• Title/Summary/Keyword: IT Equipment/Server

Search Result 135, Processing Time 0.027 seconds

A Research on Personal Environment Services for a Smart Home Network (스마트 홈 네트워크를 위한 개인환경서비스 연구)

  • Ro, Kwang-Hyun;Kim, Seung-Cheon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.46-55
    • /
    • 2012
  • Recently, the concept of PES(Personal Environment Service) is being widely discussed on various standardization organizations such as ITU-R, ETSI, 3GPP, TTA and etc. The purpose of PES is to introduce the services which can dynamically, automatically and intelligently reconfigures the electronic, electrical, and mechanical equipment surrounding the user according to the user preferences included in a user's profile by using a smartphone embedding WPAN radio technologies such as bluetooth and WiFi. This research introduces an Android Platform-based PES system which consists of a PES app, PES devices and a PES server. A smartphone platform is Android 2.2(Froyo) version and 4 simulated PES devices were implemented by using Galaxy Tab. It has shown that the PES would be a killer application of M2M(Machine-to-Machine) or D2D(Device-to-Device) in the future and it would need to study how to update a user's profile based on analyzing user's behaviour for enhancing the PES user's satisfaction.

The Implement of Intelligent Home Network System on Smart Phone (스마트 폰을 이용한 지능형 홈 네트워크 시스템 구현)

  • Lee, Tae-Woong;Son, Cheol-Su;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.505-509
    • /
    • 2011
  • Home network system makes it available for controlling inside home and for controlling from outside as well with personal computer, cellular phone or smart phone, by connecting diverse information equipments within home such as lighting, gas, and heating equipments with network. Integrated server and wall-pad, which form home network system, have demerits as saying of being high-priced and of needing to implement network infrastructure. This study suggested the intelligent home network system, which uses smart phone of supplementing these merits of home network system. It substituted high-specification input & output equipment in the currently and widely supplied smart phone for display and touch screen, which are user interface part of the existing wall-pad, and implemented the common wall-pad with low cost by concentrating management and control function of home network on smart phone.

A Study on System for Environmental Control in the Greenhouse using Internet (인터넷 기반의 온실 환경 제어 시스템에 관한 연구)

  • Kim, Dae-Eop;Park, Heung-Bok
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.427-438
    • /
    • 2001
  • Recently, Environmental Control Devices of Green House for Protected Cultivation is composed of on/off-type Controller to control each device using timer in equipment of intensive Labor. In case of system, it is difficult to grasp condition of the greenhouse about errors when this system has defect of a hardware, and it operates in the remote place or at night. In this paper, we developed a system that capable of replacing the existing control method of on/off with display panel in the greenhouse, monitoring data aquisition and status in the greenhouse using client computer based on internet. Also this system can communicate with each local greenhouse, and send alarm message about error. And we constructed web server to manage efficient informations for environmental control and corps cultivation in the greenhouse.

  • PDF

Realization of a Automatic Grading System for Driver's License Test (자동차 운전면허 시험을 위한 자동 채점 시스템 구현)

  • Kim, Chul Woo;Lee, Dong Hahk;Yang, Jae Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.5
    • /
    • pp.109-120
    • /
    • 2017
  • It is important to estimate objectively in the driving test. Especially, the driving test is examined by totally driving ability, rule observation and situational judgement. For this, a grading automation system for driving test was presented by using GPS, sensor data and equipment operation informations. This system is composed of vehicle mounted module, automatic grading terminal, data controller, data storage and processing server. The vehicle mounted module gathters sensor data in the car. The terminal performs automatic grading using the received sensor data according the driving test criterion. To overcome the misposition of vehicle in the map due to GPS error, we proposed the automatic grading system by map matching method, path deviation and return algorithm. In the experimental results, it was possible to grade automatically, display the right position of the car, and return to the right path under 10 seconds when the vehicle was out of the shadow region of the GPS. This system can be also applied to the driving education.

Design of The Patient Monitoring System based on Wearable Device for Multi-biosignal Measurement (다중 생체신호 측정 웨어러블 디바이스 기반 환자 모니터링 시스템 설계)

  • Lee, Minhye;Chung, Gisoo;Jeong, Dongmyong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.7
    • /
    • pp.103-109
    • /
    • 2017
  • In order to apply the patient monitoring system to the hospital field, it is necessary to be able to measure and analysis data the major bio-signals that are basically covered by the existing patient monitoring system. We have implemented a wearable device and the patient monitoring system for measuring ECG and oxygen saturation. The implemented system transmits the measured bio-signal to the server on the nursing station via Bluetooth. It is represented by graph waveforms and numerical values that can be checked by the medical staff in the patient monitoring system. The validity of this system is verified by comparing the data collected through the designed system with the data obtained from the conventional equipment.

Design and Implementation of a Data Management System for Mobile Spatio-Temporal Query (모바일 시공간 질의을 위한 데이타 관리 시스템의 설계 및 구현)

  • Lee, Ki-Young;Lim, Myung-Jae;Kim, Joung-Joon;Kim, Kyu-Ho;Kim, Jeong-Lae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.109-113
    • /
    • 2011
  • Recently, according to the development of ubiquitous computing, the u-GIS which not only used in u-Transport, u-Care, u-Fun, u-Green, u-Business, u-Government, and u-City but also used to provides various spatial information such as the location of user is being the core technology of the ubiquitous computing environment. In this paper, we implemented an mobile spatio-temporal Query Processing Systems for handling the Spatio-Temporal Data in mobile equipment.The mobile spatio-temporal Query Processing Systems provides the spatio-temporal data type and the spatio-temporal operator that is expanded by the spatial data type and the spatial operator from OepenGIS "Simple Feature Specification for SQL". It supports arithmetic coding compression techniques that is considered with a spatio-temporal data specific character. It also provides the function of data cashing for improving the importation and exportation of the spatio-temporal data between a embedded spatio-temporal DBMS and u-GIS server.

Research on Effective Security Control Measures Against DDoS Attacks (DDoS 공격에 대한 효과적인 보안 관제 방안)

  • Jung, Il-Kwon;Kim, Jeom-Gu;Kim, Kiu-Nam;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.7-12
    • /
    • 2009
  • It is very difficult to completely block the DDoS attack, which paralyzes services by depleting resources or occupying the network bandwidth by transmitting a vast amount of traffic to the specific website or server from normal users' PCs that have been already infected by an outside attacker. In order to defense or endure the DDoS attack, we usually use various solutions such as IDS (Intrusion Detection System), IPS (Intrusion Prevention System), ITS (Intrusion Tolerance System), FW (Firewall), and the dedicated security equipment against DDoS attack. However, diverse types of security appliances cause the cost problem, besides, the full function of the equipments are not performed well owing to the unproper setting without considering connectivity among systems. In this paper, we present the effective connectivity of security equipments and countermeasure methodology against DDoS attack. In practice, it is approved by experimentation that this designed methdology is better than existing network structure in the efficiency of block and endurance. Therefore, we would like to propose the effective security control measures responding and enduring against discriminated DDoS attacks through this research.

  • PDF

Implementation of Ubiquitous Application based on Context-Awareness (상황 인식 기반의 유비쿼터스 어플리케이션 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.744-751
    • /
    • 2008
  • Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.

Design and Implementation of Reception Systems for Non-Face-To-Face Medical Services (비대면 의료 서비스를 위한 접수시스템 설계 및 구현)

  • Baek, Yu-Jin;Lee, Hyo-Seung;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.975-980
    • /
    • 2021
  • As technology utilizing low-power short-range wireless communication is applied in conjunction with medical information as a development of the fourth industrial revolution, interest in medical information is increasing. As the age group of smart devices increases and becomes more common, related research such as linking mobile devices with various objects and equipment is continuously being conducted. In addition, interest in untact (non-face-to-face) is increasing due to the prevalence of Coronavirus Disease-19 (COVID-19), including various infectious diseases. As a result, it is a state that requires distance not only in social but also in life. In this study, using a low-power near-field wireless communication technology of beacons to create an IoT device by communicating with the web server of the medical information system was studied to make it easier to receive medical treatment during visits to medical institutions.

A IoT Security Service based on Authentication and Lightweight Cryptography Algorithm (인증 및 경량화 암호알고리즘 기반 IoT 보안 서비스)

  • Kim, Sun-Jib
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2021
  • The IoT market continues to expand and grow, but the security threat to IoT devices is also increasing. However, it is difficult to apply the security technology applied to the existing system to IoT devices that have a problem of resource limitation. Therefore, in this paper, we present a service that can improve the security of IoT devices by presenting authentication and lightweight cryptographic algorithms that can reduce the overhead of applying security features, taking into account the nature of resource limitations of IoT devices. We want to apply these service to home network IoT equipment to provide security. The authentication and lightweight cryptographic algorithm application protocols presented in this paper have secured the safety of the service through the use of LEA encryption algorithms and secret key generation by users, IoT devices and server in the IoT environment. Although there is no difference in speed from randomly generating secret keys in experiments, we verify that the problem of resource limitation of IoT devices can be solved by additionally not applying logic for secret key sharing to IoT devices.