• 제목/요약/키워드: Request

Search Result 2,841, Processing Time 0.024 seconds

Development of Automatic Data Transmitting System of Arterial Blood Gas Results via Local Area Network( LAN) (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.327-332
    • /
    • 1993
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system that transmits data from the arterial blood gas analyzer to the request site automatically In this system HOST computer, FILE server,'LAN(Local Area Network) , 3270 Emulator and bfulti-port card are integrated with 3 blood gas analyzers(NOVA Inc., USA) which are connected to a single multi-port card in a personal computer. When specimen are collected from tramp)inly sites, they are transferee to the laboratory In the Yonsei Cardiovascular Center After analysis, the result is transmitted to the personal computer via serial commnunication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Patient ID No., etc.) is obtained from the HOST computer througth the emulator. The combined data (patient information & lab data) is transmitted to each request site via LAN automatically These results are stored in the File Server for one year and they can be reviewed anytime. Also, it could be used for the various statistics and the flow chart for clinical research. Additionally, we found thal this system reduces the personal labor.

  • PDF

HTTP based remote monitoring and control system using JAVA (HTTP 기반의 자바를 이용한 원격 감시 및 제어 시스템)

  • Yi Kyoung-Woong;Choi Han-Soo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.9
    • /
    • pp.847-854
    • /
    • 2004
  • In this paper, It is studied to control and to monitor the remote system state using HTTP(Hyper Text Transfer Protocol) object communication. The remote control system is controlled by using a web browser or a application program. This system is organized by three different part depending on functionality-server part, client part, controller part. The java technology is used to composite the server part and the client part and C language is used for a controller. The server part is waiting for the request of client part and then the request is reached, the server part saves client data to the database and send a command set to the client part. The administrator can control the remote system just using a web browser. Remote part is worked by timer that is activated per 1 second. It gets the measurement data of the controller part, and then send the request to the server part and get a command set in the command repository of server part using the client ID. After interpreting the command set, the client part transfers the command set to the controller part. Controller part can be activated by the client part. If send command is transmitted by the client part, it sends sensor monitoring data to the client part and command set is transmitted then setting up the value of the controlled system.

MAC Protocol for Multimedia Services in Wireless ATM Networks based on TDMA/TDD (TDMA/TDD 기반 무선 ATM망에서 멀티미디어 서비스를 위한 MAC 프로토콜)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.899-906
    • /
    • 2003
  • In this paper, a channel access control algorithm and a slot allocation algorithm are proposed as MAC protocol for multimedia services in TDMA/TDD-based wireless ATM networks. In the proposed protocol, VBR terminals that require real-time services transmit a reservation request through a random access minislot. VBR terminals, which are successfully transmitted the reservation request, transmits the dynamic parameters through a dynamic parameter minislot without contention. On the other hand, ABR terminals transmit a reservation request with contention basis whenever a non-real-time traffic burst is generated. Based on the received dynamic parameters and the number of requested slots, the base station scheduler allocates a dynamic parameter minislot as well as uplink data slots into VBR terminals. Also the scheduler allocates uplink data slots into ABR terminals in proportion to the number of requested slots.

The Practical Use of Un Standard Message for cargo flow EDI (물류EDI 표준메세지 이용 방안)

  • 박남규;이태우
    • Journal of the Korean Institute of Navigation
    • /
    • v.17 no.2
    • /
    • pp.57-73
    • /
    • 1993
  • Subject : The Practical Use of UN Standard Message for cargo flow EDI Writer : Park, Nam Kyu and Lee, Tae Woo It's necessary to prepare standard message which is agreed on among trading partners for EDI in container transport industry. Now KMPA is carrying out the EDI Project for establishing Korea Logistics Network. It is important to make standard message of documents using in transport industry to succesfully accomodate EDI. The objective of this study is to find out the method of UN standard message utility in Korea. For this study, the UN message guideline is primarily reviewed, and the process that Shipping Request being used in Hanjin Shipping Co. Ltd. is applied to UNSMs as case study. Generally the data format of EDIFACT is so complex and broad for inter-industry standard that the abstract of data format is usually used. Therefore, it is necessary to make the subset of standard message for Shipping Request in ocean industry. In the result of this study, that the ocean industry can use the subset of IFTMBF for Shipping Request is proved, and the subset is suggested. This thesis will contribute toward showing the practical way of standardrization of 350 documents using in trade, customs and transport sectors.

  • PDF

Design of XML message-based the heterogeneous P2P Data sharing System (XML 메시지 교환을 이용한 이기종 P2P 데이터 공유시스템 설계)

  • Jung, Hun;Kang, Byung-Wook;Seo, Yeung-Su
    • Journal of the Korea society of information convergence
    • /
    • v.1 no.1
    • /
    • pp.1-8
    • /
    • 2008
  • If the management through the center server is unnecessary and JXTA is connected to a network, a communication with any kind of devices or some device is possible. And features that a communication with heterogeneous P2P systems is possible have. The important module of the designed Data exchange system an interworking between the P2P system which it is made we used API and the each other different protocol the possible data for replacement Data exchange system were designed this kind of a feature was to the utmost utilized may account for the XML Parser Component(XPC) which we use it parses the or about a request and the generated request, and the structure of the XML Making Component(XMC) which we use in generating the inappropriate a request and response.

  • PDF

A Study on the Development of Internet-based Reference Request System (인터넷 기반 참고질의시스템의 개발에 관한 연구)

  • 박준식;방대욱
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.1
    • /
    • pp.1-31
    • /
    • 2001
  • University libraries need the development of a common Internet-based reference request system in order to prevent duplicated investment and provide interoperability among them. This paper proposes a standard of Internet-based reference recluest system that serves reference request-responses and that provides reference source sites on the world wide web. Using this system, university libraries can cooperate other libraries with reference databases and may perform tasks of reference service efficiently.

  • PDF

Parity Bits Request Estimation Using Motion Information Feedback for Fast Distributed Video Decoding (고속 분산 비디오 복호화를 위한 움직임 정보 피드백을 이용한 패리티 비트 요구량 예측 기법)

  • Kim, Man-jae;Choi, Haechul;Kim, Jin-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.107-108
    • /
    • 2012
  • For low complexity encoder, the parity bit transmission through a feedback channel is an essential part of DVC. But feedback channel-based parity bit control is a major cause for the high decoding time latency. In this paper, we propose a fast distributed video decoding by parity bit request estimation using rate-distortion model. Through computer simulations, it is shown that the proposed method can achieve complexity reduction compared to other methods.

  • PDF

An Efficient PFMIPv6 and WLAN Interworking Scheme for Fast Handover (고속 핸드오버를 위한 PFMIPv6와 무선랜의 효율적인 연동 방안)

  • Park, Min-Ji;Min, Sang-Won;Kim, Bok-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.174-180
    • /
    • 2012
  • As the number of a smart phone user over the world surprisingly grows and a wireless Internet market expands, service requirement of a mobile terminal is increasing. However, because there is no consideration of mobility in the early standard step, it is difficult to expect to improve the service performance in handover procedure. This paper proposes a PFMIPv6 handover scheme by using probe request message and authentication message and by using buffering scheme in IEEE 802.11. In addition, we simulated this proposal scheme and verified that the proposed handover scheme is improved in terms of handover delay, and average FTP throughput during the handover period.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

A Security Model based on Reputation and Collaboration through Route-Request in Mobile Ad Hoc Networks

  • Anand, Anjali;Rani, Rinkle;Aggarwal, Himanshu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4701-4719
    • /
    • 2015
  • A Mobile Ad hoc Network (MANET) consists of mobile nodes which co-operate to forward each other's packets without the presence of any centralized authority. Due to this lack of centralized monitoring authority, MANETs have become vulnerable to various kinds of routing misbehaviour. Sometimes, nodes exhibit non-cooperating behaviour for conserving their own resources and exploiting others' by relaying their traffic. A node may even drop packets of other nodes in the guise of forwarding them. This paper proposes an efficient Reputation and Collaboration technique through route-request for handling such misbehaving nodes. It lays emphasis not only on direct observation but also considers the opinion of other nodes about misbehaving nodes in the network. Unlike existing schemes which generate separate messages for spreading second-hand information in the network, nodes purvey their opinion through route-request packet. Simulation studies reveal that the proposed scheme significantly improves the network performance by efficiently handling the misbehaving nodes in the network.