• Title/Summary/Keyword: Server System

Search Result 4,822, Processing Time 0.028 seconds

Design and Implementation of a Self-diagnosis System on the Eating Disordered Diet (청소년 식사장애 자가진단을 위한 시스템 구현)

  • Kim Kwang-huy
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.3
    • /
    • pp.477-493
    • /
    • 2005
  • The cause of the eating disordered diet, which is a main topic of this study, has not been identified clearly, however, has been affected by an emphasis of western norm of a beauty - being tall and skinny - since the eighties. Another reason would be his/her lack of self-confidence and willingness to resolve his/her unsatisfied mental problem. There are two different of eating disordered diets; anorexia nervosa, bulimia nervosa. firstly, a patient of anorexia nervosa which is characterized by the loss in weight, tends to either deny meals, due to his/her desire to be skinny and a fear of gaining the weight. Secondly, a patient of bulimia nervosa eats much more food than an ordinary person does in around two hours and then removes them by doing vomiting with drugs. obesity is defined as overweight by $20\%$ and more than normal weight. In this case, body mass index(BMI) defined by the ratio of the weight(kg) to the height(m') is used. BMI = Weight(kg) / Height(m) In this paper, a list of questioneire for an adolescent to self-diagnosis the possibility of his/her eating disorder diet is identified and then a multi-media system which incorporates the list is designed and implemented with ASP language as a server language on a local host.

  • PDF

A Study on Implementation of SVG for ENC Applications (전자해도 활용을 위한 SVG 변환 연구)

  • Oh, Se-Woong;Park, Jong-Min;Seo, Ki-Yeol;Suh, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1930-1936
    • /
    • 2007
  • Electronic Navigational Charts(ENCs) are official nautical charts which are equivalent to paper charts with supplementary information. Although their main purpose is to be used for the safe navigation of ships, they also contain much information on coasts and seas which may be interesting to ordinary people. However, there is no easy way to access them because of their specialized data format, access method and visualization. This paper proposes m implementation of SVG for the access and services of ENCs. SVG(Scalable Vector Graphic) makes it possible to make use of Vector graphics for map services in basic internet browsing environment. Implementation of SVG for ENC applications by this research is free of special server side GIS mapping system and client side extra technology. The Implementation of SVG for ENC Applications can be summarized as follows: Firstly, SVG provides spatial information to possess searching engine to embody SVG map. Secondly SVG can provide high-quality vector map graphics and interactive facility without special Internet GIS system. It makes it possible to use services with very low cost. Thirdly, SVG information service targeting on maritime transportation can be used as template, so it can be used dynamically any other purpose such as traffic management and vessel monitoring. Many good characteristics of SVG in mapping at computer screen and reusability of SVG document provide new era of visualization of marine geographic information.

Development of V2I2V Communication-based Collision Prevention Support Service Using Artificial Neural Network (인공신경망을 활용한 V2I2V 통신 기반 차량 추돌방지 지원 서비스 개발)

  • Tak, Sehyun;Kang, Kyeongpyo;Lee, Donghoun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.5
    • /
    • pp.126-141
    • /
    • 2019
  • One of the Cooperative Intelligent Transportation System(C-ITS) priority services is collision prevention support service. Several studies have considered V2I2V communication-based collision prevention support services using Artificial Neural Networks(ANN). However, such services still show some issues due to a low penetration of C-ITS devices and large delay, particularly when loading massive traffic data into the server in the C-ITS center. This study proposes the Artificial Neural Network-based Collision Warning Service(ACWS), which allows upstream vehicle to update pre-determined weights involved in the ANN by using real-time sectional traffic information. This research evaluates the proposed service with respect to various penetration rates and delays. The evaluation result shows the performance of the ACWS increases as the penetration rate of the C-ITS devices in the vehicles increases or the delay decreases. Furthermore, it reveals a better performance is observed in more advanced ANN model-based ACWS for any given set of conditions.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Cat Behavior Pattern Analysis and Disease Prediction System of Home CCTV Images using AI (AI를 이용한 홈CCTV 영상의 반려묘 행동 패턴 분석 및 질병 예측 시스템 연구)

  • Han, Su-yeon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1266-1271
    • /
    • 2022
  • Cats have strong wildness so they have a characteristic of hiding diseases well. The disease may have already worsened when the guardian finds out that the cat has a disease. It will be of great help in treating the cat's disease if the owner can recognize the cat's polydipsia, polyuria, and frequent urination more quickly. In this paper, 1) Efficient version of DeepLabCut for pose estimation, 2) YOLO v4 for object detection, 3) LSTM is used for behavior prediction, and 4) BoT-SORT is used for object tracking running on an artificial intelligence device. Using artificial intelligence technology, it predicts the cat's next, polyuria and frequency of urination through the analysis of the cat's behavior pattern from the home CCTV video and the weight sensor of the water bowl. And, through analysis of cat behavior patterns, we propose an application that reports disease prediction and abnormal behavior to the guardian and delivers it to the guardian's mobile and the server system.

Development of a low-power remote monitoring module for set-net fish school based on WCDMA (WCDMA 기반의 저전력 정치망 어군 정보전송 모듈 개발)

  • Donggil LEE;Myungsung KOO;Gyeom HEO;Jiwon CHEONG;Hyohyuc IM;Jaehyun BAE
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.59 no.3
    • /
    • pp.206-214
    • /
    • 2023
  • Fish school monitoring technology is utilized for various purposes, such as boat fishing and resource surveys. With advancements in information and communication technology, this technology has expanded its application to remote areas. Its significance has grown in fishing sites, particularly for improving the efficiency and cost-effectiveness of set-net fishing. Set-net fishing gears are not limited to coastal areas, but are also installed in inland and remote sea regions. Consequently, fishermen require technology that allows them to quickly transmit information about approaching fish schools and enables them to perform long-term monitoring. The development of remote monitoring technology for set-net fish schools must consider crucial design factors such as communication range, transmission speed, power consumption of information modules, and operational expenses. In this study, we developed a low-power remote monitoring module for set-net fish school based on WCDMA. The module was specifically designed to minimize power consumption, allowing for communication over long distances and extended operation times in set-net fishing applications. Furthermore, we developed a web server software application that enables remote access to fish schools and provides real-time weather information. The performance of the developed module was evaluated through set-net fishing site application and experiments with moving ships on the sea. The experimental results demonstrated that the remote monitoring system, consisting of the developed low-power remote monitoring module for set-net fish school based on WCDMA and a fish finder, had an average power consumption of 4.6 W, a maximum communication range of 22.84 km, and a data transmission and reception rate of 98.79%. The maximum fish school information transmission and reception rate was 97.26%

Performance analysis and prediction through various over-provision on NAND flash memory based storage (낸드 플래시 메모리기반 저장 장치에서 다양한 초과 제공을 통한 성능 분석 및 예측)

  • Lee, Hyun-Seob
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.343-348
    • /
    • 2022
  • Recently, With the recent rapid development of technology, the amount of data generated by various systems is increasing, and enterprise servers and data centers that have to handle large amounts of big data need to apply high-stability and high-performance storage devices even if costs increase. In such systems, SSD(solid state disk) that provide high performance of read/write are often used as storage devices. However, due to the characteristics of reading and writing on a page-by-page basis, erasing operations on a block basis, and erassing-before-writing, there is a problem that performance is degraded when duplicate writes occur. Therefore, in order to delay this performance degradation problem, over-provision technology of SSD has been applied internally. However, since over-provided technologies have the disadvantage of consuming a lot of storage space instead of performance, the application of inefficient technologies above the right performance has a problem of over-costing. In this paper, we proposed a method of measuring the performance and cost incurred when various over-provisions are applied in an SSD and predicting the system-optimized over-provided ratio based on this. Through this research, we expect to find a trade-off with costs to meet the performance requirements in systems that process big data.

Development of crop harvest prediction system architecture using IoT Sensing (IoT Sensing을 이용한 농작물 수확 시기 예측 시스템 아키텍처 개발)

  • Oh, Jung Won;Kim, Hangkon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.719-729
    • /
    • 2017
  • Recently, the field of agriculture has been gaining a new leap with the integration of ICT technology in agriculture. In particular, smart farms, which incorporate the Internet of Things (IoT) technology in agriculture, are in the spotlight. Smart farm technology collects and analyzes information such as temperature and humidity of the environment where crops are cultivated in real time using sensors to automatically control the devices necessary for harvesting crops in the control device, Environment. Although smart farm technology is paying attention as if it can solve everything, most of the research focuses only on increasing crop yields. This paper focuses on the development of a system architecture that can harvest high quality crops at the optimum stage rather than increase crop yields. In this paper, we have developed an architecture using apple trees as a sample and used the color information and weight information to predict the harvest time of apple trees. The simple board that collects color information and weight information and transmits it to the server side uses Arduino and adopts model-driven development (MDD) as development methodology. We have developed an architecture to provide services to PC users in the form of Web and to provide Smart Phone users with services in the form of hybrid apps. We also developed an architecture that uses beacon technology to provide orchestration information to users in real time.

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Comparison of Frequency and Stay Time between Normal and Abnormal Elimination Behavior of Cats Using a Litter Box with Automatic Sensor

  • Ji-Woo Shin;Sun-Woo Han;Soon-Hak Kweon;Myungseok Kang;Jong-Hyuk Kim;Chung-Gwang Choi;Joon-Seok Chae
    • Journal of Veterinary Clinics
    • /
    • v.41 no.2
    • /
    • pp.71-78
    • /
    • 2024
  • Changes in elimination behavior, including urination and defecation, are common clinical signs of numerous disorders in cats. Therefore, this study attempted to automatically measure the elimination behavior of cats using the litter box and develop an early warning system for the guardian in case of abnormalities. To construct an early warning system for abnormal changes through cat elimination behavior, it consisted of a litter box, an automatic sensor for data collection and data wifi transmission, a server for data analysis, and a mobile phone app for result transmission and early warning. To establish the reference interval (RI), the elimination behavior was monitored for more than 2 weeks using a motion sensor within a litter box in 37 healthy cats and 19 diseased cats. The data were expressed as daily total visits, daily total stay duration, average stay duration per elimination, weekly total visits, and weekly total stay duration. Healthy cats showed median daily total visits of 3 times/day (RI 1.0-7.0) and daily total stay duration of 192 s/day (RI 8.0-452.0). For weekly data, the median total visits were 20 times/week (RI 3.0-35.25) and the median total stay duration was 1,147 s/week (RI 80.0-2,249.5). The average stay duration per elimination was 59 s/elimination (RI 4.67-132.0). Diseased cats showed more frequent elimination behavior than healthy cats (p < 0.001). Otherwise, for each elimination, diseased cats had shorter stay durations than healthy cats (p < 0.001). This study established the RIs of elimination behavior parameters (frequency and duration) in healthy cats. The present study might help guardians and veterinarians detect changes in elimination behaviors in diseased cats at an early stage.