• Title/Summary/Keyword: Data Connection

Search Result 2,201, Processing Time 0.025 seconds

Telemedicine for Real-Time Multi-Consultation

  • Chun Hye J.;Youn HY;Yoo Sun K.
    • Journal of Biomedical Engineering Research
    • /
    • v.26 no.5
    • /
    • pp.301-307
    • /
    • 2005
  • We introduce a new multimedia telemedicine system which is called Telemedicine for Real-time Emergency Multi-consultation(TREM), based on multiple connection between medical specialists. Due to the subdivision of medical specialties, the existing one-to-one telemedicine system needs be modified to a simultaneous multi-consulting system. To facilitate the consultation the designed system includes following modules: high-quality video, video conferenceing, bio-signal transmission, and file transmission. In order to enhance the operability of the system in different network environment, we made it possible for the user to choose appropriate data acquisition sources of multimedia data and video resolutions. We have tested this system set up in three different places: emergency room, radiologist's office, and surgeon's office. All three communicating systems were successful in making connections with the multi-consultation center to exchange data simultaneously in real-time.

Implementation of RS232C and TCP/IP Connection Device Using ARM Processor (ARM프로세서를 이용한 RS232C와 TCP/IP 접속장치의 구현)

  • Lee, Young-Jun;Han, Kyong-Ho
    • Proceedings of the KIPE Conference
    • /
    • 2002.07a
    • /
    • pp.635-638
    • /
    • 2002
  • In this paper, the connection device of RS232C and TCP/IP implementation using ARM processor and LINUX is proposed. Data interaction flash memory the multiple serial ports are transferred to ARM processor and the data are processed and formed into data packet for transfer via internet protocol. Packet flash memory Internet is decoded to extract the serial port data. The serial ports supports RS232C asynchronous protocol communication and control program is developed in GNU-C and installed in the on-board memory for packet conversion and control. The research result can be applied to terminal server, printer server and multiple serial ports equipments.

  • PDF

A Study on the Secure Coding for Security Improvement of Delphi XE2 DataSnap Server (델파이 XE2 DataSnap 서버의 보안성 개선을 위한 시큐어 코딩에 관한 연구)

  • Jung, Myoung-Gyu;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.706-715
    • /
    • 2014
  • It is used to lead to serious structural vulnerability of the system security of security-critical system when we have quickly developed software system according to urgent release schedule without appropriate security planning, management, and assurance processes. The Data Set and Provider of DataSnap, which is a middleware of Delphi XE2 of the Embarcadero Technologies Co., certainly help to develop an easy and fast-paced procedure, but it is difficult to apply security program and vulnerable to control software system security when the connection structure Database-DataSnap server-SQL Connection-SQL Data set-Provider is applied. This is due to that all kinds of information of Provider are exposed on the moment when DataSnap Server Port is sure to malicious attackers. This exposure becomes a window capable of running SQL Command. Thus, it should not be used Data Set and Provider in the DataSnap Server in consideration of all aspects of security management. In this paper, we study on the verification of the security vulnerabilities for Client and Server DataSnap in Dlephi XE2, and we propose a secure coding method to improve security vulnerability in the DataSnap server system.

Analysis on Connection of Information Infra for Efficient Ubiquitous-service Realization (효율적인 u-서비스 구현을 위한 정보 인프라 연계성 분석)

  • Choi, Pill-Soon;Kang, Joon-Mook;Park, Joon-Kyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.5
    • /
    • pp.497-507
    • /
    • 2011
  • Ubiquitous city which was appeared since 2006 is defined as "The city provided the ubiquitous city service anytime and anywhere using ubiquitous urban infrastructure to improve the city's competitiveness and quality of life" under ubiquitous city construction law. To realize the ubiquitous city, the city has to be constructed efficiently based on the spatial information. And connection of information achieve effective synergy. In this study, applied multilateral analysis to spatial information and administrative information to implement u-service focused on MACCA(Multifunctional Administrative City Construction Agency). Study about main function and product data with connection process of Korean Land Spatialization System and administrative information System was performed. Also, details of u-service and method of acquiring necessary data were derived. In Addition, the information connection possibility for efficient u-service realization was suggested by linkage analysis method to utilize the related information infrastructure jointly.

Fairness Improvement Leaky Bucket Algoriom for Group Connections in ATM Network (ATM 망에서 그룹 연결을 위한 효율적인 공평성 향상 Leaky Bucket 알고리즘)

  • Lee Jae-hwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.591-595
    • /
    • 2005
  • In this paper, we propose the fairness improvement leaky bucket (PILB) algorithm as a traffic policing mechanism. In the proposed algorithm, there is a cell buffer for every ATM connection in order to store date cells. Network decides whether an ATM connection obeys the contracted traffic parameter, and stores data cells in the cell buffer if the connection obeys but is considered as violated the contract due to temporary lack of network resource. By using the proposed algorithm, we can obtain the statistical multiplexing gain that is the superiority of packet switching network. Moreover, when a connection tries to transmit more data cells by violating the contracted traffic parameters, the connection is prevented from using excess network resource, which incurs all connections sharing network resource fairly. The performance of the proposed FILB algorithm is investigated by using the simulation. The result shows that the proposed algorithm provides superior performance and all connections within a group share network resource fairly. The proposed algorithm can be applied not only the ATM network but also IP network.

Multimedia Home Network Middleware for Isochronous Connection Management based on IEEE1394-IEC61883 (IEEE 1394-lEC61883 기반 멀티미디어 홈 네트워크에서 등시성 연결 관리를 위한 미들웨어)

  • Lee Dong Kyu;Oh joo Yong;Park Jun Ho;Kang Soon Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12B
    • /
    • pp.1042-1051
    • /
    • 2004
  • The IEEE1394 is a favorable protocol for A/V networks recently in home and there are two types of transmission in this protocol which are asynchronous and isochronous. The more nodes participate in the IEEE1394 network, the more problems of resource exhaustion and connection repetition may occur. So this paper proposes a middleware for isochronous connection management and reliable multimedia data transmission in the IEEE1394-IEC61883 based home networks. In this paper, proposed middleware is supporting the various types of isochronous connection, guaranteeing the reliability of isochronous connection and providing the characteristic of a real-time data transmission. We support CORBA API for multimedia service and the proposed architecture was implemented using a test-bed and we verified the proposed architecture in a test-bed.

A study on the threat hunting model for threat detection of circumvent connection remote attack (우회 원격공격의 위협탐지를 위한 위협 헌팅 모델 연구)

  • Kim, Inhwan;Ryu, Hochan;Jo, Kyeongmin;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.15-23
    • /
    • 2021
  • In most hacking attacks, hackers intrudes inside for a long period of time and attempts to communicate with the outside using a circumvent connection to achieve purpose. research in response to advanced and intelligent cyber threats has been mainly conducted with signature-based detection and blocking methods, but recently it has been extended to threat hunting methods. attacks from organized hacking groups are advanced persistent attacks over a long period of time, and bypass remote attacks account for the majority. however, even in the intrusion detection system using intelligent recognition technology, it only shows detection performance of the existing intrusion status. therefore, countermeasures against targeted bypass rwjqthrwkemote attacks still have limitations with existing detection methods and threat hunting methods. in this paper, to overcome theses limitations, we propose a model that can detect the targeted circumvent connection remote attack threat of an organized hacking group. this model designed a threat hunting process model that applied the method of verifying the origin IP of the remote circumvent connection, and verified the effectiveness by implementing the proposed method in actual defense information system environment.

Water Transportation and Stratification Modification in the Andong-Imha Linked Reservoirs System (안동호-임하호 연결에 따른 물 이동과 수온성층 변화)

  • Park, Hyeung-Seok;Chung, Se-Woong
    • Journal of Korean Society on Water Environment
    • /
    • v.30 no.1
    • /
    • pp.31-43
    • /
    • 2014
  • Recently, Andong Reservoir and Imha Reservoir located in Nakdong River basin (Korea) are being connected by a tunnel (length 2km, diameter 5.5m) for a conjunctive use. The objectives of this study were to construct a two dimensional(2D) laterally-averaged model for two reservoirs, and examine the effects of connection on the water transportation and temperature stratification in the reservoirs. The 2D models for each reservoir were calibrated using field data obtained in 2006, and applied to the linked system for the year of 2002 when a severe flood intruded into Imha Reservoir during the typhoon Rusa. Simulation results showed that 364 million $m^3$ of water can be conveyed from Imha to Andong, while 291 million $m^3$ of water from Andong to Imha after connection. It resulted in 1.38 m increase of annual averaged water level in Andong Reservoir, whereas 3.75 m decrease in Imha Reservoir. The structures of thermal stratification in both reservoirs were influenced in line with the flow exchanges. In Andong Reservoir, the location of thermocline moved upward about 10 m compared to an independent operation. The results imply that the persistent turbidity issue of Imha Reservoir might be shifted to Andong Reservoir during a severe flood event after connection.

Mechanism for Fairness Service of Web Server

  • Rhee, Yoon-Jung;Park, Nam-Sup;Hyun, Eun-Sil;Kim, Jeong-Beom;Lee, Young-Ji;Yun, Ma-Ru;Hyeok Kang;Kim, Young-Jun;Kim, Tai-Yoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.355-357
    • /
    • 2001
  • HTTP/1.1 standard reduces latencies and overhead from closing and re-establishing connections by supporting persistent connections as a default, which encourage multiple transfers of objects over one connection. HTTP/1.1, however, does not define explicitly connection-closing time but specifies a certain fixed holding time model. This model may induce wasting server’s resource when server maintains connection with the idle-state client that requests no data for a certain time. This paper proposes the mechanism of a heuristic connection management supported by the client-side under persistent HTTP, in addition to HTTP/1.1’s fixed holding time model on server-side. The client exploits the tag information within transferred HTML page so that decides connection-closing time. As a result, the mechanism allows server to use server’s resource more efficiently without server’s efforts.

Investigation of major parameters affecting instablility of steel beams with RBS moment connections

  • Tabar, A.Moslehi;Deylami, A.
    • Steel and Composite Structures
    • /
    • v.6 no.3
    • /
    • pp.203-219
    • /
    • 2006
  • One of the most promising ways through which a steel moment frame may attain high energy dissipating capability is to trim off a portion of the beam flanges near the column face. This type of moment connection, known as Reduced Beam Section (RBS) connection, has notable superiority in comparison with other moment connection types. As the result of the advantages of RBS moment connection, it has widely being used in practice. In spite of the good hysteretic behaviour, an RBS beam suffers from an undesirable drawback, which is local and lateral instability of the beam. The instability in the RBS beam reduces beam load-carrying capacity. This paper aims to investigate key issues influencing cyclic behaviour of RBS beams. To this end, a numerical analysis was conducted on a series of steel subassemblies with various geometric properties. The obtained results together with the existing experimental data are used to study the instability of RBS beams. A new slenderness concept is presented to control an RBS beam for combined local and lateral instability. This concept is in good agreement with the numerical and experimental results. Finally, a model is developed for the prediction of the magnitude of moment degradation owing to the instability of an RBS beam.