• Title/Summary/Keyword: Home Server

Search Result 371, Processing Time 0.023 seconds

Development of Web-based Nursing Education Program for Ostomy Care (장루 관리를 위한 Web 기반 간호교육 프로그램 개발)

  • Hong, Hae-Sook
    • Journal of Korean Academic Society of Home Health Care Nursing
    • /
    • v.10 no.2
    • /
    • pp.141-147
    • /
    • 2003
  • The purpose of this study was to develop and apply a Web-based Nursing Education & Instruction Program to help the clinical nurses improving their knowledge and skills of ostomy care. This program was developed in three different steps: analysis. design. and development. The results of the study were as follows: The analysis step was designed to select the study contents for effective and easy educationthrough the analyses of specialized books. This surveyed and analyzed study contents were categorized into five different sections. Introduction. ostomy classification. ostomy management. elimination management. and life style. After that each section describes necessary information of each category. In the design step. the image files used in this program were created using Adobe Photoshop 6.0. and HTML files were designed and developed using Namo Editor 5.0. In the development step. the developed program was published into Web using FTP (File Transfer Protocol) and then finalized after trial operation for testing of real users. In addition. this Web-based Nursing Education & Instruction Program will be used as excellentand effective tool for continuous and lifelong education in nursingfield. In this study. computer-aided education program was developed for ostomy management and managed at the Web-Server (http://hshong.knu.ac.kr/ostomy) in order to help nurses real-time education in clinical field by this program.

  • PDF

Appplication of Role-based access control in Embedded OS (임베디드 OS에서의 역할기반 접근제어 적용)

  • Lim, Jae-Deok;Un, Sung-Kyong;Kim, Ki-Young;Kim, Jeong-Nyeo;Lee, Choel-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.163-165
    • /
    • 2007
  • Recently, the security requirements of the embedded system which were not considered when the embedded system is independently deployed are being increased because the embedded system is connected to an internet. The connection to the internet of embedded system is the meaning that it is exposed to the various kinds of external attack and can be a victim to these attacks in anytime. Particularly, it is trend that the user-related information is stored into the personal terminals and/or electrical appliances such as PDA, home gateway for home network, settop boxes and so on. So it is needed the security mechanism which protects the user information from the malicious accesses. Accordingly, the coverage of the system security is being expanded from the general server to the embedded system. And it is not enough that the embedded system supports only its inherent functions and it becomes the essential element to provide the security function to the embedded system. This paper applies the RBAC(role-based access control) function to the embedded linux OS and tries to strengthen the security of the embedded linux OS. RBAC is implemented as a loadable kernel module with LSM(Linux Security Module) security framework for user's flexibility.

  • PDF

A study on WSN based ECG and body temperature measuring system for ubiquitous healthcare: 2. Vital signal monitoring software system (유비쿼터스 헬스케어를 위한 센서 네트워크 기반의 심전도 및 체온 측정 시스템: 2. 생체신호 모니터링 소프트웨어 시스템)

  • Lee, Dae-Seok;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.15 no.6
    • /
    • pp.417-424
    • /
    • 2006
  • An ubiquitous healthcare monitoring system for elderly person at home was designed for continuous healthy monitoring of elderly person or patients. Human vital signals, such as ECG and body temperature, were monitored by terminal PC or PDA via ECG and temperature sensor nodes on the patient's body. From the ECG data, the heart rate, tachycardia, bradycardia and arrhythmia were diagnosed on the terminal PC or PDA to assist doctor's or nurse's aid or patient itself to monitor the patient's condition and give medical examination. Artificial judgement support system was designed in server computer and the system support a doctor or nurser for management or treatment of the patient. This system can be applied to vital signal monitoring system for solitude elderly person at self house or home health care service part. And this ubiquitous healthcare system can reduce the medical expenses in coming aging or aged society.

A Design of Video Phone System based on SIP for HomeServer (SIP 기반의 홈서버용 영상전화 시스템 설계)

  • Ahn, Sung-Ho;Lee, Kyung-Hee;Lee, Eun-Ryoung;Kim, Ji-Yong;Kim, Doo-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11a
    • /
    • pp.53-56
    • /
    • 2002
  • VoIP(Voice over IP) 기술은 다양한 인터넷 응용 서비스 보급의 대중화에 기여한 주요 통신기술의 하나이다. 이에 따라 인터넷 이용자가 급격히 증가하고 인터넷 전화의 수요가 증가하게 되었다. 특히, 음성 뿐만 아니라 영상에 대한 기술이 접목되어 V2oIP(Voice and Video over IP) 라 일컬어 지는 기술이 보급되면서, 인터넷 영상전화에 대한 대중화가 이루어 지고 있다. 한편, 다양한 인터넷 응용 서비스 보급의 대중화에 따른 가정 내에서의 네트워크 환경 또한 부각되고 있어 정보가전분야에 큰 변화가 일고 있다. 이에 홈서버 중심의 홈네트워크환경이 구축된다. 따라서, 기존의 pc 를 단말기로 한 인터넷 환경 및 제반 응용 서비스가 그대로 홈서버 중심의 홈네트워크환경으로 옮겨져야 할 필요가 있다. 본 논문에서의 전체 시스템은 임베디드 리눅스 기반인 Qplus 운영체제를 기반으로 하는 홈서버상에 HoCoS(Home Collaboration Service) 시스템이 탑재되며, 이 시스템은 크게 영상전화 시스템과 공동작업 시스템으로 구성된다. 본 논문에서는 상기 시스템 중 SIP(Session Initiation Protocol)기반의 홈서버용 영상전화 시스템에 대한 설계 및 구현에 대해 기술하고자 한다.

  • PDF

Deep Learning-based Environment-aware Home Automation System (딥러닝 기반 상황 맞춤형 홈 오토메이션 시스템)

  • Park, Min-ji;Noh, Yunsu;Jo, Seong-jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.334-337
    • /
    • 2019
  • In this study, we built the data collection system to learn user's habit data by deep learning and to create an indoor environment according to the situation. The system consists of a data collection server and several sensor nodes, which creates the environment according to the data collected. We used Google Inception v3 network to analyze the photographs and hand-designed second DNN (Deep Neural Network) to infer behaviors. As a result of the DNN learning, we gained 98.4% of Testing Accuracy. Through this results, we were be able to prove that DNN is capable of extrapolating the situation.

  • PDF

Design and Implementation of a Service Platform that Recommends the Optimal Shortest Distance as a Patrol Route

  • Jo, Yu-min;Jang, Ye-jin;Paik, Jong-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, interest in living safety and crime prevention is increasing. The reality is that most women have anxiety about social safety and ultimately want a safe return to home. As a result of these issues, the Seoul Metropolitan Government and the National Police Agency are implementing various services to alleviate them. However, there are limitations such as that the service can be used only during a limited time or the process of checking whether the patrol is really completed is complicated. Therefore, in this paper, we propose a service platform that overcomes these limitations and suggests the best and shortest patrol route to the police based on the desired patrol location applied by citizens. It is designed based on the MVC pattern, and the functions are divided for each user. It is hoped that the platform will reduce crime rates and allow citizens to ultimately return home with peace of mind. Also we expect that the police will ablet to find places where they did not know about or need to patrol with more attention through the recommended route of the platform, which will be helpful in their task.

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

Design of DRM System for Secure Contents Transfer in Home Domain (홈 도메인에서 안전한 콘텐츠 전송을 위한 DRM 시스템의 설계)

  • Lee, Chang-Bo;Kim, Jung-Jae;Moon, Ju-Young;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.221-228
    • /
    • 2007
  • For the usage of the different standard technology among DRM vendors, the DRM technologies in today could not guarantee the interoperability between the digital contents and digital devices. While users have been guaranteed the protection of contents, they have to put up with the limitation and inconvenience. The Superdistribution methods that InterTrust has proposed is the content distribution technology which is possible to use the content only by the user authentication with the license regardless of the acquisition of the DRM contents. However, it need a additional license with re-authentication from DRM server when the original contents need to be moved to other devices from the own device. In this paper, to reduce the inconveniences of re-authentication and re-issue procedures of the license and continually to protect the rights of contents on the offline, we propose the DRM system that creates domain between home devices and enable users to freely transfer contents with the domain.

An Automatic Address Allocation Mechanism based on the Signal Strength for the PLC-based Home Network (전력선 홈 네트워크를 위한 신호 세기 기반의 자동 주소 할당 기술)

  • Hwang, Min-Tae;Choi, Sung-Soo;Lee, Won-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1072-1081
    • /
    • 2008
  • We can categorize the network address allocation mechanism into two types. One is to assign a unique network address using the address allocation server and the other is to make a random address by itself and process the DAD(Duplicate Address Detection) procedure. In this paper we suggest a new address allocation mechanism based on the signal strength for the PLC-based home network. As the combined mechanism of two types this mechanism allocates a unique address for the new node from one of the existing nodes with the simple equation and with the priority based on the signal strength from the new node to the existing nodes. We can use this mechanism for the self-healing function when the packet from the source node may not be delivered to the destination node directly. We developed the simulator for our mechanism using the C# programming and verified the network address assigned uniquely based on the signal strength.

  • PDF

A Countermeasure Technique for Attack of Reflection SSDP in Home IoT (홈 IoT에서 SSDP 반사체 공격에 대한 대응기법)

  • Park, Kwang-ok;Lee, Jong-Kun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the DDoS attack using the amplifier method makes it difficult to distinguish the normal traffic from the normal server and it is difficult to detect even the attack detection. Since the SSDP protocol is a common protocol widely used in IoT devices, it is used as a DDoS amplification attack. In this paper, we analyze the reflector attack of SSDP which is one of the DDoS and suggest a technical proposal to detect and defend against the attack by managing the Mac address of each device. Also, we propose a control structure to protect the reflection attack of SSDP in Home IoT. The efficiency of the proposed system has been verified by performing an experimental attack on the virtual environment.