• Title/Summary/Keyword: Management of server system

Search Result 1,341, Processing Time 0.029 seconds

Develop 3D Prostate Cancer Visualization Tool in Smart Care System (스마트 케어 시스템에서의 3차원 전립선 암 가시화 도구 개발)

  • Ahn, Byung Uk;Shin, Seung Won;Choi, Moon Hyung;Jung, Seung Eun;Kim, Kwang Gi
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.163-169
    • /
    • 2016
  • In Korea, prostate cancer accounted for generating growth rate second the following thyroid cancer, because of western dietary habits. Survival rate of prostate cancer after clinical behavior is changed depend on follow-up management. A telemedicine have been applied to replacement of medical specialist in rural area, and a quick reaction to emergency situation. Our study developed prostate 3-dimensional (3D) visualization program and designed prostate aftercare system architecture, called smart care, using a device that can access the Internet. Region of interest (ROI) in prostate was manually segmented by physicians and visualized to 3D objects and sent to PACS Server as DICOM images. So, medical personnel could confirm patients' data along with 3D images not only PACS system, but also portable device like a smart phone. As a result, we conducted the aftercare service to 98 patients and visualize 3D prostate images. 3D images had advantage to instinctively apprehend where lesion is and make patients to understand state of their disease easily. In the future, should conduct an aftercare service to more patients, and will obtain numerical index through follow-up study to an accurate analysis.

File Block Management for Energy-Efficient Distributed Storages (파일 분산 저장 시스템의 에너지 효율성 증대를 위한 파일 블록 관리 기술)

  • Suh, Min-Kook;Kim, Seong-Woo;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.1
    • /
    • pp.97-104
    • /
    • 2016
  • Because of rapid growth of data size, the number of data storage has been increased. When using multiple data storages, a distribute file system is essential to insure the availability of data files. The power consumption is a major problem when using a distributed file system with many data storages. Previous works have aimed at reducing the energy consumption with efficient file block layout by changing some data servers into stand-by mode. The file block migration has not been seriously considered because migration causes large cost. But when we consider addition of a new data server or file, file block migration is needed. This paper formulates the minimization of data block migration as an ILP optimization problem and solves it using branch-and-bound method. Using this technique, we can maximize the number of stand-by data servers with the minimum number of file block movement. However, computation time of branch-and-bound method of an ILP optimization problem increases exponentially as the problem size grows. Therefore this paper also proposes a data block and data server grouping method to solve many small ILP problems.

Design of an In-vehicle Intelligent Information System for Remote Management (차량 원격 진단 및 관리를 위한 차량 지능 정보시스템의 설계)

  • Kim, Tae-Hwan;Lee, Seung-Il;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1023-1026
    • /
    • 2005
  • In the ubiquitous computing environment, an intelligent vehicle is defined as a sensor node with a capability of intelligence and communication in a wire and wireless network space. To make it real, a lot of problems should be addressed in the aspect of vehicle mobility, in-vehicle communication, common service platform and the connection of heterogeneous networks to provide a driver with several intelligent information services beyond the time and space. In this paper, we present an intelligent information system for managing in-vehicle sensor network and a vehicle gateway for connecting the external networks. The in-vehicle sensor network connected with several sensor nodes is used to collect sensor data and control the vehicle based on CAN protocol. Each sensor node is equipped with a reusable modular node architecture, which contains a common CAN stack, a message manager and an event handler. The vehicle gateway makes vehicle control and diagnosis from a remote host possible by connecting the in-vehicle sensor network with an external network. Specifically, it gives an access to the external mobile communication network such as CDMA. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixed place, 707ms at rural area and 910ms at urban area.

  • PDF

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

A History Check System of Public Electronic Certificate using OCSP Service (OCSP 서비스를 이용한 공인인증서 사용이력 확인 시스템)

  • Kim, Nam-Gon;Cho, Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.543-548
    • /
    • 2016
  • Public electronic certificates, as an important means for identification, have been used as the main economic transactions, including banking, e-government, e-commerce. identification. However, damage cases of certificates have been increased by Illegally issued and by hacking practices. Also the users have a difficult in ensuring that their certificates when and where to use. Therefore, the proposed system gives the organization code for the Institutions using OCSP services in advance, the organization code embedded in extensions of OCSP request message structure when institutions ask the validation of certificate to CA(Certificate Authority). Also, OCSP server can extract the organization code from OCSP request message, confirm the institution, and record it in certificate history management table of DB. In this paper, we presented a system that could determine the certificate history check using OCSP service, public electronic certificate validation service, and implemented to prevent and cope immediately with financial incidents.

Social Network based Sensibility Design Recommendation using {User - Associative Design} Matrix (소셜 네트워크 기반의 {사용자 - 연관 디자인} 행렬을 이용한 감성 디자인 추천)

  • Jung, Eun-Jin;Kim, Joo-Chang;Jung, Hoill;Chung, Kyungyong
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.313-318
    • /
    • 2016
  • The recommendation service is changing from client-server based internet service to social networking. Especially in recent years, it is serving recommendations with personalization to users through crowdsourcing and social networking. The social networking based systems can be classified depending on methods of providing recommendation services and purposes by using memory and model based collaborative filtering. In this study, we proposed the social network based sensibility design recommendation using associative user. The proposed method makes {user - associative design} matrix through the social network and recommends sensibility design using the memory based collaborative filtering. For the performance evaluation of the proposed method, recall and precision verification are conducted. F-measure based on recommendation of social networking is used for the verification of accuracy.

Design of Deep Learning-Based Automatic Drone Landing Technique Using Google Maps API (구글 맵 API를 이용한 딥러닝 기반의 드론 자동 착륙 기법 설계)

  • Lee, Ji-Eun;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.18 no.1
    • /
    • pp.79-85
    • /
    • 2020
  • Recently, the RPAS(Remote Piloted Aircraft System), by remote control and autonomous navigation, has been increasing in interest and utilization in various industries and public organizations along with delivery drones, fire drones, ambulances, agricultural drones, and others. The problems of the stability of unmanned drones, which can be self-controlled, are also the biggest challenge to be solved along the development of the drone industry. drones should be able to fly in the specified path the autonomous flight control system sets, and perform automatically an accurate landing at the destination. This study proposes a technique to check arrival by landing point images and control landing at the correct point, compensating for errors in location data of the drone sensors and GPS. Receiving from the Google Map API and learning from the destination video, taking images of the landing point with a drone equipped with a NAVIO2 and Raspberry Pi, camera, sending them to the server, adjusting the location of the drone in line with threshold, Drones can automatically land at the landing point.

Development and Performance Test of Gas Safety Management System based on the Ubiquitous Home (u-home 가스안전관리시스템 개발 및 성능시험)

  • Park, Gyou-Tae;Lyu, Geun-Jun;Kim, Young-Gyu;Kim, Yeong-Dae;Jee, Cha-Wan;Kwon, Jong-Won;Kim, Hie-Sik
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.3
    • /
    • pp.13-20
    • /
    • 2011
  • In this paper, we proposed a system to raise gas safety management by using the wireless communication module and intelligent gas safety appliances. Our designed systems configure a micom-gas meter, an automatic extinguisher, sensors, and a wallpad. A micom-gas-meter monitors gas flow, gas pressure, and earthquake. An automatic fire extinguisher checks gas(combustible) leaks and temperature of $100^{\circ}C$ and $130^{\circ}C$. Sensors measure smoke and CO gas. In our novel system, a micom-gas meter cut off inner valve with warnings, an automatic fire extinguisher cut off middle valve and spray extinguishing materials, and sensors generate signals for smoke and CO when occurring gas risk. Gas safety appliances and sensors takes safety measures, and transmit those signal to a wallpad. The wallpad again transmit signal like events to a control server. Users can connect web pages for gas safety through B-ISDN and control and manage them. We hereby devised scenarios for gas safety and risk management, and demonstrated their effectiveness through experiments.

Convergence CCTV camera embedded with Deep Learning SW technology (딥러닝 SW 기술을 이용한 임베디드형 융합 CCTV 카메라)

  • Son, Kyong-Sik;Kim, Jong-Won;Lim, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.103-113
    • /
    • 2019
  • License plate recognition camera is dedicated device designed for acquiring images of the target vehicle for recognizing letters and numbers in a license plate. Mostly, it is used as a part of the system combined with server and image analysis module rather than as a single use. However, building a system for vehicle license plate recognition is costly because it is required to construct a facility with a server providing the management and analysis of the captured images and an image analysis module providing the extraction of numbers and characters and recognition of the vehicle's plate. In this study, we would like to develop an embedded type convergent camera (Edge Base) which can expand the function of the camera to not only the license plate recognition but also the security CCTV function together and to perform two functions within the camera. This embedded type convergence camera equipped with a high resolution 4K IP camera for clear image acquisition and fast data transmission extracted license plate area by applying YOLO, a deep learning software for multi object recognition based on open source neural network algorithm and detected number and characters of the plate and verified the detection accuracy and recognition accuracy and confirmed that this camera can perform CCTV security function and vehicle number plate recognition function successfully.

User Authentication Technology Using Multi-Blocks in the Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.139-146
    • /
    • 2020
  • Cloud computing technology provides economic and efficient system operation and management features to deal with rapidly changing IT technologies. However, this is less used in institutes and companies due to low security of cloud computing service. It is recognized that storing and managing important information, which is confidential in external systems is vulnerable to security threats. In order to enhance security of this cloud computing service, this paper suggests a system and user authentication reinforcement model. The suggested technology guarantees integrity of user authentication information and provides users with convenience by creating blocks for each cloud service and connecting service blocks with chains. The block chain user authentication model offers integrity assurance technology of block chains and system access convenience for SSO users. Even when a server providing cloud computing is invaded, this prevents chained invasions not to affect other systems.