• Title/Summary/Keyword: server-independent system

Search Result 131, Processing Time 0.025 seconds

A Study on the Design of DICOM Integration Engine in the Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 DICOM 설계에 대한 연구)

  • Im, In-Chul;Ha, An-Rye;Kim, Chang-Soo;Hwang, In-Chul;Ok, Chi-Sang
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.307-315
    • /
    • 2005
  • In the ubiquitous computing environments, ICT industries of current society are developed in enormous growth. Medicine or patients with mobile devices can access at any time, any place. The medical procedures at the patient bedside are out of the scope of current systems, which means that patient record and image data access during the medical visit or the execution, recording and confirmation of the medicine prescriptions, still do not enjoy computerized support. Today, the exchange of medical images and clinical information is well defined by DICOM and HL7 standards. The DICOM independent terminal equipment image access system was developed in which a DICOM Engine acts as the gateway between a PACS DB and user's terminal. Implementation system is compatible with most currently available Integration system models. This paper presents a software technology where the medical and nursing staff will be equipped with any device connected by wire and wireless to a central server that provides access to the electronic patient records and that will actively inform about tasks pending distribution. The prototype described in this article implements a medical images and structured reports server that makes the search and recovery of data stored in the DICOM standard possible.

  • PDF

Design and Implementation of an Agent-based Continuous Double Auction System (에이전트 기반의 연속다중경매 시스템의 설계 및 구현)

  • Kim, Kwang-Soo;Kim, In-Cheol
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.641-652
    • /
    • 2001
  • Most of current internet auction systems are single auction server program that partly automates the function of the conventional auction house. So these systems do not provide sufficient independence, distribution and parallelism between the functions of the conventional auction house. In these suction systems, only some of suction management facilities are automated by the server program, but still users need to execute a repetitive task to monitor the dynamic progress of a certain auction, decide the proper bid price, and submit the bid. Another problem is that they support only the single auctions such as English suction and Dutch auction, but they do not support the double auctions that are superior to the single auction in terms of speed, efficiency, and the fair distribution of profit. In this paper, we present are design and implement of an agent-based continuous double auction system, called CoDABot, in order to overcome the limitations of current auction systems. CoDABot supports the continuous double auction, provides various bidding agents for users to select, and has been implemented with a multi-agent system to realize more independent, and parallel subsystems.

  • PDF

A System Implementation for Issuing and Verifying the Electronic Receipt for M-Commerce (무선 전자상거래를 위 한 전자영수증 발급 및 검증 기법 구현)

  • Park, Keun-Hong;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.559-566
    • /
    • 2003
  • As cell phone and PDA have been in common use recently, there is a growing tendency to utilize the mobile terminals for M-Commerce. The information security and the receipt of e-trade are very important to support reliable digital transactions in wireless environment as in wired environment. Even though some work such as WML digital signature and WPKI has been studied for M-Commerce, there are several problems on the aspects of the functional limitation of the mobile terminals and the unsecure data transformation of WAP gateway. In this study we have designed and implemented a prototype system of issuing and verifying the electronic receipt that guarantees authentication, data integrity and non-repudiation for secure mobile e-commerce. Moreover, we have enhanced the system performance by letting the trusted independent server verify and manage the electronic receipt.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.

Development of Stand-Alone Risk Assessment Software for Optimized Maintenance Planning of Power Plant Facilities (발전설비 최적 정비를 위한 독립형 위험도 평가 소프트웨어 개발)

  • Choi, Woo Sung;Song, Gee Wook;Kim, Bum Shin;Chang, Sung Ho;Lee, Sang Min
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.11
    • /
    • pp.1169-1174
    • /
    • 2015
  • Risk-Risk-based inspection (RBI) has been developed in order to identify risky equipments that can cause major accidents or damages in large-scale plants. This assessment evaluates the equipment's risk, categorizes their priorities based on risk level, and then determines the urgency of their maintenance or allocates maintenance resources. An earlier version of the risk-based assessment software is already installed within the equipment management system; however, the assessment is based on examination by an inspector, and the results can be influenced by his subjective judgment, rather than assessment being based on failure probability. Moreover, the system is housed within a server, which limits the inspector's work space and time, and such a system can be used only on site. In this paper, the development of independent risk-based assessment software is introduced; this software calculates the failure probability by an analytical method, and analyzes the field inspection results, as well as inspection effectiveness. It can also operate on site, since it can be installed on an independent platform, and has the ability to generate an I/O function for the field inspection results regarding the period for an optimum maintenance cycle. This program will provide useful information not only to the field users who are participating in maintenance, but also to the engineers who need to decide whether to extend the lifecycle of the power machinery or replace only specific components.

A Design of Open GIS Compliant Object Web (개방형 GIS 표준에 따른 오브젝트 웹 시스템 설계)

  • Park, Ki-Ho;Jeong, Jae-Gon
    • Journal of Korea Spatial Information System Society
    • /
    • v.1 no.2 s.2
    • /
    • pp.47-62
    • /
    • 1999
  • To meet the interoperability requirements associated with geospatial data access and geoprocessing, much efforts to design prototypical systems conforming to $OpenGIS^{TM}$ specification has been made. With respect to Object Web GIS, however, current internet mapping technology mainly focuses on either developing mapping libraries or client applications regardless of the future needs for interoperability such as an integration of $OpenGIS^{TM}$ standard for CORBA. In this paper, we propose an $OpenGIS^{TM}$ compliant mapping kernel. OpenViews, which is designed to meet those requirements. The kernel of OpenViews encapsulates the process of acquiring geospatial data in the format of $OpenGIS^{TM}$ Geometry through ORB(Object Request Broker). OpenViews, being designed based on well-known design patterns, is a highly extensible in that programmers can easily customize it on the object oriented architecture. The components implemented in OpenViews are CORBA/Java objects, and as such are portable and scalable in a networked environment. A companion package, OpenBroker, is also developed as a portable geoprocessing application server to facilitate the implementation and configuration of server side CORBA objects. It can be used for implementing objects for spatial analysis service which would be independent of legacy spatial database systems in many cases. OpenViews, together with OpenBroker, has been successfully prototyped using the technologies including EJB and servlet as the core components of an Open GIS compliant internet mapping.

  • PDF

Implementation of Encrypted Mail Program using SMTP and POP3 (SMTP와 POP3를 활용한 암호화 메일 프로그램 구현)

  • Kong, Keon-Woong;Won, Yonggwan
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1403-1409
    • /
    • 2017
  • As the Internet evolves, security becomes more important. Especially, e-mail has become one of the most important services that companies and ordinary users use on the Internet. However, security vulnerabilities such as sniffing attacks, IDs, and password spoofs are causing many problems. This paper introduces an example of implementation of encrypted mailing program with which the secured mail is encrypted by symmetric key methode and the encrypted message can not be read without proper decryption. In order to use the current mailing systems, we keep the rules related to SMTP and POP3, and only the encrypted message is stored in the mail server system and the message can be decrypted only at the terminals of the senders and the receivers with the key which is shared in advanced by independent route between them. This implementation scheme can provide an efficiency that it does not request any change of current mailing system, which can be an additional security protection.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Implementaion of status information and protocol integration system at marine transportation facilities (해양교통시설의 상태정보 안내 및 프로토콜 통합 시스템 구현)

  • Jang, Hyun-Young;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.190-193
    • /
    • 2015
  • The current sea route sign system based on an electronic marine chart only has a data manufacture specification for uses at ECDIS. Therefore, it has a limitation in expressing various sea route data and falls short of productivity as it is frozen to prevent being changed for a long time. Also, it cannot satisfy requirements from high tech such as lattice structure data and time series information. Currently, although it builds each independent operation system based S-57, it has been found that it is the most important requirement from consumers that the entire monitoring system can mutually interwork by standardizing and uniting formats of all protocols. In addition, current status information and alarm system is using AIS, TRS, WCDMA telecommunication and processing all the data after saving it into each different server. Lighthouse lantern which currently has used was utilized to do a performance test of a developed system. All of created data was trasmitted through the RS-232, It is clear that the data was received by a situation monitoring system. In addition, when the data was transmitted after saving in a database, same data was ordinarily received. In this thesis, we will implemented the status information and alarm system of Marine transportation facilities which is a sea route sign system based on S-63 electronic marine chart, S/W, after uniting each different protocol and making combined system.

  • PDF

Hierarchical QoS Architecture for Virtual Dancing Environment (분산 가상현실을 위한 계층적 QoS 지원 기법)

  • 김진용;원유집;김범은;박종일;박용진
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.11
    • /
    • pp.675-690
    • /
    • 2003
  • In this paper, we present the virtual dancing studio for distributed virtual environment. In this system, geographically distributed user shares the virtual dancing hall and interacts with each other. The participating object can be a graphical avatar or a live video stream. It allows the coexistence of graphic objects and real images in the shared virtual space. One of the main technical challenges in developing the distributed virtual environment is to handle excessive network traffic. In an effort to effectively reduce the network traffic, we propose a scheme to adjust the QoS of each object with respect to the distance from the observer in the virtual space. The server maintains the QoS vector for each client's shared space and controls the packet traffic to individual clients based on its QoS vectors. We develop a proto-type virtual dancing environment. Java based development enables the client to be platform independent. The result of experiment shows that the adoption of hierarchical QoS management significantly reduces the overall network traffic.