• Title/Summary/Keyword: Intelligent Network

Search Result 3,278, Processing Time 0.035 seconds

Supervisor System Development for Improving Quality of RFID Cold Storage Management Systems (RFID 냉동창고 관리시스템의 품질향상을 위한 슈퍼바이저 시스템 개발)

  • Moon, Mi-Kyeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.6
    • /
    • pp.109-117
    • /
    • 2014
  • A cold storage is a warehouse of a insulated building with cooling installations. It has many different types of cold rooms with temperatures below 0 degrees Celsius, and the sequential workflow such as receiving, picking and packing runs in that rooms. Recently, the cold storages have adopted RFID technology, and consequently, warehouse product management in them are becoming intelligent and network. However, information inconsistency in warehouses caused by physical and logical errors reduces reliability in the RFID cold storage management system and worsens their work efficiency. Therefore, it is necessary to develop an early detection system to identify errors. In this paper, we suggest a supervisory system detecting logical errors on business processes of the RFID cold storage. It is composed of a master supervisor and mobile supervisor. In the master supervisor, the manager can set the constraints conditions and get alerts, and in the mobile supervisor, the workers confirm and deal with these faults directly. The supervisory system improve reliability of the RFID cold storage management system by recognizing a failure to identify physically and logically using these constraint conditions. This paper shows that the supervisory system can reduce the average recovery time to improve reliability by decreasing the time for detecting and analyzing errors in the RFID cold storage management system.

Welfare Interface using Multiple Facial Features Tracking (다중 얼굴 특징 추적을 이용한 복지형 인터페이스)

  • Ju, Jin-Sun;Shin, Yun-Hee;Kim, Eun-Yi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.75-83
    • /
    • 2008
  • We propose a welfare interface using multiple fecial features tracking, which can efficiently implement various mouse operations. The proposed system consist of five modules: face detection, eye detection, mouth detection, facial feature tracking, and mouse control. The facial region is first obtained using skin-color model and connected-component analysis(CCs). Thereafter the eye regions are localized using neutral network(NN)-based texture classifier that discriminates the facial region into eye class and non-eye class, and then mouth region is localized using edge detector. Once eye and mouth regions are localized they are continuously and correctly tracking by mean-shift algorithm and template matching, respectively. Based on the tracking results, mouse operations such as movement or click are implemented. To assess the validity of the proposed system, it was applied to the interface system for web browser and was tested on a group of 25 users. The results show that our system have the accuracy of 99% and process more than 21 frame/sec on PC for the $320{\times}240$ size input image, as such it can supply a user-friendly and convenient access to a computer in real-time operation.

Polymer-based Large Core Optical Splitter for Multimode Optical Networks (멀티모드 광네트워크용 폴리머기반 대구경 광분배기)

  • An, Jong Bae;Lee, Woo-Jin;Hwang, Sung Hwan;Kim, Gye Won;Kim, Myoung Jin;Jung, Eun Joo;Moon, Jong Ha;Kim, Jin Hyeok;Rho, Byung Sup
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.4
    • /
    • pp.184-188
    • /
    • 2013
  • Two types of polymer-based optical splitters with $200{\mu}m$ large core are presented for optical multimode networks, such as smart home networks, intelligent automotive networks, etc. Optical splitters that have 1:1 symmetric and 9:1 asymmetric structure were fabricated by a ultra violet(UV)-imprint technology using a deep etched Si(silicon) master by the Bosch process. In this paper, we successfully fabricated the symmetric and asymmetric optical splitters with suitable optical network applications.

Multi-Channel MAC Protocol Based on V2I/V2V Collaboration in VANET (VANET에서 V2I/V2V 협력 기반 멀티채널 MAC 프로토콜)

  • Heo, Sung-Man;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • VANET technologies provide real-time traffic information for mitigating traffic jam and preventing traffic accidents, as well as in-vehicle infotainment service through Telematics/Intelligent Transportation System (ITS). Due to the rapid increasement of various requirements, the vehicle communication with a limited resource and the fixed frame architecture of the conventional techniques is limited to provide an efficient communication service. Therefore, a new flexible operation depending on the surrounding situation information is required that needs an adaptive design of the network architecture and protocol for efficiently predicting, distributing and sharing the context-aware information. In this paper, Vehicle-to-Infrastructure (V2I) based on communication between vehicle and a Road Side Units (RSU) and Vehicle-to-Vehicle (V2V) based on communication between vehicles are effectively combined in a new MAC architecture and V2I and V2V vehicles collaborate in management. As a result, many vehicles and RSU can use more efficiently the resource and send data rapidly. The simulation results show that the proposed method can achieve high resource utilization in accordance. Also we can find out the optimal transmission relay time and 2nd relay vehicle selection probability value to spread out V2V/V2I collaborative schedule message rapidly.

Study on the Network System between of the Outpatient and Central Treatment Department of Long Term Care Hospitals (요양병원 외래 및 중앙진료부의 의료영역 간 연결관계에 관한 연구)

  • Bae, Sunmi;Kim, Suktae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.22 no.4
    • /
    • pp.7-17
    • /
    • 2016
  • Purpose: As our population ages and becomes an elderly society the number of elderly care hospitals is rapidly increasing. Because physical functions and spatial perception in the elderly decrease with age, these hospitals require more systematic and intelligent space designs. The design of these spaces are even more complex because they must accommodate medical programs to treat various different diseases and ailments and also because there are many first time patients and irregular short term patients that seek out outpatient treatment services. Also by analyzing the spatial configuration systems and systematic relationships between each of the functional spaces of the outpatient treatment service departments for hospitals specialized in care for the elderly by focusing on the hallway and corridor systems of these hospitals, the according characteristics and trends were examined. Methods: Based on preceding research, the types of hallway and corridor systems of these hospitals were categorized into five types, including gallery corridors, middle corridors, hall-type, mixed type and cyclic type corridors, and into six types according to function including by medical diagnosis, patient registration, examination, administration and convenience and shared common space to derive any interconnecting relationships between the corridor systems. Also by comprehensively examining the types and combined utilization of the corridor types and the integration and the intelligibility of the space syntax, any trends within the corridor system were derived. The elderly care hospitals examined in this research study were twelve hospitals that opened after the year 2000 in Korea with more that 150 sick beds with areas larger than $1000m^2$ and with all outpatient medical service related rooms located entirely on a single floor of the hospital. Results: The following results could be confirmed based on this research study. 1) The spaces where medical diagnosis and examination occurred were adjacent, and the movement lines for first time patients and re-visiting patients were taken into consideration by separating the treatment space. 2) This research study confirmed that the larger the size of the hospital was, there were more detailed categorizations of treatment services and that there was a tendency for treatment areas to be separated and independent from examination areas. 3) There was a tendency for integration and intelligibility to decrease the more complex and diverse the combination of hall types designed into the corridor systems of these hospitals was. cyclic type corridors dramatically decreased the intelligibility of the corridor systems of these hospitals. 4) The priority rank of these spaces were confirmed to be highest in the order of registration, diagnosis, examination, treatment, administration and shared common spaces. However it was confirmed for the local integration that the diagnosis scope had the highest priority rank. Implications: There were exceptional cases confirmed where the number of unit spaces did not have an absolute effect on integration and intelligibility. These results can be interpreted to mean that this can be overcome through efficient architectural planning.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

Cost-Based Directed Scheduling : Part II, An Inter-Job Cost Propagation Algorithm (비용기반 스케줄링 : Part II, 작업간 비용 전파 알고리즘)

  • Suh, Min-Soo;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.1
    • /
    • pp.117-129
    • /
    • 2008
  • The cost-based scheduling work has been done in both the Operations Research (OR) and Artificial Intelligence (AI) literature. To deal with more realistic problems, AI-based heuristic scheduling approach with non-regular performance measures has been studied. However, there has been little research effort to develop a full inter-job cost propagation algorithm (CPA) for different jobs having multiple downstream and upstream activities. Without such a CPA, decision-making in scheduling heuristics relies upon local, incomplete cost information, resulting in poor schedule performance from the overall cost minimizing objective. For such a purpose, we need two types of CPAs : intra-job CPA and inter-job CPA. Whenever there is a change in cost information of an activity in a job in the process of scheduling, the intra-job CPA updates cost curves of other activities connected through temporal constraints within the same job. The inter-job CPA extends cost propagation into other jobs connected through precedence relationships. By utilizing the cost information provided by CPAs, we propose cost-based scheduling heuristics that attempt to minimize the total schedule cost. This paper develops inter-job CPAs that create and update cost curves of each activity in each search state, and propagate cost information throughout a whole network of temporal constraints. Also we propose various cost-based scheduling heuristics that attempt to minimize the total schedule cost by utilizing the cost propagation algorithm.

  • PDF

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

Design and Implementation of Sequential Pattern Miner to Analyze Alert Data Pattern (경보데이터 패턴 분석을 위한 순차 패턴 마이너 설계 및 구현)

  • Shin, Moon-Sun;Paik, Woo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.1-13
    • /
    • 2009
  • Intrusion detection is a process that identifies the attacks and responds to the malicious intrusion actions for the protection of the computer and the network resources. Due to the fast development of the Internet, the types of intrusions become more complex recently and need immediate and correct responses because the frequent occurrences of a new intrusion type rise rapidly. Therefore, to solve these problems of the intrusion detection systems, we propose a sequential pattern miner for analysis of the alert data in order to support intelligent and automatic detection of the intrusion. Sequential pattern mining is one of the methods to find the patterns among the extracted items that are frequent in the fixed sequences. We apply the prefixSpan algorithm to find out the alert sequences. This method can be used to predict the actions of the sequential patterns and to create the rules of the intrusions. In this paper, we propose an extended prefixSpan algorithm which is designed to consider the specific characteristics of the alert data. The extended sequential pattern miner will be used as a part of alert data analyzer of intrusion detection systems. By using the created rules from the sequential pattern miner, the HA(high-level alert analyzer) of PEP(policy enforcement point), usually called IDS, performs the prediction of the sequence behaviors and changing patterns that were not visibly checked.

  • PDF

Hallym Jikimi: A Remote Monitoring System for Daily Activities of Elders Living Alone (한림 지킴이: 독거노인 일상 활동 원격 모니터링 시스템)

  • Lee, Seon-Woo;Kim, Yong-Joong;Lee, Gi-Sup;Kim, Byung-Jung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.4
    • /
    • pp.244-254
    • /
    • 2009
  • This paper describes a remote system to monitor the circadian behavioral patterns of elders who live alone. The proposed system was designed and implemented to provide more conveniently and reliably the required functionalities of a remote monitoring system for elders based on the development of first phase prototype[2]. The developed system is composed of an in-house sensing system and a server system. The in-house sensing system is a set of wireless sensor nodes which have pyroelectric infrared (PIR) sensor to detect a motion of elder. Each sensing node sends its detection signal to a home gateway via wireless link. The home gateway stores the received signals into a remote database. The server system is composed of a database server and a web server, which provides web-based monitoring system to caregivers (friends, family and social workers) for more cost effective intelligent care service. The improved second phase system can provide 'automatic diagnosis', 'going out detection', and enhanced user interface functionalities. We have evaluated the first and second phase monitoring systems from real field experiments of 3/4 months continuous operation with installation of 9/15 elders' houses, respectively. The experimental results show the promising possibilities to estimate the behavioral patterns and the current status of elder even though the simplicity of sensing capability.