• Title/Summary/Keyword: Client and Server

Search Result 1,773, Processing Time 0.036 seconds

Remote Monitoring of Patients and Emergency Notification System for U-Healthcare

  • Lee, Jun;Jang, Hyun-Se;Yang, Tae-Kyu;Seo, Yong-Ho
    • International journal of advanced smart convergence
    • /
    • v.2 no.1
    • /
    • pp.1-5
    • /
    • 2013
  • This study proposes a remote monitoring of patients and emergency notification system with a camera and pulse wave sensor for U-Healthcare. The proposed system is a server client model based U-Healthcare system which consists of wireless clients that have micro-controller, embedded-board for patient status monitoring and a remote management server. The remote management server observes the change of pulse wave data individually in real-time sent from the clients that is to be remote-monitored based on the pulse wave data stored by users and divides them into caution section and emergency section. When the pulse wave data of a user enters an emergency situation, the administrator can make a decision based on the real-time image information and pulse rate variability. When the status of the monitored patient enters the emergency section, the proposed U-healthcare system notifies the administrator and relevant institutions. An experiment was conducted to demonstrate the pulse wave recognition of the proposed system.

Implementation of HL7 Interface Engine for Medical Information Exchange (의료정보 공유를 위한 HL7 인터페이스 엔진 구현)

  • Hwang, Deuk-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.89-98
    • /
    • 2010
  • Recently supply of Internet is bringing a important change in medical environments. The hospitals which had a different system is required the system that can efficiently share and exchange medical information. In order to transmission medical information between systems, the Health Level Seven(HL7) interface engine development that can convert medical data to HL7 messages is necessary. The HL7 is a standard protocol for data exchange in healthcare environments. In this paper, I implemented HL7 interface engine for Alzheimer's disease in elderly care facility. The interface engine is composed of the client system and the server system. The client system inputs user's medical care data for the aged, and builds them into HL7 message stream. HL7 messages in the client system transmitted over TCP/IP protocol to the server system. The server system parses and validates this messages stream to the segments and fields and then transmits acknowledgement to the client system. I implemented it using the Java and JavaCC. The study of interface engine implementation can be used meaningfully in electronic health record, telemedicine system, and medical information sharing among various healthcare institutions.

A Study on Radiation Risk Recognition Aided System Visualizing Risk Information by CG

  • Katagiri, M.;Tuzuki, Y.;Sawamura, S.;Aoki, Y.
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.425-428
    • /
    • 2002
  • The technology of Computer Graphics (CG) has been in great progress for almost 20 years and has proven to be a valuable tool for a broad variety of fields, including nuclear engineering. To work in any hazardous environment for example radiation field is particularly challenging because the danger is not always visually apparent. In this study as the application of CG to nuclear engineering field, we proposed to develop a radiation risk recognition aided system in which various radiation information; radiation risks, radiation distribution, hazard information and so on, were visualized by CG. The system used the server and client system. In the server there were two parts; one (main-server) was the database part having various data and the other (sub-server) was the visualization part visualizing the human phantom by POV-Ray. In the client there was the input and output part. The outputs from the system were various radiation information represented by coloring, circle graph and line graph intuitionally. The system is useful for a broad range of activities including radiation protection, radiation management, dose minimization, and demonstration to the public.

  • PDF

The Design of Proxy for CORBA Traffic Monitoring Using OSI management technology (OSI 관리 기술을 이용한 CORBA 트래픽 모니터링 프록시 설계)

  • 박재성;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.355-362
    • /
    • 1999
  • Traffic monitoring, a part of the system management, is a vital function lot the proper operation of a system in use. Currently OMG has been trying to standardize CORBA system management. Besides, many companies and research laboratories have been developing and studying CORBA system management. In this paper, we have designed the proxy to monitor the CORBA traffic using the OSI management technology. To manage CORBA traffic resources, 6 parameters have been made into managed objects. The monitoring system consists of a CORBA server, a proxy object and an MIB. The CORBA server is made up of a service provider, a proxy server, and a event sewer. The proxy object acts as a process of a CORBA object, and is made up of a proxy client, a event client, and an IPC server.

  • PDF

Remote robot system using Internet server (인터넷 서버 기반의 원격 로봇 시스템)

  • Lee, Tae-Hee;Cho, Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1434-1441
    • /
    • 2003
  • Recent technological advances in utilization and generalization of Internet have overcome some of the limitations of remote robot control range and real-time monitoring system. However, It needs Embedded system with control protocol or hardware which has avility to port the micro realtime operating system in robot control system communicate with remote controlled robot, because those system use the wireless LAM or Bluetooth as a network media. In this paper, we design and implement the wireless MODEM protocol and install it to the server system. Also, we implement a client system could control the remote robot through the server and we assure that this protocol and client/server system ate suitable for small size remote control system based on Internet.

Design and Implementation of CC/PP Profiling System for Providing of Device Independent Digital Contents (장치 독립적 디지털 콘텐츠 제공을 위한 CC/PP프로파일 생성 시스템 설계 및 구현)

  • Byun Yung-Cheol;Kang Chul-Ung;Lee Sang-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1527-1537
    • /
    • 2006
  • The server system of digital contents has to how the context information about client devices to provide the appropriate contents for each device effectively. CC/PP standard specification is an agreement for describing and transmission of the information related with a client device. In this case, the information on device hardware and software, networks and user's preference is included here. In the mean time, WAP forum defined W-HTTP protocol to transmit the CC/PP profile information of a client device to a server system. However, the client devices which use existing HTTP protocol to transmit their information cannot provide the CC/PP profile information to a server. In this paper, we propose an effective method to create and provide the CC/PP profile in the clients which use not only HTTP protocol but also W-HTTP protocol to transmit device information.

Development of Vulnerability Scanner using Search Engine (검색엔진을 이용한 취약점 분석 시스템 개발)

  • Joo, Bok-Gyu;Min, Beung-Woo;Chang, Moon-Suk;Ahn, Chang-Kyum;Yang, Dong-Hyuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.19-24
    • /
    • 2009
  • In these days, security threat is ever increasing as computer systems and networking is everywhere. This paper is on the development of security scanner using search engine, with which site managers can easily check security vulnerability on their systems. Our security server automatically collects security-related information on the Internet, and indexes them in the database. To check the vulnerability of a customer server, the client system collects various system-specific information, and sends necessary queries to our security server for vulnerability checking. Up-to-date and site-specific vulnerability information is retrieved through the viewer, which allows the customer effectively to check and respond to security threat on client systems.

  • PDF

Password-Based Key Exchange Protocols for Cross-Realm (Cross-Realm 환경에서 패스워드기반 키교환 프로토콜)

  • Lee, Young Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.139-150
    • /
    • 2009
  • Authentication and key exchange are fundamental for establishing secure communication channels over public insecure networks. Password-based protocols for authenticated key exchange are designed to work even when user authentication is done via the use of passwords drawn from a small known set of values. There have been many protocols proposed over the years for password authenticated key exchange in the three-party scenario, in which two clients attempt to establish a secret key interacting with one same authentication server. However, little has been done for password authenticated key exchange in the more general and realistic four-party setting, where two clients trying to establish a secret key are registered with different authentication servers. In fact, the recent protocol by Yeh and Sun seems to be the only password authenticated key exchange protocol in the four-party setting. But, the Yeh-Sun protocol adopts the so called "hybrid model", in which each client needs not only to remember a password shared with the server but also to store and manage the server's public key. In some sense, this hybrid approach obviates the reason for considering password authenticated protocols in the first place; it is difficult for humans to securely manage long cryptographic keys. In this work, we introduce a key agreement protocol and a key distribution protocol, respectively, that requires each client only to remember a password shared with its authentication server.

A Study on Construction Site of Virtual Desktop Infrastructure (VDI) System Model for Cloud Computing BIM Service

  • Lee, K.H.;Kwon, S.W.;Shin, J.H.;Choi, G.S.;Moon, D.Y.
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.665-666
    • /
    • 2015
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In construction site phase, especially the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. The purpose of this study is enable the cloud computing BIM server to provide several main function such as edit a model, 3D model viewer and checker, mark-up, snapshot in high-performance quality by proper design of VDI system. Concurrent client connection performance is a main technical index of VDI. Through test-bed server client, developed VDI system's multi-connect control will be evaluated. The performance-test result of BIM server VDI will effect to development direction of cloud computing BIM service for commercialization.

  • PDF

Unifying User Requests for Multimedia Storage Systems (멀티미디어 저장 시스템을 위한 사용자 요청 통합)

  • Hwang, In-Jun
    • Journal of KIISE:Databases
    • /
    • v.29 no.1
    • /
    • pp.15-26
    • /
    • 2002
  • Most work on multimedia storage systems has assumed that client will be serviced using a round-robin strategy. The server services the clients in rounds and each client is allocated a time slice within that round. Furthermore, most such algorithms are evaluated on the basis of a tightly coupled cost function. This is the basis of well-known algorithm such as FCFS, SCAN, SCAN-EDF, etc. In this paper, we describe a scheduling module called Request Unifier(RU) that takes as input, a set of client request, and a set of constraints on the desired performance such as client waiting time or maximum disk bandwidth, and a cost function. It produces as output a Unified Read Request(URR), telling the storage server which data items to read and when these data items to be delivered to the clients. Given a cost function, a URR is optimal if there is no other URR satisfying the constraints with a lower cost. We present three algorithms in this paper that can accomplish this kind of request merging and compare their performance through an experimental evaluation.