• Title/Summary/Keyword: information overload

Search Result 522, Processing Time 0.032 seconds

P2P DICOM System using Multiagent Systems Communicating with XML Encoded ACL (XML 기반 ACL로 통신하는 멀티에이전트 시스템을 이용한 P2P DICOM 시스템)

  • Kwon, Gi-Beom;Kim, Il-Kon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.598-606
    • /
    • 2002
  • We suggest a distributed communication and management methodology using PC to PC Query multicasting strategy for efficient management of medical images produced by DICOM(Digital Imaging and Communications in Medicine) Modalities. It is absolutely necessary to reduce strict degradation of PACS system due to large sire of medical images and their very high transport rates. DICOM PC to PC Component is composed of a Service Manager to execute requested queries, a Communication Manager to take charge of file transmission, and a DICOM Manager to manage stored data and system behavior Each Manager itself is a component to search for requested file by interaction or to transmit the file to other PCs. Distributed management and transformation of medical information based on PC to PC Query multicasting methodology will enhance performance of central server and network capacity, reducing overload on both. We organize three major components for system operation. Each component is implemented as Agent. Communication between agents uses XML encoded Agent Communication Language.

A Study on Prediction Reputation System Improvement for Prevention of SPIT (SPIT 차단을 위한 예측 평판도 기법 개선에 대한 연구)

  • Bae, Kwang-yong;Jo, Hwa;Yoon, Oh-jun;Jang, Sung-jin;Shin, Yongtae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1568-1576
    • /
    • 2015
  • This paper proposes a prediction reputation system for the anti-SPIT solution in real-time VoIP environment. Increased accuracy of the determination as to whether spam or not by deriving a threshold based on SPIT presence in the existing paper. The existing schemes need to get the user's feedback and/or have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme predicts the reputation through the statistical analysis based on the period of session initiation of each caller and the call duration of each receiver. As per the second mentioned problem, this scheme performs the prediction before session initiation, therefore, it's proper for real-time VoIP environment.

A Scheduling Algorithm for Servicing (m,k)-firm-based Request Data from RSU Using in VANETs (VANET내 RSU에서 (m,k)-firm 기반 요청 데이터 처리를 위한 스케쥴링 알고리즘)

  • Nam, Jae-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2665-2670
    • /
    • 2015
  • VANET is ad-hoc network in which vehicles are treated as node and these nodes are communicating with each other as well as RSUs on the road. In VANET, scheduling is a very important issue as the request data are to be delivered to the recipient vehicle properly and accurately. It is also critical that any request data which is sent to the vehicle is received by it in the time period for which the vehicle will be in range of RSU. RSU picks the one with the highest priority to serve based on the scheduling scheme. In this paper, we propose a scheduling algorithm to select the one with the highest priority in RSU, in which an RSU can transfer the overload requests to other RSUs. We use the modified DBP scheme to calculate the priority of request data. Simulation results show that our scheme outperforms other scheduling schemes under various conditions.

A Study on the Real-Time Certificate Status Verification System Using VDN (VDN을 이용한 실시간 인증서 상태 검증 시스템의 관한 연구)

  • Lee, Kwang-Hyoung;Kim, Hyun-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.858-865
    • /
    • 2006
  • A certificate that is issued by the certification authority can be revoked within the period of validity by various reasons such as the loss of private key, disqualification or the change in key. Therefore, the certificate status verification must precede prior to use Currently, the CRL or the OCSP methods are used in most cases. But the CRL system can't guarantee the present status of the certificate, and the OCSP generates heavy network traffic by checking or requesting certificate status in real-time using high-capacity messages. In this paper, we propose a system that requests the certificate verification by creating VDN for user identity information. Through this system, the certification authority will be able to guarantee the certificate's status in real-time, and solve the problem of the sewer and network overload by verifying and finding user identity information from VDN, Based on the results, we propose a real-time certificate status verification system which can improve the speed of the verification. We confirmed the improvement in speed by testing and comparing it with the existing methods.

  • PDF

Design and Implementation of Web-Based Cyber-University System (웹-기반 가상대학 시스템의 설계 및 구현)

  • Lee, Sei-Young;Yong, Hwan-Seung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3577-3588
    • /
    • 1999
  • This paper describes design and implementation of a general purpose cyber educational system. In this system, there are different types of menus and services according to such user's rights as system operators, professors, assistant instructors, students. In order to keep in close contact between students and professors, provided are various services such as the official announcement, transcripts of lecture, bulletin board, Q/A corner, report box, archive of study materials, electronic mail box, memorandum including checking of one's attendance and school record. For the purpose of activating small group studies and discussion about given subject, it can organize into groups automatically and provide with debating rooms. The system is implemented by separating with both HTML design and programming part by templete concept. Overload of iterative server is solved by adjusting the numbers of DB servers of each service.

  • PDF

Architecture for Secure Mobile Agent through STAS System (STAS 시스템을 적용한 안전한 이동 에이전트구조)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1873-1879
    • /
    • 2007
  • As the mobile terminal which uses P2P service increases and it comes to be applied to many fields, mobile agent technology has been applied to P2P and its innovative services has been offered to various fields. However, free mobility of mobile agent technology works like worm, the problem which is contaminated by malicious attacker's attack quickly has appeared and fundamental solution has not been developed yet. This paper proposes STAS (Security Tracking and Auditing Server) system which can offer verification for security of mobile agent in structured P2P environments. Mobile Agent will send data value to STAS via peer so that STAS can verify secure audit and integrity and Mobile agent initiator will obtain the final value of the data from STAS. It can minimize overload of mobile terminal which is occurred by verification of mobile agent and its accomplishment.

The Effect of Uncertainty Avoidance on Purchase Deferral Intention in Online Shopping : The Moderating Effect of Consumption Values (온라인 소비자의 불확실성 회피성향이 구매연기의도에 미치는 영향 : 소비가치의 조절효과를 중심으로)

  • Kim, Eun-cheol;Kim, Da-young;Kim, Pu-reum;Kang, Do-yoon;Park, Euna
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.283-288
    • /
    • 2019
  • This study investigated how consumer's uncertainty avoidance affect purchase deferral intention when purchasing high-involved products (i.e. laptops) in online shopping, and we looked at whether utilitarian/hedonic consumption value has a moderating effect in this relationship. Results showed the higher the uncertainty avoidance, the higher the deferral intention. Also, only the utilitarian consumption value had moderating effect in this relationship. This means that in an information overload situation like online shopping, consumers are more likely to delay their purchase intention when they have more uncertainty avoidance. Thus, to prevent this purchase delay, marketers should selectively present relative product information, strategically emphasize the importance of certain product attribution to reduce consumers' uncertainty of the product or highlight the utilitarian values of product attributes that are expected to have a significant impact on decision making.

Knowledge Reasoning Model using Association Rules and Clustering Analysis of Multi-Context (다중상황의 군집분석과 연관규칙을 이용한 지식추론 모델)

  • Shin, Dong-Hoon;Kim, Min-Jeong;Oh, SangYeob;Chung, Kyungyong
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.11-16
    • /
    • 2019
  • People are subject to time sanctions in a busy modern society. Therefore, people find it difficult to eat simple junk food and even exercise, which is bad for their health. As a result, the incidence of chronic diseases is increasing. Also, the importance of making accurate and appropriate inferences to individual characteristics is growing due to unnecessary information overload phenomenon. In this paper, we propose a knowledge reasoning model using association rules and cluster analysis of multi-contexts. The proposed method provides a personalized healthcare to users by generating association rules based on the clusters based on multi-context information. This can reduce the incidence of each disease by inferring the risk for each disease. In addition, the model proposed by the performance assessment shows that the F-measure value is 0.027 higher than the comparison model, and is highly regarded than the comparison model.

Analysis of Link Stability Based on Zone Master for Wireless Networks (무선네트워크에서 존 마스터 기반의 링크 안정성 해석)

  • Wen, Zheng-Zhu;Kim, Jeong-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.3
    • /
    • pp.73-78
    • /
    • 2019
  • Due to frequent topology changes in wireless networks, inter-node link disconnection and path re-establishment occur, causing problems such as overloading control messages in the network. In this paper, to solve the problems such as link disconnection and control message overload, we perform path setup in three steps of the neighbor node discovery process, the route discovery process, and the route management process in the wireless network environment. The link stability value is calculated using the information of the routing table. Then, when the zone master monitors the calculated link value and becomes less than the threshold value, it predicts the link disconnection and performs the path reset to the corresponding transmitting and receiving node. The proposed scheme shows a performance improvement over the existing OLSR protocol in terms of data throughput, average path setup time, and data throughput depending on the speed of the mobile node as the number of mobile nodes changes.

Edge-Centric Metamorphic IoT Device Platform for Efficient On-Demand Hardware Replacement in Large-Scale IoT Applications (대규모 IoT 응용에 효과적인 주문형 하드웨어의 재구성을 위한 엣지 기반 변성적 IoT 디바이스 플랫폼)

  • Moon, Hyeongyun;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1688-1696
    • /
    • 2020
  • The paradigm of Internet-of-things(IoT) systems is changing from a cloud-based system to an edge-based system to solve delays caused by network congestion, server overload and security issues due to data transmission. However, edge-based IoT systems have fatal weaknesses such as lack of performance and flexibility due to various limitations. To improve performance, application-specific hardware can be implemented in the edge device, but performance cannot be improved except for specific applications due to a fixed function. This paper introduces a edge-centric metamorphic IoT(mIoT) platform that can use a variety of hardware through on-demand partial reconfiguration despite the limited hardware resources of the edge device, so we can increase the performance and flexibility of the edge device. According to the experimental results, the edge-centric mIoT platform that executes the reconfiguration algorithm at the edge was able to reduce the number of server accesses by up to 82.2% compared to previous studies in which the reconfiguration algorithm was executed on the server.