• Title/Summary/Keyword: Integrated Monitoring system

Search Result 895, Processing Time 0.031 seconds

Network Adaptive Quality of Service Method in Client/Server-based Streaming Systems (클라이언트/서버 기반 스트리밍 시스템에서의 네트워크 적응형 QoS 기법)

  • Zhung, Yon-il;Lee, Jung-chan;Lee, Sung-young
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.691-700
    • /
    • 2003
  • Due to the fast development of wire&wireless internet and computer hardware, more and more internet services are being developed, such as Internet broadcast, VoD (Video On Demand), etc. So QoS (Qualify of Service) is essentially needed to guarantee the quality of these services. Traditional Internet is Best-Effort service in which all packets are transported in FIFO (First In First Out) style. However, FIFO is not suitable to guarantee the quality of some services, so more research in QoS router and QoS protocol are needed. Researched QoS router and protocol are high cost and inefficient because the existing infra is not used. To solve this problem, a new QoS control method, named Network Adaptive QoS, is introduced and applied to client/server-based streaming systems. Based on network bandwidth monitoring mechanism, network adaptive QoS control method can be used in wire&wireless networks to support QoS in real-time streaming system. In order to reduce application cost, the existing streaming service is used in NAQoS. A new module is integrated into the existing server and client. So the router and network line are not changed. By simulation in heavy traffic network conditions, we proved that stream cannot be seamless without network adaptive QoS method.

Knowledge and Perceptions of Cancer and Cancer Prevention among Malaysian Traditional Healers: a Qualitative Study

  • Al-Naggar, Redhwan A.;Bobryshev, Yuri V.;Abdulghani, Mahfoudh Al-Musali Mohammed;Rammohan, Subramanian;Al-Jashamy, Karim
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.8
    • /
    • pp.3841-3850
    • /
    • 2012
  • Objective: The objective of this study was to explore the knowledge and perceptions of Malaysian tradition healers towards cancer and cancer prevention. Methodology: A total of 25 participants agreed to participate in this qualitative study during the period from $20^{th}$ July 2011 until $24^{th}$ of September 2011. The proposal of this study was approved by the Ethics Committee of Management and Science University (MSU). Once the participant agreed to be interviewed, date, time and place of the interviews were determined. Consent form was obtained from participants before the interview began. Participants were briefed about the study and its purpose, and after asking their permissions, their replies were recorded. The data was organized into themes and analyzed manually. Results: Twenty-five Malaysian traditional healers participated in this qualitative study. The age of participants ranged between 26 to 78 years old. The majority were in the age group of 31-60 years old, male, Chinese, degree holders with a monthly income ranging from 1,000-5,000 Ringgit Malaysia (RM) and were married (56%, 80%, 48%, 52%, 68%, 84% respectively). The majority defined cancer as having high cholesterol or abscess accumulation. A few of them defined cancer as a type of cell growth. The majority mentioned that food and unhealthy lifestyles are the primary causes of cancer. Surprisingly some of them mentioned that cancer is caused by interference by ghosts. Regarding the diagnosis of cancer, the majority mentioned that they refer their patients to modern physicians' medical report when it comes to diagnosing or treating patients with cancer. The most common cancers that many patients came to seek treatment were breast cancers, followed by colon cancers, liver and lung cancers. Conclusions: Despite good knowledgeabout the causes of cancer among traditional healers, misconceptions still exist. Insufficient knowledge about the definition of cancer was noted among the traditional healers. This urges immediate action by the Ministry of Health of Malaysia to set up a strict regulation and regular monitoring of the traditional healers nationally. Traditional and Complementary Medicine may be integrated into the healthcare system and need to have sustained cooperation for the benefit of patients since about 80% of patients use traditional medicines.

Development of the Critical Pathway for Cesarean Section Patient (제왕절개술 환자를 위한 Critical Pathway 개발)

  • Chung Kyung-Hee;Jang Keum-Seung
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.4 no.1
    • /
    • pp.66-80
    • /
    • 1998
  • With the opening of healthcare market, the health care environment in Korea is anticipating a drastic change. In this Internationally open market environment, it is necessary to introduce a systematic health care plan and DRG system which offer qualitative medical services as well as reduced cost. Purpose of this study is to develop and test the critical pathway for Cesarean section patient in the way to be possible the integrated inpatient management. It was adopted the process of six phases to develop the critical pathway as the theoretical framework implemented by Johns Hopkins Hospital, Maryland, U.S.A. In the first phase, make a selection of diagnosis/procedures to develop. In the second phase, organize a development team consisted of eight expertises working in maternity nursing area. In the third phase, analyze the overall medical service offered to patient through review medical records and decided the service content and the implementation period for the Cesarean section patient. In the forth phase, make out a preliminary critical pathway after verification of expert group on content validity. In the fifth phase, validity operate to ten Cesarean section patients to test implementation in practice by using the preliminary critical pathway, In the sixth phase, defined the final critical pathway. The result of this study was as follows. 1. There were classified 8 categories as monitoring/assesment, treatment, medication, activity, diet, test, consult, education/discharge plan for vertical axis and showed hospital stayed from admission to discharge for horizontal axis of critical pathway through analysis 68 Cesarean section patients medical records. 2. After critical review 68 medical records to make out a preliminary critical pathway, hospital stays for horizontal axis were showed 6 days, mean hospital stays were 7.5 days, 2.1 days were to be taken operation after admission and 4.2 days were stayed until discharge after operation. 3. After making out a questionare in 90 items of a medical service content of eight categories and verifying the content validity of expertises, the 85 items of the preliminary critical pathway were selected by expertises agreement over 88% and modified or deleted 5 items showing agreement below 75%. 4. After verifying a validity to 10 patients for 4 weeks, hospital stays were 5.9 days. There were deleted 1 item and modified or supplemented the 9 items of the 10 items.

  • PDF

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

Effect Analysis of Classical Line TI-21 type Audio Frequency Track Circuit from KTX Sancheon Return Current Harmonics (KTX산천 귀선전류고조파가 일반선 TI-21형 AF궤도회로에 미치는 영향분석)

  • Choi, Jae Sik;Kim, Hie Sik;Park, Ju Hun;Kim, Bun Gon
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.1
    • /
    • pp.38-45
    • /
    • 2016
  • The power transformation system of High Speed rolling stocks like KTX-Sancheon has shown excellent control capacities in the areas of riding comfortability, switching efficiency, safety and energy consumption due to technical developments in power-electronics, high speed & large scale integrated semiconductors and microprocessors. However, harmonics from IGBT, a high speed switching device used in the Convertor & Invertor equipment of rolling stocks have given rise to various problems in transformer substations, signaling systems, data transmission systems and facility monitoring systems. Especially, TI21 non-insulated track circuits have malfunctioned due to the influence of returning current harmonics which were generated at around of integer times of the number of power transformation equipment in the frequency domain. This paper, measures and analyzes various schemes to analyze the traveling path of the returning current harmonics generated due to the relationship between the rolling stocks and track circuits on site. Ultimately, theseschemes will be used to design high speed rolling stocks, AF track circuits and a common grounding network.

An Application of Optoacoustic Technique for the CO Oxidation Reaction Catalyzed by $Gd_{1-x}Sr_xCoO_{3-y}$ (광음향분광법을 이용한 CO 산화반응에서의 $Gd_{1-x}Sr_xCoO_{3-y}$ 촉매효과 연구)

  • Kang Hee-Seok;Oum Ka-Won;Hwang Jin-Soo;Yo Chul-Hyun;Choi Joong-Gill
    • Journal of the Korean Chemical Society
    • /
    • v.37 no.1
    • /
    • pp.55-61
    • /
    • 1993
  • An application of the optoacoustic detection method to investigate the catalytic effect of a perovskite, $Gd_{1-x}Sr_xCoO_{3-y}$ (x = 0.00, 0.25, 0.50, 0.75) system, in the oxidation reaction of CO is described. The optoacoustic signals Of $CO_2$ produced from the oxidation reaction were measured for differing x values in $Gd_{1-x}Sr_xCoO_{3-y}$. By monitoring optoacoustic signals with respect to the time, the concentration ratios of CO and $O_2$, and the temperature, the kinetic information on the catalytic properties of the perovskite for CO oxidation reaction can be obtained. The effect of Sr substitution in $Gd_{1-x}Sr_xCoO_{3-y}$ has been found to show the maximum catalytic effect at x = 0.25 and the substantial increase in catalytic activity at temperatures above 200$^{\circ}C$. It demonstrates that the optoacoustic detection method allows the investigation of the integrated catalytic effect not only for the oxidation reaction of CO, but also for many reactions, in general, by continuously and directly detecting the species associated with the reactions.

  • PDF

Developing Local Biodiversity Strategies and Action Plans (지자체 생물다양성 관리전략 구축)

  • Kim, Geunhan;Kong, Seok-Jun;Kim, Min-Kyeong;Lee, Moung-Jin;Song, Jiyoon;Jeon, Seong-Woo
    • Journal of Environmental Policy
    • /
    • v.13 no.2
    • /
    • pp.3-20
    • /
    • 2014
  • Due to habitat damage associated with climate change and human activities, biodiversity has decreased all over the world. In order to prevent further reduction in biodiversity, the international community has endeavored to establish a cooperative system, such as the Convention on Biological Diversity (CBD). Until now, most biodiversity strategic planning has been led by the national government. However, the National Biodiversity Strategy and Action Plan is conservative and its strategic plan is vague. Therefore, we propose a method for managing local biological resources called the Local Biodiversity Strategy and Action Plan. In order to provide the strategic plans and detailed plans for the Local Biodiversity Strategy and Action Plan, the report has examined several cases including Convention on Biological Diversity, Strategic Plan for Biodiversity 2011-2020, and the biodiversity strategies and action plans of the Republic of Korea and several other countries. As a result, the report demonstrates the survey and protection of bio-species, the designation and monitoring of conservation region, the management of the integrated eco-network, the establishment of biodiversity organizations and capacity building, the methods to promote networking and traditional knowledge, and the strategy for development in bioindustry. Consequently, the implementation of biodiversity management strategies by local governments will play a significant role in preserving and increasing biodiversity by realizing the goals of Strategic Plan for Biodiversity 2011-2020.

  • PDF

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

A Discussion on Container Loss Accidents and Responses During Ship Voyage (선박 운항 중 컨테이너 해상유실 사고 및 대응에 관한 고찰)

  • Hwang, Daejung
    • Journal of Navigation and Port Research
    • /
    • v.46 no.4
    • /
    • pp.331-337
    • /
    • 2022
  • In 2021, the Joint Group of Experts on the Scientific Aspects of Marine Environmental Protection (GESAMP), a U.N. advisory research institute, cited container loss as one of six sources of marine litters in shipping. The sinking of the X-P ress Pearl in May 2021 caused a catastrophic environmental pollution accident in which the loaded containers were moved to the shore, and the plastic pellets were loaded inside covered the coast of Sri Lanka. With this history, the International Maritime Organization (IMO) will discuss prevention and follow-up measures for container loss during ship voyages, as an agenda at the 8th Sub Committee on Carriage of Cargoes and Containers meeting in September 2022. To establish Korea's response direction at the IMO meeting, this study identified major causes of container loss accidents, and considered the response through analysis based on the accident investigation report and related professional data. As a result, it was found that the major cause of container loss during voyages was the enlargement of container ships, bad weather, and poor loading of containers. In particular, the need to prepare countermeasures for the deterioration of the operational safety of large container ships due to bad weather was identified. Additionally, integrated monitoring of the implementation of international conventions is required, for the safe sea transportation of container cargo. In particular, in terms of preservation of the marine environment, it is necessary to supplement the system for the recovery of lost containers. Finally, it was found that it is necessary to establish systems that can complement each other in the shipbuilding and shipping industries, in terms of shipbuilding as well as ship operation, to fundamentally prevent container loss accidents at sea. It is judged that it is difficult to resolve the various factors of container loss at sea during voyages, by responding from an individual perspective.

A Study on Falling Detection of Workers in the Underground Utility Tunnel using Dual Deep Learning Techniques (이중 딥러닝 기법을 활용한 지하공동구 작업자의 쓰러짐 검출 연구)

  • Jeongsoo Kim;Sangmi Park;Changhee Hong
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.498-509
    • /
    • 2023
  • Purpose: This paper proposes a method detecting the falling of a maintenance worker in the underground utility tunnel, by applying deep learning techniques using CCTV video, and evaluates the applicability of the proposed method to the worker monitoring of the utility tunnel. Method: Each rule was designed to detect the falling of a maintenance worker by using the inference results from pre-trained YOLOv5 and OpenPose models, respectively. The rules were then integrally applied to detect worker falls within the utility tunnel. Result: Although the worker presence and falling were detected by the proposed model, the inference results were dependent on both the distance between the worker and CCTV and the falling direction of the worker. Additionally, the falling detection system using YOLOv5 shows superior performance, due to its lower dependence on distance and fall direction, compared to the OpenPose-based. Consequently, results from the fall detection using the integrated dual deep learning model were dependent on the YOLOv5 detection performance. Conclusion: The proposed hybrid model shows detecting an abnormal worker in the utility tunnel but the improvement of the model was meaningless compared to the single model based YOLOv5 due to severe differences in detection performance between each deep learning model