• Title/Summary/Keyword: remote communication

Search Result 1,805, Processing Time 0.03 seconds

Multiagent Enabled Modeling and Implementation of SCM (멀티에이전트 기반 SCM 모델링 및 구현)

  • Kim Tae Woon;Yang Seong Min;Seo Dae Hee
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.57-72
    • /
    • 2003
  • The purpose of this paper is to propose the modeling of multiagent based SCM and implement the prototype in the Internet environment. SCM process follows the supply chain operations reference (SCOR) model which has been suggested by Supply Chain Counsil. SCOR model has been positioned to become the industry standard for describing and improving operational process in SCM. Five basic processes, plan, source, matte, deliver and return are defined in the SCOR model, through which a company establishes its supply chain competitive objectives. A supply chain is a world wide network of suppliers, factories, warehouses, distribution centers and retailers through which raw materials are acquired, transformed or manufactured and delivered to customers by autonomous or semiautonomous process. With the pressure from the higher standard of customer compliance, a frequent model change, product complexity and globalization, the combination of supply chain process with an advanced infrastructure in terms of multiagent systems have been highly required. Since SCM is fundamentally concerned with coherence among multiple decision makers, a multiagent framework based on explicit communication between constituent agents such as suppliers, manufacturers, and distributors is a natural choice. Multiagent framework is defined to perform different activities within a supply chain. Dynamic and changing functions of supply chain can be dealt with multi-agent by cooperating with other agents. In the areas of inventory management, remote diagnostics, communications with field workers, order fulfillment including tracking and monitoring, stock visibility, real-time shop floor data collection, asset tracking and warehousing, customer-centric supply chain can be applied and implemented utilizing multiagent. In this paper, for the order processing event between the buyer and seller relationship, multiagent were defined corresponding to the SCOR process. A prototype system was developed and implemented on the actual TCP/IP environment for the purchase order processing event. The implementation result assures that multiagent based SCM enhances the speed, visibility, proactiveness and responsiveness of activities in the supply chain.

  • PDF

Design and Implementation of an Application Level Mobile Server for On-the-site Oriented Services (현장 중심 서비스를 위한 응용레벨 모바일 서버의 설계 및 구현)

  • Kim, Seonil;Jung, Jinman;Yoon, Young-Sun;Eun, Seongbae;So, Sun Sup;Cha, Shin
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.3
    • /
    • pp.358-368
    • /
    • 2018
  • The mobile characteristics of the smart phone are well suited to on-the-site oriented services and are being utilized in a variety of ways. However, since most applications operate on a central server basis, Internet access is inevitable, and there are various problems such as an increase in server maintenance cost and security deterioration. Although researches have been proposed to utilize the smart phone itself as a server to improve it, these methods are based on downsizing the PC-based web server or modifying the smart phone kernel. These methods have the problems that a end user has to use the rooting, and they are not able to effectively utilize various communication means of a smart phone. In this paper, we propose a design and implementation of an application level smart phone web server. The server receives the document request from the remote via the Internet and in the local area using the WPAN. At this time, the web document is stored as an internal file structure of the smart phone application. We proposed the phttp protocol which uses server's phone number as ID for document request. Through the implementation, we analyzed the capacity and latency of stored data and its effectiveness is evaluated.

Wireless Triggering Pulse Generation for Digital X-ray Imaging System (디지털 x-ray 영상시스템을 위한 무선 트리거 발생기)

  • Ko, Dae-Sik;Lee, Jae-Cheol;Lee, Joo-Shin
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.2
    • /
    • pp.163-169
    • /
    • 2007
  • In this paper, we propose a method of trigger pulse generation to capture the image on time by making a synchronization between the x-ray generator and digital x-ray image acquisition system. we designed a wireless trigger pulse generation circuit to make a synchronization between x-ray generator and digital image acquisition system and analysis its performance. When it starts to detect a certain level of x-ray radiation or above from the air, this method starts to generate a ACQ_START signal to indicate the timing for image acquisition starting from digital image acquisition system. Hence, when it starts to detect under certain level of x-ray signal from the air, this method starts to generate a ACC_END signal to indicate the timing for image acquisition stop from digital image acquisition system. Image acquisition is activated only this time between ACQ_START and ACQ_END signal. By doing this wireless detecting of x-ray signal from remote, we can get more accurate timing for capturing the x-ray image and any type of x-ray generator can be connected to digital image acquisition system, regards of wired protocol. This makes easy installation. We could get 3.5 line pair / mm resolution at 20 mAs of x-ray level with resolution chart. This is same or better image comparing to conventional wired result.

  • PDF

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

An Implementation of Wireless Monitoring System for Health Care (헬스 케어를 위한 무선 모니터링 시스템 구현)

  • Eom, Sang-Hee;Nam, Jae-Hyun;Chang, Yong-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.67-71
    • /
    • 2007
  • Recently, a health care need according to the increase of an advanced age population is increasing. The requirement about a health care monitoring is increasing rapidly from general people as well as patient. The requisition about a medical treatment technique and a medical treatment information service is the trend to be expanding. That can be possible minimizing the inconvenience of the patient to take a medical service and continuously monitoring the status of the patient to take a health care service. This paper discusses an implementation of wireless physiological signal monitoring system for health care. The system are composed of the sensor node and monitoring program. The sensor node has the physiological signal measurement part and the wireless communication part. The remote monitoring system has a monitoring program that are communicating the sensor node using bluetooth. The sensor node measured the ECG, pulse wave, blood pressure, Sp02, and heart rate.

  • PDF

The Device Configuration Protocol with Real-Time Processing for QoS Support over IPv6 (IPv6 상에서 QoS 지원을 위한 실시간 처리용 DCP 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.660-668
    • /
    • 2005
  • Recently, the Internet-based communication method has been adopted as an open networking solution in the field of remote control and data acquisition. In the current Internet, most networking applications are developed according to the client-server approach. In this paper, we propose an innovative Device Configuration Protocol (DCP) that exchanges the traditional role between client and server to provide a uniform device interface over the Internet for various field devices. The proposed protocol is implemented as an application-level protocol running on top of the standard TCP/IP protocols. Also, the DCP protocol is extended with real-time processing to work with the FlowLabel of IPv6 for QoS (Quality of Service) support. The simulation results show that the real-time packets can be processed prior to the given deadline regardless of throughput, as compared to the normal packets.

A Study of User Behavior Recognition-Based PIN Entry Using Machine Learning Technique (머신러닝을 이용한 사용자 행동 인식 기반의 PIN 입력 기법 연구)

  • Jung, Changhun;Dagvatur, Zayabaatar;Jang, RhongHo;Nyang, DaeHun;Lee, KyungHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.127-136
    • /
    • 2018
  • In this paper, we propose a PIN entry method that combines with machine learning technique on smartphone. We use not only a PIN but also touch time intervals and locations as factors to identify whether the user is correct or not. In the user registration phase, a remote server was used to train/create a machine learning model using data that collected from end-user device (i.e. smartphone). In the user authentication phase, the pre-trained model and the saved PIN was used to decide the authentication success or failure. We examined that there is no big inconvenience to use this technique (FRR: 0%) and more secure than the previous PIN entry techniques (FAR : 0%), through usability and security experiments, as a result we could confirm that this technique can be used sufficiently. In addition, we examined that a security incident is unlikely to occur (FAR: 5%) even if the PIN is leaked through the shoulder surfing attack experiments.

Message Delivery and Energy Consumption Analysis on Pocket Switched Network Routing Protocols (Pocket Witched Network 라우팅 프로토콜의 메시지 전송 및 에너지 소비 분석)

  • Cabacas, Regin;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.571-576
    • /
    • 2013
  • Despite the development of the Internet, both in terms of technology and coverage, there are still remote areas and scenarios where connectivity is very difficult to achieve. Pocket Switched Network is a network paradigm that takes the advantage of human mobility to disseminate data. Factors such as mobility of nodes, link failures, discharged batteries, are among the challenges that may compromise connectivity in these networks. This paper presents a performance analysis of existing routing schemes for PSN in terms of delivery probability, overhead ratio, average latency and average residual energy when the number of nodes is increased. We seek to identify a scheme that maximizes data delivery while minimizing communication overhead and thus extending the network lifetime.

Design of Spontaneous Acoustic Field Reproducing System (II) (능동형 음장조성시스템의 설계(II))

  • Kook, Chan;Jang, Gil-Soo;Chon, Ji-Hyun;Shin, Yong-Gyu;Min, Byoung-Chul
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.964-969
    • /
    • 2006
  • The soundscape is a novel attempt to offer comfortable sound environments at the urban public spaces by adding pleasant sounds and removing unagreeable ones. Most important factors to be considered therein are to determine what kind of sounds to offer and how to adjust them to the changing circumstances. But nowadays, the audio system provided in the almost every urban public spaces is just only a PA system with CD player or radio broadcasting music, the provided sound is only intended by the operator. Furthermore, providing the soundscape which fits to the situation and the atmospheric conditions needs enormous effort and time, it is almost impossible with the existing PA systems which installed in the public spaces nowadays. Thus, the new sounds cape reproduction system was developed on the basis of the prior VAFSS(Virtual Acoustic Field Simulation System) systems, which has the artificial intelligence to read out the mood of the field and select the appropriate soundscape to reproduce. In this new system, various environmental sensors with standard voltage, current or resistance output are available simultaneously, and the monitoring with video and sound became available via the TCP/IP communication protocol. The update and control of this system can be very convenient, so the money, time and the effort of maintaining and providing soundscape on the public spaces can be enormously saved. This new soundscape reproducing system was named as Virtual Acoustic Field Simulation System II (V AFSS II).

  • PDF

The Application and Integration of an Improvement Technique for Layers of NETCONF (NETCONF 계층에 대한 개선 기법 적용 및 통합)

  • Lee, YangMin;Lee, JaeKee
    • Journal of KIISE
    • /
    • v.43 no.2
    • /
    • pp.256-268
    • /
    • 2016
  • Modern networks consisting of various heterogeneous equipment are often installed in a distributed manner. Thus the NETCONF standard was established to manage networks centrally and efficiently. In this paper, we present a method that integrates each NETCONF layer into a single system based on the results of previous studies. In the RPC Layer, an asynchronous communication channel and parallel processes are possible using multi-threading. In the Operation Layer, operational efficiency is increased by using a data group with dependencies between the equipment configuration data and by improving the data structure, enabling efficiently processing of XML queries even with multiple managers. The data modeling techniques and grouping methods in the Content Layer are presented in detail for interoperability between the Operation Layer and the Content Layer. Finally, the GUI program was implemented and its implementation is reported. We performed an experiment comparing the improved NETCONF with the standard NETCONF to measure factors, such as query processing ratio, query processing speed, and CPU utilization. The improved NETCONF demonstrated excellent query processing ratio and query processing speed, whereas the standard NETCONF had excellent CPU utilization.