A Resilient Device Monitoring System in Collaboration Environments
|
|
|
- Edgar Dalton
- 10 years ago
- Views:
Transcription
1 , pp A Resilient Device Monitoring System in Collaboration Environments KeeHyun Park 1 and JongHwi Lee 1 Department of Computer Engineering, Keimyung University, Daegu, Korea {khp, dragon8829}@kmu.ac.kr Abstract In this paper, a resilient device monitoring system is proposed in which agents on remote devices can collaborate with each other. The system consists of collaboration groups, proxy servers and a device monitoring server. A collaboration group consists of P2P agents and a P2P host which represents the collaboration group. The system is resilient in the sense that it finds an alternative P2P host or proxy server to continue its works in the event of a failure of the original ones. Communication protocols including communication messages and flow sequences for finding alternatives are proposed in detail, and some implementation results are explained. Keywords: Device monitoring, Collaboration, P2P, Mobile device, Resilience 1. Introduction A device monitoring system can monitor the activities of remote devices in order to manage the devices remotely, without the need for operators to visit the places where the devices are located [1-5]. Typical examples of such monitoring activities are control of the device activities, value setting in the devices, error monitoring, remote install and execution of new programs in the devices, etc. Because visiting a remote device would require a great deal of time and effort, making it difficult to promptly respond to unexpected circumstances, numerous remote device monitoring systems have been developed. Examples of devices to be monitored are Personal Healthcare devices, game terminals, home appliances, lighting equipment, and various sensing devices. Usually, an agent is installed in the device to communicate with a device monitoring server for the purpose of remote device monitoring [6-10]. Most remote device monitoring systems that have been developed thus far are based on 1:1 communication between a remote device and the device monitoring server. However, as devices become smarter and as users needs become more diverse, it becomes more difficult for the existing systems to deal with the following problems: Lack of ability to react to environments in which collaboration is required: In order to meet the current trend of lighter, smaller and cheaper devices, devices are required to execute collaborative work to compensate for the diminished computing and communication power of the devices. Typical examples can be found in the area of distributed sensor networks, in which most sensors do not have enough communication power to send data to the remote server. All the sensed data are sent to the adjacent sink node and the sink node in turn transmits the data to the remote server [11-12], which demonstrates the collaboration work of communication. ISSN: IJSH Copyright c 2014 SERSC
2 Another type of collaboration work can be seen in game terminals. In the past, users would enjoy their games through one game terminal, or through several game terminals connected to one game machine. Recently, users have wanted to enjoy their games in a way that is location-independent (i.e., enjoy the same game with different game terminals in different locations). For example, users want to play the same screen golf game in different locations with different screen game terminals [13]. In this case, screen golf game terminals located in geographically remote areas must be able to collaborate in order to place users in the same game. However, most of the existing device monitoring systems would suffer from degraded performance because only 1:1 communication between devices and the server is provided, and the problem of bottlenecks at the server would occur. Occurrence of security problems due to excessive propagation of sensitive data: The data sensed by devices may include sensitive data such as personal biomedical data. Therefore, device monitoring systems must pay special attention to the sensitive data which has to travel all the way from remote devices to the server in most existing device monitoring systems, increasing the risk of exposure of sensitive data [14]. If remote devices in a specific area (i.e., user s home) can collaborate with each other to process most of the sensitive biomedical data, only a small portion of the data would travel to the server, decreasing the exposure risk. In this paper, a resilient device monitoring system is proposed in which agents on remote devices can collaborate with each other. The system consists of collaboration groups, proxy servers and a device monitoring server. A collaboration group consists of P2P agents and a P2P host which represents the collaboration group. The system is resilient in the sense that it finds an alternative P2P host or proxy server to continue its works in the event of a failure of the original ones. The remainder of this paper is organized as follows. Section 2 describes the previous studies related to this study. Section 3 explains the design of the system proposed in this paper. Next, Section 4 describes the results of the implementation. Finally, Section 5 draws conclusions and discusses some directions for future research. 2. Related Studies 2.1 Device Management System The management of remote devices has been one of the hot issues in various applications [1, 15-17]. Recently, some studies of remote device management have been focused on PHD (Personal Healthcare Device) management systems, because continuous monitoring of patient health is required in ubiquitous healthcare environments [15-16]. Remote management systems of pulse oximetry and medication dispenser were studied, in [15] and [16], respectively. The system UbiMMS is comprised of medication dispensers and a monitoring server, as shown in Figure 1 [16]. Once medication schedules and system settings are configured manually by users or automatically via the remote monitoring server, the configured information is stored in memory. When the real-time clock reaches the medication time, the alarm notifies the user through a buzzer that it is time to take medications. If the user presses the dispense button at that time, the predetermined medications are dispensed. The medication dispensers transmit the patient s medication and device status and device configurations. The 104 Copyright c 2014 SERSC
3 medication status is transmitted periodically, whereas the device configurations are transmitted whenever the monitoring server sends a request. Information on the occurrence of events such as a shortage of medication, medication jam, memory overload, software error, or non-adherence is transmitted immediately. The monitoring server sends the received status data and configurations to medical staff and system administrators via a medication monitor and a system monitor, respectively. In addition, it generates management operations to manage configurations, software, and medication dispenser errors if necessary [16]. 2.2 Collaborating Agents Figure 1. Ubiquitous Medication Monitoring System Figure 2 shows the structure of the agent-based device management system designed in the earlier studies [18, 19]. The system consists of agents, P2P hosts, and an Agent data server. Agents can exchange their local data with each other in the same group via a P2P host in the group. Upon receiving data from an agent in the group to which the P2P host belongs, the P2P host saves the data to its local database and transmits the data to every agent in the group. Only one P2P host exists in a group to represent the group, which means that transmission of data outside the group must be performed by the P2P host [18, 19]. P2P hosts can collaborate with other P2P hosts via the Agent server. The Agent server can multicast data to P2P hosts in response to a request from them. In addition, the server issues commands to reconfigure settings or update programs of the P2P hosts. The server also communicates with the P2P host to authenticate an agent when the agent logs in. Figure 3 (a) and (b) shows the structures of the agent and a P2P host proposed in the earlier study [15-16]. The agent consists of a session handler module, a network module, a message handler module and a manager module. The session handler module manages the communication session. Along with the network module, the module deals with communication with a P2P host. Because communication messages transmitted in the system are represented in XML [20, 21], it is the responsibility of the message handler module to parse, analyze, or generate XML messages. The manager module transmits XML messages to the P2P host in the group to which the agent belongs. As shown in Figure 4, the agent in this study consists of various classes, such as an Copyright c 2014 SERSC 105
4 IPC_Controller class, a User Object class, a NativeMethod class, an IPC_Structs class, an XMLFactory class, and a P2PClient (or a P2PHost) class. Figure 2. Structure of an Agent-based Device Management System 106 Copyright c 2014 SERSC
5 Session Handler XML Data Session Handler XML Data Message Handler Network Module Network Module Message Handler Network Module Manager Manager Figure 3. Structures of an agent (a) and a P2P host (b) Figure 4. UML Diagram of the Agent Copyright c 2014 SERSC 107
6 3. Remote Device Monitoring System Figure 5. Device Monitoring System in Collaboration Environments Figure 5 shows the resilient device monitoring system proposed in this study in collaboration environments. The system consists of collaboration groups, proxy servers and a device monitoring server. A collaboration group consists of P2P agents and a P2P host. When a user logs into a mobile device, the P2P agent installed in the mobile device is activated. To perform cooperative works, the agent must either create a new collaboration group by itself or join one of the existing collaboration groups. When a P2P agent creates a new collaboration group, the P2P agent becomes a P2P host of the collaboration group, representing the group. In a collaboration group, P2P agents transmit messages between them through the P2P host of the group using the P2P communication protocol [22, 23]. All the messages between P2P agents and a proxy server must pass through the P2P host of the group, and all the messages transmitted in the system are represented in XML. The device monitoring system in this study performs device management tasks for remote device management and remote error reporting. The device monitoring server in the system manages mobile devices remotely through the following items: AgentStatus: represents the status of the agent in the remote mobile device to be managed AgentVersion: represents the version of the agent installed in the device OSVersion: represents the version of the operating system installed in the device Manufacturer: represents the manufacturer of the device Network Info: represents IP addresses and ports for device, separated by : The device monitoring message is generated by the agent of the mobile device to transmit in XML to the device monitoring server via the P2P host and the proxy server to which the agent belongs. An example of the message is shown in Table Copyright c 2014 SERSC
7 Table 1. Device Monitoring Message in XML (An Example) <Device_Monitoring> <AgentStatus> 0 </AgentStatus> <AgentVersion> </SoftwareVersion> <OSVersion> Windows7 </OSVersion> <Manufacturer> Samsung </Manufacturer> <NetworkInfo> :1308 </NetworkInfo> </Device_Monitoring > The device monitoring server recognizes the errors that occur in a mobile device by referring to the device management message transmitted by the device. Error items defined in this study are shown in Table 2. Table 2. Error Items to be Reported Error Items Value Comments OK 000 No errors Bad proxy server 001 Failure to access the proxy server Bad agent 002 Error occurrence in the agent Bad collaboration group 003 Failure to access the collaboration group Examples of the error reporting message are shown in Tables 3 through 5. From a device agent, the device monitoring server receives the error reporting message shown in Table 3, when there are no errors in the device agent. Error reporting messages on a proxy server and a collaboration group are shown in Tables 4 and 5, respectively. When the device monitoring server receives an error reporting message on a bad proxy server, the device monitoring server tells the related P2P hosts which proxy server they should access. When the device monitoring server receives an error reporting message on a collaboration group, the related proxy server releases the related session between the error reporting P2P agent and the related P2P host to allow the agent to join another collaboration group. Table 3. Error Reporting Message in XML (No Errors) <ErrorReportingRequest> <ErrorStatus> 000 </ErrorStatus> </ErrorReportingRequest> Table 4. Error Reporting Message in XML (Bad Proxy Server) <ErrorReportingRequest> <ErrorStatus> 001 </ErrorStatus> <ProxyInfo> :1305 </ProxyInfo> </ErrorReportingRequest> Table 5. Error Reporting Message in XML (Bad Collaboration Group) <ErrorReportingRequest> <ErrorStatus> 003 </ErrorStatus> <CollaborationGroupID> 0012 </ CollaborationGroupID > </ErrorReportingRequest> Copyright c 2014 SERSC 109
8 Figure 6 shows the flow sequence of a Bad proxy server error. When an agent tries to login and finds that the related proxy server cannot be reached, the agent sends the device monitoring server an error reporting request message (error reporting message on Bad proxy server), as shown in Table 4, in order to request an alternative proxy server to login. Upon receiving the error reporting message from the agent, the server recognizes the failure of the proxy server and sends the agent an error reporting response message to tell the agent the alternative proxy server to use for login. Then, the agent tries to login to the alternative proxy server and performs the normal login procedure. Figure 6. Flow Sequence on the Bad Proxy Server Error Figure 7 shows the flow sequence of a Bad collaboration group error. When an agent tries to join a collaboration group and finds that the related P2P host cannot be reached, the agent sends the related proxy server an error reporting request message (error reporting message on Bad collaboration group), as shown in Table 5. Then, the proxy server relays the message to the device monitoring server. Upon receiving the message from the proxy server, the server recognizes the failure of the collaboration group and allows the related proxy server to choose a new P2P host for the collaboration group. Then, the new P2P host sends response messages for connection to all the P2P agents in the group. Upon receiving the message from the new P2P host, the agents update information of their collaboration group. 110 Copyright c 2014 SERSC
9 4. Results Figure 7. Flow Sequence on the Bad Collaboration Group Error The system explained above is implemented. Figure 8 shows a screen shot that illustrates how the system is working when the Bad proxy server error occurs. In this figure, a P2P sends an ErrorReportingRequest message in XML to the device monitoring server after the P2P agent finds it cannot access the related proxy server whose IP address is The content of the message is shown in the upper part of the screen ( Send XML ). Upon receiving the ErrorReportingRequest message, the device monitoring server sends the agent an ErrorReportingResponse message in XML, the content of which is shown in the lower part of the screen ( Receive XML ). The server tells the agent that the alternative proxy server is Figure 8. A Screen Shot on the Bad Proxy Server Error 5. Conclusion and Future Research In this paper, a resilient device monitoring system is proposed, in which agents on remote devices can collaborate with each other. For the original P2P host representing a collaboration group, the system finds an alternative P2P host to maintain the related collaboration group work. Also, the system can find an alternative proxy server when the original server cannot be accessed. Communication protocols including communication messages and flow sequences for finding alternatives are proposed in Copyright c 2014 SERSC 111
10 detail, and some implementation results are explained. For future research, efficient methods of selecting from among alternative candidates will be studied. Acknowledgements This research was supported by the Bisa Research Grant of Keimyung University in References [1] OMA, accessed in July (2014) [2] OMA DM Protocol Specification, accessed in July (2014) [3] J. Pak and K. Park, Advanced Pulse Oximetry System for Remote Monitoring and Management, Journal of Biomedicine and Biotechnology, vol. 2012, Article ID , 8 pages, doi: /2012/ (2012). [4] J. Pak and K. Park, UbiMMS: an ubiquitous medication monitoring system based on remote device management methods, Health Information Management Journal, vol. 41, no. 1, (2012), pp [5] K. Park and J. Park, A Collaborating Agents for a Device Management System, International Journal of Software Engineering and Its Applications, submitted (2014). [6] Wikipedia, accessed in July (2014) [7] M. Wooldridge and N. R. Jennings, Intelligent agents: theory and practice, Knowledge Engineering Review, vol. 10, no. 2, (1995), pp [8] S. Yu and Jun Ai, Software Test Data Generation Based on Multi-Agent, International Journal of Software Engineering and Its Applications, vol. 4, no. 3, (2010). [9] R. O. Legendi and L. Gulys, Agent-based dynamic network models: Validation on empirical data, Advances in social simulation, Springer, (2014), pp [10] H. Du, S. Li and S. Ding, Bounded consensus algorithms for multi-agent systems in directed networks, Asian Journal of Control, vol. 15, no. 1, (2013), pp [11] W. Dargie and C. Poellabauer, Fundamentals of wireless sensor networks: theory and practice, John Wiley and Sons, (2010). [12] D. Silva, M. Ghanem and Y. Guo, WikiSensing: An Online Collaborative Approach for Sensor Data Management, Sensors, vol. 12, no. 12, doi: /s (2012). [13] K. Park, An XML Based Communication System for a Ubiquitous Game Simulator, International Journal of Smart Home, vol. 7, no. 6, (2013), pp [14] W. Stallings, Cryptography and Network Security: Practice and Principles, 4th. ed., Prentice Hall (2006). [15] J. Pak and K. Park, Advanced Pulse Oximetry System for Remote Monitoring and Management, Journal of Biomedicine and Biotechnology, vol. 2012, Article ID , 8 pages, doi: /2012/ (2012). [16] J. Pak and K. Park, UbiMMS: an ubiquitous medication monitoring system based on remote device management methods, Health Information Management Journal, vol. 41, no. 1, (2012), pp [17] M. O. Balitanas and T. Kim, Architecture for Automatic Management of ParcTab Ubiquitous Computing, International Journal of Advanced Science and Technology, vol. 15, February (2010), pp [18] K. Park and J. Park, Design of a Monitoring System for Many Collaboration Agents, Proceedings of Software2013 the second workshop, Jeju (2013). [19] K. Park and J. Park, Collaborating Agents for a Device Management Systems, International Journal of Software Engineering and Its Applications, vol. 8, no. 5, pp , (2014) [20] S. Y. Hong and D. H. Han, XML Principles and Applications, Hanbit Media Inc. (2011). [21] Y. Song, K. Choo and S. Lee, Design of Index Schema based on Bit-Streams for XML Documents, International Journal of Software Engineering and Its Applications, vol. 6, no. 4, (2012), pp [22] E. P. Duarte Jr. and F. B. Godoi, Reliable Content Distribution in P2P Networks Based on Peer Groups, International Journal of Internet and Distributed Systems, vol. 2, no. 2, Article ID:45447, 10 Pages, (2014). [23] Y. Wang, J. bo1 and W. Xu, Model Research of p2p VoD System based on Fluency, International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 7, no. 2, pp , (2014). 112 Copyright c 2014 SERSC
11 Authors KeeHyun Park, He received his B.Sc. and M.Sc. degrees in Computer Science from Kyungbook National University, Korea, and from KAIST, Korea, in 1979 and 1981, respectively, and his Ph.D. degree in Computer Science from Vanderbilt University, USA, He has been a professor of Computer Science and Engineering Department at Keimyung University, Korea since March His research interests include Mobile/Network Communication System, Embedded System and Parallel Processing System. JongHwi Lee, ([email protected]) He received his B.Sc. Computer Engineering from Keimyung University, Korea, in His research interests include Mobile Device Management/Data Synchronization and Personal Health Device Management System. Copyright c 2014 SERSC 113
12 114 Copyright c 2014 SERSC
Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards
, pp. 143-150 http://dx.doi.org/10.14257/ijseia.2015.9.7.15 Development of Integrated Management System based on Mobile and Cloud Service for Preventing Various Hazards Ryu HyunKi 1, Yeo ChangSub 1, Jeonghyun
Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
Personal Health Care Management System Developed under ISO/IEEE 11073 with Bluetooth HDP
Vol.8, No.3 (2014), pp.191-196 http://dx.doi.org/10.14257/ijsh.2014.8.3.18 Personal Health Care Management System Developed under ISO/IEEE 11073 with Bluetooth HDP Am suk Oh 1, Doo Heon Song 2 and Gwan
The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator
Vol.8, No.3 (2014), pp.107-118 http://dx.doi.org/10.14257/ijsh.2014.8.3.10 The Design and Implementation of the Integrated Model of the Advertisement and Remote Control System for an Elevator Woon-Yong
Development of a Service Robot System for a Remote Child Monitoring Platform
, pp.153-162 http://dx.doi.org/10.14257/ijsh.2014.8.5.14 Development of a Service Robot System for a Remote Child Monitoring Platform Taewoo Han 1 and Yong-Ho Seo 2, * 1 Department of Game and Multimedia,
Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service
, pp. 195-204 http://dx.doi.org/10.14257/ijsh.2015.9.5.19 Smart Integrated Multiple Tracking System Development for IOT based Target-oriented Logistics Location and Resource Service Ju-Su Kim, Hak-Jun
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks
, pp. 205-216 http://dx.doi.org/10.14257/ijseia.2015.9.9.18 Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic
A Study on Design of Health Device for U-Health System
, pp.79-86 http://dx.doi.org/10.14257/ijbsbt.2015.7.2.08 A Study on Design of Health Device for U-Health System Am-Suk Oh Dept. of Media Engineering, Tongmyong University, Busan, Korea [email protected] Abstract
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource
Cloud Computing based Livestock Monitoring and Disease Forecasting System
, pp.313-320 http://dx.doi.org/10.14257/ijsh.2013.7.6.30 Cloud Computing based Livestock Monitoring and Disease Forecasting System Seokkyun Jeong 1, Hoseok Jeong 2, Haengkon Kim 3 and Hyun Yoe 4 1,2,4
A Proxy-Based Data Security Solution in Mobile Cloud
, pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,
Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver
, pp.161-165 http://dx.doi.org/10.14257/astl.205.98.41 Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver Jeong MyeongSu 1, Moon ChangSoo 1, Gwon DaeHyeok 1 and Cho
A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems
, pp. 49-56 http://dx.doi.org/10.14257/ijsh.2013.7.5.05 A Proposed Integration of Hierarchical Mobile IP based Networks in SCADA Systems Minkyu Choi 1 and Ronnie D. Caytiles 2 1 Security Engineering Research
A Study of Key management Protocol for Secure Communication in Personal Cloud Environment
, pp.51-58 http://dx.doi.org/10.14257/ijsia.2014.8.4.05 A Study of Key management Protocol for Secure Communication in Personal Cloud Environment ByungWook Jin 1 and Keun-Wang Lee 2,* 1 Dept. of Computer
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073
, pp. 113-118 http://dx.doi.org/10.14257/ijsh.2015.9.6.13 A Study on HL7 Standard Message for Healthcare System Based on ISO/IEEE 11073 Am-Suk Oh Dept. of Media Engineering, Tongmyong University, Busan,
A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers
, pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
Development of a User Management Module for Internet TV Systems
, pp.43-56 http://dx.doi.org/10.14257/ijmue.2015.10.11.05 Development of a User Management Module for Internet TV Systems Kangjai Lee 1 and Jaegeol Yim 2* 1 Dept. of Computer Information, Suwon Science
Mobile Hybrid Cloud Computing Issues and Solutions
, pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University
NanoMon: An Adaptable Sensor Network Monitoring Software
NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and Telecommunications Research Institute (ETRI) Gajeong-dong
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a
Vol. 8, No. 4 (2015), pp. 275-286 http://dx.doi.org/10.14257/ijca.2015.8.4.27 Implementation of IR-UWB MAC Development Tools Based on IEEE 802.15.4a Sol Lim, Kye Joo Lee, So Yeon Kim, Chang Seok Chae,
Biomarker Discovery and Data Visualization Tool for Ovarian Cancer Screening
, pp.169-178 http://dx.doi.org/10.14257/ijbsbt.2014.6.2.17 Biomarker Discovery and Data Visualization Tool for Ovarian Cancer Screening Ki-Seok Cheong 2,3, Hye-Jeong Song 1,3, Chan-Young Park 1,3, Jong-Dae
The Digital Signage System Supporting Multi-Resources Schedule on an Elevator
, pp. 219-228 http://dx.doi.org/10.14257/ijsh.2015.9.8.23 The Digital Signage System Supporting Multi-Resources Schedule on an Elevator Woon-Yong Kim and SoonGohn Kim (Corresponding Author) Department
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES
REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES 1 Abinath.T.R, 2 Sudhakar.V, 3 Sasikala.S 1,2 UG Scholar, Department of Electrical and Electronics Engineering, Info Institute of Engineering,
How do I load balance FTP on NetScaler?
How do I load balance FTP on NetScaler? Introduction: File transfer protocol is a standard for the exchange of files across a network. It is based on a client/server model with an FTP client on a user
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Security Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing
A Dynamic Resource Management with Energy Saving Mechanism for Supporting Cloud Computing Liang-Teh Lee, Kang-Yuan Liu, Hui-Yang Huang and Chia-Ying Tseng Department of Computer Science and Engineering,
A Design of Mobile Convergence Architecture for U-healthcare
, pp. 253-260 http://dx.doi.org/10.14257/ijseia.2015.9.1.22 A Design of Mobile Convergence Architecture for U-healthcare Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology Catholic
Two-Level Metadata Management for Data Deduplication System
Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,
Review of the Techniques for User Management System
, pp.87-91 http://dx.doi.org/10.14257/astl.2014.46.20 Review of the Techniques for User Management System Jaegeol Yim *, Gyeyoung Lee *, Kyungsoo Ham * *Dongguk University at Gyeongju Korea, {yim, lky,
A Digital Door Lock System for the Internet of Things with Improved Security and Usability
, pp.33-38 http://dx.doi.org/10.14257/astl.2015.109.08 A Digital Door Lock System for the Internet of Things with Improved Security and Usability Ohsung Doh 1, Ilkyu Ha 1 1 Kyungil University, Gyeongsan,
A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan
, pp.61-66 http://dx.doi.org/10.14257/ijmue.2015.10.12.07 A Study on IP Exposure Notification System for IoT Devices Using IP Search Engine Shodan Yun-Seong Ko 1, Il-Kyeun Ra 2 and Chang-Soo Kim 1* 1 Department
A Scenario of Machine-to-Machine (M2M) Health Care Service
A Scenario of Machine-to-Machine (M2M) Health Care Service Jung-Ho Kim*, Ya-Ting Wei*, Jae-Oh Lee* * Dept. of Electrical, Electronics &, Korea University of Technology and Education, Korea {jungho32, weiyating,
AlienVault Unified Security Management (USM) 4.15-5.x. Configuring High Availability (HA)
AlienVault Unified Security Management (USM) 4.15-5.x Configuring High Availability (HA) USM v4.15-5.x Configuring High Availability (HA), rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The
Fast Device Discovery for Remote Device Management in Lighting Control Networks
J Inf Process Syst, Vol.11, No.1, pp.125~133, March 2015 http://dx.doi.org/10.3745/jips.03.0011 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Fast Device Discovery for Remote Device Management in
The Development of an Intellectual Tracking App System based on IoT and RTLS
, pp.9-13 http://dx.doi.org/10.14257/astl.2015.85.03 The Development of an Intellectual Tracking App System based on IoT and RTLS Hak-Jun Lee 1, Ju-Su Kim 1, Umarov Jamshid 1, Man-Kyo Han 2, Ryum-Duck
A Review of an MVC Framework based Software Development
, pp. 213-220 http://dx.doi.org/10.14257/ijseia.2014.8.10.19 A Review of an MVC Framework based Software Development Ronnie D. Caytiles and Sunguk Lee * Department of Multimedia Engineering, Hannam University
Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications
, pp.71-80 http://dx.doi.org/10.14257/ijsia.2014.8.1.07 Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications Kyung-Soo Joo 1 and Jung-Woong Woo 2 1 Department of Computer
Design of Remote data acquisition system based on Internet of Things
, pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; [email protected]
Developing Safety Management Systems for Track Workers Using Smart Phone GPS
, pp.137-148 http://dx.doi.org/10.14257/ijca.2013.6.5.13 Developing Safety Management Systems for Track Workers Using Smart Phone GPS Jin-Hee Ku 1 and Duk-Kyu Park 2 1 Dept of Liberal Education and 2 Dept
Department of Electronics Engineering, Associate Professor, Tatysaheb kore Istitute of Engineering and Technology,Warnanagar, India
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY WIRELESS HEALTHCARE APPLICATION DEVELOPMENT FOR SITTING POSTURE MONITORING Paymal Sneha B.*, Prof.A.S.Mali *Department of Electronics
An ECG Monitoring and Alarming System Based On Android Smart Phone
Communications and Network, 2013, 5, 584-589 http://dx.doi.org/10.4236/cn.2013.53b2105 Published Online September 2013 (http://www.scirp.org/journal/cn) An ECG Monitoring and Alarming System Based On Android
Scalable Multiple NameNodes Hadoop Cloud Storage System
Vol.8, No.1 (2015), pp.105-110 http://dx.doi.org/10.14257/ijdta.2015.8.1.12 Scalable Multiple NameNodes Hadoop Cloud Storage System Kun Bi 1 and Dezhi Han 1,2 1 College of Information Engineering, Shanghai
Wireless Communications for SCADA Systems Utilizing Mobile Nodes
, pp. 1-8 http://dx.doi.org/10.14257/ijsh.2013.7.5.01 Wireless Communications for SCADA Systems Utilizing Mobile Nodes Minkyu Choi Security Engineering Research Support Center, Daejon, Republic of Korea
To install the SMTP service:
To install the SMTP service: From the Start menu, click Control Panel. 2. Double-click Add or Remove Programs. 3. From the left pane, click Add/Remove Windows Components. 4. From the Components list, click
The Research in Remote and Real-time Monitoring System of Digitized Earthquake Omen Instrument
2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.1.13 The Research in Remote and
The Sensitive Information Management System for Merger and Acquisition (M&A) Transactions
, pp.203-212 http://dx.doi.org/10.14257/ijmue.2014.9.3.19 The Sensitive Information Management System for Merger and Acquisition (M&A) Transactions Kyong-jin Kim * and Seng-phil Hong ** Sungshin Women
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Lets3D: A Collaborative 3D Editing Tool Based On Cloud Storage
, pp.189-198 http://dx.doi.org/10.14257/ijmue.2015.10.9.20 Lets3D: A Collaborative 3D Editing Tool Based On Cloud Storage Yeoun-Ui Ha 1, Jae-Hwan Jin 1 and Myung-Joon Lee 2* Department of Electrical/Electronic
Enterprise Resource Planning System Deployment on Mobile Cloud Computing
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.3, No.1 (2013), pp. 1-8 http://dx.doi.org/10.14257/ajmscahs.2013.06.02 Enterprise Resource Planning System
Mathematical models to estimate the quality of monitoring software systems for electrical substations
Mathematical models to estimate the quality of monitoring software systems for electrical substations MIHAIELA ILIESCU 1, VICTOR URSIANU 2, FLORICA MOLDOVEANU 2, RADU URSIANU 2, EMILIANA URSIANU 3 1 Faculty
Agent-based University Library System
_ Course Number: SENG 609.22 Session: Fall, 2004 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Project Report Agent-based University Library
A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/jips.2011.7.4.707 A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks
, pp.100-104 http://dx.doi.org/10.14257/astl.2014.45.19 A Study of Low Cost Meteorological Monitoring System Based on Wireless Sensor Networks Li Ma 1,2,3, Jingzhou Yan 1,2,Kuo Liao 3,4, Shuangshuang Yan
Premium Server Client Software
Premium Server Client Software Server / Client SMSPro & GSMS TH series Get the tools on hand Premium Server is designed to cover most of the applications in the market. It gives a hassle free management
Monitoring Human Blood Pressure for U-Healthcare Using ISO/IEEE PHD Standard
Monitoring Human Blood Pressure for U-Healthcare Using ISO/IEEE PHD Standard Gi Hyun Bang, Do Kyeong Lee and Deok Jai Choi Electronics Computer Engineering, Chonnam National University 77 Yongbong-dong,
Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology
Home Appliance Control and Monitoring System Model Based on Cloud Computing Technology Yun Cui 1, Myoungjin Kim 1, Seung-woo Kum 3, Jong-jin Jung 3, Tae-Beom Lim 3, Hanku Lee 2, *, and Okkyung Choi 2 1
Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide
WA Manager Alarming System Management Software Windows 98, NT, XP, 2000 User Guide Version 2.1, 4/2010 Disclaimer While every effort has been made to ensure that the information in this guide is accurate
Internet of Things for Smart Crime Detection
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 749-754 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4685 Internet of Things for Smart Crime Detection Jeong-Yong Byun, Aziz
ACR Triad Site Server Click Once Software System
ACR Triad Site Server Click Once Software System Version 2.5 20 October 2008 User s Guide American College of Radiology 2007 All rights reserved. CONTENTS INTRODUCTION...3 ABOUT TRIAD...3 DEFINITIONS...4
Installation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM
DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM Shweta 1, Nayana P Shetty 2 M.Tech student, Department of Electrical and Electronics Engineering, NMAMIT, Nitte, India 1 Associate Professor,
Design of UPS Battery Remote Monitoring System
, pp.26-268 http://dx.doi.org/.4257/ijmue.24.9.9.28 esign of UPS Battery Remote Monitoring System Jiabin Wang, Haiying Wang 2,*,Tianjun Sun 2,Yuran Wang 2 and Ruilin Wang 2 aqing Oil Field Chemical Co.,LT,
UPS battery remote monitoring system in cloud computing
, pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology
Multimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: [email protected]
An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology
Vol.63 (NT 2014), pp.1-5 http://dx.doi.org/10.14257/astl.2014.63.01 An Application of Data Leakage Prevention System based on Biometrics Signals Recognition Technology Hojae Lee 1, Junkwon Jung 1, Taeyoung
Study on Differential Protection of Transmission Line Using Wireless Communication
Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Setting Up B2B Data Exchange for High Availability in an Active/Active Configuration
Setting Up B2B Data Exchange for High Availability in an Active/Active Configuration 2010 Informatica Abstract This document explains how to install multiple copies of B2B Data Exchange on a single computer.
Effective Use of Android Sensors Based on Visualization of Sensor Information
, pp.299-308 http://dx.doi.org/10.14257/ijmue.2015.10.9.31 Effective Use of Android Sensors Based on Visualization of Sensor Information Young Jae Lee Faculty of Smartmedia, Jeonju University, 303 Cheonjam-ro,
Hallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
Deployment Pattern. Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4
Deployment Pattern Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4 Samsung Electronics 1,2,3, Hanyang University 4 alroad.son 1, jiwon.ss.kim 2, dude.kim 3 @samsung.net, [email protected] 4
