• Title/Summary/Keyword: User Response Time

Search Result 413, Processing Time 0.02 seconds

Response Time Simulation for 2-tier and 3-tier C/S System (2-계층과 3-계층 C/S 시스템의 응답시간 시뮬레이션)

  • Kim Yong-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.45-53
    • /
    • 2004
  • The fact that the end-user response time could become unacceptable in the 2-tier C/S system has been well known to C/S system developers. But inexperienced new developers who want to provide mobile solutions using PDA sometimes do not realize the ominous consequences of the 2-tier C/S systems. Except for the easy of development. the 2-tier C/S system has many weak points like in application deployment, security, scalability, application reuse, heterogeneous DBMS support, availability. and response time. This paper analyzes the response time in the 2-tier and 3-tier C/S systems through simulation. Although the problem space is confined to the 2 and 3 tiers, the result could be equally applied to any multi-tier systems.

  • PDF

Interactive Typography System using Combined Corner and Contour Detection

  • Lim, Sooyeon;Kim, Sangwook
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.68-75
    • /
    • 2017
  • Interactive Typography is a process where a user communicates by interacting with text and a moving factor. This research covers interactive typography using real-time response to a user's gesture. In order to form a language-independent system, preprocessing of entered text data presents image data. This preprocessing is followed by recognizing the image data and the setting interaction points. This is done using computer vision technology such as the Harris corner detector and contour detection. User interaction is achieved using skeleton information tracked by a depth camera. By synchronizing the user's skeleton information acquired by Kinect (a depth camera,) and the typography components (interaction points), all user gestures are linked with the typography in real time. An experiment was conducted, in both English and Korean, where users showed an 81% satisfaction level using an interactive typography system where text components showed discrete movements in accordance with the users' gestures. Through this experiment, it was possible to ascertain that sensibility varied depending on the size and the speed of the text and interactive alteration. The results show that interactive typography can potentially be an accurate communication tool, and not merely a uniform text transmission system.

Design and Implementation of Realtime Things Control System Using MQTT and WebSocket in IoT Environment (IoT환경에서 MQTT와 WebSocket을 활용한 실시간 사물제어 시스템 설계 및 구현)

  • Seo, Jun-Oh;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.517-524
    • /
    • 2018
  • This Paper presents the real time things control method through Web browser that has no limited by time and place. To design and realize the system that not only makes it possible to communicate with other protocols but also reinforces the advantages of each protocol, the real time communication environment, based on the WebSocket technology of HTML5 whose international standardization has recently been completed, is realized. Also, the message communication environment in the low electricity and limited communication environment is realized using MQTT(Message Queue Telemetry Transport) protocol which is in the spotlight as the optimum protocol in the IoT environment. And by designing intuitive and simple hardware and realizing the responsive web interface which is not limited by the user's contact devices, the interactive system in which the user receives real time data from the hardware and reversely the user controls the things is designed and realized.

One-Pass Identification Processing Password (한 단계로 신원확인을 위한 패스워드)

  • Kim Yong-Hun;Cho Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.627-632
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/ server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root problem, and we would like to suggest OPI(One Pass Identification), enhancing the stability for all of the well-known attacks by now including Free-playing attack, off-line Literal attack, Server and so on. OPI does not need to create the special key to read the password. OPI is very excellent in identifying the approved person within a very short time.

A Study on Efficient User Management System of Combat System

  • Hee-Soo Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.191-198
    • /
    • 2024
  • In this paper, we proposes a user management system for efficient operation of the combat system within naval ship. Recently, naval ships have seen performance enhancements through various sensors, features, and continuous system development. This progress in the system has led to an increase in multi-funstion consoles that can manipulate various sensors and features within naval ship, consequently increasing the number of operators for these consoles. Therefore, a user management system that can control and manage multi-function consoles and operators in real-time is necessary for efficient management within naval ship. This paper suggests a user management system that can effectively manage the real-time situation of users accessing multi-function consoles. Additionally, a parallelization method using GPUs to reduce the CPU workload in operating various functions of the combat system is proposed. The proposed user management system has shown a performance improvement where the response time decreased by approximately 82% and the occupancy reduced by approximately 20% compared to the method using CPUs.

An Efficient Caching Strategy in Data Broadcasting (데이터 방송 환경에서의 효율적인 캐슁 정책)

  • Kim, Su-Yeon;Choe, Yang-Hui
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1476-1484
    • /
    • 1999
  • TV 방송 분야에서 다양한 정보와 상호 작용성을 제공하기 위해서 최근 기존 방송 내용인 A/V 스트림 외 부가정보 방송이 시도되고 있다. 데이타 방송에 대한 기존 연구는 대부분 고정된 내용의 데이타를 방송하는 환경을 가정하고 있어서 그 결과가 방송 내용의 변화가 많은 환경에 부적합하다. 본 논문에서는 데이타에 대한 접근이 반복되지 않을 가능성이 높고 사용자 접근 확률을 예상하기 어려운 상황에서 응답 시간을 개선하는 방안으로 수신 데이타를 무조건 캐쉬에 반입하고 교체가 필요한 경우 다음 방송 시각이 가장 가까운 페이지를 축출하는 사용자 단말 시스템에서의 캐슁 정책을 제안하였다. 제안된 캐쉬 관리 정책은 평균적인 캐쉬 접근 실패 비용을 줄임으로써 사용자 응답 시간을 개선하며, 서로 다른 스케줄링 기법을 사용하는 다양한 방송 제공자가 공존하는 환경에서 보편적으로 효과를 가져올 수 있다.Abstract Recently, many television broadcasters have tried to disseminate digital multimedia data in addition to the traditional content (audio-visual stream). The broadcast data need to be cached by a client system, to provide a reasonable response time for a user request. Previous studies assumed the dissemination of a fixed set of items, and the results are not suitable when broadcast items are frequently changed. In this paper, we propose a novel cache management scheme that chooses the replacement victim based on the remaining time to the next broadcast instance. The proposed scheme reduces response time, where it is hard to predict the probability distribution of user accesses. The caching policy we present here significantly reduces expected response time by minimizing expected cache miss penalty, and can be applied without difficulty to different scheduling algorithms.

Response Time-based Web Service Availability Measurement Method (응답시간기반 웹 서비스 가용성 측정방안)

  • Park, Sang- Kun;Choi, Deok-Jai
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.61-70
    • /
    • 2003
  • I-Business providers and customers have chosen the service availability as the most important technical parameter which should be included in their SLA to succeed in their business. This means that web Service availability management is crucial to the web-based service providers. Application availability is originally defined as a measure of the fraction of time during a defined period when the service provided is deemed to be better than user expectation of service performance. But, because most web service availability measurement tools simply monitor disconnected state, they do not satisfy user's expectation of extended availability concept. In this paper, We propose the web service availability measurement method which supports extended availability concept. It takes account of performance degradation of web service based on response time, and determines what is the cause of unavailability of the service. We developed a measurement tool, WebSerAvail.

Virtual Data Grouping for Performance Enhancement of Multi-User Games (다중 사용자 게임 성능 향상을 위한 데이터 가상 그룹핑 방법)

  • 이철민;박홍성
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.3_4
    • /
    • pp.231-238
    • /
    • 2003
  • This paper presents a virtual grouping method used in multi-user network games, which reduces a response time and losses of response data. The proposed method divides each group into virtual groups and transmits data in them after dividing an overall map on a game into several fixed regions and grouping them. And this paper derives the optimal number of groups minimizing a given cost function. The proposed method if shown to be useful by comparing with a general grouping method.

Evaluating Users' Occurrences Number and Interaction of Maintenance Management Personnel's Response for Mechanical Defects Complaint in Complex Building (복합건물에서 사용자의 기계결함민원 원단위 및 유지관리조직 대응의 상호작용 평가)

  • Kwak, Ro-Yeul
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.34 no.3
    • /
    • pp.95-102
    • /
    • 2018
  • In order to understand interaction between building users' occupant performance and building maintenance performance of maintenance management personnel, actual data from maintenance activities of buildings were analyzed. Also, using building defect customer complaint data reported by building user, satisfaction data on building maintenance services of building users and service response time of maintenance management personnel, a method for evaluating interaction of buildings with the same purpose and same size was proposed. Throughout analysis, average number of occurrences per unit area per year for the mechanical complaints in complex building were presented. In addition, using building users' satisfaction with facility management services, attitude of responding to business obstacles, number of occurrences per unit area per year of mechanical complaints and complaint processing speed, interaction was comprehensively identified and compared.

Multifactor Authentication Using a QR Code and a One-Time Password

  • Malik, Jyoti;Girdhar, Dhiraj;Dahiya, Ratna;Sainarayanan, G.
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.483-490
    • /
    • 2014
  • In today's world, communication, the sharing of information, and money transactions are all possible to conduct via the Internet, but it is important that it these things are done by the actual person. It is possible via several means that an intruder can access user information. As such, several precautionary measures have to be taken to avoid such instances. The purpose of this paper is to introduce the idea of a one-time password (OTP), which makes unauthorized access difficult for unauthorized users. A OTP can be implemented using smart cards, time-based tokens, and short message service, but hardware based methodologies require maintenance costs and can be misplaced Therefore, the quick response code technique and personal assurance message has been added along with the OTP authentication.