• Title/Summary/Keyword: web server

Search Result 1,878, Processing Time 0.126 seconds

A Study on Development of Industrial Engine Monitoring System Using Smart Phone Application (스마트폰 앱을 이용한 산업용 엔진의 모니터링 시스템 개발에 관한 연구)

  • Jeong, C.S.;Kim, Y.S.;Jeong, Y.M.;Kho, J.H.;Jeong, K.S.;Lee, H.S.;Yang, S.Y.
    • Journal of Drive and Control
    • /
    • v.10 no.2
    • /
    • pp.7-12
    • /
    • 2013
  • In this study, a wire/wireless communication system transmitting the operation data of engine from the ER (Engine Room) to the engine controller of ECR(Engine Control Room) has been developed through the communication of ISM(Industrial Science Medical) Band for the test operation environment improvement of medium speed engine. This wire/wireless communication system is composed of the RTU (Remote Terminal Unit) gathering and transmitting engine data as well as the MCU (Master Control Unit) receiving engine status information from the RTU to be sent to the engine controller (PLC). Through this study, a trial product of RTU and MCU has been manufactured. A test bench that has made temperature, pressure and pick-up sensor into a module for the local test of prototype was produced a test bench. In addition, at the same time save the data to a Web server and the smart phone real-time monitoring system has been developed using Wi-Fi communications. The ultimate objective of this study is to develop a wireless smart phone monitoring system of engine for the operator of engine to be able to monitor and control engine status even from the outside of engine room and control room based on this study.

Educational Voice Storybook Application using Mobile NFC (모바일 NFC를 이용한 교육용 음성동화책 어플리케이션)

  • Jo, Seung-Geun;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.541-544
    • /
    • 2015
  • Through the data communication services in the mobile field in the past of a voice call center (SMS, E-Mail, web surfing, etc.), it has evolved as a "service of smartphone-based" life convenience. According to the latest world book publishing market statistics, the while increasing the proportion of e-books, the proportion of this paper are commercially being reduced. Paper this many e-books in the development of, but active communication in this paper By fusing an NFC-based mobile environment that provides a function to complement the disadvantage of electronic books has, it can give to meet the matters required in more diverse applications. Therefore, in this paper, in order to design and implement an NFC-based mobile phonic fairy book application of, and the efficiency and maintenance of the development through a way to save on rather than storing the information of the management target device server We have implemented a NFC-based mobile education phonic fairy book application that takes into account.

  • PDF

Efficient Multicasting Mechanism for Mobile Computing Environment (교육 영상제작 시스템 설계 및 구현)

  • Kim, Jungguk;Cho, Wijae;Park, Subeen;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.482-484
    • /
    • 2017
  • Over the past 70 years, movies and television have revolutionized the way people communicate. However, even with this development, TV has been used only as a means of communication targeting an unspecified number of people due to the restriction of media such as radio waves and movies. However, the development of the Internet and online video has come to a time when 100 million people watch YouTube videos uploaded from the other side of the world by eliminating these restrictions. The message that you want to deliver now can be delivered to anyone, but making the image with these messages remains the last obstacle to communication. To solve these problems, we implemented a web application and a video production program through AWS. This system basically provides the administrator with the video production through the easy interface, the information management and the program on the server on the internet through AWS, the assigned lecture including the computer and the smart phone, the learning materials, And implemented to increase the efficiency of educational video production service.

  • PDF

Design and Implementation of XML Based Relational Database Metadata Repository (XML을 기반으로 한 관계형 데이터베이스 메타데이터 리파지토리 설계 및 구현)

  • Gwon, Eun-Jeong;Yong, Hwan-Seung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.1-10
    • /
    • 2002
  • Metadata is data about data that is used to mange data itself. As applications based on DBMS are increased, it is suggested that metadata model and metadata interchange model to manage metadata in DBMS. but metadata which is in the form of XML (eXtensible Markup Language) document is generally stored into RDBMS. Therefore In this paper, as for the method to store metadata of RDBMS into OODBMS, we design metadata model, metadata interchange model and implement new repository system. The metadata of RDBMS is translated into in the form of XML Document and integrated into XML Data Server on OODBMS, eXcelon and executes retrieval metadata information about RDBMS by XQL(XML Query Language). So It is possible to searchm edit a metadata. The metadata of XML documents stored in eXcelon is easily made to be printed in web browser by applying a XSL (extensible StyleSheets Language). So we can have a detail information about property of metadata in DBMS.

Design and Implementation of a Keyboard Input Security System for Safe md Trusted E-Commerce (안전하고 신뢰성있는 전자상거래를 위한 키보드 입력 보안 시스템의 설계 및 구현)

  • Choi Sung-Wook;Kim Ki-Tae
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.55-62
    • /
    • 2006
  • It is growing to use the E-Commerce, recently However, if a cracking tool that detects e keyboard input is set up, users' input values and personal information could be taken away. This paper shows the design and implementation of security system that prevent the keyboard input information leaking. The ideas of thus paper are encrypting the keyboard input values with using the keyboard interrupt hooking, the browser embedding program's decrypting the values in case of need and decrypting all values in the web server. The own input control was developed for direct attacks to the browser, and that the values of password fields which are showed as *(asterisk character) won't be decrypted in the client PC is different from other commercial keyboard input security systems. Consequently, this paper shows the chance of realizing a lot safer customer information protective system than before.

Efficient Evaluation of Shared Predicates for XForms Page Access Control (XForms 페이지의 접근제어를 위한 공유 조건식의 효율적 계산 방법)

  • Lee, Eun-Jung
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.441-450
    • /
    • 2008
  • Recently, access control on form-based web information systems has become one of the useful methods for implementing client systems in a service-oriented architecture. In particular, XForms language is being adopted in many systems as a description language for XML-based user interfaces and server interactions. In this paper, we propose an efficient algorithm for the evaluation of XPath-based access rules for XForms pages. In this model, an XForms page is a sequence of queries and the client system performs user interface realization along with XPath rule evaluations. XPath rules have instance-dependent predicates, which for the most part are shared between rules. For the efficient evaluation of shared predicate expressions in access control rules, we proposed a predicate graph model that reuses the previously evaluated results for the same context node. This approach guarantees that each predicate expression is evaluated for the relevant xml node only once.

A Study for Smart Apartment for Supporting Intelligent Service based on Ubiquitous (유비쿼터스 기반의 지능형 서비스를 지원하는 스마트 아파트 연구)

  • Ahn, Byeong-Tae;Lee, Chong-Ha;Chung, Bhum-suk
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.247-261
    • /
    • 2013
  • Recently, the smart phone, a carrying along terminal connection technology such as Galaxytap/iPad etc. evolves, and supply is increasing rapidly, is included for smart phone because various sensor technologies are developed and service application that is acted in terminal with this is accompanied and grow. Continuously 4 generation to 3 Gs, Wibro Wireless network technology of communications a LTE technology from that is constructed, environment for Ubiquitous realization is being constructed fast. Therefore, in this paper it can inquire state of electronic, furniture devices through apartment complex web server and gear that control groove network at smart phone, and control, and confirms home state prevention of crimes state, and video inquiry of position that CCTV is placed in apartment complex was available. And it proposed integrated smart apartment with parking system and medical system using RFID system in ubiquitous environment.

  • PDF

Monitoring System for the Elderly Living Alone Using the RaspberryPi Sensor (라즈베리파이 센서를 활용한 독거노인 모니터링 시스템)

  • Lee, Sung-Hoon;Lee, June-Yeop;Kim, Jung-Sook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1661-1669
    • /
    • 2017
  • In 2017, Korea has reached 1.3 million elderly people living alone. The government is promoting the basic care service for the elderly by using care workers to check the security of the elderly living alone. However, due to lack of service personnel and service usage rate of elderly care workers, it is difficult to manage. To improve these environmental constraints, this study attempted to construct a monitoring system for elderly people living alone by using sensors such as temperature, humidity, motion detection, and gas leak detection. The sensor periodically collects the current status data of the elderly and sends them to the server, creates a real time graph based on the data, and monitors it through the web. In the monitoring process, when the sensor is out of the range of the specified value, it sends a warning text message to the guardian to inform the current situation, and is designed and implemented so as to support the safety life of the elderly living alone.

FlashEDF: An EDF-style Scheduling Scheme for Serving Real-time I/O Requests in Flash Storage

  • Lim, Seong-Chae
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.26-34
    • /
    • 2018
  • In this paper, we propose a scheduling scheme that can efficiently serve I/O requests having deadlines in flash storage. The I/O requests with deadlines, namely, real-time requests, are assumed to be issued for streaming services of continuous media. Since a Web-based streaming server commonly supports downloads of HTMLs or images, we also aim to quickly process non-real-time I/O requests, together with real-time ones. For this purpose, we adopt the well-known rate-reservation EDF (RR-EDF) algorithm for determining scheduling priorities among mixed I/O requests. In fact, for the use of an EDF-style algorithm, overhead of task's switching should be low and predictable, as with its application of CPU scheduling. In other words, the EDF algorithm is inherently unsuitable for scheduling I/O requests in HDD storage because of highly varying latency times of HDD. Unlike HDD, time for reading a block in flash storage is almost uniform with respect to its physical location. This is because flash storage has no mechanical component, differently from HDD. By capitalizing on this uniform block read time, we compute bandwidth utilization rates of real-time requests from streams. Then, the RR-EDF algorithm is applied for determining how much storage bandwidth can be assigned to non-real-time requests, while meeting deadlines of real-time requests. From this, we can improve the service times of non-real-time requests, which are issued for downloads of static files. Because the proposed scheme can expand flexibly the scheduling periods of streams, it can provide a full usage of slack times, thereby improving the overall throughput of flash storage significantly.

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF