• Title/Summary/Keyword: User Response

Search Result 983, Processing Time 0.027 seconds

Scheduling Algorithms and Queueing Response Time Analysis of the UNIX Operating System (UNIX 운영체제에서의 스케줄링 법칙과 큐잉응답 시간 분석)

  • Im, Jong-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.3
    • /
    • pp.367-379
    • /
    • 1994
  • This paper describes scheduling algorithms of the UNIX operating system and shows an analytical approach to approximate the average conditional response time for a process in the UNIX operating system. The average conditional response time is the average time between the submittal of a process requiring a certain amount of the CPU time and the completion of the process. The process scheduling algorithms in thr UNIX system are based on the priority service disciplines. That is, the behavior of a process is governed by the UNIX process schuduling algorithms that (ⅰ) the time-shared computer usage is obtained by allotting each request a quantum until it completes its required CPU time, (ⅱ) the nonpreemptive switching in system mode and the preemptive switching in user mode are applied to determine the quantum, (ⅲ) the first-come-first-serve discipline is applied within the same priority level, and (ⅳ) after completing an allotted quantum the process is placed at the end of either the runnable queue corresponding to its priority or the disk queue where it sleeps. These process scheduling algorithms create the round-robin effect in user mode. Using the round-robin effect and the preemptive switching, we approximate a process delay in user mode. Using the nonpreemptive switching, we approximate a process delay in system mode. We also consider a process delay due to the disk input and output operations. The average conditional response time is then obtained by approximating the total process delay. The results show an excellent response time for the processes requiring system time at the expense of the processes requiring user time.

  • PDF

Mean Response Delay Estimation for HTTP over SCTP in Wireless Internet (무선 인터넷 환경에서 HTTP over SCTP의 평군 응답 시간 추정)

  • Lee, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.43-53
    • /
    • 2008
  • Hyper text transfer protocol (HTTP) over transmission control protocol (TCP) is currently used to transfer objects in the Internet. Stream control transmission protocol (SCTP), an alternative to TCP, which allows for independent delivery among streams, and can thus reduce the mean response delay of web object. We present an analytical model to find the mean response delay for HTTP over SCTP, therefore, estimate the effectiveness of SCTP over TCP. Typical TCP delay models assume the wired environment. On the contrary, the proposed model in this paper assumes the multiple packet losses and wireless environment where fast retransmission is not possible due to small window. The estimated mean response time can be used the benchmark to meet quality of service (QoS) at end-user. We validate the accuracy of our model using experiments. It is shown that the differences between the results from model and those from experimental are very small below 6 % on average. We also find that the mean response delay for HTTP over SCTP is less than that for HTTP over TCP.

Challenge-Response Based Secure RFID Authentication Protocol for Distributed Database Environment (분산 데이터베이스 환경에 적합한 Challenge-Response 기반의 안전한 RFID 인증 프로토콜)

  • Rhee Keun-Woo;Oh Dong-Kyu;Kwak Jin;Oh Soo-Hyun;Kim Seung-Joo;Won Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.309-316
    • /
    • 2005
  • Recently, RFID system is a main technology to realize ubiquitous computing environments, but the feature of the RFID system may bring about various privacy problem. So, many kinds of protocols To resolve this problem are researched. In this paper, we analyse the privacy problem of the previous methods and propose more secure and effective authentication protocol to protect user's privacy. Then we prove that the proposed protocol is secure and effective as we compare the proposed protocol with previous methods. The proposed protocol is based on Challenge-Response using one-way hash function and random number. The proposed protocol is secure against replay attack, spoofing attack and so on. In addition, the proposed protocol is proper for distributed database environment.

User Response to Mobile Payment System: Emotional, Cognitive, and Behavioral Approaches (모바일 간편결제시스템 사용의 감성적, 인지적, 행동적 반응 과정 연구)

  • Choi, Yoo-Jung;Hwangbo, Hyunwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1158-1164
    • /
    • 2022
  • In this study, the emotional reaction process and the cognitive reaction process were divided into the process of building trust in order to form a continuous use intention in the process of using the mobile simple payment system. We examined the process by which various external factors generate continuous use intentions, that is, behavioral responses through the process of each reaction. External factors were divided into social factors, systemic factors, and social factors. Among them, system factors were social norms and images, and systemic factors were simplicity and accessibility. And the social factors consisted of security and compatibility. And the emotional response was set as pleasure and emotional trust, the cognitive response was cognitive trust, and the final dependent variable was set as continuous use intention. A survey was conducted for model analysis, and the analysis results were derived using PLS.

Evaluating Impressions of Robots According to the Robot's Embodiment Level and Response Speed (로봇의 외형 구체화 정도 및 반응속도에 따른 로봇 인상 평가)

  • Kang, Dahyun;Kwak, Sonya S.
    • Design Convergence Study
    • /
    • v.16 no.6
    • /
    • pp.153-167
    • /
    • 2017
  • Nowadays, as many robots are developed for desktop, users interact with the robots based on speech. However, due to technical limitations related to speech-based interaction, an alternative is needed. We designed this research to design a robot that interacts with the user by using unconditional reflection of biological signals. In order to apply bio-signals to robots more effectively, we evaluated the robots' overall service evaluation, perceived intelligence, appropriateness, trustworthy, and sociability according to the degree of the robot's embodiment level and the response speed of the robot. The result showed that in terms of intelligence and appropriateness, 3D robot with higher embodiment level was more positively evaluated than 2D robot with lower embodiment level. Also, the robot with faster response rate was evaluated more favorably in overall service evaluation, intelligence, appropriateness, trustworthy, and sociability than the robot with slower response rate. In addition, in service evaluation, trustworthy, and sociability, there were interaction effects according to the robot's embodiment level and the response speed.

Array Calibration for CDMA Smart Antenna Systems

  • Kyeong, Mun-Geon;Park, Hyung-Geun;Oh, Hyun-Seo;Jung, Jae-Ho
    • ETRI Journal
    • /
    • v.26 no.6
    • /
    • pp.605-614
    • /
    • 2004
  • In this paper, we investigate array calibration algorithms to derive a further improved version for correcting antenna array errors and RF transceiver errors in CDMA smart antenna systems. The structure of a multi-channel RF transceiver with a digital calibration apparatus and its calibration techniques are presented, where we propose a new RF receiver calibration scheme to minimize interference of the calibration signal on the user signals. The calibration signal is injected into a multi-channel receiver through a calibration signal injector whose array response vector is controlled in order to have a low correlation with the antenna response vector of the receive signals. We suggest a model-based antenna array calibration to remove the antenna array errors including mutual coupling errors or to predict the element patterns from the array manifold measured at a small number of angles. Computer simulations and experiment results are shown to verify the calibration algorithms.

  • PDF

A Train Ticket Reservation Aid System Using Automated Call Routing Technology Based on Speech Recognition (음성인식을 이용한 자동 호 분류 철도 예약 시스템)

  • Shim Yu-Jin;Kim Jae-In;Koo Myung-Wan
    • MALSORI
    • /
    • no.52
    • /
    • pp.161-169
    • /
    • 2004
  • This paper describes the automated call routing for train ticket reservation aid system based on speech recognition. We focus on the task of automatically routing telephone calls based on user's fluently spoken response instead of touch tone menus in an interactive voice response system. Vector-based call routing algorithm is investigated and mapping table for key term is suggested. Korail database collected by KT is used for call routing experiment. We evaluate call-classification experiments for transcribed text from Korail database. In case of small training data, an average call routing error reduction rate of 14% is observed when mapping table is used.

  • PDF

Suppression of Noisy Characteristics of Biosignals by Implementing Digital Filters with an Android Smartphone Platform (스마트폰 연동 생체신호 왜곡보정을 위한 디지털 필터 설계 및 구현)

  • Kim, Jeong-Hwan;Kim, Kyeong-Seop;Shin, Seung-Won;Kim, Hyun-Tae;Lee, Jeong-Whan;Kim, Dong-Jun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.10
    • /
    • pp.1518-1523
    • /
    • 2012
  • In this study, the novel digital filtering algorithms are implemented to suppress the noisy characteristics embedded in ambulatory electrocardiogram signals by an android smartphone platform. With this aim, Graphical User Interface (GUI) is designed and implemented by utilizing multithread-Java programming to realize Finite Impulse Response and Infinite Impulse Response filter. With simulating our implemented digital filters built in an android smartphone, we can find the fact that we can efficiently suppresses the noisy characteristics due to baseline wandering and 60 Hz powerline source fluctuations especially in electrocardiograms.

A Situation-Based Dialogue Management with Dialogue Examples (대화 예제를 이용한 상황 기반 대화 관리 시스템)

  • Lee, Cheong-Jae;Jung, Sang-Keun;Lee, Geun-Bae
    • MALSORI
    • /
    • no.56
    • /
    • pp.185-194
    • /
    • 2005
  • In this paper, we present POSSDM (POSTECH Situation-Based Dialogue Manager) for a spoken dialogue system using a new example and situation-based dialogue management technique for effective generation of appropriate system responses. Spoken dialogue system should generate cooperative responses to smoothly control dialogue flow with the users. We introduce a new dialogue management technique incorporating dialogue examples and situation-based rules for EPG (Electronic Program Guide) domain. For the system response inference, we automatically construct and index a dialogue example database from dialogue corpus, and the best dialogue example is retrieved for a proper system response with the query from a dialogue situation including a current user utterance, dialogue act, and discourse history. When dialogue corpus is not enough to cover the domain, we also apply manually constructed situation-based rules mainly for meta-level dialogue management.

  • PDF

Efficient Repair Algorithms using Disk Mirroring (디스크 미러링을 이용한 효율적인 복구 알고리즘)

  • Kim, Sung-Soo;Cho, Young-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1615-1624
    • /
    • 1997
  • In this paper, we propose and analyze various repair methods for a disk subsystem using mirroring. We also study the effects of the repair process that is invoked on disk faults on the mean response time of user disk requests. Finally, we analyze the effects of two different access patterns (uniform and non-uniform) on the repair process and performance. According to the results, average response times for non-uniform access pattern compared with uniform access pattern become shorter as the system load increases. Our simulation results show that the proposed repair algorithm with a short delay gives a better performance than the previous algorithms.

  • PDF