• Title/Summary/Keyword: Web Server

Search Result 1,879, Processing Time 0.023 seconds

Surveillance System Using Person Tracking in Mobile Platform (모바일 플랫폼 기반의 사람 추적 감시시스템)

  • Lee, Kyoung-Mi;Lee, Youn-Mi
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.8
    • /
    • pp.94-101
    • /
    • 2007
  • In this paper, we propose a surveillance system using multi-person tracking in a WIPI based mobile system, which is the standard wireless internet platform. The proposed system consists of two subsystems: the person tracking system and the mobile information transmission system. The person tracking system tracks persons who invade security and the mobile information transmission system sends the tracking results from the person tracking system to the user's mobile phone. In this paper, the person tracking system tracks persons who appear on many cameras with non-overlapping views in order to achieve a wider view. The mobile information transmission system saves automatically tracked data to the owner's web server and transmits the saved data to the user's WIPI mobile phone. Therefore, whenever the user wishes to view tracked data later, the mobile system can provide the user with the tracking results by either the user selecting particular cameras or the time on the owner's mobile phone. The proposed system is a new surveillance system that transfers tracked data among cameras to the user's mobile phone in order to overcome space limitations in tracking areas and monitoring areas and spatial limitations in monitoring hours.

Physical Computing Learning Model for Information and Communication Education (정보통신기술 교육을 위한 피지컬 컴퓨팅 학습모델)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.1-6
    • /
    • 2016
  • This paper aims to present the physical computing learning model applicable in teaching the information and communication technology for technology and engineering education. This model is based on the physical computing and deals with the information creation and information transfer in one framework, thus provides students with the total understanding and practice opportunity about information and communication. The proposed learning models are classified into the client-server based model and the web based model. In the implemented learning model, the acquirement and control of information is performed by sketch on Arduino and the communication of information is performed by the Python socket on Raspberry Pi well known as an education platform. Our proposed learning model can be used for teaching students to understand the concept of Internet of Things (IoT), which provides us with world wide control and communication of information.

Design and Implementation of a Mobile System for Exploiting the Internet Product Information Effectively (인터넷 상품정보의 효과적 제공을 위한 모바일 시스템의 설계 및 구현)

  • Ha Sangho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.3 s.99
    • /
    • pp.493-498
    • /
    • 2005
  • With the advances of wireless technologies and mobile computing, m-commerce is being realized for several mobile devices such as PDAs and mobile phones. Currently, service contents in m-commerce are usually newly written to meet specific characteristics of the target mobile devices, thus requiring formidable efforts. Therefore, we should exploit the Internet product information currently being provided for e-commerce. However, bringing the Internet product to mobile devices is far from straightforward due to the many limitations of mobile devices such as little memory, small displays, low processing speeds, and so forth. In this paper, we first suggest a new model to effectively adapt the Internet product information for mobile phones. We then suggest a mobile system to implement the model. We then design and implement the system. Finally, we give experiments on the system.

Detection of Potential Memory Access Errors based on Assembly Codes (어셈블리어 코드 기반의 메모리 오류 가능성 검출)

  • Kim, Hyun-Soo;Kim, Byeong-Man;Bae, Hyun-Seop;Chung, In-Sang
    • The KIPS Transactions:PartD
    • /
    • v.18D no.1
    • /
    • pp.35-44
    • /
    • 2011
  • Memory errors can cause not only program malfunctions but also even unexpected system halt. Though a programmer checks memory errors, some memory errors with low occurrence frequency are missed to detect. In this paper, we propose a method for effectively detecting such memory errors using instruction transition diagrams through analyzing assembly codes obtained by disassembling an executable file. Out of various memory errors, local memory return errors, null pointer access errors and uninitialized pointer access errors are targeted for detection. When applying the proposed method to various programs including well-known open source programs such as Apache web server and PHP script interpreter, some potential memory errors are detected.

Network-Based Partially-Distributed Mobility Management Mechanism and Performance Evaluation (망기반 부분분산형 이동성 관리 메커니즘 및 성능분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.75-84
    • /
    • 2014
  • In order to solve the problems such as overload, single point of failure, non-optimized data path, and network scalability in conventional central mobility management protocols, distributed mobility management schemes have been continually studied in and around the IETF. In this paper, a network-based partially-distributed mobility management mechanism, pDMMv6, is suggested and the performance comparison with traditional protocols such as PMIPv6 and MIPv6 is made through simulation under the various user traffic environment. The simulation results include UDP packet delivery ratio, end-to-end packet delay, binding delay for registration signaling, CPU utilization in each node, and response delays in several server-client TCP applications such as web browsing, e-mail, telnet remote login, FTP file up/down-load, and database access.

Smart Warehouse Management System Utilizing IoT-based Autonomous Mobile Robot for SME Manufacturing Factory (중소제조기업을 위한 IoT기반의 자율이동모듈을 활용한 스마트 창고관리 시스템 개발)

  • Kim, Jeong-A;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.237-244
    • /
    • 2018
  • The Smart Factory level of manufacturing factories of SMEs now lacks a system for grasping the accurate inventory amount associated with inventory movements in managing warehouses at the basic level. Also, it is difficult to manage accurate materials for loss of data due to worker manual work and production method due to experience. In order to solve this problem, in this paper, automatic acquisition of inventory to minimize manual work to grasp workers' Inventory and improve automation is done. In the smart warehouse management system using the IoT-based autonomous mobile module, the autonomous mobile module acquires the data of the inventory storage while moving through the line. In order to grasp the material of the Inventory storage, The Camera module recognizes the name of the inventory storage. And Then, If output matches, the data measured by the sensor is transferred to the server. This data can be processed, saved in a database, and real-time inventory quantity and location can be grasped in a web-based monitoring environment for administrators. The Real-time Automatic Inventory (RAIC) systems is reduce manual tasks and expect the effects of automated inventory management systems.

Small-Scale Warehouse Management System by Log-Based Context Awareness (로그기반 상황인식에 의한 소규모 창고관리시스템)

  • Kim, Young-Ho;Choi, Byoung-Yong;Jun, Byung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.507-514
    • /
    • 2006
  • Various application systems are developed using RFID as a part of ubiquitous computing, and it is expected that RFID chip will become wide-spread for the distribution industry especially. Efficient and efact intelligent-type of warehouse management system is essential for small-to-medium-sized enterprises in the situation having a trouble in the viewpoint of expense and manpower. In this paper, we implement small-scale warehouse management system using log-based context awareness technology. This system is implemented to be controlled on web, configuring clients to control RFID readers and building up DBMS system in a server. Especially, it grasps user's intention of storing or delivering based on toE data for the history of user's access to the system and it reports user's irregular pattern of warehouse use and serves predictive information of the control of goods in stock. As a result, the proposed system can contribute to enhance efficiency and correctness of small-scale warehouse management.

Multicast VOD System for Interactive Services in the Head-End-Network (Head-End-Network에서 대화형 서비스를 위한 멀티캐스트 VOD 시스템)

  • Kim, Back-Hyun;Hwang, Tae-June;Kim, Ik-Soo
    • The KIPS Transactions:PartB
    • /
    • v.11B no.3
    • /
    • pp.361-368
    • /
    • 2004
  • This paper proposes an interactive VOD system to serve truly interactive VCR services using multicast delivery, client buffer and web-caching technique which implements the distributed proxy in Head-End- Network(HNET). This technique adopts some caches in the HNET that consists of a Switching Agent(SA), some Head-End-Nodes(HEN) and many clients. In this model, HENs distributively store the requested video under the control of SA. Also, client buffer dynamically expands to support various VCR playback rate. Thus, interactive services are offered with transmitting video streams from network, HENs and stored streams on buffer. Therefore this technique makes the load of network occur In the limited area, minimizes the additional channel allocation from server and restricts the transmission of duplicated video contents

A Study on the Security Threats of IoT Devices Exposed in Search Engine (검색엔진에 노출된 IoT 장치의 보안 위협에 대한 연구)

  • Han, Kyong-Ho;Lee, Seong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.65 no.1
    • /
    • pp.128-134
    • /
    • 2016
  • IoT devices including smart devices are connected with internet, thus they have security threats everytime. Particularly, IoT devices are composed of low performance MCU and small-capacity memory because they are miniaturized, so they are likely to be exposed to various security threats like DoS attacks. In addition, in case of IoT devices installed for a remote place, it's not easy for users to control continuously them and to install immediately security patch for them. For most of IoT devices connected directly with internet under user's intention, devices exposed to outside by setting IoT gateway, and devices exposed to outside by the DMZ function or Port Forwarding function of router, specific protocol for IoT services was used and the devices show a response when services about related protocol are required from outside. From internet search engine for IoT devices, IP addresses are inspected on the basis of protocol mainly used for IoT devices and then IP addresses showing a response are maintained as database, so that users can utilize related information. Specially, IoT devices using HTTP and HTTPS protocol, which are used at usual web server, are easily searched at usual search engines like Google as well as search engine for the sole IoT devices. Ill-intentioned attackers get the IP addresses of vulnerable devices from search engine and try to attack the devices. The purpose of this study is to find the problems arisen when HTTP, HTTPS, CoAP, SOAP, and RestFUL protocols used for IoT devices are detected by search engine and are maintained as database, and to seek the solution for the problems. In particular, when the user ID and password of IoT devices set by manufacturing factory are still same or the already known vulnerabilities of IoT devices are not patched, the dangerousness of the IoT devices and its related solution were found in this study.

Door-Lock System to Detect and Transmit in Real Time according to External Shock Sensitivity (외부 충격 감도에 따른 실시간으로 탐지하고 전송하는 Door-Lock 시스템)

  • Jeon, Byung-Jin;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.7
    • /
    • pp.9-16
    • /
    • 2018
  • The purpose of this study is to prevent the malicious user from breaking the door-lock due to physical impact. If it matches the analog displacement value set in the door-lock system, it protects the body and property by transmitting damage information in real time to the manager smart phone. The research suggests a system that transmits damage information in real time to registered users when door-lock is damaged by physical impact. Then compare the impact information sensed by the door lock with the data of the sensitivity control unit. In the web server of the proposed system, after impact information transmitted from Door-Lock is stored in the DB, if the impact information is larger than the shock detection transmission reference value stored in the DB, it is transmitted to the administrator in real time by SMS module so that illegal access information.