• Title/Summary/Keyword: Network Device

Search Result 2,417, Processing Time 0.036 seconds

Development of an Eye Patch-Type Biosignal Measuring Device to Measure Sleep Quality (수면의 질을 측정하기 위한 안대형 생체신호 측정기기 개발)

  • Changsun Ahn;Jaekwan Lim;Bongsu Jung;Youngjoo Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.171-180
    • /
    • 2023
  • The three major sleep disorders in Korea are snoring, sleep apnea, and insomnia. Lack of sleep is the root of all diseases. Some of the most serious potential problems associated with sleep deprivation are cardiovascular problems, cognitive impairment, obesity, diabetes, colitis, prostate cancer, etc. To solve these problems, the Korean government provided low-cost national health insurance benefits for polysomnography tests in July 2018. However, insomnia patients still have problems getting treated in terms of time, space, and economic perspectives. Therefore, it would be better for insomnia patients to be allowed to test at home. The measuring device can measure six biosignals (eye movement, tossing and turning, body temperature, oxygen saturation, heart rate, and audio). A gyroscope sensor (MPU9250, InvenSense, USA) was used for eye movement, tossing, and turning. The input range of the sensor was in 258°/sec to 460°/sec, and the data range was in the input range. Body temperature, oxygen saturation range, and heart rate were measured by a sensor (MAX30102, Analog Devices, USA). The body temperature was measured in 30 ℃ to 45 ℃, and the oxygen saturation range was 0% for the unused state and 20 % to 90 % for the used state. The heart rate measurement range was in 40 bpm to 180 bpm. The measurement of audio signal was performed by an audio sensor (AMM2742-T-R, PUIaudio, USA). The was -42 dB ±1 dB frequency range was 20 Hz to 20 kHz. The measured data was successfully received in wireless network conditions. The system configuration was consisted of a PC and a mobile app for bio-signal measurement and data collection. The measured data was collected by mobile phones and desktops. The data collected can be used as preliminary data to determine the stage of sleep and perform the screening function for sleep induction and sleep disturbances. In the future, this convenient sleep measurement device could be beneficial for treating insomnia.

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.

Interaction Between TCP and MAC-layer to Improve TCP Flow Performance over WLANs (유무선랜 환경에서 TCP Flow의 성능향상을 위한 MAC 계층과 TCP 계층의 연동기법)

  • Kim, Jae-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.99-111
    • /
    • 2008
  • In recent years, the needs for WLANs(Wireless Local Area Networks) technology which can access to Internet anywhere have been dramatically increased particularly in SOHO(Small Office Home Office) and Hot Spot. However, unlike wired networks, there are some unique characteristics of wireless networks. These characteristics include the burst packet losses due to unreliable wireless channel. Note that burst packet losses, which occur when the distance between the wireless station and the AP(Access Point) increase or when obstacles move temporarily between the station and AP, are very frequent in 802.11 networks. Conversely, due to burst packet losses, the performance of 802.11 networks are not always as sufficient as the current application require, particularly when they use TCP at the transport layer. The high packet loss rate over wireless links can trigger unnecessary execution of TCP congestion control algorithm, resulting in performance degradation. In order to overcome the limitations of WLANs environment, MAC-layer LDA(Loss Differentiation Algorithm)has been proposed. MAC-layer LDA prevents TCP's timeout by increasing CRD(Consecutive Retry Duration) higher than burst packet loss duration. However, in the wireless channel with high packet loss rate, MAC-layer LDA does not work well because of two reason: (a) If the CRD is lower than burst packet loss duration due to the limited increase of retry limit, end-to-end performance is degraded. (b) energy of mobile device and bandwidth utilization in the wireless link are wasted unnecessarily by Reducing the drainage speed of the network buffer due to the increase of CRD. In this paper, we propose a new retransmission module based on Cross-layer approach, called BLD(Burst Loss Detection) module, to solve the limitation of previous link layer retransmission schemes. BLD module's algorithm is retransmission mechanism at IEEE 802.11 networks and performs retransmission based on the interaction between retransmission mechanisms of the MAC layer and TCP. From the simulation by using ns-2(Network Simulator), we could see more improved TCP throughput and energy efficiency with the proposed scheme than previous mechanisms.

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.

Study on Integrating Women's Policies in Unified Korea : Social Welfare Policy (통일한국의 여성정책 통합방안에 관한 연구 : 사회복지정책 부문)

  • Kim, Young-Lan
    • Korean Journal of Social Welfare
    • /
    • v.36
    • /
    • pp.39-69
    • /
    • 1998
  • The study is to grope for the unified device of the women's welfare policy in the United Korea by considering and comparing with the women's welfare in South Korea and North Korea centering on the women's welfare law and system among the social security laws and systems in the present both countries. The both Koreas have enforced the different women's welfare policies according to the different ideologies and constitutions. But in the welfare policy women are in the secondary stage by means of the ideology of sexual devision. It, therefore, is clear that the position of the North Korean woman goes in advance of the South Korean woman in the law and system. However, they are similar to the North Korean women in the aspects of the application of law and system. That is, both of them are discriminated not only in home and labor participation, but also in social welfare. There are the patriarchal family system and sexual devision of labor under the discrimination against woman. As though the both sexes are equal in law, the welfare law and system are applicated unequally to woman because of the ideology of sexual devision and familism which family should take the primary responsibility of welfare. From this perspective the women's welfare policy of the United Korea is not just to unify both laws and systems related women's welfare, but to search for the convergence on the higher level of quality and to make the real gender-equal society. The study suggests as the women's welfare the spread of the application of social welfare system, and social security network constructed through the mother protection policy, women's poverty and social security on basis of the primary principles such as the gender equal right as civil right, benefits of social welfare as social right, escape from the patriarchal familism, strengthening of resposibility of state and the principle of women participation in process of social welfare management. The device of women's welfare means building the social welfare system based on the real gender equality, so the unification will be the important turning point for the gender-equal society to the South-North Korean women.

  • PDF

Self-Tour Service Technology based on a Smartphone (스마트 폰 기반 Self-Tour 서비스 기술 연구)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.4
    • /
    • pp.147-157
    • /
    • 2010
  • With the immergence of the iPhone, the interest in Smartphones is getting higher as services can be provided directly between service providers and consumers without the network operators. As the number of international tourists increase, individual tourists are also increasing. According to the WTO's (World Tourism Organization) prediction, the number of international tourists will be 1.56 billion in 2020,and the average growth rate will be 4.1% a year. Chinese tourists, in particular, are increasing rapidly and about 100 million will travel the world in 2020. In 2009, about 7.8 million foreign tourists visited Korea and the Ministry of Culture, Sports and Tourism is trying to attract 12 million foreign tourists in 2014. A research institute carried out a survey targeting foreign tourists and the survey results showed that they felt uncomfortable with communication (about 55.8%) and directional signs (about 21.4%) when they traveled in Korea. To solve this inconvenience for foreign tourists, multilingual servicesfor traffic signs, tour information, shopping information and so forth should be enhanced. The appearance of the Smartphone comes just in time to provide a new service to address these inconveniences. Smartphones are especially useful because every Smartphone has GPS (Global Positioning System) that can provide users' location to the system, making it possible to provide location-based services. For improvement of tourists' convenience, Seoul Metropolitan Government hasinitiated the u-tour service using Kiosks and Smartphones, and several Province Governments have started the u-tourpia project using RFID (Radio Frequency IDentification) and an exclusive device. Even though the u-tour or u-tourpia service used the Smartphone and RFID, the tourist should know the location of the Kiosks and have previous information. So, this service did not give the solution yet. In this paper, I developed a new convenient service which can provide location based information for the individual tourists using GPS, WiFi, and 3G. The service was tested at Insa-dong in Seoul, and the service can provide tour information around the tourist using a push service without user selection. This self-tour service is designed for providing a travel guide service for foreign travelers from the airport to their destination and information about tourist attractions. The system reduced information traffic by constraining receipt of information to tourist themes and locations within a 20m or 40m radius of the device. In this case, service providers can provide targeted, just-in-time services to special customers by sending desired information. For evaluating the implemented system, the contents of 40 gift shops and traditional restaurants in Insa-dong are stored in the CMS (Content Management System). The service program shows a map displaying the current location of the tourist and displays a circle which shows the range to get the tourist information. If there is information for the tourist within range, the information viewer is activated. If there is only a single resultto display, the information viewer pops up directly, and if there are several results, the viewer shows a list of the contents and the user can choose content manually. As aresult, the proposed system can provide location-based tourist information to tourists without previous knowledge of the area. Currently, the GPS has a margin of error (about 10~20m) and this leads the location and information errors. However, because our Government is planning to provide DGPS (Differential GPS) information by DMB (Digital Multimedia Broadcasting) this error will be reduced to within 1m.

An Application-Independent Multimedia Adaptation framework for the Mobile Web (모바일 웹을 지원하는 응용 독립적 멀티미디어 적응 프레임워크)

  • Chon, Sung-Mi;Lim, Young-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.139-148
    • /
    • 2005
  • The desired level for multimedia services in the mobile web environment, the next generation web environment, is expected to be of PC level quality. And great efforts have been made in the development of hadware technology, communication technology, various kinds of services and standardization to support these services, In the mobile web environment, multimedia contents adaptation services should be available through supporting various kinds of devices, network abilities and users' preferences. It means that due to the variety of both desired devices' hardware specifications, called destinations, and desired QoSes, the QoSes in the destinations are not fixed or defined. If a new user wants to stream multimedia contents in a server through a new kind of terminal device, it should be considered whether the existing transcoders are able to adapt the multimedia contents. However, the existing libraries for multimedia adaptation have heavy transcoder figures which include all adaptive functions in one library, The challenge of universal access is too complex to be solved with these all in one solutions. Therefore, in this paper we propose an application independent multimedia adaptation framework which meets the QoS of new and varied mobile devices. This framework is composed of a group of unit transcoders having only one transcoding function respectively, Instead of heavy transcoders. Also, It includes the transcoder manager supporting the dynamic connections of the unit transcoders in order to satisfy end to end QoS.

  • PDF

Calibration Kit for 4-Port Horizontal/Vertical Probing (4-포트 수평/수직 겸용 프로브용 교정키트)

  • Kim, Taeho;Kim, Jonghyeon;Kim, Sungjun;Kim, Kwangho;Pu, Bo;Nah, Wansoo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.5
    • /
    • pp.559-575
    • /
    • 2014
  • In this paper, we propose a horizontal/vertical calibration kit for calibrating a vector network analyzer(VNA) to measure the vertical connector pin. If the conventional calibration kit is used, we should change the arm for a probe or need an assistant device and it takes a long time. In addition there is a risk of precision degradation caused by the position change of the probe tip sensitive to the surroundings. We suggest a 4-port vertical calibration kit to make up for the aforementioned shortcomings. The calibration kit was manufactured for the SOLT calibration method. 'Short', 'Open', and 'Load' are available in the horizontal plane, 'Thru' is available not only in the horizontal plane on the two planes of a PCB, but in the vertical plane between the two planes according to the positions of the probes. We complemented the conventional calibration kit to make a vertical calibration kit to be used for the vertical measurement method. We compared and analysed their reflection/transfer characteristics of the SOLT calibration standards of the proposed calibration kit and conventional one, we get a ${\pm}0.1$ dB differences of transfer characteristics in the range from 300 kHz to 8.5 GHz. In order to demonstrate usefulness, and we performed a case study for horizontal and vertical cases, and compared the results of the proposed calibration kit and conventional one.

The Improvement Index of Smart Public Services to Advance Information Accessibility for the Elderly (고령자 정보접근성 향상을 위한 스마트 공공서비스 지표)

  • Kim, Mi-Yun;Byun, Sung-Jun
    • Journal of Digital Convergence
    • /
    • v.16 no.5
    • /
    • pp.43-53
    • /
    • 2018
  • Recently, public service for the improvement of quality of life and life support such as safety, aging, disaster, welfare, housing, economy, urban environment, traffic etc are actively developed based on open public data, and the spread of the network and the necessity of everyday life, smartphones are playing a role in providing public services. Currently, the development of science is changing the life expectancy of human beings and changing into social structure in which aged people become bigger due to various social conditions and low fertility and aging problems. However, the elderly who do not have easy access to information are very uncomfortable in dealing with mobile devices with very low accessibility and utilization of public services provided by mobile phones. Therefore, this study recategorizes the condition of the elderly presented in the previous study and identifies the problem through case analysis provided for the elderly. Also, we summarize the hierarchy of the core items of the existing interface design and derive it as an improvement index of the public service design for the improvement of the information accessibility of the elderly, and propose a design method to improve the utilization of the public service provided through the mobile device.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.