• Title/Summary/Keyword: Realtime search

Search Result 43, Processing Time 0.019 seconds

A System of Guiding Path for Parking Lots based on RFID to Consider Real-time Constraints (실시간 제약을 고려한 RFID 기반 주차 경로 안내 시스템)

  • Kang, Ku-An;Kim, Jin-Deog
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.65-77
    • /
    • 2008
  • There have been many studies and technologies that define a current location of a moving vehicle with GPS(Global Positioning System). However, the navigation system with GPS has troubles to search an optimized route considering data such as realtime parking status and road conditions. Moreover, the GPS systems show malfunction in the downtown with very tall buildings, underground parking lot and the inside of buildings. On the contrary, the RFID systems are able to reflect real-time status of parking lots and roads in the downtown. This paper proposes a system of guiding path for parking lots to consider real-time constraints based on RFID. The results obtained from the implemented system show smooth guiding of a new route after immediately sensoring the change of the information of parking lots and roads: if a parking lot that a vehicle is heading to is fully occupied, the system re-searches a new route for a neighbor parking lot and immediately transfers it to customer's mobile, and if the designated route is under construction, the system guides a detour path. The proposed method will be useful for advanced integrated parking control system.

  • PDF

Isolation and Characterization of a Nitric Oxide-induced Gene in Sweetpotato (고구마에서 질소 유도성 유전자의 분리 및 특성분석)

  • Lee, Il Hwan;Shim, Donghwan;Lee, Kang Lok;Nam, Ki Jung;Lee, Shin-Woo;Kim, Yun-Hee
    • Journal of Life Science
    • /
    • v.29 no.6
    • /
    • pp.631-636
    • /
    • 2019
  • A new nitric oxide-induced (NOI) gene was isolated by screening ESTs from a cDNA library of dehydration-treated fibrous roots of sweetpotato (Ipomoea batatas). The 720 bp cDNA fragment, IbNOI, was sequenced, from which a 77 amino acid residue protein was deduced. A search of the protein BLAST database identified significant similarity to other plant NOI protein sequences. Quantitative RT-PCR analysis revealed diverse expression patterns of IbNOI in various tissues of the intact sweetpotato plant, and in leaves exposed to different stresses. The IbNOI gene was highly expressed in storage roots and suspension-cultured cells. In leaf tissues, IbNOI showed strong expression during sodium nitroprusside (SNP)-induced NO accumulation and chemical stress treatments. Expression of IbNOI was also induced under various abiotic stress conditions, such as dehydration, salt, and bacterial pathogen infection. These results suggest that IbNOI is involved in plant responses to diverse abiotic stresses and pathogen infection through a NO-related pathway.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.