• Title/Summary/Keyword: proxy management

Search Result 340, Processing Time 0.021 seconds

Development of a Call Center System using CTI : A Proxy Driving System (CTI를 이용한 콜센터 시스템 개발 : 대리운전 시스템)

  • Park, Sang-Sung;Jung, Won-Gyo;Shin, Young-Guen;Jang, Dong-Sik
    • IE interfaces
    • /
    • v.20 no.3
    • /
    • pp.309-314
    • /
    • 2007
  • By an explosive increase of proxy driving, customers require the quick and correct services of call center. But because most call centers have an unsystematic management system, grievance of customers is continually increasing. To solve these problem, we constructed a call center system of proxy driving that is based on CTI (Computer Telephony Integration) in this paper. The proposed system is constructed using CID (Caller Identify Display) terminal, SMS (Short Message Service) and call center management program etc. Customer service level could be improved through efficient customer management by using the proposed system. Also it could be convenient and easy to implement customer management, order management, staff management, SMS and settlement of accounts.

Performance Evaluation of Disk I/O for Web Proxy Servers (웹 프락시 서버의 디스크 I/O 성능 평가)

  • Shim Jong-Ik
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.603-608
    • /
    • 2005
  • Disk I/O is a major performance bottleneck of web proxy server. Today's most web proxy sowers are design to run on top of a general purpose file system. But general purpose file system can not efficiently handle web cache workload, small files, leading to the performance degradation of entire web proxy servers. In this paper we evaluate the performance potential of raw disk to reduce disk I/O overhead of web proxy servers. To show the performance potential of raw disk, we design a storage management system called Block-structured Storage Management System (BSMS). And we also actually implement web proxy server that incorporate BSMS in Squid. Comprehensive experimental evaluations show that raw disk can be a good solution to improve disk I/O performance significantly for web proxy servers.

The Design of Proxy for CORBA Traffic Monitoring Using OSI management technology (OSI 관리 기술을 이용한 CORBA 트래픽 모니터링 프록시 설계)

  • 박재성;송왕철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.355-362
    • /
    • 1999
  • Traffic monitoring, a part of the system management, is a vital function lot the proper operation of a system in use. Currently OMG has been trying to standardize CORBA system management. Besides, many companies and research laboratories have been developing and studying CORBA system management. In this paper, we have designed the proxy to monitor the CORBA traffic using the OSI management technology. To manage CORBA traffic resources, 6 parameters have been made into managed objects. The monitoring system consists of a CORBA server, a proxy object and an MIB. The CORBA server is made up of a service provider, a proxy server, and a event sewer. The proxy object acts as a process of a CORBA object, and is made up of a proxy client, a event client, and an IPC server.

  • PDF

Non-Controlling Interests and Proxy of Real Activities Manipulation in Stakeholder-Oriented Corporate Governance

  • FUJITA, Kento;YAMADA, Akihiro
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.10
    • /
    • pp.105-113
    • /
    • 2022
  • The purpose of this paper is to analyze the relationship between the ratio of non-controlling shareholder interests (minority equity ratio, MER) and the measurement error in real activities manipulation (RM) proxy for Japanese firms. Many Japanese firms have practiced stakeholder-oriented corporate governance systems. Previous studies suggest that the higher the MER, the more Japanese businesses tend to employ management techniques for the group's sales growth while also reallocating resources inside the group to reduce principal-principal conflicts. Such differences in management strategies by firms could lead to measurement error in the RM proxy. The analysis uses 16,450 firm-years listed on the Tokyo Stock Exchange. The results of our analysis show that there is a positive relationship between MER and the RM proxy, and high persistence of RM proxies, suggesting that the RM proxies may contain measurement error. We also find that MER is correlated with variables associated with management strategy and that controlling for these variables can reduce the measurement error of RM proxy in firms with large MER. This study extends previous research on measurement error in RM proxy by relating them to ownership structure and corporate governance. This paper would contribute to researchers examining issues related to RM.

Analytical Approach of Proxy-LMA Mobility System in Heterogeneous IP-based Mobile Networks

  • Cho, Chulhee;Choi, Jae-Young;Jeong, Jongpil
    • International journal of advanced smart convergence
    • /
    • v.4 no.1
    • /
    • pp.71-87
    • /
    • 2015
  • Mobile users want to be provided with undisrupted network services when they navigate on the Next-Generation (NG) wireless networks. For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the Next-Generation (NG) network environment. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.

A New Mobility Management Scheme in Proxy Mobile IPv6 Networks with Dynamic Paging Support (Proxy Mobile IPv6 환경에서 동적 페이징 지원을 위한 이동성 관리기법)

  • Yi, Myung-Kyu;Kim, Cheol-Joong;Park, Seok-Cheon;Yang, Young-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.9
    • /
    • pp.1999-2007
    • /
    • 2010
  • Proxy Mobile IPv6(PMIPv6) is a network-based mobility management protocol and it does not require mobile node's involving in mobility management. In PMIPv6, the Mobile Access Gateway (MAG) incurs a high signaling cost to update the location of a mobile node to the remote Local Mobility Anchor (LMA) if it moves frequently. It may cause excessive signaling traffic and increase a high traffic load on LMA. Therefore, we propose a new mobility management scheme in proxy mobile IPv6 networks with dynamic paging support. To minimize signaling overhead, in our proposal, the size of the paging area is determined dynamically according the changes of mobility and traffic patterns of the mobile node. An analytic model is applied to determine the optimal size of the paging area. The cost analysis using fluid flow model presented in this paper shows that our proposal can achieve performance superior that of PMIPv6 scheme.

Implementation of TMN-based Performance Proxy Agent for ATM Switching Systems (ATM 교환 시스템을 위한 TMN 기반의 Proxy 성능 관리대행자 구현)

  • 권봉경;김화성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.562-570
    • /
    • 2002
  • The network-wide performance management is crucial for maintaining the quality of network services, which requires the collection and monitoring the performance data at individual network nodes. Most of the public networks, however, are composed of diverse, heterogeneous network nodes that are managed by various types of proprietary management systems with a conventional operator console and embedded management functions, which makes it difficult to implement the integrated performance management systems. Even though the developments of TMN (Telecommunication Management Network) based management systems are being attempted, the little work has been done in performance management area. In this paper, we propose the performance monitoring architecture for ATM switches using the 0₃ object model and describe how to implement the TMN-based performance prosy agent for ATM switching systems. The proposed performance proxy agent provides the TMN standard performance management interfaces by translating the proprietary performance management functions, which eventually leads to network-wide integrated performance management.

Proxy Management Protocol for based on Verifier for Efficient Proxy Signature (효율적인 위임서명을 위한 검증자 중심의 위임관리 프로토콜)

  • Park Se-Joon;Lee Yong-Joon;Oh Dong-Yeol;Oh Hae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.93-101
    • /
    • 2006
  • Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signature schemes that used in these days have some problems about the security. Especially, it is difficult to prevent misuse of certification and private key. In this thesis, we propose the more stronger security structure by turning the point from original signer with proxy signer to original signer with verifier, and the proposed protocol is more stronger than previous scheme and can be applied to various PKI based application.

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

Connection Setup Method for Mobile SCTP to a Mobile Node Using Direct Interoperation with Location Management System (Mobile SCTP에서 위치관리 시스템과 직접 연동을 통한 이동 단말로의 연결 설정 방법)

  • Kim, Kwang-Ryoul;Kim, Seung-Kuck;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.3
    • /
    • pp.183-191
    • /
    • 2008
  • In this paper, we propose Stream Control Transmission Protocol(SCTP) proxy which supports making an SCTP connection from a Corresponding Node(CN) to a Mobile Node(MN). Recently, mobility support in transport layer is proposed, which provides mobility in end-to-end way using the extension of SCTP. Mobile SCTP can provide handover to all applications that use SCTP as a transport protocol. However, current SCTP does not include independent location management service and can not make connection from a CN to a MN without assistance of other mobile protocols. To solve this problem, Proposed SCTP proxy interoperates with generic location management service and performs an address transformation to forward connection set up messages to the MN. Using the proposed proxy, SCTP can provide a complete mobility support including a connection setup to the MN and maintaining an existing connection.