• Title/Summary/Keyword: Voice-call

Search Result 237, Processing Time 0.023 seconds

Performance analysis of a call control scheme with buffering and dynamic bandwidth assignment for non-uniform traffic distribution (부하가 일정하지 않은 환경에서 버퍼 사용에 따른 시스템 성능 분석)

  • 임승철;성홍석;박동선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4B
    • /
    • pp.316-323
    • /
    • 2002
  • In this paper, we analyze the call control scheme that is using buffer at new call and handoff call for non-uniform traffic load distribution, the multiple cell environments and the multiple types of services such as voice and data service. Considering the facts, the call admission control method using the effective bandwidth concept is employed in this paper, The bandwidth for a new call and a handoff call is allocated by the number of mobile station and dynamically assigned by taking account of the blocking rate of new calls and the dropping rate of handoff calls. The call control procedure is experimented through a simulation study by dynamically the bandwidth to new and handoff calls based on the blocking rate and the dropping rate. The results show our call control scheme can get a good quality of service for mobile users.

Individual Recognition between Siblings of the Young Black-tailed Gull (Larus crassirostris)

  • Chung, Hoon;Lee, Hyun-Jung;Park, Shi-Ryong
    • The Korean Journal of Ecology
    • /
    • v.25 no.6
    • /
    • pp.365-369
    • /
    • 2002
  • We had 18 eggs artificially hatched in a mass breeding place of black-tailed gulls and examined the individual recognition between young siblings in a laboratory environment. The results of the experiment showed that the young gulls selectively responded to their siblings and non-siblings at an early stage after hatching. It was shown that they began to recognize the begging call among the voice signals of siblings and non-siblings 15-16 days after hatching, and the chirirah call 11-12 days after hatching. Also, more significant results were shown with the chirirah call than with the begging call. In an experiment of visual recognition between siblings and non-siblings, the young black-tailed gulls approached their siblings significantly 9-10 days after hatching. The recognition between young siblings in a mass breeding place provides an important evolutionary indicator in terms of their social behaviors.

A Development of Administrative Affairs Supporting System using Call Control Mode of CTI (CTI 호출 제어 방식을 이용한 행정 업무 지원 시스템의 개발)

  • 최준기;조성범;정상수;이상정
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.46-60
    • /
    • 1999
  • Recently, CTI (Computer Telephony Integration) technology has been widely applied to various area such as video conference, file transfer, voice mail, automatic message transfer and automatic redial, integrated messaging and network fax. In this paper, an administrative affairs supporting system using call control mode of CTI is designed. To improve inefficient processing of job due to heavy calling from entrance candidates during entrance examination of a college, the system is developed. The database of the system is desigend using object modeling technique. Also, the automatic calling and response system using CTI call control mode is implemented. Especially, to interface with voice of candidates who ask whether they pass or fail the entrance examination of the college, TTS(Text To Speech) module is developed.

  • PDF

Analysis of key technologies related to VoIP security (VoIP 보안관련 주요기술에 대한 분석)

  • Rha, Sung-Hun;Shin, Hyun-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.385-390
    • /
    • 2010
  • VoIP Service is provided voice & image call using internetwork unlike traditional call. VoIP usage is becoming generalization & development. As a result, threats of security are steadily increasing. Regarding this situation, we will investigate the security problem of VoIP in various aspects. Also We will investigate main technology of security solution method for solve this problem.

A Consideration on the Minimum Transmission Loss for the Intraoffice Call Path Based on the Listener Echo (수화자 반향을 고려한 자국내 최소 전송손실에 대한 고찰)

  • Jang, Chung-Ryong;Hong, Jin-Woo
    • Proceedings of the KIEE Conference
    • /
    • 1987.07b
    • /
    • pp.894-897
    • /
    • 1987
  • Listener echos, which arise in multiple 4-wire loop connections(MLC) during the evolving switched telephone network, impare voice-band data signal transmission performance. This paper first shows the calculation method of the total number of listener echo loops over N 4-wire physical loops and presents the additative law for listener echos. It next demonstrates that about 4 dB should be ensured to Eke the transmission loss of intraoffice call path be minimum for the voice-band data service in a digital local switch.

  • PDF

Analysis of Performance According to the Number of the Reserved Channel for Handover at Hierarchical Cellular System With Multi Traffic (멀티 트래픽이 있는 계층 셀룰라 시스템에서 핸드오버 예약 채널 수에 따른 성능 분석)

  • Seong, Hong-Seok;Won, Young-Jin;Lee, Jong-Seong
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1207-1208
    • /
    • 2008
  • We analyzed the performance of hierarchical cellular system with multi traffic(voice traffic, data traffic). We executed the computer simulation by the number of reserved channel for handover. For new call, the more the number of channel reserved, the higher the block probability of call became. The blocking probability of data traffic was higher, compared with that of voice traffic

  • PDF

Voice Traffic Estimation using Kalman-filtering and Performance Evaluation of a Circuit Switched Network with Grid Topology (Kalman-Filter를 이용한 음성트래픽 예측 및 회선 교환 격자 구조망 성능 평가)

  • 문경덕;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.5
    • /
    • pp.452-459
    • /
    • 1992
  • In this paper, we have estimated voice traffics using Kalman-filtering for upcoming years and evaluated performance of a grid topology circuit switched network using above outcomes. Since measurement errors and modeling errors are considered in Kalman-filtering, the system is estimated more accurately than by using any other estimation methods. A grid topology circuit switched network has alternative routing paths, therefore it is more reliable than any other networks. In this paper, we have calculated the call blocking probabilities, which is the key measuremens of performance evaluation in circuit switched networks. by using estimated voice traffics for upcoming years.

  • PDF

A Study on Factors Influencing Telecommunications Fraud : In the Case of Voice Phishing (전기 통신 금융사기에 영향을 미치는 요인에 관한 연구 : 전화 금융사기를 중심으로)

  • Jo, Soohyun;Lee, Wooyoo;Choi, Myeonggil
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.35-49
    • /
    • 2016
  • With the gradual development of IT technology, voice phishing victims are increasing in number. In the past when only voice phone calls were made, personal information or financial information were stolen mainly by a direct phone call, but recently, as smart phones are widely in use, it is evolving into a way such as smishing that leads an access to a site with malicious codes spreading out. Since it is easy to run away after committing a crime, and trace are rarely left in case of voice phishing, it is difficult to find out criminal. In addition, it is most likely that a victim be would be exposed to further damage from another voice phishing. Its technique is growing in kinds and turning more intelligent day by day; Therefore, its victims are increasing in number. Previous researches mainly focused the area of legal studies while the factors exposed to voice phishing have not been made. Therefore, this study has analyzed the motifs in which voice phishing is done to draw out its outcomes as follows. First, a victim comes to trust the criminal by the factors of favorability, rare message, and mutuality. Second, the more sophisticated the technique of a criminal, the more likely a victim is exposed to voice phishing.

A Proposal for Certificate Status Validation Using the Call Processing of PCS (PCS의 호처리를 이용한 인증서 상태검증 모델 제안)

  • Lee Young-Sook;Won Dong-Ho;Lee Young-Gyo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • With the rapid progress of research to offer a convenience of mobile communication, the mobile users can use not only the services of voice call but also the variety services of data communication using Internet. These include Internet Searching, Internet Shopping and Internet banking and Internet stock exchange and electronic payment and so on, based on PKI. Also, the need of data communication between the mobile users has been increased. As it is possible for mobile users to do user authentication, key distribution, encryption, decryption and so on, it is needed the certificate status validation between the mobile users. However due to the PCS(Personal Communication System) had been only designed and implemented for voice call between the mobile users, it is not easy to apply data communication between the mobile users on PKI. Therefore the study of for the data communication between the mobile users in PCS is a few. It is for the data transfer between the mobile users to communicate using call processing of PCS. So, we propose how to process the certificate status validation during call processing for data communication between the mobile users in the PCS.

  • PDF

Study on Design of IP PBX of Distribute Base on SIP Protocol Stack (SIP프로토콜 스텍을 기반으로 하는 분산형 IP PBX 단말기 설계)

  • Yoo Seung-Sun;Yoo Gi-Hyoung;Lim Pyung-Jong;Hyun Chul-Ju;Kwak Hoon-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.377-384
    • /
    • 2006
  • According to fast VoIP technology development, more and more companies change voice network into IP based network among branch offices. IP PBX, which is deployed up to now, composed of IP phone and VoIP Gateway. Every telphone has replaced with If phone which support VoIP and VoIP gateway is installed in PBTN connection point to relay voice data. It can reduce the communication expense of International call, long distance call and call between a headquater and a trance because it uses internet line. In this paper, IP PBX is implemented that can distribute call using PBX network only usig personal terminal without Proxy Server. Depending on Role, terminal can be registered Master, Server and Client and it is verified in terms of performance and validation.