• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.03 seconds

Implementation and Design of Document Class Editor based on ODA (ODA에 근거한 문서 클래스 에디터 설계 및 구현)

  • 정회경;이수연
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.12
    • /
    • pp.1412-1422
    • /
    • 1992
  • This paper describes an implementation of the document class editor based on ODA(Open Document Architecture). For processing, we divided document structure into generic logical structure and generic layout structure as ODA standard. Also this editor could edit document profile. Using the utility which was implemented to investigate the composed document by object. we confirmed the document. And we could verify the ODIF stream data of the document. We designed this editor based on DAP level 2 of international functional standard. This system was implemented in environment of the X window system and the Motif as graphical user interface. This document class editor will be used to create real document having specific document structure.

  • PDF

Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective

  • Li, Yuheng;Zhao, Qianchuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3635-3654
    • /
    • 2015
  • With the rapid development of smart devices and mobile Internet, the video application plays an increasingly important role on mobile devices. Understanding user behavior patterns is critical for optimized operation of mobile live streaming systems. On the other hand, volume based billing models on cloud services make it easier for video service providers to scale their services as well as to reduce the waste from oversized service capacities. In this paper, the watching behaviors of a commercial mobile live streaming system are studied in a content-centric manner. Our analysis captures the intrinsic correlation existing between popularity and watching intensity of programs due to the synchronized watching behaviors with program schedule. The watching pattern is further used to estimate traffic volume generated by the program, which is useful on data volume capacity reservation and billing strategy selection in cloud services. The traffic range of programs is estimated based on a naive popularity prediction. In cross validation, the traffic ranges of around 94% of programs are successfully estimated. In high popularity programs (>20000 viewers), the overestimated traffic is less than 15% of real happened traffic when using upper bound to estimate program traffic.

Server Side Solutions For Web-Based Video

  • Biernacki, Arkadiusz
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1768-1789
    • /
    • 2016
  • In contemporary video streaming systems based on HTTP protocol, video players at the client side are responsible for adjusting video quality to network conditions and user expectations. However, when multiple video clips are streamed simultaneously, an intricate application logic implemented in the video players overlays the TCP mechanism which is responsible for a balanced access to a shared network link. As a result, some video players may not obtain a fair share of network throughput and may be vulnerable to an unstable video bit-rate. Therefore, we propose to simplify the algorithms implemented in the video players, which are responsible for the adjustment of video quality and constrain their functionality only to sending feedback to a server about a state of the player buffer. The main logic of the system is shifted to the server, which is now responsible for bit-rate selection and prioritisation of the video streams transmitted to multiple clients. To verify our proposition, we performed several experiments in a laboratory environment which show that when the server cooperates with the clients, the video players experience fewer quality switches and the system achieves better fairness when allocating network throughput among the video players. However, this comes at the cost of worse utilisation of network bandwidth.

Scheduling Scheme for Cloud Computing based on Workflow Characteristics (클라우드 컴퓨팅에서 워크플로우의 특성을 고려한 스케줄링 기법)

  • Kim, Jeong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.1-8
    • /
    • 2012
  • Cloud computing has got great popularity in recent times because users can easily access its resources as well as service providers can use efficiently use its resources. By the way, cloud computing are composed of heterogeneous resources and workflows of user application have various characteristics. So, the main goal of this paper is to design new efficient workflow scheduling algorithm, which classifies workflows through their importance degree and allocates resources to each workflow based on QoS metrics such as responsibility, cost and load balancing. Simulation results show that the proposed scheme can improve the responsibility as well as availability of resource.

Flow-based P2P Traffic Identification using SVM (SVM을 이용한 플로우 기반 P2P 트래픽 식별)

  • Um, Nam-Kyoung;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.123-130
    • /
    • 2008
  • To avoid some protection systems such as firewall, P2P applications have recently used to apply dynamic port numbers. Reliable estimates of P2P traffic require examination of packet payload, a methodological land mine from legal, privacy technical, logistic, and fiscal perspectives. Indeed, access to user payload is often rendered impossible by one of these factors, inhibiting trustworthy estimation of P2P growth and dynamics. Despite various methods such as port-based and signature-based techniques, it still dose not satisfy the method which uses both qualitative and quantitative aspects. In this paper, a method using SVM mechanism which discriminate the P2P traffic from non-P2P traffics using differences between P2P and other application traffics is suggested. This is a systematic methodology to identify P2P networks, and without relying on packet payload.

  • PDF

Cooperative Query Answering Based on Abstraction Database (추상화 정보 데이터베이스 기반 협력적 질의 응답)

  • 허순영;이정환
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.24 no.1
    • /
    • pp.99-117
    • /
    • 1999
  • Since query language is used as a handy tool to obtain information from a database, a more intelligent query answering system is needed to provide user-friendly and fault-tolerant human-machine Interface. Frequently, database users prefer less rigid querying structure, one which allows for vagueness in composing queries, and want the system to understand the intent behind a query. When there is no matching data available, users would rather receive approximate answers than a null information response. This paper presents a knowledge abstraction database that facilitates the development of such a fault-tolerant and intelligent database system. The proposed knowledge abstraction database adepts a multilevel knowledge representation scheme called the knowledge abstraction hierarchy(KAH), extracts semantic data relationships from the underlying database, and provides query transformation mechanisms using query generalization and specialization steps. In cooperation with the underlying database, the knowledge abstraction database accepts vague queries and allows users to pose approximate queries as well as conceptually abstract queries. Specifically. four types of vague queries are discussed, including approximate selection, approximate join, conceptual selection, and conceptual Join. A prototype system has been implemented at KAIST and is being tested with a personnel database system to demonstrate the usefulness and practicality of the knowledge abstraction database in ordinary database application systems.

  • PDF

User Customized Travel Course Recommendation Application (사용자 맞춤형 여행코스 추천 애플리케이션)

  • Kang, JuHui;Kim, EunGyeong;Kim, SeokHoon
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.174-176
    • /
    • 2017
  • 매년 여행을 즐기는 여행객들의 수가 꾸준히 증가하고 있으며, 이러한 추세는 해외여행 뿐 아니라 국내 여행에서도 나타나고 있다. 국내 여행을 즐기는 여행객 수의 증가는 매우 다양하고 복합적인 요인들에 의해 이루어지고 있는 것이 사실이나, 국내 여행객들의 절대 다수는 해외여행과는 달리 패키지 형태 보다는 자유여행 형태의 여행을 선호하고 있다. 이는 해외 여행지 대비 국내 여행지가 여행객들이 취득 및 분석할 수 있는 정보의 접근성이 훨씬 높고 정보의 양 역시 풍부하다는 것에서 기인한다고 할 수 있다. 그러나 이러한 정보 접근의 용이성 및 정보량의 풍요성은 오히려 자유여행을 즐기고자 하는 여행객들이 여행코스 및 숙소를 정하는데 많은 시간을 투자하게 되는 요인으로 작용하고 있다. 때문에 이러한 단점을 해결하고자 본 논문에서 제안하는 애플리케이션은 국내 여행객들이 편리하고 손쉽게 국내 여행을 즐길 수 있도록 여행코스 및 숙소를 지정할 수 있는 기능을 제공한다. 이를 위해, 제안하는 애플리케이션에서는 국내 여행과 관련된 다양한 정보들을 각종 포털 사이트와 SNS에서 수집하고, 이를 기반으로 사용자 선호 정보와의 매칭을 통해 맞춤형 여행 코스 제안 및 숙소 예약 기능을 제공한다. 이를 통해, 국내 여행을 즐기는 여행객들에게 편리함을 제공하고, 국내 여행객 수의 증가를 기대할 수 있다.

A Framework for Universal Cross Layer Networks

  • Khalid, Murad;Sankar, Ravi;Joo, Young-Hoon;Ra, In-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.4
    • /
    • pp.239-247
    • /
    • 2008
  • In a resource-limited wireless communication environment, various approaches to meet the ever growing application requirements in an efficient and transparent manner, are being researched and developed. Amongst many approaches, cross layer technique is by far one of the significant contributions that has undoubtedly revolutionized the way conventional layered architecture is perceived. In this paper, we propose a Universal Cross Layer Framework based on vertical layer architecture. The primary contribution of this paper is the functional architecture of the vertical layer which is primarily responsible for cross layer interaction management and optimization. The second contribution is the use of optimization cycle that comprises awareness parameters collection, mapping, classification and the analysis phases. The third contribution of the paper is the decomposition of the parameters into local and global network perspective for opportunistic optimization. Finally, we have shown through simulations how parameters' variations can represent local and global views of the network and how we can set local and global thresholds to perform opportunistic optimization.

An Application Method of Augmented Reality Technology for Layout Planning of Housing Complex (주거단지 배치계획을 위한 증강현실 기술의 활용방안에 관한 기초연구)

  • Ryu, Jung-Rim;Choo, Seung-Yeon;Jo, Jin-Sung
    • Journal of the Korean housing association
    • /
    • v.21 no.4
    • /
    • pp.89-97
    • /
    • 2010
  • Digital convergence era has been already started and is rapidly developed. Recently, convergency technology became an essential issue in all industries, and is expected to accelerate. This means that we can experience growth and change of architecture using new technology and approaching method. The AR (Augmented Reality) technology, among these convergence technology, is a kind of virtual reality technology that user can see a scene of real world which is overlapped by virtual world with additional information. It has been used in manufacturing and management in the whole industry fields including medical, mechanical, military field and so on because it can provide higher sense of reality. Thus, in this paper, we suggest the utilization of AR technology for organically connecting the roads, facilities, green area, landscape and others in the layout planning of housing complex. Users can see real world with virtual object by overlap computer graphic on the real world. This method provides users with various information about territoriality and openness. As the result of this study it is expected that this technology will help the layout planning of housing complex to become more reasonable in the aspect of design, time and cost.

The Development of Personal Computer Control System Using Voice Command (음성 명령을 이용한 개인용 컴퓨터 조작 시스템의 구현)

  • Lee, Tae Jun;Kim, Dong Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.101-102
    • /
    • 2018
  • Users who using computer may experience fatigue or sickness on their wrists if they use the keyboard and mouse for a long time. People with physical disabilities will find it difficult to work with the keyboard and mouse. There is a problem in that the substitute product for solving this is limited in function or expensive. In this paper, we development a system for controlling a personal computer with voice commands using the Amazon Echo and Amazon Web Services lambda functions. The implemented system processes the user's voice commands from the Amazon web server and sends them to the personal computer. The personal computer processes the received command and uses it to operate the application program.

  • PDF