• Title/Summary/Keyword: Information Server

Search Result 5,858, Processing Time 0.035 seconds

Implement of Web-based Remote Monitoring System of Smart Greenhouse (스마트 온실 통합 모니터링 시스템 구축)

  • Dong Eok, Kim;Nou Bog, Park;Sun Jung, Hong;Dong Hyeon, Kang;Young Hoe, Woo;Jong Won, Lee;Yul Kyun, Ahn;Shin Hee, Han
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.24 no.4
    • /
    • pp.53-61
    • /
    • 2022
  • Growing agricultural products in greenhouses controlled by creating suitable climatic conditions and root zone of crop has been an important research and application subject. Appropriate environmental conditions in greenhouse are necessary for optimum plant growth improved crop yields. This study aimed to establish web-based remote monitoring system which monitors crops growth environment and status of crop on a real-time basis by applying to greenhouses IT technology connecting greenhouse equipment such as temperature sensors, soil sensors, crop sensors and camera. The measuring items were air temperature, relative humidity, solar radiation, CO2 concentration, EC and pH of nutrient solution, medium temperature, EC of medium, water content of medium, leaf temperature, sap flow, stem diameter, fruit diameter, etc. The developed greenhouse monitoring system was composed of the network system, the data collecting device with sensors, and cameras. Remote monitoring system was implemented in a server/client environment. Information on greenhouse environment and crops is stored in a database. Items on growth and environment is extracted from stored information, could be compared and analyzed. So, A integrated monitoring system for smart greenhouse would be use in application practice and understanding the environment and crop growth for smart greenhouse management. sap flow, stem diameter and pant-water relations

NextAuction: A DID-based Robust Auction Service for Digital Contents

  • Lee, Young-Eun;Kim, Hye-Won;Lee, Myung-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.2
    • /
    • pp.115-124
    • /
    • 2022
  • In this paper, we present an NFT auction service for the next generation, named NextAuction, which can reliably trade ownership of individual content using DID technology. Recently, as the types and sizes of tradable digital assets have expanded, the number of NFT transactions has also increased, and a significant number of marketplaces are being operated. But, the current user authentication methods of NFT marketplaces are done only through the associated blockchain wallets. It is desirable that ownership transfer through NFT transactions be transparently managed based on a more reliable identity authentication service. NextAuction increases the reliability of auction service participants by transparently and consistently providing identity authentication for users of auction services based on the DID technique using the Klaytn blockchain. In addition, in preparation for server failure that may occur during the auction of individual content, it provides users with a robust auction service using the BR2K technique that continuously provides consistent service through the replication of a target service. The NextAuction service is developed by extending BCON, a blockchain-based content management service.

Cat Behavior Pattern Analysis and Disease Prediction System of Home CCTV Images using AI (AI를 이용한 홈CCTV 영상의 반려묘 행동 패턴 분석 및 질병 예측 시스템 연구)

  • Han, Su-yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1266-1271
    • /
    • 2022
  • Cats have strong wildness so they have a characteristic of hiding diseases well. The disease may have already worsened when the guardian finds out that the cat has a disease. It will be of great help in treating the cat's disease if the owner can recognize the cat's polydipsia, polyuria, and frequent urination more quickly. In this paper, 1) Efficient version of DeepLabCut for pose estimation, 2) YOLO v4 for object detection, 3) LSTM is used for behavior prediction, and 4) BoT-SORT is used for object tracking running on an artificial intelligence device. Using artificial intelligence technology, it predicts the cat's next, polyuria and frequency of urination through the analysis of the cat's behavior pattern from the home CCTV video and the weight sensor of the water bowl. And, through analysis of cat behavior patterns, we propose an application that reports disease prediction and abnormal behavior to the guardian and delivers it to the guardian's mobile and the server system.

APPLICATION OF WIFI-BASED INDOOR LOCATION MONITORING SYSTEM FOR LABOR TRACKING IN CONSTRUCTION SITE - A CASE STUDY in Guangzhou MTR

  • Sunkyu Woo;Seongsu Jeong;Esmond Mok;Linyuan Xia;Muwook Pyeon;Joon Heo
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.869-875
    • /
    • 2009
  • Safety is a big issue in the construction sites. For safe and secure management, tracking locations of construction resources such as labors, materials, machineries, vehicles and so on is important. The materials, machineries and vehicles could be controlled by computer, whereas the movement of labors does not have fixed pattern. So, the location and movement of labors need to be monitored continuously for safety. In general, Global Positioning System(GPS) is an opt solution to obtain the location information in outside environments. But it cannot be used for indoor locations as it requires a clear Line-Of-Sight(LOS) to satellites Therefore, indoor location monitoring system could be a convenient alternative for environments such as tunnel and indoor building construction sites. This paper presents a case study to investigate feasibility of Wi-Fi based indoor location monitoring system in construction site. The system is developed by using fingerprint map of gathering Received Signal Strength Indication(RSSI) from each Access Point(AP). The signal information is gathered by Radio Frequency Identification (RFID) tags, which are attached on a helmet of labors to track their locations, and is sent to server computer. Experiments were conducted in a shield tunnel construction site at Guangzhou, China. This study consists of three phases as follows: First, we have a tracking test in entrance area of tunnel construction site. This experiment was performed to find the effective geometry of APs installation. The geometry of APs installation was changed for finding effective locations, and the experiment was performed using one and more tags. Second, APs were separated into two groups, and they were connected with LAN cable in tunnel construction site. The purpose of this experiment was to check the validity of group separating strategy. One group was installed around the entrance and the other one was installed inside the tunnel. Finally, we installed the system inner area of tunnel, boring machine area, and checked the performance with varying conditions (the presence of obstacles such as train, worker, and so on). Accuracy of this study was calculated from the data, which was collected at some known points. Experimental results showed that WiFi-based indoor location system has a level of accuracy of a few meters in tunnel construction site. From the results, it is inferred that the location tracking system can track the approximate location of labors in the construction site. It is able to alert the labors when they are closer to dangerous zones like poisonous region or cave-in..

  • PDF

Utility Analysis on Activating Web-Based Course Support System by Faculty in Universities (웹기반 강의지원시스템에 대한 대학교수의 활용도분석)

  • Kim, Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.221-232
    • /
    • 2009
  • To purpose of the study was to analyze faculty utility of Web-Based course support system in Universities. Data were collected from log file in server computer, 5,023 faculties and 12,733 courses offered at spring semester of 2009 in the Metropolitan area S, K, D universities were analyzed. Specifically, frequency and percentile of faculties and courses using course management system were analyzed. In addition, the frequencies and percentiles of courses using sub-functions of course management system were analyzed and X2 test used to examine the difference of frequencies of faculties and courses using course system at using announcement, providing instructional material, public bulletin board and free board. Results were as follows. The 62.28% of faculties and 50.3% of courses have used Web-Based course support system. The results of Subfunction utility analysis showed the highest use as 80.4%. in providing instructional material. However, the use of announcement functions and online discussion was more or less low. Results imply that most of faculties and course are using course management system as supplementary system of off-line instruction.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

Design of a designated lane enforcement system based on deep learning (딥러닝 기반 지정차로제 단속 시스템 설계)

  • Bae, Ga-hyeong;Jang, Jong-wook;Jang, Sung-jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.236-238
    • /
    • 2022
  • According to the current Road Traffic Act, the 2020 amendment bill is currently in effect as a system that designates vehicle types for each lane for the purpose of securing road use efficiency and traffic safety. When comparing the number of traffic accident fatalities per 10,000 vehicles in Germany and Korea, the number of traffic accident deaths in Germany is significantly lower than in Korea. The representative case of the German autobahn, which did not impose a speed limit, suggests that Korea's speeding laws are not the only answer to reducing the accident rate. The designated lane system, which is observed in accordance with the keep right principle of the Autobahn Expressway, plays a major role in reducing traffic accidents. Based on this fact, we propose a traffic enforcement system to crack down on vehicles violating the designated lane system and improve the compliance rate. We develop a designated lane enforcement system that recognizes vehicle types using Yolo5, a deep learning object recognition model, recognizes license plates and lanes using OpenCV, and stores the extracted data in the server to determine whether or not laws are violated.Accordingly, it is expected that there will be an effect of reducing the traffic accident rate through the improvement of driver's awareness and compliance rate.

  • PDF

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

Protecting Multi Ranked Searchable Encryption in Cloud Computing from Honest-but-Curious Trapdoor Generating Center (트랩도어 센터로부터 보호받는 순위 검색 가능한 암호화 다중 지원 클라우드 컴퓨팅 보안 모델)

  • YeEun Kim;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1077-1086
    • /
    • 2023
  • The searchable encryption model allows to selectively search for encrypted data stored on a remote server. In a real-world scenarios, the model must be able to support multiple search keywords, multiple data owners/users. In this paper, these models are referred to as Multi Ranked Searchable Encryption model. However, at the time this paper was written, the proposed models use fully-trusted trapdoor centers, some of which assume that the connection between the user and the trapdoor center is secure, which is unlikely that such assumptions will be kept in real life. In order to improve the practicality and security of these searchable encryption models, this paper proposes a new Multi Ranked Searchable Encryption model which uses random keywords to protect search words requested by the data downloader from an honest-but-curious trapdoor center with an external attacker without the assumptions. The attacker cannot distinguish whether two different search requests contain the same search keywords. In addition, experiments demonstrate that the proposed model achieves reasonable performance, even considering the overhead caused by adding this protection process.

Implementation Strategy of Global Framework for Climate Service through Global Initiatives in AgroMeteorology for Agriculture and Food Security Sector (선도적 농림기상 국제협력을 통한 농업과 식량안보분야 전지구기후 서비스체계 구축 전략)

  • Lee, Byong-Lyol;Rossi, Federica;Motha, Raymond;Stefanski, Robert
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.15 no.2
    • /
    • pp.109-117
    • /
    • 2013
  • The Global Framework on Climate Services (GFCS) will guide the development of climate services that link science-based climate information and predictions with climate-risk management and adaptation to climate change. GFCS structure is made up of 5 pillars; Observations/Monitoring (OBS), Research/ Modeling/ Prediction (RES), Climate Services Information System (CSIS) and User Interface Platform (UIP) which are all supplemented with Capacity Development (CD). Corresponding to each GFCS pillar, the Commission for Agricultural Meteorology (CAgM) has been proposing "Global Initiatives in AgroMeteorology" (GIAM) in order to facilitate GFCS implementation scheme from the perspective of AgroMeteorology - Global AgroMeteorological Outlook System (GAMOS) for OBS, Global AgroMeteorological Pilot Projects (GAMPP) for RES, Global Federation of AgroMeteorological Society (GFAMS) for UIP/RES, WAMIS next phase for CSIS/UIP, and Global Centers of Research and Excellence in AgroMeteorology (GCREAM) for CD, through which next generation experts will be brought up as virtuous cycle for human resource procurements. The World AgroMeteorological Information Service (WAMIS) is a dedicated web server in which agrometeorological bulletins and advisories from members are placed. CAgM is about to extend its service into a Grid portal to share computer resources, information and human resources with user communities as a part of GFCS. To facilitate ICT resources sharing, a specialized or dedicated Data Center or Production Center (DCPC) of WMO Information System for WAMIS is under implementation by Korea Meteorological Administration. CAgM will provide land surface information to support LDAS (Land Data Assimilation System) of next generation Earth System as an information provider. The International Society for Agricultural Meteorology (INSAM) is an Internet market place for agrometeorologists. In an effort to strengthen INSAM as UIP for research community in AgroMeteorology, it was proposed by CAgM to establish Global Federation of AgroMeteorological Society (GFAMS). CAgM will try to encourage the next generation agrometeorological experts through Global Center of Excellence in Research and Education in AgroMeteorology (GCREAM) including graduate programmes under the framework of GENRI as a governing hub of Global Initiatives in AgroMeteorology (GIAM of CAgM). It would be coordinated under the framework of GENRI as a governing hub for all global initiatives such as GFAMS, GAMPP, GAPON including WAMIS II, primarily targeting on GFCS implementations.