• Title/Summary/Keyword: System Behavior Monitoring

Search Result 484, Processing Time 0.026 seconds

Development of living body information and behavior monitoring system for nursing person

  • Ichiki, Ai;Sakamoto, Hidetoshi;Ohbuchi, Yoshifumi
    • Journal of Engineering Education Research
    • /
    • v.17 no.4
    • /
    • pp.15-20
    • /
    • 2014
  • The non-contact easy detecting system of nursing person's body vital information and their behaviors monitoring system are developed, which consist of "Kinect" sensor and thermography camera. The "Kinect" sensor can catch the body contour and the body moving behavior, and output their imaging data realtime. The thermography camera can detect respiration state and body temperature, etc. In this study, the practicability of this system was verified.

A Study of Applicability of Monitoring System through Polar Environment around the King Sejong Station, Antarctica (극지환경을 고려한 남극 세종과학기지 계측시스템 적용성에 관한 연구)

  • Park, Keunbo;Kim, Young Seok
    • Journal of the Korean Geosynthetics Society
    • /
    • v.12 no.2
    • /
    • pp.43-53
    • /
    • 2013
  • Environmental monitoring analysis were analyzed for the period from 1988 to 2007 near King Sejong Station. Extreme environment structure behaviors(Marine Biology Lab.) were evaluated using monitoring sensors developed commercial sensors. Also when installing the sensors ambient environment of the King Sejong Station, to analyze the measured data and the comparative behavior of the structure were analyzed. As a environmental monitoring analysis result at King Sejong Station temperature, sensors were installed to withstand about $-25.6^{\circ}C$ or less and 49.5m/s. They were needed that the height of 225.0cm or more to be installed during the installation. For several monitoring sensors used in Antarctic, temperature, snow and strong winds were very sensitive to the atmospheric environment. Quite often a camouflage(animals and humans) would make it necessary to provide housing for monitoring sensors. Therefore, protection system developed for these sensors were to protect the sensors and data logger. Protection system the newly developed, is economical, easy to install even in harsh environments. Based on the measurement result of the one year, consider electrode applicability of the protection system, it was confirmed that the behavior of the structure is also predictable.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

A Study on Smart Korean Cattle Livestock Management Platform based on IoT and Machine Learning (IoT 및 머신러닝 기반 스마트 한우 축사관리 플랫폼에 관한 연구)

  • Park, Jun;Kim, Jun Yeong;Kim, Jeong Hoon;Bang, Ji Hyeon;Jung, Se Hoon;Sim, Chun Bo
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.12
    • /
    • pp.1519-1530
    • /
    • 2020
  • As livestock farms grow in size, the number of breeding individuals increases, making it difficult to manage livestock. Livestock farms require an integrated management system such as a monitoring system, an access control system, and an abnormal behavior detection system to manage livestock houses. In this paper, a smart korean cattle livestock management system using IoT and AI technology was proposed for livestock management in livestock farms. The smart korean cattle farm management system consists of a monitoring and control system, a vehicle access management system, and an abnormal cattle behavior detection system. It is expected that this will help manage large-scale livestock houses, and additional research is needed to improve the performance of abnormal behavior detection in the future.

An Experimental Study on Health Monitoring System of Smart Structure (스마트구조물 계측시스템에 관한 실험적 연구)

  • Yoon, Hee-Jun;Yoo, Byung-Eok;Han,, Chang-Pyong;Ahn, Hyung-Joon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.10 no.2
    • /
    • pp.191-202
    • /
    • 2006
  • Computer programs for a structure design help the optimum design that considers each condition. however, the findings can not explain accurately a behavior of the real-living structure because each condition of a structure is simplified and generalized. The smart structure is introduced to overcome these problems, and we can understand a behavior of the real-living structure by means of Health Monitoring System. In this study, we compare a behavior by means of the existing structure design with a behavior of the living structure by means of an experiment. As a result, we examine adequacy of a measuring system and developing possibility in the future.

The Impact of Information Access Monitoring between Dilemma of Unethical Information Sharing and Social Networking (비윤리적 정보공유 딜레마와 사회적 네트워킹 관계에서 정보접근 모니터링의 영향력)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.91-105
    • /
    • 2018
  • The purpose of this study is to examine an immoral effectiveness decrease by information access monitoring between ethical dilemma and unethical information-sharing behavior. Firms are raising the demand of confidential information management and are highlighting the ethical awareness of organizational members. The individuals in organization are concerned information sharing for future-oriented social networking. To prevent their immoral behavior, Firms should consider investing the information access monitoring. This system is aiming at log verification of movement, storage and deletion on information and will reduce an ethical conflict and unethical behavior on employees. I used the structural equation methodology for this empirical study. The research model constructs the voluntary and involuntary dilemma of information sharing on the two independent-variables, the unethical information behavior and the improper networking reinforcement on the two dependent-variables and the information access monitoring the one mediating-variables. This model tests the power effect of direct path, indirect path and total path. According to the study, the two ethical dilemma of information sharing provided a high influence to the unethical sharing action and to the inappropriate social networking strengthens. However, the mediating role of information access monitoring shows the effect weakens of independent and dependent variables. Thus, the mediating variables appeared to be important for the controlling role of an unethical behavior and improper social networking. Ultimately, The firms will need to invest the information access monitoring for a compulsory ethics behavior of organizational members. In addition, this can hinder networking enhancements for future opportunistic behaviors.

Real-time user behavior monitoring technique in Linux environment (Linux 환경에서 사용자 행위 모니터링 기법 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.3-8
    • /
    • 2022
  • Security threats occur from the outside, but more often from the inside. In particular, since the internal user knows about the information service, the security threat damage caused by the internal user is greater. In this environment, the actions of all users accessing information services should be monitored and recorded in real-time. However, the current operating system records only the logs of system and application execution, so there is a limit to monitoring user behavior in real-time. In such a security environment, damage may occur due to user's unauthorized actions. To solve this problem, this study proposes an architecture that monitors user behavior in real-time in a Linux environment. As a result of verifying the function to confirm the effectiveness of the proposed architecture, the console input values and output angles of all users who have access to the operating system are monitored in real-time and stored. Although the performance of the proposed architecture is somewhat slower than the identification and authentication functions provided by the operating system, it was confirmed that the performance was not at a level that users would recognize, and thus it was judged to be sufficiently effective. However, since this study focuses on monitoring the console behavior, it is impossible to monitor the behavior of user applications running in the background, so additional research is needed.

Cat Monitoring and Disease Diagnosis System based on Deep Learning (딥러닝 기반의 반려묘 모니터링 및 질병 진단 시스템)

  • Choi, Yoona;Chae, Heechan;Lee, Jonguk;Park, Daihee;Chung, Yongwha
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.2
    • /
    • pp.233-244
    • /
    • 2021
  • Recently, several ICT-based cat studies have produced some successful results, according to academic and industry sources. However, research on the level of simply identifying the cat's condition, such as the behavior and sound classification of cats based on images and sound signals, has yet to be found. In this paper, based on the veterinary scientific knowledge of cats, a practical and academic cat monitoring and disease diagnosis system is proposed to monitor the health status of the cat 24 hours a day by automatically categorizing and analyzing the behavior of the cat with location information using LSTM with a beacon sensor and a raspberry pie that can be built at low cost. Validity of the proposed system is verified through experimentation with cats in actual custody (the accuracy of the cat behavior classification and location identification was 96.3% and 92.7% on average, respectively). Furthermore, a rule-based disease analysis system based on the veterinary knowledge was designed and implemented so that owners can check whether or not the cats have diseases at home (or can be used as an auxiliary tool for diagnosis by a pet veterinarian).

A Study on the Real Time Monitoring of Long Span Bridge Behavior Using GPS (GPS를 이용한 장대교량 실시간 거동 모니터링에 관한 연구)

  • Choi, Byoung-Gil;Sohn, Duk-Jae;Na, Young-Woo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.3
    • /
    • pp.377-383
    • /
    • 2010
  • This study aims to develop the system which is able to monitor long span bridge behavior in real time using GPS. Through measuring displacement of long span bridge by GPS in real time, over all 3D behavior of bridge could be analyzed and managed. Monitoring system of long span bridge which is developed in this study is able to manage in real time the safety of bridge by transmitting horizontal and vertical displacement of bridge, and danger signals to an integrated operations center. Also it is able to monitor the absolute behavior of long span bridge by GPS, and to construct a national bridge safety management networks.