• Title/Summary/Keyword: User Response Time

Search Result 413, Processing Time 0.026 seconds

Efficient Repair Algorithms using Disk Mirroring (디스크 미러링을 이용한 효율적인 복구 알고리즘)

  • Kim, Sung-Soo;Cho, Young-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1615-1624
    • /
    • 1997
  • In this paper, we propose and analyze various repair methods for a disk subsystem using mirroring. We also study the effects of the repair process that is invoked on disk faults on the mean response time of user disk requests. Finally, we analyze the effects of two different access patterns (uniform and non-uniform) on the repair process and performance. According to the results, average response times for non-uniform access pattern compared with uniform access pattern become shorter as the system load increases. Our simulation results show that the proposed repair algorithm with a short delay gives a better performance than the previous algorithms.

  • PDF

Towards a Redundant Response Avoidance for Intelligent Chatbot

  • Gwon, Hyuck-Moo;Seo, Yeong-Seok
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.318-333
    • /
    • 2021
  • Smartphones are one of the most widely used mobile devices allowing users to communicate with each other. With the development of mobile apps, many companies now provide various services for their customers by studying interactive systems in the form of mobile messengers for business marketing and commercial promotion. Such interactive systems are called "chatbots." In this paper, we propose a method of avoiding the redundant responses of chatbots, according to the utterances entered by the user. In addition, the redundant patterns of chatbot responses are classified into three categories for the first time. In order to verify the proposed method, a chatbot is implemented using Telegram, an open source messenger. By comparing the proposed method with an existent method for each pattern, it is confirmed that the proposed method significantly improves the redundancy avoidance rate. Furthermore, response performance and variation analysis of the proposed method are investigated in our experiment.

An Exploratory Study on 3D-based Building Information Management for Multi-User Fire Protection System

  • Kim, Dahee;Cha, Heesung
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1162-1169
    • /
    • 2022
  • As buildings become more and more complicated, the importance of developing and managing facility management information is increasing. In a building fire situation, various information is generated and needed to be quickly shared among participants. However, the current fire response system fails to monitor the relevant information in a real time basis. This study aims to develop a system prototype for fire protection management which can quickly and accurately manage and effectively deliver the pertinent information to the target participants. The research contributes to the efficiency of fire protection endeavors by interpreting both dynamic and static fire information in an appropriate manner.

  • PDF

An efficient user authentication protocol for cloud computing environments (클라우드 컴퓨팅 환경에서 효과적인 사용자 인증 프로토콜)

  • Moon, Jeong-Kyung;Kim, Jin-Mook;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2353-2359
    • /
    • 2011
  • The request of Green-IT technology and recommend of computer hardware resource are increasing explosively. So, necessity of Cloud computing is increasing rapidly. Berkeley Univ. announced teens constituent that threat Cloud computing in 2009 and problem for user authentication should be solved as is urgentest among them. So, We wish to propose effective user authentication protocol in Cloud computing environment. Secure safety for user quotation through Kerberos's ticket issue that is existent representative user authentication techniques, and defined authentication procedure of two steps that flow user authentication and service authentication through PKI's. Is uncomplicated structurally more than efficiency for certification protocol and examination result about safety, existent PKI that propose and simplify achievement procedure and system configuration more than Kerberos and reduced response time.

Integrated Authentication Protocol of Financial Sector that Modified OAuth2.0 (OAuth2.0을 변형한 금융권 통합인증 프로토콜)

  • Jung, Kyu-Won;Shin, Hye-seong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.373-381
    • /
    • 2017
  • Currently, various types of user authentication methods based on public certificates are used in domestic financial transactions. Such an authorized certificate method has a problem that a different security module must be installed every time a user connects an individual financial company to a web server. Also, the financial company relying on this authentication method has a problem that a new security module should be additionally installed for each financial institution whenever a next generation authentication method such as biometric authentication is newly introduced. In order to solve these problems, we propose an integrated authentication system that handles user authentication on behalf of each financial institution in financial transactions, and proposes an integrated authentication protocol that handles secure user authentication between user and financial company web server. The new authentication protocol is a modified version of OAuth2.0 that increases security and efficiency. It is characterized by performing a challenge-response protocol with a pre-shared secret key between the authentication server and the financial company web server. This gives users a convenient and secure Single Sign-On (SSO) effect.

A Micro-Webpage Stored in NFC Tag (NFC태그에 저장 가능한 마이크로 웹페이지)

  • Choi, BokDong;Eun, SeongBae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.1
    • /
    • pp.1-7
    • /
    • 2012
  • A Smartphone has an ability accessing Internet by URL stored in NFC(Near Field Communication) Tag for storing the information of items, blogs and web pages. Because the system works through the Internet with URL, however, it needs to pay some costs like communication fee and time. If we can store the web page on the tags, we can save the communication overhead. But they have too small memory to store it. In this paper, we introduce the Micro-Webpage technology which can be stored in NFC tag or QR(Quick Response) code. To make a Micro-Webpage, we remove control tags from the web page to leave a user original content. The removed control tags are stored in our smartphone application as a template. The user content is also compressed to a smaller one by an lossless compression algorithm. When a tag is read, the stored content is decompressed and, it is combined with the template to make the original web page. We have implemented a prototype of Micro-Webpage system on Android platform and confirmed that the prototype has reasonable performance improvements in saving memory and loading web page time.

Public Transportation Information Profit Model in Using CVM(Focused on BIT) (CVM기법을 이용한 대중교통수익모델 연구(BIT를 중심으로))

  • Park, Bum-Jin;Moon, Byeong-Sup
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.8
    • /
    • pp.459-467
    • /
    • 2011
  • BIS(Bus Information Systems) supplies the bus arrived time information for users in using BIT(Bus Information Terminal) installed on the bus stop. BIT is the device using peoples directly. So, BIT need a quick response when it flew. These are an important factor in the strategy of the BIS maintenance. BIT need a maintenance cost to operate smoothly. So, Suppose that commercial advertisement can be displayed on BIT screen in this study. And we researched an advertisement rates of the optimum level in using Contingent Valuation Method. In addition, we analyzed a characteristic of user's depending on each time using multinomial Logit Modeling method, and studied for BIT operation and ad. displaying strategy considered user's sex, ages and using times.

Speech Interactive Agent on Car Navigation System Using Embedded ASR/DSR/TTS

  • Lee, Heung-Kyu;Kwon, Oh-Il;Ko, Han-Seok
    • Speech Sciences
    • /
    • v.11 no.2
    • /
    • pp.181-192
    • /
    • 2004
  • This paper presents an efficient speech interactive agent rendering smooth car navigation and Telematics services, by employing embedded automatic speech recognition (ASR), distributed speech recognition (DSR) and text-to-speech (ITS) modules, all while enabling safe driving. A speech interactive agent is essentially a conversational tool providing command and control functions to drivers such' as enabling navigation task, audio/video manipulation, and E-commerce services through natural voice/response interactions between user and interface. While the benefits of automatic speech recognition and speech synthesizer have become well known, involved hardware resources are often limited and internal communication protocols are complex to achieve real time responses. As a result, performance degradation always exists in the embedded H/W system. To implement the speech interactive agent to accommodate the demands of user commands in real time, we propose to optimize the hardware dependent architectural codes for speed-up. In particular, we propose to provide a composite solution through memory reconfiguration and efficient arithmetic operation conversion, as well as invoking an effective out-of-vocabulary rejection algorithm, all made suitable for system operation under limited resources.

  • PDF

User Mobility Model Based Computation Offloading Decision for Mobile Cloud

  • Lee, Kilho;Shin, Insik
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.3
    • /
    • pp.155-162
    • /
    • 2015
  • The last decade has seen a rapid growth in the use of mobile devices all over the world. With an increasing use of mobile devices, mobile applications are becoming more diverse and complex, demanding more computational resources. However, mobile devices are typically resource-limited (i.e., a slower-speed CPU, a smaller memory) due to a variety of reasons. Mobile users will be capable of running applications with heavy computation if they can offload some of their computations to other places, such as a desktop or server machines. However, mobile users are typically subject to dynamically changing network environments, particularly, due to user mobility. This makes it hard to choose good offloading decisions in mobile environments. In general, users' mobility can provide some hints for upcoming changes to network environments. Motivated by this, we propose a mobility model of each individual user taking advantage of the regularity of his/her mobility pattern, and develop an offloading decision-making technique based on the mobility model. We evaluate our technique through trace-based simulation with real log data traces from 14 Android users. Our evaluation results show that the proposed technique can help boost the performance of mobile devices in terms of response time and energy consumption, when users are highly mobile.

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.