• Title/Summary/Keyword: Call

Search Result 3,578, Processing Time 0.034 seconds

A Design of Call Routing Agent for Multi-Channel (멀티채널 환경에서의 콜 에이전트 설계 및 구현)

  • Jun, Byung-Uk
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.139-145
    • /
    • 2008
  • CRM(Customer Relationship Management) improves the competitiveness of small companies to large enterprises. E-mail, SMS (Short Message Service), telephony service, DM (Direct Mail) are used for customer response in many companies. In order to improve company's profit, business diversification is in progress with protecting the succession of existing customers, and the only of new customers. Futhermore, BPR (Business Process Re-engineering) and BPM (Business Process Management) of the CRM can be easily found in many companies, because it is the first contact point to the company at the customer's view. This paper discusses the development of CRM, and proposes a call object routing agent that is the main engine of the CRM. Result of performance evaluation of proposed method show that the system is effective and powerful enough to use at the multi-channel environment.

  • PDF

A Multimedia Call Admission Control Algorithm with the Bandwidth Reservation based on the Prediction of Wireless Terminal's Location (무선 단말기 위치 예측 기반의 대역폭 예약을 이용한 멀티미디어 호 수락 알고리즘)

  • Jung Young-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.1
    • /
    • pp.24-32
    • /
    • 2006
  • In this paper, we proposed the multimedia call admission control algorithm with the bandwidth reservation based on the prediction of wireless terminal's location to guarantee quality of service for multimedia applications in cellular networks. This algorithm aims at minimizing possible errors In predicting the moving direction of terminals using a mobility prediction scheme. This prediction reduces the size of bandwidth reserved redundantly. In order to evaluate the performance of the algorithm, the blocking rate of new calls and the forced termination rate of hand-off calls are measured and compared the results with those of existing schemes. The results of the experiment revealed that the algorithm presented in this paper achieved better performance with lower call blocking rates and forced-termination rates than those of other methods.

  • PDF

Performance analysis of PC communication networks with two-phase service connection (이단 서비스 접속의 PC 통신망의 성능분석)

  • 홍용표;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.652-663
    • /
    • 1996
  • In this paper, we analyze the blocking probability of a call in a PC communication network. In a PC communication network, a call generated from the PSTN (public switched telephone network) requests the connection to the ICPS(information communication processing system) which interconnects the the PSTN and the PSDN(packet switched data network). Then, as a second step, a packet call is requested to the specific service database attached in the PSDN. The call blocking probabilies are analyzed for these two interface points, the PSTN interface ports of the ICPS and the PSDN interface link of the database. We also present some numerical results to show the effects of the system parameters on the performance of the network. The results show the effects of the capacity of each interface point on the performance point.

  • PDF

Performance Analysis of Coordinated Cognitive Radio Networks under Fixed-Rate Traffic with Hard Delay Constraints

  • Castellanos-Lopez, S. Lirio;Cruz-Perez, Felipe A.;Rivero-Angeles, Mario E.;Hernandez-Valdez, Genaro
    • Journal of Communications and Networks
    • /
    • v.16 no.2
    • /
    • pp.130-139
    • /
    • 2014
  • Due to the unpredictable nature of channel availability, carrying delay-sensitive traffic in cognitive radio networks (CRNs) is very challenging. Spectrum leasing of radio resources has been proposed in the so called coordinated CRNs to improve the quality of service (QoS) experienced by secondary users (SUs). In this paper, the performance of coordinated CRNs under fixed-rate with hard-delay-constraints traffic is analyzed. For the adequate and fair performance comparison, call admission control strategies with fractional channel reservation to prioritize ongoing secondary calls over new ones are considered. Maximum Erlang capacity is obtained by optimizing the number of reserved channels. Numerical results reveal that system performance strongly depends on the value of the mean secondary service time relative to the mean primary service time. Additionally, numerical results show that, in CRNs without spectrum leasing, there exists a critical utilization factor of the primary resources from which it is not longer possible to guarantee the required QoS of SUs and, therefore, services with hard delay constraints cannot be even supported in CRNs. Thus, spectrum leasing can be essential for CRN operators to provide the QoS demanded by fixed-rate applications with hard delay constraints. Finally, the cost per capacity Erlang as function of both the utilization factor of the primary resources and the maximum allowed number of simultaneously rented channels is evaluated.

Comparing the application of social network service with existing method on the efficiency and velocity of spreading mobilization order -Based on the circumstance of Ulchi focus lens training of South Korean military- (기존의 예비군 동원 방식과 소셜네트워크를 응용한 새로운 동원 체계의 효율 및 확산 속도 비교연구 -을지 포커스 렌즈 훈련 상황 전제-)

  • Sung, Ki-Seok;Kang, Sung-Woo
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.183-191
    • /
    • 2012
  • Since June 25th 1950, the beginning of the cold war (Korean war), Korean peninsula is still in a state of war. Officially South and North Korean government call a truceafter three years from the beginning day, however both countries are still having several combats in these days. So every Korean citizen male has duty for serving military duty and this lasts even after the serving regular military force, as reserved military. Although South Korea is very small country, the size of military is very large so informing all reserved military takes some time. Since this nation is confronting the enemy and considering the global potential threat, South Korean military needs expedite informing system to call up the reserved military to active duty. In this project, the current informing system has been analyzed and compared with the new method which is using social network service such as Twitter. However mobilization order is very critical. So in our new model there are two ways combined. Using twitter to inform and then use traditional ways to finish the order. This method will provide more efficient and accurate way to cover the call ups.

A VoIP Transcript System for Call Recording in IP Contact Center (IP 컨택센터에서 통화 녹음을 위한 VoIP 녹취 시스템)

  • Jung, In-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.7-16
    • /
    • 2012
  • In this paper we describe a VoIP transcript system which is able to record call conversation between counselor and customer in an IP contact center based on IP telephony environment. The transcript system, designed and implemented in this paper, uses packet sniffering to capture packets without imposing network overhead on overall system. It can decode H.323 and SIP which are used to setup call sessions in VoIP environment and captures voice data and record without any loss of contents. Implemented transcript system can be integrated with CTI system in that it can manage and record call more effectively. It is designed generically so that it is implemented both on Windows and Linux environment.

Smart Mobile Blackbox DVR in Car Environment (자동차 환경에서 스마트 모바일 블랙박스 DVR)

  • Choi, Sun-O;Kim, Young-Po;Im, Yong-Soon;Kim, Young-Ja;Kang, Eun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.9-15
    • /
    • 2013
  • In this paper, automatic recognition of an accident and whether service delivery and risk driving through the giving of the driver to correct driving habits before and after the accident to reproduce highly scalable video Smart Mobile Blackbox DVR (SMBD, Smart Mobile Blackbox DVR) Computer of the model was designed. SMBD on embedded systems equipped with wireless capabilities to sleep in the car accident point and the image information by wireless communications, by notification in the control center, 24-hour emergency rescue service and traffic information can be provided. The vehicle ECU (Electronic Control Unit) of the vehicle information and sensor data in conjunction with wireless eCall (Emergency Call) services can be realized.

A Study on Phon Call Big Data Analytics (전화통화 빅데이터 분석에 관한 연구)

  • Kim, Jeongrae;Jeong, Chanki
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.387-397
    • /
    • 2013
  • This paper proposes an approach to big data analytics for phon call data. The analytical models for phon call data is composed of the PVPF (Parallel Variable-length Phrase Finding) algorithm for identifying verbal phrases of natural language and the word count algorithm for measuring the usage frequency of keywords. In the proposed model, we identify words using the PVPF algorithm, and measure the usage frequency of the identified words using word count algorithm in MapReduce. The results can be interpreted from various viewpoints. We design and implement the model based HDFS (Hadoop Distributed File System), verify the proposed approach through a case study of phon call data. So we extract useful results through analysis of keyword correlation and usage frequency.

Machine Learning Based Malware Detection Using API Call Time Interval (API Call Time Interval을 활용한 머신러닝 기반의 악성코드 탐지)

  • Cho, Young Min;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.51-58
    • /
    • 2020
  • The use of malware in cyber threats continues to be used in all ages, and will continue to be a major attack method even if IT technology advances. Therefore, researches for detecting such malicious codes are constantly tried in various ways. Recently, with the development of AI-related technology, many researches related to machine learning have been conducted to detect malware. In this paper, we propose a method to detect malware using machine learning. For machine learning detection, we create a feature around each call interval, ie Time Interval, in which API calls occur among dynamic analysis data, and then apply the result to machine learning techniques.

Implementation of Morning-Call System based on the Multi-point Group Communication (다자간 그룹 통신 기반의 모닝콜 시스템 구현)

  • Ryu, Ho-Dong;Kim, Woo-In;Kim, Hee-Yong;Park, Ki-Hong;Lee, Yang Sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.954-957
    • /
    • 2015
  • In this paper, the android platform based on the morning call system using multi-point group communication is proposed. Implemented multi-point group communication was applied by fusing a variety of techniques such as JAVA NIO, JSP, MySQL, DBMS Pool, GCM and JSON. Some experiments are conducted so as to verify the proposed method, and as a result, morning-call application based multi-point group communication is well performed.

  • PDF