• Title/Summary/Keyword: one call

Search Result 685, Processing Time 0.027 seconds

A Modified Esophageal Fistulation Technique with Sheep and Goats (개량(改良)된 방법(方法)에 의한 면(緬), 산양(山羊)의 식도루관형성술(食道瘻管形成術))

  • Kim, Myung Cheol;Kim, Kyo Joon;Lee, In Duk
    • Korean Journal of Agricultural Science
    • /
    • v.14 no.1
    • /
    • pp.186-190
    • /
    • 1987
  • Three sheep and 3 Korean native goats, raised in animal farm in Agricultural College of Chungnam National University, were esophageally fistulated for herbivore dietary composition studies. The results obtained were as follows. 1. Esophageal fistulation with improved method was relatively convenient in surgical operation and it was also suitable for the study of forage material in sheep and goats. 2. Excellent animal health was maintained over one year during which animals were utilized periodically in diet studies.

  • PDF

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Location Management Using Static Cache & Carry in Mobile Networks (이동망에서 정적 Cache & Carry을 이용한 위치관리)

  • Rim, Soon-Young;Koo, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.789-798
    • /
    • 2002
  • Even when users are moving, a major problem in such a mobile networks is how to locate mobile clients. Two major operations are involved in managing a mobile client's location : the location registration operation and the call tracking operation. The past methods can only minimize the cost of one of these two operations, but not both. The contribution of this paper is to propose strategy that minimize the costs of both operations simultaneously. Our performance analysis proves that the proposed strategies are superior to the past methods.

iCaMs: An Intelligent System for Anti Call Phishing and Message Scams (iCaMs: 안티 콜 피싱 및 메시지 사기를 위한 지능형 시스템)

  • Tran, Manh-Hung;Yang, Hui-Gyu;Dang, Thien-Binh;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.156-159
    • /
    • 2019
  • The damage from voice phishing reaches one trillion won in the past 5 years following report of Business Korea on August 28, 2018. Voice phishing and mobile phone scams are recognized as a top concern not only in Korea but also in over the world in recent years. In this paper, we propose an efficient system to identify the caller and alert or prevent of dangerous to users. Our system includes a mobile application and web server using client and server architecture. The main purpose of this system is to automatically display the information of unidentified callers when a user receives a call or message. A mobile application installs on a mobile phone to automatically get the caller phone number and send it to the server through web services to verify. The web server applies a machine learning to a global phone book with Blacklist and Whitelist to verify the phone number getting from the mobile application and returns the result.

Analysis of Performance and Availability of Mobile Cellular Systems (모바일 셀룰러 시스템의 성능 및 가용도 분석)

  • Ro Cheul-Woo;Kim Kyung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.6
    • /
    • pp.9-15
    • /
    • 2006
  • To obtain realistic composite performance and availability measures, one should consider performance changes that are associated with failure recovery behavior. In this paper we address two modeling approaches, exact composite and approximate, and develop SRN models for these approaches. The former approach is to combine the performance and availability models and yields accurate results but generally faces largeness problem. To avoid the problem, the two level hierarchical model is developed. The upper level model describes the failure and repair behavior of the system and the lower level captures the pure performance aspect of the system, channel allocation and service. It models guard channel and preemptive handoff scheme. As numerical results, blocking and dropping probabilities are given for new call and handoff call, respectively.

  • PDF

Personality Characteristic-based Enhanced Software Testing Levels for Crowd Outsourcing Environment

  • Kamangar, Zainab U.;Siddiqui, Isma Farah;Arain, Qasim Ali;Kamangar, Umair A.;Qureshi, Nawab Muhammad Faseeh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2974-2992
    • /
    • 2021
  • Crowd-based outsourcing is an emerging trend in testing, which integrates advantages of crowd-based outsourcing in software testing. Open call format is used to accomplish various network tasks involving different types of testing levels and techniques at various places by software testers. Crowd-sourced software testing can lead to an improper testing process as if it does not allocate the right task to the right crowd with required skills and not choose the right crowd; it can lead to huge results, which become time-consuming and challenging crowd-source manager for the identification of improper one. The primary purpose of this research is to make crowd-based outsourced software testing more effective and reliable by relating association between the software tester, personality characteristic, and different levels of software testing, i.e., unit, integration, and system, in order to find appropriate personality characteristic for required testing level. This research has shown an observed experiment to determine which software testing level suits which personality characteristic tester in a crowd-based software testing environment. A total of 1000 software testers from different software houses and firms in Pakistan were registered to perform tasks at different software testing levels. The Myers-Briggs Type Indicator (MBTI) test is used to identify each tester's personality characteristic involved in this research study.

Performance Improvement of a Recommendation System using Stepwise Collaborative Filtering (단계적 협업필터링을 이용한 추천시스템의 성능 향상)

  • Lee, Jae-Sik;Park, Seok-Du
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.05a
    • /
    • pp.218-225
    • /
    • 2007
  • Recommendation system is one way of implementing personalized service. The collaborative filtering is one of the major techniques that have been employed for recommendation systems. It has proven its effectiveness in the recommendation systems for such domain as motion picture or music. However, it has some limitations, i.e., sparsity and scalability. In this research, as one way of overcoming such limitations, we proposed the stepwise collaborative filtering method. To show the practicality of our proposed method, we designed and implemented a movie recommendation system which we shall call Step_CF, and its performance was evaluated using MovieLens data. The performance of Step_CF was better than that of Basic_CF that was implemented using the original collaborative filtering method.

  • PDF

Design and Construction of Asymmetric Two-way Message Transmitting System Overlaid on TRS (비대칭 양방향 메시지 전송 시스템의 설계와 구성)

  • 전명연;안정근
    • The Journal of Information Technology
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2000
  • This paper studies on method about construction and design of two-way message system to overcome limit of one-way pager system. Method of two-way system construction is studied on using the present one-way pager system and configure system. Forward-link of proposed method is using the present one-way pager system. And Reverse-link of proposed method is used TRS and Beacon on pager. CTI(Computer Telephony Integration) is used to Call processing

  • PDF

Implementation of Position Awareness System Using One-Pass Tag (원패스 태그를 이용한 위치인식 시스템 구현)

  • Sohn, Jong-Hoon;Hwang, Gi-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.301-303
    • /
    • 2012
  • In this Paper, we are implemented position awareness system based on one-pass tag. This system are combined ZigBee and RFID technology. We developed the solution to detect of user's position using position awareness receiver and repeater. This location recognition includes parked car location tracking, coming in and out car, automation of immigration control, enhanced security through emergency call, and automatic invocation elevator control and etc.

  • PDF

QoS and Multi-Class Service Provisioning with Distributed Call Admission Control in Wireless ATM Networks (무선 ATM망에서 QoS와 다중 서비스를 지원하는 분산된 호 수락 제어 알고리즘과 성능 분석)

  • Jeong, Da-Ip;Jo, Yeong-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.2
    • /
    • pp.45-53
    • /
    • 2000
  • In wireless environment, due to the limited capacity of radio channels it is not easy to guarantee QoS provisioning to mobile users. Therefore, one of the key problems to support broadband multimedia multi-services in wireless ATM networks is to study an effective call admission control(CAC). The purpose of this paper is to propose a distributed CAC scheme that guarantees multi QoS and multi-class service. Control parameters of the proposed scheme are QoS threshold and channel overload probability. With these parameter control, we show that the scheme can guarantee the requested QoS to both new and handover calls. In the scheme, channels are allocated dynamically, and QoS measurements are made in a distributed manner. We show that by providing variable data rate to calls it can effectively prohibit the QoS degradation even if there are severe fluctuations of network traffic. We compare the proposed CAC scheme to the well-known schemes such as guard band call admission control scheme. Through numerical examples and simulations, the proposed scheme is shown to improve the performance by lowering the probability of handover call dropping

  • PDF