• Title/Summary/Keyword: Management of server system

Search Result 1,340, Processing Time 0.031 seconds

A Repository Utilization System to optimize maintenance of IIoT-based main point Utilities (IIoT 기반한 핵심유틸리티의 유지보수 최적화를 위한 공동 활용 시스템)

  • Lee, Byung-Ok;Lee, Kun-Woo;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.89-94
    • /
    • 2021
  • Recently, manufacturing companies are introducing many intelligent production processes that apply IIoT/ICT to improve competitiveness, and a system that maintains availability, improves productivity, and optimizes management costs is needed as a preventive measure using environmental data generated from air ejectors. Therefore, in this study, a dedicated control board was developed and LoRa communication module was applied to remotely control it to collect and manage information about compressors from cloud servers and to ensure that all operators and administrators utilize common data in real time. This dramatically reduced M/S steps, increased system operational availability, and reduced local server operational burden. It dramatically reduced maintenance latency by sharing system failure conditions and dramatically improved cost and space problems by providing real-time status detection through wired and mobile utilization by maintenance personnel.

Design of Remote management System Using Mobile Agents (이동에이전트를 이용한 원격관리 시스템 설계)

  • Hong, Seong-Pyo;Song, Gi-Beom;Park, Chan-Mo;Lee, Joon;Oh, Moo-Song
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.368-371
    • /
    • 2000
  • The distributed object computing is possible to distributed computing on same or heterogeneous machine environment with growth of distributed computing and object-oriented technology. The typical of model, CORBA is int solved the interoperability in heterogeneous machine environment over the network But, the CORBA has a problem that the server is can't rely on request of client occurs network overhead by extinction of network A plan was on the rise to solve the problem that is combination of mobile agent and distributed computing technology.

  • PDF

A Study on Portable Weighing Scales Applicable to Poultry Farms (가금류 농장에 적용 가능한 이동식 중량 저울에 관한 연구)

  • Park, Sung Jin;Park, In Ji;Kim, Jin Young
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.2
    • /
    • pp.155-159
    • /
    • 2022
  • Smart livestock, which combines information and communication technology (ICT) with livestock, can be said to be an effective solution to existing livestock problems such as productivity improvement, odors, and diseases. So far, it has hardly been universalized; thus, it is necessary to develop automation devices to reduce labor by localizing automation devices to expand the distribution of ICT technology to farms, and to advance precise specifications and health management technology using biometric information. Weighing scales currently being used in livestock farms are to prevent the spread of diseases by diagnosis and preparation for AI and other diseases in advance, using information on the growing weight of duck breeding. However, accurate values cannot be obtained due to poor breeding conditions. In this paper, we developed a separate data transmission system kit for the weighing scale and placed the sensor on top of the weighing scale so that the sensor wire is not affected by pollutants or ducks on the floor. A display function was provided, and a method of receiving and analyzing the serial port data of the weighing device, and then transmitting them to the data collection server was implemented.

Research on security technology to respond to edge router-based network attacks (Edge 라우터 기반 네트워크 공격에 대응하는 보안기술 연구)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1374-1381
    • /
    • 2022
  • Existing research on security technology related to network attack response has focused on research using hardware network security technology, network attacks that wiretap and wiretap network packets, denial of service attack that consumes server resources to bring down the system, and network by identifying vulnerabilities before attack. It is classified as a scanning attack. In addition, methods for increasing network security, antivirus vaccines and antivirus systems have been mainly proposed and designed. In particular, many users do not fully utilize the security function of the router. In order to overcome this problem, it is classified according to the network security level to block external attacks through layered security management through layer-by-layer experiments. The scope of the study was presented by examining the security technology trends of edge routers, and suggested methods and implementation examples to protect from threats related to edge router-based network attacks.

Implementation of Sensors Information Alarm Service using an FCM based on Raspberry Pi (FCM을 이용한 라즈베리파이 기반의 센서정보 알림 구현)

  • Oh, Sejin
    • Journal of Industrial Convergence
    • /
    • v.20 no.8
    • /
    • pp.61-67
    • /
    • 2022
  • The Internet of Things(IoT) is one of the key technologies in the Fourth Industrial Revolution. The IoT is a system that acquires information from various sensors and provides meaningful information to users. The method of obtaining information from sensor is using WIFI, Bluetooth and Server. is not accessible to external users because of different type of networks or local area communication. For this reason, there is a problem that external user cannot receive notification in regard to sensor information. In this paper, we want to establish a cloud message environment using Google's FCM(Firebase Cloud Messaging) and find out through experiments how users can receive notifications even if they are outside.

Development of a Document-Oriented and Web-Based Nuclear Design Automation System (문서중심 및 웹기반 노심설계 자동화 시스템 개발)

  • Park Yong Soo;Kim Jong Kyung
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.4
    • /
    • pp.35-47
    • /
    • 2004
  • The nuclear design analysis requires time-consuming and erroneous model-input preparation. code run. output analysis and quality assurance process. To reduce human effort and improve design quality and productivity. Innovative Design Processor (IDP) is being developed. Two basic principles of IDP are the document-oriented desigll and the web-based design. The document-oriented design is that. if the designer writes a design document called active document and feeds it to a special program. the final document with complete analysis. table and plots is made automatically. The active documents can be written with Microsoft Word or created automatically on the web. which is another framework of IDP. Using the proper mix-up of server side and client side programming under the LAMP (Linux/Apache/MySQL/PHP) environment. it e design process on the web is modeled as a design wizard style so that even a novice designer makes the design document easily. This automation using the IDP is now being implemented for all the reload design of Korea Standard Nuclear Power Plant (KSNP) type PWRs. The introduction of this process will allow large reduction in all reload design efforts of KSNP and provide a platform for design and R&D tasks of KNFC.

  • PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Development of Web-based User Script Linking System for Three-dimensional Robot Simulation (3차원 로봇 시뮬레이션 환경을 위한 웹 기반의 사용자 스크립트 연동 시스템 개발)

  • Yang, Jeong-Yean
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.469-476
    • /
    • 2019
  • Robotic motion is designed by the rotation and the translation of multiple joint coordinates in a three-dimensional space. Joint coordinates are generally modeled by homogeneous transform matrix. However, the complexity of three dimensional motions prefers the visualization methods based on simulation environments in which models and generated motions work properly. Many simulation environments have the limitations of usability and functional extension from platform dependency and interpretation of predefined commands. This paper proposes the web-based three dimensional simulation environment toward high user accessibility. Also, it covers the small size web server that is linked with Python script. The non linearities of robot control apply to verify the computing efficiency, the process management, and the extendability of user scripts.

An Implementation of NMEA 0183/2000 Gateway (NMEA0183/2000 게이트웨이 구현)

  • Son, Hyeong-Gon;Joo, Moon G.;Woo, Him-Chan;Kang, Mu-Sung;Sul, Jaehoon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.405-411
    • /
    • 2017
  • As the number of sensors in a ship has increased, studies have been actively conducted to efficiently manage a large amount of data. Sensors in a ship follow the NMEA (National Marine Electronics Association) data format. In particular, NMEA0183 standardized as IEC 61162-1 and NMEA2000 standardized as IEC 61162-3 are widely used. NMEA0183 is a protocol based on serial communication and NMEA2000 is a protocol based on CAN (Controller Area Network) communication. We implemented a gateway that receives data from NMEA0183 sensors and NMEA2000 sensors and then transmits them to the server on TCP/IP network. By using the NMEA2000 0183/2000 gateway to receive the sensor data and manage it through the ship's preventive maintenance system, the sensor data can be utilized efficiently and promptly. This management can reduce crew's daily tasks and reduce the number of accidents.

Performance Evaluation of Catalog Management Schemes for Distributed XML Database at the Query Compile Time (분산 XML 데이터베이스에서 질의 컴파일 시 카탈로그 관리 기법의 성능 평가)

  • Jang, Gun-Up;Hong, Eui-Kyeong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.77-82
    • /
    • 2006
  • 최근 컴퓨팅 환경은 클라이언트-서버(client-server) 환경에서 웹(World Wide Web)을 기반으로 한 분산 컴퓨팅(distributed computint) 환경으로 변화하고 있다. 그에 따라 XML 문서의 사용과 XML 문서의 양이 급속하게 증가하였다. 언제 어디서나 쉽게 필요한 XML 문서에 접근해야하며, 이러한 응용을 위해 짧은 시간 내에 그 정보를 전달할 수 있어야 한다. 이에 따라 분산 환경에서의 XML 문서의 처리가 요구된다. XML 데이터를 분산 데이터베이스의 특성을 이용하여 저장, 관리, 질의하는 분산 XML 데이터베이스 시스템(Distributed XML Database System)의 사용의 필요성이 증가하고 있다. 이에 따라, 사이트의 자치성, 질의 최적화, 데이터의 투명성 등에 큰 영향을 미치는 분산 XML 데이터베이스 시스템에서의 카탈로그 관리 기법의 연구의 필요성이 증가하게 된다. 본 논문에서는 중앙 집중식 카탈로그와 완전 중복식 카탈로그, 분할식 카탈로그를 분산 XML 데이터베이스 시스템에서 CPU 비용, I/O 비용, 동시성 제어, 이단계 완료 프로토콜, 큐잉 지연 등을 모두 고려한 모델을 설계하였고, 이를 시뮬레이터로 구현하여 각 카탈로그 관리 기법들의 성능을 합리적인 환경 설정을 통해 시뮬레이션함으로써 카탈로그 관리 기법들의 성능을 평가하였다.

  • PDF