• Title/Summary/Keyword: Software service

Search Result 2,465, Processing Time 0.026 seconds

Incremental Face Annotation for Open Web Service (개방형 웹 서버스를 위한 증가적 얼굴 어노테이션)

  • Chai, Kwon-Taeg;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.8
    • /
    • pp.673-682
    • /
    • 2009
  • Recently, photo sharing and publishing based Social Network Sites(SNSs) are increasingly attracting the attention of academic and industry researches. Unlike the face recognition environment addressed by existing works, face annotation problem under SNSs is differentiated in terms of daily updated images database, a limited number of training set and millions of users. Thus, conventional approach may not deal with these problems. In this paper, we proposed a face annotation method for sharing and publishing photographs that contain faces under a social network service using random projection, non-linear regression and representational state transfer. Our experiments on several databases show that the proposed method records an almost constant execution time with comparable accuracy of the PCA-SVM classifier.

Web Services System Supporting Fault-Tolerance based on the Quality (품질 기반 장애 극복을 지원하는 웹 서비스 시스템)

  • Lee, Yong-Pyo;Shin, Jae-Dong;Han, Sang-Yong
    • The KIPS Transactions:PartD
    • /
    • v.12D no.6 s.102
    • /
    • pp.875-880
    • /
    • 2005
  • Recently web services ale being used to provide environments of distributed computing. Web services provide reusable software component. So, one web service can be used by many users, and one user can use different web services. For reliable use of web services, in these cases, it is important to be fault-tolerance. Existing fault-tolerant methods in web services need a kind of client modification and cannot consider extensible factors like quality. This study suggests the system architecture and description language for the system which can improve some of these problems.

A Fault-Recovery Agent for Distance Education on Home Network Environment (홈 네트워크 환경에서 원격 교육을 위한 결함 복구 에이전트)

  • Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.479-484
    • /
    • 2007
  • This paper explains the design and implementation of the FRA(Fault Recovery Agent). FRA is a system that is suitable for recovering software error for multimedia distance education based on home network environment. In terms of distributed multimedia systems, the most important catagories for quality of service are a timeless, volume, and reliability. In this paper, we discuss a method for increasing reliability through fault tolerance. This paper explains a performance analysis of an error recovery system running on distributed multimedia environment using rule-based DEVS modeling and simulation techniques. In DEVS, a system has a time base, inputs, states, outputs, and functions. The proposed method is more efficient than the other method in comparison with error ration and processing time.

  • PDF

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

A Scalable Management Method for Asterisk-based Internet Telephony System (확장성을 고려한 Asterisk 기반 인터넷 전화 관리 방법)

  • Ha, Eun-Yong
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.235-242
    • /
    • 2014
  • Internet telephony is an Internet service which supports voice telephone using VoIP technology on the IP-based Internet. It has some advantages in that voice telephone services can be accompanied with multimedia services such as video communication and messaging services. In this paper we suggested an Asterisk-based Internet telephony system which can be easily scalable. Most current systems use text files to manage their configuration: SIP users, dialplans, IVR service and etc. But we designed the management system which introduces database tables for efficiency and scalability. It also supports web-based functions developed by using Asterisk, Apache, MySQL, jQuery, PHP and open source softwares.

SOCKET-based mobile SNS interlocking System Design and Implementation (SOCKET기반 모바일SNS 연동시스템 설계 및 구현)

  • Koh, Wan-Ki;Koh, Seok-Yong;Kim, Je-Seok
    • Journal of Digital Convergence
    • /
    • v.11 no.8
    • /
    • pp.367-373
    • /
    • 2013
  • Mobile SNS is a new paradigm of the communication. These days, mobile services communicate with server by client applications. TALK or PUSH provide services using TCP/IP software in operation system through massage or data by socket. Thus, SNS and mobile convergence are necessary and new service is constructed using platform of SNS. In this paper, we design and implement TALK and PUSH services between clients by location based SNS using the socket type.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

Comparison of Oral Health Behavior and Oral Health Indexes between Patients Undergoing Scaling Regularly and Those Undergoing Scaling Irregularly (스케일링 환자들의 정기적인 스케일링과 비정기적인 스케일링의 구강건강행동지수와 구강건강지수 비교)

  • Kim, Yu-Rin
    • The Korean Journal of Health Service Management
    • /
    • v.11 no.1
    • /
    • pp.171-180
    • /
    • 2017
  • Objectives : The objective of this study was to compare oral health behaviors and oral health indices between regular scaling group and irregular scaling group. Methods : This study was performed at M Dental Clinic in Busan on 352 dental patients treated between January 2014 and June 2015 using V6.0 software and medical interviews. The 352 patients were divided into 3 groups and oral health behavior (OHB) and oral health indices were compared. Results : The OHB scores significantly differed among Groups C and A. Group C had the lowest number of "Bad" scores for the Simplified Debris Index (S-DI), Simplified Calculus Index (S-CI), and Simplified Oral Hygiene Index (S-OHI). Groups B and A had the lowest number of "Excellent" scores. Group C had the lowest bleeding on probing (BOP), calculus rate (CR) and decayed teeth (DT). Furthermore, Group C had the highest number of missing teeth (MT) and filled teeth (FT). Conclusions : Patients who underwent regular scaling had the highest OHB and oral health index scores. This emphasizes the importance of regular scaling for prevention and early detection of oral disease.

Priority-Based Resource Allocation Algorithm for Virtual Network (가상 네트워크를 위한 우선순위 기반 자원 할당 알고리즘)

  • Kim, Hak-Suh;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.303-310
    • /
    • 2016
  • Due to the ossification of the Internet, it is difficult to accommodate variety services. One of the efficient solution to this problem is network virtualization. It allows multiple parallel virtual networks to run on the shared physical infrastructure. It needs new resource allocation mechanism to share efficient physical resources. In this paper, we present efficient bandwidth allocation algorithm for virtual network request with high service priority. Our proposed algorithm can withdraw allocated bandwidth from low-level priority virtual network and maintain low-level virtual network service. We evaluated the performance of our proposed algorithm using simulation and found the improvement of approximately 8% acceptance rate.

Perception of Transfer Job and Liaison Nursing among Nurses in Neurological Intensive Care Units (전실업무와 연계간호에 대한 신경계 중환자실 간호사의 인식)

  • Yun, Sun Hee;Cho, Ok Hee;Yoo, Yang Sook
    • Journal of Korean Clinical Nursing Research
    • /
    • v.19 no.1
    • /
    • pp.115-127
    • /
    • 2013
  • Purpose: This study aimed to describe how nurses in neurological intensive care units (ICU) perceive their roles about patient transfer and liaison. Methods: A cross-sectional survey was conducted using a questionnaire developed for the study. Data were collected from a convenience sample of 115 nurses working in the neurological intensive care units ofsix university hospitals. Data were analyzed using SPSS software (version 15.0). Results: Staff nurses were mainly in charge of patient transfer, and the awareness about its importance was significantly related with the burden about the practice of patient transfer (p<.001). Patient liaison was mainly conducted by staff nurses as well. Liaison practice wassuggested to be started from the ICU at the time of transfer; the suggested time for completion of liaison service and evaluation was when patients were adjusted to the transferred ward. Preparing job descriptions and increasing nursing staffing for patient liasion service were strongly recommended. Conclusion: The results suggest that the ICU nurses' burden in relation to patient transfer is commensurate with their awareness about itsimportance. To improve the continuity of care from ICU to transferred ward, it isrequired to reduce the burden about patient transfer and improve perceptions about patient liaison.