• Title/Summary/Keyword: one call

Search Result 677, Processing Time 0.029 seconds

Implementation of Kalman Filter as a Remote Procedure Call Webservice (원격 프로시저 호출 웹서비스로 칼만필터 구현)

  • Yim, Jaegeol;Du, Vu Quang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1365-1368
    • /
    • 2011
  • The Kalman Filter is one of the most common techniques of tracking mobile user. Web service is a promising method of reusing programs. Therefore, this paper presents our implementation of Kalman Filter web service. There are three ways of implementing a web service system. Ours is Kalman filter as RPC web service.

A study of descriptive forms of catalogue and searching method for dissertations (학위논문의 목록기술형식 및 검색방법 고찰)

  • 조호일
    • Journal of Korean Library and Information Science Society
    • /
    • v.12
    • /
    • pp.133-160
    • /
    • 1985
  • In college or university libraries, the data of dissertations is one of the important academic information data. But traditional cataloging rules of dissertations and the method of operation is not only didn't unify but also fit to actual circumstances of library. This reason make librarians waste of time and the situation about piling up of unprocessed data don't make library services properly. In this papers, to analyze the above mentioned problems, I have investigated with questionaries about actual examples of construction methods of call number and item describing form of dissertations which is being used now in every college library in Korea. With the replied 61 questionaries which was compared with and investigated to merits and faults about library itself, I have showed revision ways. The characteristics of the revision ways are the followings. 1) Deleted informal and unmeaning descriptions and simplified describing. 2) Recommended to operating one or two kinds describing items which are only necessary. 3) Made call number specifically and then it make us easy to identify data and simultaneously call number can do its original action. 4) shelving range of data is made to colleges, years, departments, majors but in same departments, author's name is recommended by Korean alphabetical ordering. Besides, for proper and systematic management and operating of data. It must be necessary to recommend that reading systems of closed shelves type, incoming and outgoing and shelving by fulltime exclusive charged librarian, separate management of items and data are recommended.

  • PDF

An Experiment on On-Demand Circuit Provisioning in SONET/SDH ASON Networks (지능형 광 전달망에서의 on-demand 회선 생성 성능 분석 실험)

  • Nga, Kinh Thi Thuy;Kim, Byung-Jae;Lee, Yong-Gi;Kang, Min-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.174-179
    • /
    • 2005
  • In the SONET/SDH based ASON, one VC3 connection contains 21 VC12 calls. Hence, it can serve up to 21 VC12 calls. When a new VC12 call arrives, if there exists at least one available VC3 connection in the network, that VC12 call is severed immediately. However, if there is no available VC3 connection, that VC12 call has to wait a certain time, called setup latency, for the a new VC3 connection to be established. This is inconvenient for the customers. On the other hand, if there are more VC3 connections than the network requires, this can waste network resources. In this paper, we proposed the solution for these problems. In order to reduce the number of VC12 calls which have to wait, we setup a new VC3 before all VC12 time slots are occupied. Furthermore, to avoid the waste of the network resources, we do not establish all VC3 connections at the same time, but do establish step by step.

  • PDF

Object-Size and Call-Site Tracing based Shared Memory Allocator for False Sharing Reduction in DSM Systems (분산 공유 메모리 시스템에서 거짓 공유를 줄이는 객체-크기 및 호출지-추적 기반 공유 메모리 할당 기법)

  • Lee, Jong-Woo;Park, Young-Ho;Yoon, Yong-Ik
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.77-86
    • /
    • 2008
  • False sharing is a result of co-location of unrelated data in the same unit of memory coherency, and is one source of unnecessary overhead being of no help to keep the memory coherency in multiprocessor systems. Moreover, the damage caused by false sharing becomes large in proportion to the granularity of memory coherency. To reduce false sharing in page-based DSM systems, it is necessary to allocate unrelated data objects that have different access patterns into the separate shared pages. In this paper we propose sized and call-site tracing-based shared memory allocator, shortly SCSTallocator. SCSTallocator places each data object requested from the different call-sites into the separate shared pages, and at the same time places each data object that has different size into different shared pages. Consequently data objects that have the different call-site and different object size prohibited from being allocated to the same shared page. Our observations show that our SCSTallocator outperforms the existing dynamic shared memory allocators. By combining the two existing allocation technique, we can reduce a considerable amount of false sharing misses.

  • PDF

A Protocol Compression Scheme for Improving Call Processing of Push-To-Talk Service over IMS (IMS망에서 PTT서비스의 통화 처리 성능 향상을 위한 프로토콜 압축 기법)

  • Jung, In-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.257-271
    • /
    • 2009
  • In this paper, we propose a protocol compression scheme for enhancing the performance of call processing of PTT(Push-to-Talk) which is one of the important services in IMS(IP Multimedia Subsystem), a next generation integrated wired/wireless packet communication network. To service the PTT on an IMS network, it should use the same call setup procedure as legacy Mobile and TRS(Trunked Radio System) networks and have a fast call setup time and enough communication bandwidth because a number of terminals should be able to exchange same data in real time. The proposed A+SigComp scheme reduces the initial call setup delay of SIP by about 10%, which is used by PTT service for call setup. In addition, the A+ROHC scheme is proposed to compress the header of RTP packets transferred during PTT voice transmission and, as a result, about 5% of increase in communication efficiency is observed.

  • PDF

Cost Effective Analysis of Recall Methods for Cervical Cancer Screening in Selangor - Results from a Prospective Randomized Controlled Trial

  • Abdul Rashid, Rima Marhayu;Ramli, Sophia;John, Jennifer;Dahlui, Maznah
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.13
    • /
    • pp.5143-5147
    • /
    • 2014
  • Cervical cancer screening in Malaysia is by opportunistic Pap smear which contributes to the low uptake rate. To overcome this, a pilot project called the SIPPS program (translated as information system of Pap smear program) had been introduced whereby women aged 20-65 years old are invited for Pap smear and receive recall to repeat the test. This study aimed at determining which recall method is most cost-effective in getting women to repeat Pap smear. A randomised control trial was conducted where one thousand women were recalled for repeat smear either by registered letter, phone messages, phone call or the usual postal letter. The total cost applied for cost-effectiveness analysis includes the cost of sending letter for first invitation, cost of the recall method and cost of two Pap smears. Cost-effective analysis (CEA) of Pap smear uptake by each recall method was then performed. The uptake of Pap smear by postal letter, registered letters, SMS and phone calls were 18.8%, 20.0%, 21.6% and 34.4%, respectively (p<0.05). The CER for the recall method was lowest by phone call compared to other interventions; RM 69.18 (SD RM 0.14) compared to RM 106.53 (SD RM 0.13), RM 134.02 (SD RM 0.15) and RM 136.38 (SD RM 0.11) for SMS, registered letter and letter, respectively. ICER showed that it is most cost saving if the usual method of recall by postal letter be changed to recall by phone call. The possibility of letter as a recall for repeat Pap smear to reach the women is higher compared to sending SMS or making phone call. However, getting women to do repeat Pap smear is better with phone call which allows direct communication. Despite the high cost of the phone call as a recall method for repeat Pap smear, it is the most cost-effective method compared to others.

A Design of Voice Communication Service for U-Sports (U-Sports용 음성통신 서비스 모델 제안 및 Hands-free 기기의 구현)

  • Huh, Myung-Sun;Lee, Jong-Duck;Kim, Jae-O;Yang, Yoon-Seok;Ahn, Hyun-Sik;Jeong, Gu-Min
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.3
    • /
    • pp.208-212
    • /
    • 2008
  • This paper proposes a model of a voice communication using bluetooth and a mobile, and implements a hands-free for this model. A Proposed model uses bluetooth for a voice network, and is possible to share a voice with a great number of people using preemptive algorithm proposed in this paper. There are two types of models. One is a model only using a hands-free, the other is a model using a mobile. Second model uses a scatternet and a call forwarding service for a call on a voice communication. In case of using a scatternet, scatternet is composed of a piconet of a voice communication and a piconet of a call. In case of using a call forwarding service, the mobiles share information of each others before formation of a network.

  • PDF

DEVS Simulation of Spam Voice Signal Detection in VoIP Service (VoIP 스팸 콜 탐지를 위한 음성신호의 DEVS 모델링 및 시뮬레이션)

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Cho, Young-Duk;Kim, Hwan-Kuk;Won, Yoo-Jae;Kim, Myuhng-Joo
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2007
  • As the VoIP service quality is getting better and many shortcomings are being overcome, users are getting interested in this service. Also, there are several additional features that provide a convenience to users such as presence service, instant messaging service and so on. But, as there are always two sides of rein, some security issues have users hesitate to make use of it. This paper deals with one of the issues, the VoIP spam problem. We took into account the signal pattern of voice message in spam call and we have constructed voice signal models of normal call, normal call with noise and spam call. Each voice signal case is inserted into our spam decision algorithm which detects the spam calls based on the amount of information in the call signal. We made use of the DEVS-$Java^{TM}$ for our modeling and simulation. The contribution of this work is in suggestion of a way to detect voice spam call signal and testing of the method using modeling and simulation methodology.

  • PDF