• Title/Summary/Keyword: multi server

Search Result 638, Processing Time 0.03 seconds

Study of Multi-Charging System Using M2M for Efficient Electric Vehicle Charging (효율적인 전기자동차 충전을 위한 M2M 연동 멀티충전시스템 연구)

  • Hong, Rok-Ji;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.4
    • /
    • pp.393-400
    • /
    • 2014
  • With developed countries, nationally the supply and development of electric vehicle(EV) has been going at a rapid pace. Now, the charger specifications, charging methods and standardization of communication protocols is going in each country and a lot of company are involved in the business about those. To popularize it as existing car, it is required to build the network and infrastructure which is proper for domestic environment. It should also need to be able to develop standardized protocols can be beyond the construction of the protocol of the upper stage server and charger, and is used in a residential environment actually applied to related industries. Therefore, in this paper, we propose a home network model of EV that raised the need for a study of the charging system for EV, using M2M technology and multi-charging system tailored to the residential environment of our country.

Development of Automatic Data Transmitting System of Atrial Blood Gas Results via LAN (LAN을 이용한 혈액가스 검사결과 전송시스템)

  • Kim, Nam-Hyun;Huh, Jae-Man;Kim, Ji-Hyue;Kim, Do-Nyun;Kim, Won-Ky;Chang, Byung-Chul
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.11
    • /
    • pp.103-104
    • /
    • 1992
  • Automatic transmission of data from the blood analyzer to the request site is one of the most important part in hospital computerization. We have developed a system to automatically transmit the data from the atrial blood gas analyzer. In this system, HOST computer, FILE server, LAN(Local Area Network), 3270 Emulator and Multi-port card were integrated. Also, 3 blood gas analyser(NOVA Inc., USA) were connected to a single multi-port card which is attached in a personal computer for data acquisition. When specimen is collected from sampling sites, it is transfered to the lab. After analysis, the result is transmitted to the personal computer via serial communication between machine and multi-port card using interrupt method. Then, the patient's information (Name, Sex, etc.) is obtained from the HOST computer througth the emulator. The combined data(patient information & lab data) is transmitted to the each request site via LAN automatically. From the collected data, patient's previous data could be reviewed, and it could be used for the various statistics and the flow chart for clinical research. Also, we found that this system reduces the personal labor.

  • PDF

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

OpenID Based User Authentication Scheme for Multi-clouds Environment (멀티 클라우드 환경을 위한 OpenID 기반의 사용자 인증 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.215-223
    • /
    • 2013
  • As cloud computing is activated, a variety of cloud services are being distributed. However, to use each different cloud service, you must perform a individual user authentication process to service. Therefore, not only the procedure is cumbersome but also due to repeated authentication process performance, it can cause password exposure or database overload that needs to have user's authentication information each cloud server. Moreover, there is high probability of security problem that being occurred by phishing attacks that result from different authentication schemes and input scheme for each service. Thus, when you want to use a variety of cloud service, we proposed OpenID based user authentication scheme that can be applied to a multi-cloud environment by the trusted user's verify ID provider.

Implementing Socket Polling Server in Java (자바 언어를 이용한 소켓폴링 서버구현)

  • Sohn, Kang-Min;Kang, Tae-Gun;Ham, Ho-Sang
    • Annual Conference of KIPS
    • /
    • 2002.11a
    • /
    • pp.115-118
    • /
    • 2002
  • 소켓 프로그래밍(socket programming) 인터페이스를 지원하는 C/C++, perl, python 과 같은 언어들은 폴링(polling) 기능을 갖는 select() 함수를 제공한다. 이 select()함수를 이용할 경우, 단일 쓰레드(또는 프로세스)로 다중의 클라이언트 요청을 처리할 수 있다. 최근 네트워크 프로그래밍 분야에서 주목받는 자바 언어의 경우, 최신 JDK 1.4 의 비동기 입출력 패키지에서 select()함수를 제공하고 있으나, JDK 1.3을 포함한 그 이하의 버전에서는 아직까지 이 함수를 제공하지 않고 있다. 일반적으로 다중 쓰레드를 이용하여 소켓서버 응용프로그램을 개발할 경우, 코드가 단순해지고 응답이 빠른 장점이 있는 반면에 네트워크 연결이 증가할수록 다수의 쓰레드를 관리하는 일이 CPU에 큰 부담이 된다. 반면에 소켓폴링(socket polling)을 사용할 경우, 이러한 연결 유지에 대한 부담이 줄어드는 대신, 다중 쓰레드를 이용하는 방법에 비하여 구현이 어렵다. 본 논문에서는 다양한 시뮬레이션 환경에서 세가지 소켓 프로그래밍 모델에 대하여 그 성능을 비교평가 하였다. 이 세가지 모델은 단순 다중 쓰레드 모델(typical multi-thread model), 단일 쓰레드 소켓폴링 모델(socket polling with single-thread model), 다중 쓰레드 소켓폴링 모델(socket polling with multi-threadmodel)이다. 본 논문에서는 다중 쓰레드 소켓폴링 모델을 제안하고 JDK 1.3.1을 이용하여 구현하였다. 이 모델의 경우 복잡한 구조에도 불구하고 단순 다중 쓰레드 모델와 유사하거나 더 나은 성능을 보여주었다. 또한 동일한 용량의 쓰레드 풀(thread pool)을 사용하더라도 단순 다중 쓰레드 모델보다 더 많은 수의 클라이언트를 수용할 수 있는 장점이 있다. 이러한 결과를 바탕으로 본 연구팀에서 수행중인 MoIM-Messge서버의 네트워크 모듈로 다중 쓰레드 소켓폴링 모델을 적용하였다.

  • PDF

Context-Aware System for Status Monitoring of Industrial Automation Equipment (산업 자동화 장비의 상태감시를 위한 상황인지 시스템)

  • Kim, Kyung-Nam;Jeon, Min-Ho;Kang, Chul-Gyu;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.552-555
    • /
    • 2010
  • In this paper, we propose a context-aware system using wireless multi sensor module to monitor the state for industrial factory environment. Wireless multi sensor module combines sensing values which are collected from each acceleration, pressure, temperature and gas sensors. Moreover, it delivers this data to server after being encoded by RS code. Thereafter, RS decoder decodes the values that are received from wireless multi sensor module and fixes errors which occur in wireless communication. Based on decoded data, context-aware algorithm sets critical range and compares it to the sensing values, if the sensing values are out of the range, an event occurs by the algorithm. At the same time, if there is another sensing value which is out of the range for standby time T seconds, the algorithm orders 3 steps-alarm to occur depending on each situation. Through this system, it becomes eventually possible to monitor machines' condition effectively. From the simulation, we confirm that this system is efficient to status monitoring of industrial automation equipment.

  • PDF

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

The flight Test Procedures For Agricultural Drones Based on 5G Communication (5G 통신기반 농업용 드론 비행시험 절차)

  • Byeong Gyu Gang
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.2
    • /
    • pp.38-44
    • /
    • 2023
  • This study aims to determine how agricultural drones are operated for flight tests using a 5G communication in order to carry out a mission such as sensing agricultural crop healthy status with special cameras. Drones were installed with a multi-spectral and IR camera to capture images of crop status in separate altitudes with different speeds. A multi-spectral camera can capture crop image data using five different particular wavelengths with a built-in GPS so that captured images with synchronized time could provide better accuracy of position and altitude during the flight time. Captured thermal videos are then sent to a ground server to be analyzed via 5G communication. Thus, combining two cameras can result in better visualization of vegetation areas. The flight test verified how agricultural drones equipped with special cameras could collect image data in vegetation areas.

An Implementation of Smartphone-based Multiple Musical Instruments Application supporting Social Playing (소셜 연주를 지원하는 스마트폰기반 다중 악기 애플리케이션 구현)

  • Hwang, Byung-Kon
    • Journal of Digital Contents Society
    • /
    • v.12 no.4
    • /
    • pp.575-583
    • /
    • 2011
  • Due to the development of mobile devices and communication technology, cell phones have radically evolved from portable phones into smartphones and provided variety of services to a society. This paper presents Multi-user Musical Instrument application for smart phones based on band instruments such as piano, guitar, bass guitar, and drum. This application makes music playing from smartphone to integrative music data stream using the synchronization function of server. In addition, user can play it of smartphone efficiently by implementing a graphic user interface similar to real musical instruments.