• Title/Summary/Keyword: End-User Response

Search Result 65, Processing Time 0.023 seconds

A Study on the Participation depending on the Rebate changes in the DSM (전력 수요관리 프로그램의 지원금 변화에 따른 참여도 연구)

  • Park, Jong-Jin;Kim, Hyun-Woong;Kim, Jin-O
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.10
    • /
    • pp.18-23
    • /
    • 2008
  • The electricity demand in Korea has rapidly increased along with a steady economic growth since 1970s. Therefore Korea has positively propelled not only SSM(Supply-Side Management) but also DSM(Demand-Side Management) activities to reduce investment cost of generating units and to save supply costs of electricity through the enhancement of whole national energy utilization efficiency. However study for rebate, which have influence on success or failure on DSM program, is not sufficient. This paper executed to modeling mathematically an amount of potential participants considering rebates, which have influence on penetration amounts for DSM program using by 'A Survey of End-User for Energy Efficiency Demand Side Management Programs'.

Analytical model for mean web object transfer latency estimation in the narrowband IoT environment (협대역 사물 인터넷 환경에서 웹 객체의 평균 전송시간을 추정하기 위한 해석적 모델)

  • Lee, Yong-Jin
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.1-4
    • /
    • 2015
  • This paper aims to present the mathematical model to find the mean web object transfer latency in the slow-start phase of TCP congestion control mechanism, which is one of the main control techniques of Internet. Mean latency is an important service quality measure of end-user in the network. The application area of the proposed latency model is the narrowband environment including multi-hop wireless network and Internet of Things(IoT), where packet loss occurs in the slow-start phase only due to small window. The model finds the latency considering initial window size and the packet loss rate. Our model shows that for a given packet loss rate, round trip time and initial window size mainly affect the mean web object transfer latency. The proposed model can be applied to estimate the mean response time that end user requires in the IoT service applications.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

Analysis and Response of SSH Brute Force Attacks in Multi-User Computing Environment (다중 사용자 컴퓨팅 환경에서 SSH 무작위 공격 분석 및 대응)

  • Lee, Jae-Kook;Kim, Sung-Jun;Woo, Joon;Park, Chan Yeol
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.6
    • /
    • pp.205-212
    • /
    • 2015
  • SSH provides a secure, encrypted communication channel between two end point systems using public key encryption. But SSH brute force attack is one of the most significant attacks. This kind of attack aims to login to the SSH server by continually guessing a large number of user account and password combinations. In this paper, we analyze logs of SSH brute force attacks in 2014 and propose a failed-log based detection mechanism in high performance computing service environment.

DIGITAL PROCESSING SYSTEM FOR KVN DATA AQUISITION (KVN 자료획득을 위한 디지털 처리 시스템)

  • OH SE-JIN;ROH DUK-GYOO;CHUNG HYUN-SOO;HAN SEOG-TAE;Wajima Kiyoaki;Saso Tetsuo;Kawaguchi Noriyuki;Ozeki Kensuke;CHOI HAN-GYU
    • Publications of The Korean Astronomical Society
    • /
    • v.19 no.1
    • /
    • pp.101-107
    • /
    • 2004
  • This paper describes the digital back-end system for getting the data to analyze the user observation mode by digitalize the analog data after receiving the space radio using the radio telescope, The received analog data will be digitalized by high-speed sampler with 1 Gsps for 4 channel frequency band of millimeter wave, and the digital data will be transported through the fiber-optic digital transmission system and WDM(wavelength division multiplex) to observation building, The wideband digital FIR(Finite Impulse Response) filters analyze the data for user observation mode to record the data in high-speed recorder with 1 Gbps. In this paper, we introduce the overall system configuration and features combined by various information and communication technology in radio astronomy briefly, which will be adopted by KVN(Korean VLBI Network).

A Design and Implementation of The Deep Learning-Based Senior Care Service Application Using AI Speaker

  • Mun Seop Yun;Sang Hyuk Yoon;Ki Won Lee;Se Hoon Kim;Min Woo Lee;Ho-Young Kwak;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.23-30
    • /
    • 2024
  • In this paper, we propose a deep learning-based personalized senior care service application. The proposed application uses Speech to Text technology to convert the user's speech into text and uses it as input to Autogen, an interactive multi-agent large-scale language model developed by Microsoft, for user convenience. Autogen uses data from previous conversations between the senior and ChatBot to understand the other user's intent and respond to the response, and then uses a back-end agent to create a wish list, a shared calendar, and a greeting message with the other user's voice through a deep learning model for voice cloning. Additionally, the application can perform home IoT services with SKT's AI speaker (NUGU). The proposed application is expected to contribute to future AI-based senior care technology.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

WWW Cache Replacement Algorithm Based on the Network-distance

  • Kamizato, Masaru;Nagata, Tomokazu;Taniguchi, Yuji;Tamaki, Shiro
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.238-241
    • /
    • 2002
  • With the popularity of utilization of the Internet among people, the amount of data in the network rapidly increased. So that, the fall of response time from WWW server, which is caused by the network traffic and the burden on m server, has become more of an issue. This problem is encouraged the rearch by redundancy of requesting the same pages by many people, even though they browse the same the ones. To reduce these redundancy, WWW cache server is used commonly in order to store m page data and reuse them. However, the technical uses of WWW cache that different from CPU and Disk cache, is known for its difficulty of improving the cache hit rate. Consecuently, it is difficult to choose effective WWW data to be stored from all data flowing through the WWW cache server. On the other hand, there are room for improvement in commonly used cache replacement algorithms by WWW cache server. In our study, we try to realize a WWW cache server that stresses on the improvement of the stresses of response time. To this end, we propose the new cache replacement algorithm by focusing on the utilizable information of network distance from the WWW cache server to WWW server that possessing the page data of the user requesting.

  • PDF

Visual User Defined Schema Integration at Multimedia Database Environment (멀티미디어 데이터베이스 환경에서 시각화된 사용자 정의 스키마 통합)

  • 이현창
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.57-62
    • /
    • 2004
  • In these days, application systems for processing information using database is increasing. Enterprises holding a lot of data do not possess needed data but instead include unrelated, independent and individual data. As a result, it only contains disparate data. Disparate data is ambiguous and it does not support current integrated information. In response to the above problems, data warehouse may provide a solution. Building a data warehouse needs a systematic design because of its complexity. This paper describes an efficient design methodology using visual environment for data warehouse to cope with the requirements of end users. Also, the system is able to process existential SQL query.

  • PDF

A Study on End-User's Response depending on Rebate Change for High Efficiency Program (고효율기기 프로그램의 지원금 변화에 따른 수용가 반응도 연구)

  • Kim, Hyun-Woong;Kim, Jin-O;Kim, Jin-O
    • Proceedings of the KIEE Conference
    • /
    • 2008.07a
    • /
    • pp.566-567
    • /
    • 2008
  • 한국의 전력 산업은 현재 개발도상국들의 급속한 경제성장에 의해 연료가격이 상승하고 NIMBY현상으로 인해 발전설비의 확장에 필요한 입지선정에 어려움을 겪고 있다. 이러한 현상은 설비의 확장을 통한 공급측 수요관리(Supply-Side Management)에서 벗어나 전력사용의 효율성을 향상시킴으로써 안정적인 전력을 공급하는 수요측 관리(Demand-Side Management)의 중요성을 점차 크게 하고 있다. 수요측관리는 지원금을 이용하여 전력수요를 조절하고 있으며, 수요관리의 중요성이 커짐에 따라 지원금 규모는 점점 커지고 있다. 하지만 현재 지원금 산정에 대한 구체적인 연구가 진행되고 있지 않은 실정이므로 이에 대한 연구를 통해 더욱 효율적인 지원금 산정을 통한 수요관리 효과를 극대화 할 필요가 있다. 본 논문에서는 07년도에 지원금변화에 대한 잠재참여자의 선호도를 조사한 "지원금에 대한 수용가 반응도 조사"를 이용하여, 지원금 변화에 따른 수요관리 프로그램의 잠재참여자의 참여도를 수식화 함으로써 지원금 변화에 대한 수요관리 프로그램의 영향도를 분석할 수 있게 하는데 목적을 두고 있다.

  • PDF