• Title/Summary/Keyword: 최선형 서비스

Search Result 86, Processing Time 0.021 seconds

Advanced Calendar Queue Scheduler Design Methodology (진보된 캘린더 큐 스케줄러 설계방법론)

  • Kim, Jin-Sil;Chung, Won-Young;Lee, Jung-Hee;Lee, Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1380-1386
    • /
    • 2009
  • In this paper, we propose a CQS(Calendar Queue Scheduler) architecture which was designed for processing multimedia and timing traffic in home network. With various characteristics of the increased traffic flowed in home such as VoIP, VOD, IPTV, and Best-efforts traffic, the needs of managing QoS(Quality of Service) are being discussed. Making a group regarding application or service is effective to guarantee successful QoS under the restricted circumstances. The proposed design is aimed for home gateway corresponding to the end points of receiver on end-to-end QoS and eligible for supporting multimedia traffic within restricted network sources and optimizing queue sizes. Then, we simulated the area for each module and each memory. The area for each module is referenced by NAND($2{\times}1$) Gate(11.09) when synthesizing with Magnachip 0.18 CMOS libraries through the Synopsys Design Compiler. We verified the portion of memory is 85.38% of the entire CQS. And each memory size is extracted through CACTI 5.3(a unit in mm2). According to the increase of the memory’sentry, the increment of memory area gradually increases, and defining the day size for 1 year definitely affects the total CQS area. In this paper, we discussed design methodology and operation for each module when designing CQS by hardware.

Status of Interchange of Medical Imaging in Korea: A Questionnaire Survey of Physicians (영상정보교류 실태 파악을 위한 의사 설문조사)

  • Choi, Moon Hyung;Jung, Seung Eun;Kim, Sungjun;Shin, Na-Young;Yong, Hwan Seok;Woo, Hyunsik;Jeong, Woo Kyoung;Jin, Kwang Nam;Choi, SeonHyeong
    • Journal of the Korean Society of Radiology
    • /
    • v.79 no.5
    • /
    • pp.247-253
    • /
    • 2018
  • The purpose of this study was to summarize the results of a survey for physicians with specialties other than radiology about imaging studies of patients referred from other institutions. The survey was promoted through individual contacts or social network service and physicians who voluntarily responded to the survey were the subjects of the study. The questionnaire consisted of 11 questions about basic information and referrals about medical imaging. A total of 160 physicians from 30 specialties participated in the survey and 95.6% of the respondents worked in tertiary care center or general hospital. Patients were frequently referred with outside medical images. The most frequently referred imaging modalities were computed tomography and magnetic resonance imaging. However, radiological reports from outside institutions were rarely referred. Most physicians thought that reinterpretation for outside imaging is necessary to acquire a secondary opinion. In conclusion, considering that outside radiological reports are frequently missing and there are high demands on reinterpretation for outside imaging, guidelines for referral of radiological reports with medical imaging, basic elements of radiological reports, and reinterpretation need to be developed.

Performance Analysis of DoS/DDoS Attack Detection Algorithms using Different False Alarm Rates (False Alarm Rate 변화에 따른 DoS/DDoS 탐지 알고리즘의 성능 분석)

  • Jang, Beom-Soo;Lee, Joo-Young;Jung, Jae-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.139-149
    • /
    • 2010
  • Internet was designed for network scalability and best-effort service which makes all hosts connected to Internet to be vulnerable against attack. Many papers have been proposed about attack detection algorithms against the attack using IP spoofing and DoS/DDoS attack. Purpose of DoS/DDoS attack is achieved in short period after the attack begins. Therefore, DoS/DDoS attack should be detected as soon as possible. Attack detection algorithms using false alarm rates consist of the false negative rate and the false positive rate. Moreover, they are important metrics to evaluate the attack detections. In this paper, we analyze the performance of the attack detection algorithms using the impact of false negative rate and false positive rate variation to the normal traffic and the attack traffic by simulations. As the result of this, we find that the number of passed attack packets is in the proportion to the false negative rate and the number of passed normal packets is in the inverse proportion to the false positive rate. We also analyze the limits of attack detection due to the relation between the false negative rate and the false positive rate. Finally, we propose a solution to minimize the limits of attack detection algorithms by defining the network state using the ratio between the number of packets classified as attack packets and the number of packets classified as normal packets. We find the performance of attack detection algorithm is improved by passing the packets classified as attacks.

A Study on the Possibility of Self-Correction in the Market for Protecting Internet Privacy (인터넷 개인정보보호의 시장자체해결가능성에 대한 연구)

  • Chung, Sukkyun
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.27-37
    • /
    • 2012
  • Internet privacy has become a significant issue in recent years in light of the sharp increase in internet-based social and economic activities. The technology which collects, processes and disseminates personal information is improving significantly and the demand for personal information is rising given its inherent value in regard to targeted marketing and customized services. The high value placed on personal information has turned it into a commodity with economic worth which can be transacted in the marketplace. Therefore, it is strongly required to approach the issue of privacy from economic perspective in addition to the prevailing approaches. This article analyzes the behaviors of consumers and firms in gathering personal information, and shielding it from unauthorized access, using a game theory framework in which players strive to do their best under the given conditions. The analysis shows that there exist no market forces which require all firms to respect consumer privacy, and that government intervention in the form of a nudging incentive for information sharing and/or strict regulation is necessary.

Effective Bandwidth Measurement for Dynamic Adaptive Streaming over HTTP (DASH시스템을 위한 유효 대역폭 측정 기법)

  • Kim, Dong Hyun;Jung, Jong Min;Huh, Jun Hwan;Kim, Jong Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.42-52
    • /
    • 2017
  • DASH (Dynamic Adaptive Streaming over HTTP) is an adaptive streaming technique that enables transmission of multimedia content when clients request the multimedia contents to server. In this system, to ensure the best quality of the content to satisfy users, it is necessary to precisely measure the residual bandwidth. However, the measured residual bandwidth by the DASH, which is not considering the transmission features of TCP, varies by the size of previous media segment, which makes it hard to ensure QoE to users. In this paper, we excluded the TCP Slow start range from measurement of residual bandwidth and suggested the new DASH bandwidth measuring method to decrease the error. Then, we realized the method in DASH system based on open source, and compared the existing measuring method. The new method showed that the accuracy of result has increased by 20%. Also, it could improve the QoE of users in terms of service quality and number of changes of segment quality.

Research on Making a Disaster Situation Management Intelligent Based on User Demand (사용자 수요 기반의 재난 상황관리 지능화에 관한 연구)

  • Seon-Hwa Choi;Jong-Yeong Son;Mi-Song Kim;Heewon Yoon;Shin-Hye Ryu;Sang Hoon Yoon
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_2
    • /
    • pp.811-825
    • /
    • 2023
  • In accordance with the government's stance of actively promoting intelligent administrative service policies through data utilization, in the disaster and safety management field, it also is proceeding with disaster and safety management policies utilizing data and constructing systems for responding efficiently to new and complex disasters and establishing scientific and systematic safety policies. However, it is difficult to quickly and accurately grasp the on-site situation in the event of a disaster, and there are still limitations in providing information necessary for situation judgment and response only by displaying vast data. This paper focuses on deriving specific needs to make disaster situation management work more intelligent and efficient by utilizing intelligent information technology. Through individual interviews with workers at the Central Disaster and Safety Status Control Center, we investigated the scope of disaster situation management work and the main functions and usability of the geographic information system (GIS)-based integrated situation management system by practitioners in this process. In addition, the data built in the system was reclassified according to purpose and characteristics to check the status of data in the GIS-based integrated situation management system. To derive needed to make disaster situation management more intelligent and efficient by utilizing intelligent information technology, 3 strategies were established to quickly and accurately identify on-site situations, make data-based situation judgments, and support efficient situation management tasks, and implementation tasks were defined and task priorities were determined based on the importance of implementation tasks through analytic hierarchy process (AHP) analysis. As a result, 24 implementation tasks were derived, and to make situation management efficient, it is analyzed that the use of intelligent information technology is necessary for collecting, analyzing, and managing video and sensor data and tasks that can take a lot of time of be prone to errors when performed by humans, that is, collecting situation-related data and reporting tasks. We have a conclusion that among situation management intelligence strategies, we can perform to develop technologies for strategies being high important score, that is, quickly and accurately identifying on-site situations and efficient situation management work support.