• Title/Summary/Keyword: 시스템 콜

Search Result 172, Processing Time 0.023 seconds

A Study on the Necessity of Advanced Safety Systems in Driver Emergencies (운전자 응급상황에서의 첨단안전시스템 필요성 연구)

  • Byungdo Kang;Bonggyun Jo;Yunhwa Lee;Taehyeong Kim
    • Journal of Auto-vehicle Safety Association
    • /
    • v.15 no.1
    • /
    • pp.63-68
    • /
    • 2023
  • A study on the need for a safety system using driver's biometric information, vehicle automatic emergency braking system, and the e-call system that in the event of an unexpected situation such as loss of driving ability due to sudden physical abnormality of elderly drivers and drivers with health problems, and the improvement of laws for the spread of this system were studied.

A proxy driving system supporting user convenience and system efficiency (사용자 편의성과 시스템 효율성을 지원하는 대리운전 시스템)

  • Koh, Jeong-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1725-1733
    • /
    • 2012
  • This paper describes the design and implementation of a 3-tiered proxy driving system utilizing smartphones. This system provides customers with a convenient request facility, and enables proxy drivers to provide a prompt service based on customer's location information. Implemented system supports two methods such as the existing phone-call and the online requesting method using smartphones. Performance analysis shows that the higher the ratio of online requests, the greater the effect of decreasing of phone jockey's workloads and the reduction of request processing time through the automation of receipt and processing. From a proxy driver company's standpoint, this system minimizes the increase of phone jockeys, and improves customer satisfaction through good service quality. This system also helps the company reduce the cost and increase the market share.

Development of Ubiquitous Marketing System based on Context Awareness (상황 인식 기반의 유비쿼터스 마케팅 시스템 개발)

  • Choi, Dong-Oun;Song, Hang-Suk;Park, In-Chul;Kim, Soo-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.702-709
    • /
    • 2008
  • In this paper, Developed u-Marketing system prototype based on location base service could offer because this treatise combines personalized and mobility. It is u-Marketing system takes advantage of u-LBS base skill to support marketing that is old Mobile more efficiently u-marketing call center. If it was marketing in spam way that marketing to be Mobile passes public information contents one-sidely to unspecificness many customers so far, u-Marketing system takes advantage of u-LBS base skill-marketing system is u-marketing system of location base that can take advantage of subscriber's location information through portable phone or GPS with transfer telegraph operator adulterating member's distinction of sex, age, residential district, profession and support satisfied article ordered style Target marketing.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

LxBSM: Loadable Kernel Module for the Creation of C2 Level Audit Data based on Linux (LxBSM: C2 수준의 감사 자료 생성을 위한 리눅스 기반 동적 커널 모듈)

  • 전상훈;최재영;김세환;심원태
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.146-155
    • /
    • 2004
  • Currently most of commercial operating systems contain a high-level audit feature to increase their own security level. Linux does not fall behind the other commercial operating systems in performance and stability, but Linux does not have a good audit feature. Linux is required to support a higher security feature than C2 level of the TCSEC in order to be used as a server operating system, which requires the kernel-level audit feature that provides the system call auditing feature and audit event. In this paper, we present LxBSM, which is a kernel module to provide the kernel-level audit features. The audit record format of LxBSM is compatible with that of Sunshield BSM. The LxBSM is implemented as a loadable kernel module, so it has the enhanced usability. It provides the rich audit records including the user-level audit events such as login/logout. It supports both the pipe and file interface for increasing the connectivity between LxBSM and intrusion detection systems (IDS). The performance of LxBSM is compared and evaluated with that of Linux kernel without the audit features. The response time was increased when the system calls were called to create the audit data, such as fork, execve, open, and close. However any other performance degradation was not observed.

A Design and Implementation of CTI based Interactive CRM Utilizing Caller-ID (Caller-ID를 활용한 CTI기반의 인터액티브 CRM설계 및 구현)

  • Park, Chan-Il;Bae, Hyun-Jun;Moon, Seung-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05b
    • /
    • pp.803-806
    • /
    • 2003
  • CTI(Computer and Telephony Integration) 기술이 1970년대 처음 선 보인 이래, 정보통신 기술의 눈부신 발전과 함께 그 인기가 날로 높아져 가고 있다. 정보기술(Information Technology)의 발전으로 향상된 컴퓨터의 기능을 활용한 다양한 서비스가 출현하면서 고객과 기업간의 상호 접촉이 증가되고 있다. 과거의 CTI기술은 Inbound 위주의 Voice and Call Communication 만을 위한 소극적인 개념이었으나, 현재의 대 다수의 기업들은 좀더 발전된 CTI 기술을 활용하고 있다. 최근 들어 기업간의 경쟁이 치열해지고 고객에 대한 우위를 높이기 위해 새로운 돌파구가 필요했다. 이에 대한 경영 솔루션으로, 인터넷 환경을 통합한 CITI(Computer and Internet Telephony Integration)와 eCRM 개념을 활용한 시스템의 사용으로 질 높은 서비스와 매출증대, 경비절감 등과 같은 경쟁력을 개선시킬 수 있었다. 본 논문은 CTI 기술과 CRM 개념을 활용한 시스템을 설계 구현하였다 이는, 전화의 호 전송, 호수신, 호 전달 등의 기능과 CTI 와 사설교환기(PBX)의 링크를 통합한 시스템이다. 제안된 시스템은 콜센터(Call Center)나 기타 고객의 접촉이 집중된 기업에 응용 되도록 설계되었다.

  • PDF

A Design and Implementation of the User Customized e-Ring(Enterprise Ring Back Tone) System (사용자 맞춤형 e-Ring(Enterprise Ring Back Tone) 시스템 설계 및 구현)

  • Kim, Jung-Sook;Yang, Myeong-Yeon;Kim, Hong-Sop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.37-45
    • /
    • 2007
  • In this paper, we proposed a new customized e-Ring(Enterprise Ring Back Tone) system which could be represented each user and organization feature. The e-Ring system provided the ring back tone and additional services to reduce the waiting time when the client called an organization. This system was for an appropriate organization public relations instead of the meaningless ring back tone which was used usual call, also was maximized the service availability and work efficiency which was obtained from the automatic response and service suppling to users who had needs and questions.

  • PDF

Key Distribution Protocol and Call Control for Secure ISDN (안전한 종합정보통신망을 위한 키 분배 프로토콜과 호 제어)

  • Jeong, Hyeon-Cheol;Sin, Gi-Su;Lee, Seon-U;Kim, Bong-Han;Kim, Jeom-Gu;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.195-208
    • /
    • 1997
  • ISDN is network which has been developed to integrate and transfer some information(data, video, voice). In the ISDN, security problem that threat and intrusion about important information resource increase because every information is transferred in the form of digital and access of network has patiency. In this paper, for protect important information resource, studied that apply application method and encryption system to ISDN, and system structure, ITU-T Q.931 protocol were analyzed, and proposable encryption key distribution protocol, call control with hybrid encryption system for user information privacy to provide security service.

  • PDF

Design and Implementation of a Remote Debugger for Concurrent Debugging of Multiple Processes based on Embeded Linux System (임베디드 Linux 시스템 기반 프로세스 동시 디버깅을 지원하는 원격 디버거 설계 및 구현)

  • Sim, Hyun-Chul;Kang, Yong-Hyeog;Eom, Young-Ik
    • The KIPS Transactions:PartA
    • /
    • v.10A no.4
    • /
    • pp.305-312
    • /
    • 2003
  • In the embedded Linux environments, developers can concurrently debug multiple processes that have parent-child relationships using multiple gdbs and gdbservers. But, it needs additional coding efforts and messy works of activating another gdbs and gdbservers for each created process, and so, it may be inefficient in the viewpoint of developers. In this paper, we propose a mgdb library and mgdbserver that supports concurrent debugging of multiple processes in the embedded Linux systems by using the library wrapping mechanism without modifying the kernel. Also, through the experimentation of concurrent debugging for multiple processes that communicate by an unnamed pipe, we show that our proposed debugging mechanism is more efficient than the preexisting mechanisms.