequency and provides mobile broadcasting services, and also requires monitoring systems for monitoring online broadcasting services and reporting to administrator about interference or influence with legacy systems, and error situations. In this paper, we propose efficient monitoring system which monitors online broadcasting status of ATSC mobile DTV, reports on poor signal reception, video streaming failures to administrator, and maintains reliable digital broad ca sting system.

A Location Recognition and Notification Method of Attacker in Wireless Network Environment (모바일 환경에서의 공격자 위치 특정 및 알람 기법)

  • Bong, Jin-Sook;Park, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.201-211
    • /
    • 2017
  • Wireless network using dynamic IP and mobile IP technology provides the user with convenience of access and movement. However, this causes the attacker who disguises normal user(pretending to be a regular user) to have more opportunity in regard to access and acquisition of information. This paper help the network administrator and the service provider quickly to recognize the attacker's intention to access network and service. Therefore network administrator and service provider can specify and respond the location of the attacker appropriately. To achieve above, we define an entity (W_L_M) that manages user information of WiFi and LTE network, and propose messages and procedures for attacker's location identification and alarm. The performance evaluation of this paper is based on qualitative analysis. By using the proposed method, some cost (message creation, processing and transmission) occurred but it was analyzed to be less than the total network operation cost. The proposal of this paper is a management method that utilizes existing network information and structure. This method can be used as a reference material to enhance security.

Benefits from Utilizing A Conceptual Model of Indoor GIS Based Evacuation Information System

  • Luo, Wen-Yuan;Ahn, Byung-Ju;Kim, Jae-Jun;Lee, Gwang-Gook;Kim, Whoi-Yul
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.5
    • /
    • pp.148-157
    • /
    • 2009
  • When an emergency situation happens in buildings, the top priority is to ensure the occupant from danger as soon as possible. Achieving that goal is a multifaceted and difficult task. However, current evacuation systems have many deficiencies in dealing with the emergency in multi-level structures. The shortage of abilities to continuously update database, predict the future situation and provide the information to users with contextual information is the limit in current systems. Thus, it is very crucial to introduce Evacuation Information System (EIS), which is able to respond quickly to the emergency, and transfer the information to both the administrator and the occupant. The main purpose of this paper is to build EIS on the basis of the indoor Geographical Information System (GIS). When the emergency happens, EIS gives the instruction to Emergency Response Model (ERM) at once. ERM carries out the order and calculates the optimal evacuation routes, then sends the result to EIS. At last, EIS transmits evacuation messages to the occupant who implements evacuation plan. This paper highlights the benefits of EIS in two aspects. One is that EIS can update the data continuously to support evacuation strategy-making. The other is that it can transmit evacuation messages to both the administrator and the occupant.

Location-based Frequency Interference Management Scheme Using Fingerprinting Localization Algorithms (Fingerprinting 무선측위 알고리즘을 이용한 영역 기반의 주파수 간섭 관리 기법)

  • Hong, Aeran;Kim, Kwangyul;Yang, Mochan;Oh, Sunae;Jung, Hongkyu;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.901-908
    • /
    • 2012
  • In an intelligent automated manufacturing environment, an administrator may use M2M (Machine-to-Machine) communication to recognize machine movement and the environment, as well as to respond to any potential dangers. However, commonly used wireless protocols for this purpose such WLAN (Wireless Local Area Network), ZigBee, and Bluetooth use the same ISM (Industrial Science Medical) band, and this may cause frequency interference among different devices. Moreover, an administrator is frequently exposed to dangerous conditions as a result of being surrounded by densely distributed moving machines. To address this issue, we propose in this paper to employ a location-based frequency interference management using fingerprinting scheme in industrial environments and its advanced localization schemes based on k-NN (Nearest Neighbor) algorithms. Simulation results indicate that the proposed schemes reduce distance error, frequency interference, and any potential danger may be responded immediately by continuous tracing of the locations.

Design and Implementation of Security Kernel Module with Additional Password for Enhancing Administrator Authentication (관리자 인증 강화를 위한 추가적인 패스워드를 가지는 보안 커널모듈 설계 및 구현)

  • Kim, Ik-Su;Kim, Myung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.675-682
    • /
    • 2003
  • Attackers collect vulnerabilities of a target computer system to intrude into it. And using several attack methods, they acquire root privilege. They steal and alter information in the computer system, or destroy the computer sysem. So far many intrusion detection systems and firewallshave been developed, but recently attackers go round these systems and intrude into a computer system . In this paper, we propose security kernel module to prevent attackers having acquired root privilege from doing illegal behaviors. It enhances administrator authentication with additional password, so prevents attackers from doing illegal behaviors such as modification of important files and installation of rootkits. It sends warning mail about sttacker's illegal behaviors to administrators by real time. So using information in the mail, they can estabilish new security policies.

Development consultation example recommendation system(DCERS) for student counsel with successful (성공적인 학생상담을 위한 상담사례추천 시스템 개발)

  • Wi Seon-Jung;Lee Jin-Kwan;Jung Kyu-Cheol;Jang Hae-Suk;Park Ki-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.664-667
    • /
    • 2006
  • This study are aimed at make more efficient student consultation with develop DCERS, It based on many teachers counsel experience from consult students. This system built of administrator module and user module. And also this system designed that help effectively counsel guidance through several leacher's experience who has counsel guidance. User module is adjust io teachers example, so we can user counsel specifics search, input, PDS. And administrator module offer function that counsel guidance data manager and member manager. After this system apply to leachers who is at the front. And I make an analyze effect and present result.

  • PDF

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

A Study on the Job Description of Medical Record Administrator in Busan and Gyeongnam (부산·경남지역 의무기록사 직무분석)

  • Jung, Mi-Yeong;Kim, Hye-Sook;Kim, Kyeong-Na
    • The Korean Journal of Health Service Management
    • /
    • v.6 no.4
    • /
    • pp.61-72
    • /
    • 2012
  • The purpose of this study was to propose how to improve and develop the college curriculum of medical record administration, satisfying requirements from hospitals having medical record administrators. For the purpose, this researcher surveyed medical record administrators serving at hospitals located in Busan, Changwon, Masan and Jinju. Finally analyzed were responses from 100 medical recorders. The frequency of searching medical records to support information use was statistically different among hospitals according to the number of sick beds(p=.041), or $3.16{\pm}1.75$ for fewer than 300 sick beds, $4.28{\pm}2.42$ for 300 to 500 and $4.86{\pm}3.18$ for more than 500. The college course that was regarded as most important by most of the surveyed medical record administrators, or 53(37.2%) was medical terminology, followed by statistics by 36 of the respondents(18.5%) and EMR, 25(12.8%) in order. To make EMR truly effective requires reforming the university curriculum of medical record administration and giving more attention and more supports to training for better computerization, realizing that medical record administrators serve as a true manager of health and medical information, not a person who just paper-based medical information. In addition to managing health and medical information, medical record administrators are expected to have more roles in the future, for example, providing high-quality clinic knowledge and medical information that are necessary for efficient hospital management and medical research to survive competition.

A Study about Research on the Actual Condition for Fire Counterplan of Main Temple Wooden Cultural Properties (중요사찰목조문화재의 소방대책을 고려한 실태조사에 관한 연구)

  • Back, Min-Ho;Shin, Ho-Jun
    • Fire Science and Engineering
    • /
    • v.23 no.3
    • /
    • pp.121-130
    • /
    • 2009
  • This study is researched about the field trip of temples and the data for fire extinguishment manual of fire stations: it is done from June 2008 to December 2008 the 80 main temple wooden cultural properties among the 124 main wooden cultural properties appointed by the Cultural Heritage Administration. Cultural properties appointment classification, location classification, temple area, building area in a temple, building area of appointment cultural properties, a fire engine drive direction for fire suppression in a fire, distance from a fire station, and present condition of a fire administrator are researched. The cultural properties possess characteristic is in 2 cases: the whole things in a temple are appointed as cultural properties and only the wooden building is. The cultural properties are classified: the transport is possible or not. The special quality of cultural properties are classified for early correspondence and cultural properties transport in a fire and the basic data are arranged for damage limitation.