• Title/Summary/Keyword: Users' Response-based

Search Result 414, Processing Time 0.033 seconds

Cache Policy based on Producer Distance to Reduce Response Time in CCN (CCN에서 응답시간 감소를 위한 생산자 거리 기반 캐시정책)

  • Kim, Keon;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1121-1132
    • /
    • 2021
  • Nowadays, it is more difficult to find people who do not use mobile devices such as smartphones and tablets. Contents that can be accessed at the touch of a finger is overflowing. However, the existing network has a structure in which it is difficult to efficiently respond to the problems caused by overflowing contents. In particular, the bottleneck problem that occurs when multiple users intensively request content from the server at the same time is a representative problem. To solve this problem, the CCN has emerged as an alternative to future networks. CCN uses the network bandwidth efficiently through the In-Network Cache function of the intermediate node to improve the traffic required for user to request to reach the server, to reduce response time, and to distribute traffic concentration within the network. I propose a cache policy that can improve efficiency in such a CCN environment.

Damage identification in a wrought iron railway bridge using the inverse analysis of the static stress response under rail traffic loading

  • Sidali Iglouli;Nadir Boumechra;Karim Hamdaoui
    • Smart Structures and Systems
    • /
    • v.32 no.3
    • /
    • pp.153-166
    • /
    • 2023
  • Health monitoring of civil infrastructures, in particular, old bridges that are still in service, has become more than necessary, given the risk that a possible degradation or failure of these infrastructures can induce on the safety of users in addition to the resulting commercial and economic impact. Bridge integrity assessment has attracted significant research efforts over the past forty years with the aim of developing new damage identification methods applicable to real structures. The bridge of Ouled Mimoun (Tlemcen, Algeria) is one of the oldest railway structure in the country. It was built in 1889. This bridge, which is too low with respect to the level of the road, has suffered multiple shocks from various machines that caused considerable damage to its central part. The present work aims to analyze the stability of this bridge by identifying damages and evaluating the damage rate in different parts of the structure on the basis of a finite element model. The applied method is based on an inverse analysis of the normal stress responses that were calculated from the corresponding recorded strains, during the passage of a real train, by means of a set of strain gauges placed on certain elements of the bridge. The results obtained from the inverse analysis made it possible to successfully locate areas that were really damaged and to estimate the damage rate. These results were also used to detect an excessive rigidity in certain elements due to the presence of plates, which were neglected in the numerical reference model. In the case of the continuous bridge monitoring, this developed method will be a very powerful tool as a smart health monitoring system, allowing engineers to take in time decisions in the event of bridge damage.

Partial Image Retrieval Using an Efficient Pruning Method (효율적인 Pruning 기법을 이용한 부분 영상 검색)

  • 오석진;오상욱;김정림;문영식;설상훈
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.145-152
    • /
    • 2002
  • As the number of digital images available to users is exponentially growing due to the rapid development of digital technology, content-based image retrieval (CBIR) has been one of the most active research areas. A variety of image retrieval methods have been proposed, where, given an input query image, the images that are similar to the input are retrieved from an image database based on low-level features such as colors and textures. However, most of the existing retrieval methods did not consider the case when an input query image is a part of a whole image in the database due to the high complexity involved in partial matching. In this paper, we present an efficient method for partial image matching by using the histogram distribution relationships between query image and whole image. The proposed approach consists of two steps: the first step prunes the search space and the second step performs block-based retrieval using partial image matching to rank images in candidate set. The experimental results demonstrate the feasibility of the proposed algorithm after assuming that the response tune of the system is very high while retrieving only by using partial image matching without Pruning the search space.

mVoIP Vulnerability Analysis And its Countermeasures on Smart Phone (스마트폰에서 mVoIP 취약성 분석 및 대응 방안)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.3
    • /
    • pp.7-12
    • /
    • 2012
  • mVoIP (mobile Voice over Internet Protocol) service is a technology to transmit voice data through an IP network using mobile device. mVoIP provides various supplementary services with low communication cost. It can maximize the availability and efficiency by using IP-based network resources. In addition, the users can use voice call service at any time and in any place, as long as they can access the Internet on mobile device easily. However, SIP on mobile device is exposed to IP-based attacks and threats. Observed cyber threats to SIP services include wiretapping, denial of service, and service misuse, VoIP spam which are also applicable to existing IP-based networks. These attacks are also applicable to SIP and continuously cause problems. In this study, we analysis the threat and vulnerability on mVoIP service and propose several possible attack scenarios on existing mobile VoIP devices. Based on a proposed analysis and vulnerability test mechanism, we can construct more enhanced SIP security mechanism and stable mobile VoIP service framework after eliminating its vulnerability on mobile telephony system.

Finding Smartphone's Factors which Affect Satisfaction or Dissatisfaction based on KANO Model (KANO 모델을 활용한 스마트폰의 만족 및 불만족 요인 분석)

  • Lee, Sang-Gun;Lee, Sin-Seok;Kang, Ju-Young
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.257-277
    • /
    • 2011
  • The current study categorizes factors of smartphone into three, using KANO model: attractive factors which cause only product satisfaction, must-be factors for dissatisfaction, and one-dimensional factors for both. Based on it, it presents a new model for the effects that smartphone factors have on satisfaction or dissatisfaction. The purpose is to theoretically explain that smartphone factors on which companies and users place a high value can actually affect satisfaction or dissatisfaction. After choosing 15 factors out of 25 which had been selected through literature study, these were divided into attractive, must-be, and one-dimensional ones. 93 out of 109 questionnaires returned were used for analysis. After frequency analysis using SPSS were conducted on the surveys, the factors were grouped, based on KANO table. The grouping results are as follows. Attractive factors include 'expansion slots for external memory, battery desorption, brand awareness, mobile banking and internet telephony'. Must-be ones include 'multi-touch, information security, entertainment, information retrieval, location based service and SNS. Finally, 'screen visibility, size of internal memory, the amount of internal memory, battery life, and response to after-sales service' are classified as one-dimensional factors. A critical finding of this paper is that since the results are different depending on the operating system of smartphones, it must be taken into consideration in studies on smartphones. The wide and rapid spread of smartphones has changed people's lifestyle as well as business environment, which forces companies to compete with each other to adapt to the changed circumstances. In this competitive system, studies on smartphone factors of satisfaction and dissatisfaction are essential for firms to establish a new strategy. From this point of view, the present paper is expected to be a basic material for enterprises not only to develop goods and services that maximize customer satisfaction and minimize dissatisfaction, but also to establish the future business strategy.

A method to maintain templates in open source-based authoring tool for e-learning assessment items (오픈 소스 기반의 이러닝 평가문항 저작 도구를 위한 템플릿 유지 기법)

  • Han, Sungjae;Choi, Byung-Uk;Cha, Jaehyuk
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.101-112
    • /
    • 2014
  • Existing tools using in the standard e-learning contents authoring were used a method to provide users contents template produced in advance. In order to use resources of the template in a common web-based authoring tool, there is problem to overcome. If the resource of template is inserted within the contents on the authoring tool, the deformation of the template by the user's input that may occur during the edit process cannot be controlled. In this paper, we propose an effective maintenance method to prevent deformation of the resource of template inserted into any WYSIWYG-based HTML authoring tool by user's discretion. We added a template plug-in that can create the IMS-QTI standard resource in tynyMCE the web-based open source editor of representative examples. And the plug-in for tinyMCE was realized as a module of directly respond to the action of limited user input. So, in response to the action of user's input, the structure of the template can be sustained possibly.

Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms (스캔 기반의 인터넷 웜 공격 탐지 및 탐지룰 생성 시스템 설계 및 구현)

  • Kim Ik-Su;Jo Hyuk;Kim Myung Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.191-200
    • /
    • 2005
  • The brilliant achievements in computers and the internet technology make it easy for users to get useful information. But at the same time, the damages caused by intrusions and denial of service attacks are getting more worse. Specially because denial of service attacks by internet worm incapacitate computers and networks, we should draw up a disposal plan against it. So far many rule-based intrusion detection systems have been developed, but these have the limits of these ability to detect new internet worms. In this paper, we propose a system to detect intrusion and generate detection rule against scan-based internet worm, paying attention to the fact that internet worms scan network to infect hosts. The system detects internet worms using detection rule. And if it detects traffic causing by a new scan-based internet worm, it generates new detection nile using traffic information that is gathered. Therefore it can response to new internet worms early. Because the system gathers packet payload, when it is being necessary only, it can reduce system's overhead and disk space that is required.

Design of Fine Dust Monitoring System based on the Internet of Things (사물인터넷 기반 미세먼지 모니터링 시스템 설계 및 구현)

  • Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.14-26
    • /
    • 2022
  • Recently, according to the severity of air pollution, interest in air pollution is increasing. The IoT based fine dust monitoring system proposed in this paper allows the measurement and monitoring of fine dust, volatile organic compounds, carbon dioxide, etc., which are the biggest causes affecting the human body among air environmental pollution. The proposed system consisted of a device that measures atmospheric environment information, a server system for storing and analyzing measured information, an integrated monitoring management system for administrators and smart phone applications for users to enable visualization analysis of atmospheric environment information in real time. In addition, the effectiveness of the proposed fine dust monitoring system based on the Internet of Things was verified by using the response speed of the system, the transmission speed of the sensor data, and the measurement error of the sensor. The fine dust monitoring system based on the Internet of Things proposed in this paper is expected to increase user convenience and efficiency of the system by visualizing the air pollution condition after measuring the air environment information with portable fine dust measuring device.

The Effects of National Research Fund Recognition on the Research Fund Payment Intend in R&D Project (연구비에 대한 인식이 연구비 사용 의도에 미치는 영향에 관한 연구 : RCMS 사용자를 중심으로)

  • Lee, Jung Woo;Han, Myung Hoon
    • Journal of Information Technology Services
    • /
    • v.17 no.3
    • /
    • pp.77-100
    • /
    • 2018
  • As the importance of R&D has recently become more important, the budget for national R&D projects has continued to grow. Along with, there is a growing awareness to use and manage R&D funds transparently. This study examines the relationship among attitude toward the behavior (ATT), subjective norm (SN), perceived behavioral control (PBC) and behavioral Intention (BI) deriving from TPB (Theory of planned Behavior). To empirically prove the hypothesis, the statistical analysis were conducted based on the response from the 2,021 RCMS users, using SPSS 21.0 and AMOS 21.0. The research model variable consists of ATT, SN, PBC, BI, person type, RCMS characteristics. The results of study can be summarized as follows. First, ATT, SN, PBC have the positive effect on BI. Second, According to the type of person (Director, R&D supporter), there is no difference in ATT on BI but there is a difference in SN (or PBC) on BI. Third, The type of person have moderating effects in the relationship between ATT and BI. Finally, All RCMS characteristics have moderating effects in the relationship between ATT and BI. Some RCMS characteristics have moderating effects in the relationship between PBC and BI.

A Systematic Approach to Quality Measurement of Official Statistics) (국가통계 품질측정을 위한 체계적 접근 - 표본조사의 품질평가지표 개발을 중심으로)

  • 이동명;김설희
    • Proceedings of the Korean Association for Survey Research Conference
    • /
    • 2002.11a
    • /
    • pp.111-127
    • /
    • 2002
  • As the utilization of official statistics has been recently increased, the necessity of objective quality assessment also has been increased. Since mean square error(MSE) and response rate, which have been considered as representative quality indicators in the past, may have the limits of use, it has been demanded to develop new quality indicators which are able to reflect the various requirements of users. In this paper, regarding sample surveys conducted by governmental agencies, the flow of procedures in statistics production is analyzed using input-output of each procedure. As the result, how to identify and develop quality indicators for each procedure is discussed, with some instances of indicators. Finally, the quality index using the results of quality assessment would be calculated based on a weighting method by the size of deviation of statistical measures.

  • PDF