• Title/Summary/Keyword: CALL application

Search Result 333, Processing Time 0.026 seconds

Asynchronous Remote Procedure Call Service System using the XML Technology (XML 기술을 이용한 비 동기 RPC 자원 서비스 시스템)

  • 김정희;곽호영
    • Journal of Internet Computing and Services
    • /
    • v.3 no.6
    • /
    • pp.1-11
    • /
    • 2002
  • The purpose of this paper is the design and implementation of asynchronous remote procedure call (RPC) resource service system using the XML technology. For this purpose, the request information of client is encoded into XML document based on XML-DOM and transferred to server, Server classifies the client requests into general application program and XML-RPC service using the object which can deal with the XML-DOM. In addition, server saves the request result of client in XML-DOM structure not transmitting it immediately in order to support asynchronous service, and makes the client request redirected to another request server in XML-DOM information. As a result, general RPC and XML-RPC services were attained and client request was redirected to servers, and the execution environment was simplified compared to common RPC.

  • PDF

The Development and Utilization of I_smart_keeper for the Learner's Smart Phone Control (학습자의 스마트폰 제어를 위한 아이스마트키퍼 개발 및 적용)

  • Han, Kyujung;Heo, Jaeyoung
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.3
    • /
    • pp.253-264
    • /
    • 2013
  • We development the service that teacher and parent can control the smart phone of student in school and home, the name is I_smart_keeper. The service is composed of server system, teacher's application, parent's application and student's application. The control of student's phone in school is operated by school timetable and GPS(Global Positioning System) in smart phone. The student's phone is operating one of six policy. The six policy is 'emergency call only', 'specific application only', 'call only', 'call and text only', 'all allowed' and 'all lock'. The teacher can change the current policy with his or her phone, That is a the temporary policy can be applied on a day. In school hours, teacher is able to instruct student using application appropriate to the teaching. If student is leaving school early and located outside school, the service do free the student's phone by GPS of her or his phone. We show the Smart Health Indicator (SHI)that analyse the pattern of student's phone habit and SHI will guide a desirable student's phone habit. In home, parent can control child's phone. The service will help the risk reduction of a robbery case due to keeping student's phone by teacher in class. Currently one elementary school's all student use I_smart_keeper and three elementary school is testing to some class. The teacher's impression was very good and they usually use I_smart_keeper for class in positive light. Survey results for students with higher satisfaction.

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

System-Call-Level Core Affinity for Improving Network Performance (네트워크 성능향상을 위한 시스템 호출 수준 코어 친화도)

  • Uhm, Junyong;Cho, Joong-Yeon;Jin, Hyun-Wook
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.1
    • /
    • pp.80-84
    • /
    • 2017
  • Existing operating systems experience scalability issues as the number of cores increases. The network I/O performance on manycore systems is faced with the major limiting factors of cache consistency costs and locking overheads. Legacy methods resolve this issue include the new microkernel-like operating system or modification of existing kernels; however, these solutions are not fully application transparent. In this study, we proposed a library that improves the network performance by separating system call context from user context and by applying the core affinity without any kernel and application modifications. Experiment results showed that our implementation can improve the network throughput of Apache by up to 30%.

Extracting Graphics Information for Better Video Compression

  • Hong, Kang Woon;Ryu, Won;Choi, Jun Kyun;Lim, Choong-Gyoo
    • ETRI Journal
    • /
    • v.37 no.4
    • /
    • pp.743-751
    • /
    • 2015
  • Cloud gaming services are heavily dependent on the efficiency of real-time video streaming technology owing to the limited bandwidths of wire or wireless networks through which consecutive frame images are delivered to gamers. Video compression algorithms typically take advantage of similarities among video frame images or in a single video frame image. This paper presents a method for computing and extracting both graphics information and an object's boundary from consecutive frame images of a game application. The method will allow video compression algorithms to determine the positions and sizes of similar image blocks, which in turn, will help achieve better video compression ratios. The proposed method can be easily implemented using function call interception, a programmable graphics pipeline, and off-screen rendering. It is implemented using the most widely used Direct3D API and applied to a well-known sample application to verify its feasibility and analyze its performance. The proposed method computes various kinds of graphics information with minimal overhead.

Advanced Unified Communication Service System (차세대 통합 커뮤니케이션 서비스 제공 시스템)

  • Shin, Young-Mee;Bae, Hyun-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.962-970
    • /
    • 2011
  • This paper describes an advanced unified communication system. The advanced unified communications mean a service that integrates basic communications such as call, SMS, email, and chatting with social networking service considered as a new communication channel, presenting a unified user interface. The advanced unified communication system is composed of advanced UC(Unified Communications) applications, open UC service platform, and UC back-end servers. The advanced UC applications consist of web-based application and smart phone application. The open UC service platform provides a variety of service components that enable the third party applications to access basic communications and social network services within an enterprise. The UC back-end servers provide server functionalities for call, SMS, email, and chatting.

Bluetooth Audio Gateway and Headset including Connection Function to the Mobile Phone (휴대폰 접속 기능을 포함한 블루투스 오디오 게이트웨이 및 헤드셋)

  • Chung, J.S.;Chung, T.Y.;Jung, K.W.
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.539-544
    • /
    • 2004
  • This paper presents the implementation of the bluetooth headset and the audio gateway connected to the mobile Phone in the embedded environment. The bluetooth module includes the BC02 processor chip, the BCSP02 firmware and the bluelab software Including bluetooth protocol stack. The above components in the bluetooth module developed at CSR company are used as the development environment. The application program using API functions supported by bluelab is coded by C language and loaded on the flash ROM of the bluetooth module. The cail processing capacity measuring the call setup time and the clearing time between the audio gateway and the headset is considered as the performance parameter of the developed systems. As a call setup and clearing time between the audio gateway and the headset is about 88.8ms, the call processing capacity is about 11 calls per second. Therefore the performance result is satisfied in the aspect of the call processing time.

A Cluster Application System with CallBack Delay Time Decrease on DMA Communication (CallBack 지연시간 감소를 통한 DMA 통신 기반의 클러스터 응용 시스템)

  • Kim Han-Ho;Park Ui-Su;Choi Hyun-Ho;Yoo Won-Kyong;Yoo Kwan-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.753-756
    • /
    • 2006
  • 최근 인터넷이 발전함에따라 사용자로 하여금 다양한 형태의 멀티미디어 서비스에 대한 요구를 증가시켰다. 하지만 욕구가 다양해짐에 다라 처리해야할 데이터는 단순 텍스트에서 멀티미디어 데이터로 전환되었다. 그로 인해 데이터의 용량은 기하급수적으로 늘어나고 이를 처리하기 위해서는 고성능 대용량 서버의 필요성이 대두되고 있다. 하지만 기존의 고성능 단일 서버의 모델은 멀티미디어 데이터를 처리하는데 있어서 사용자의 요구를 충분히 만족시키기에는 많은 문제점을 가지고 있다. 이러한 문제점을 해결하기 위해 리눅스 클러스터 시스템은 하나의 해결책으로 제시되고 있다. 본 논문은 Myrinet을 사용한 클러스터 응용에 있어서 DMA 통신을 통해 고성능 단일 서버의 문제점을 해결하고 성능을 향상 시키는데 있다.

  • PDF

Performance Analysis of Saturation Routing Algorithm in Non-Hierarchical Networks (비계층 통신망에서의 포화 경로 선정 알고리즘의 성능분석)

  • Park Young-Chul
    • Journal of Digital Contents Society
    • /
    • v.3 no.1
    • /
    • pp.89-99
    • /
    • 2002
  • Saturation routing algorithm is known to be an effective routing mechanism for tactical application and packet radio networks, since it minimizes the call set-up time and does not have to maintain routing tables. But, it is known that it has significant drawbacks with respect to the network efficiency, the overhead on the control messages [1]. We consider a tactical circuit-switched grid network with a maximum of tour links and two priority classes of voice traffic. Using the minimum first-derivative length (MFDL) path, we improve the blocking probability performance of a circuit-switched network without increasing the call set-up time and processor loading of the algorithm.

  • PDF

Performance Evaluation of DAR(Dynamic Adaptive Routing) and FSR(Flood Search Routing) Methods in a Common Channel Signaling Scheme (공통선 신호방식에서의 DAR(Dynamic Adaptive Routing)방식과 FSR(Flood Search Routing)방식의 성능평가)

  • 김재현;이종규
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.12
    • /
    • pp.1-8
    • /
    • 1994
  • In this paper, we hve compare the performance of DAR(Dynamic Adaptive Routing) with that of FSR(Flooding Search Routing) to select an adequate routing protocol in circuit-switched networs. As a performance factor, we have considered call setup time, which is the key factor of performance evaluation in circuit switched networks. We have evaluated the performance of two methods in grid topology circuit-switched networks using a commn channel signaling scheme, as application examples. As results, FSR method shows better performance than DAR method under light traffic load, when the number of links by which call has passed increases, but DAR method represents better performance than FSR method under heavy traffic load or large networks because of redundant packets.

  • PDF