• Title/Summary/Keyword: End-users

Search Result 1,138, Processing Time 0.023 seconds

A Study of the delay pattern of voice traffic for end-to-end users on the voice IP (VoIP 상에서 다양한 응용 서비스 트래픽에 따른 종단간 사용자의 음성 트래픽 지연 변화 연구)

  • 윤상윤;정진욱
    • Journal of the Korea Society for Simulation
    • /
    • v.10 no.2
    • /
    • pp.15-24
    • /
    • 2001
  • In this paper we study the delay patterns of voice traffic for end-to-end users Caused by serving the whole bunch of applications traffic at the same time on the Voice over Internet Protocol (VoIP) network. Given the current situation that voice traffic is served along with other application services on the VoIP network, it is quite necessary to figure out how and by what the voice traffic requiring high QoS is delayed. We compare the delay performance of voice traffic on the VoIP network under FIFO with the one under Weighted Fair Queuing(WFQ), and discover the differences of the delay performance resulting from the use of different voice codec algorithms. The results of our study show that using the voice codec algorithm with a higher coding rate nd the queuing algorithm of WEQ can provide users with high-quality voice traffic.

  • PDF

Essential Logical Model Approach in Analysis and Design for Patient Management and Accounting System : A Case Study (본질적 논리모형에 근거한 원무관리시스템의 분석과 설계)

  • 김명기
    • Health Policy and Management
    • /
    • v.4 no.2
    • /
    • pp.111-125
    • /
    • 1994
  • In developing total hospital information system, large amount of time and expense are to be spent while its results are likely to lead itself to end-users' dissatisfaction. Some of the main complaints on the part of end-users come from insufficient consideration of end-users environment as well as inappropriate representation of their requirement in the system alalysis and design. This papre addresses some advantages of Essential Logical Modeling Process for better analysis and design, explaining by example the developmental process of the Patent Management and Accounting System for a tertiary care hospital. In the case, the Essential Model, suggested by McMenamin and Palmer, proved to be an effective tool for clear separation of analysis and design phase and for better communication among system developers and with end-users. The modeling process itself contributed to better program modularity as well, shown in a Structured Chart. Difficulties in learning how to identify' essential activities' for the modeling practice were experienced in the beginnins stage, which were, however, overcome by elaborating some heuristic guideling and by rdferring to necessary tools including State Transition Diagram, Control Flow Diagram, and so many. While full evaluation of the Essential Model usag remains to wait till the completion of the case project, its strengt in making clear distinction between analysis and design phase was enough to be attractive to system analysts. The model concepts are open to many further application fields, particularly such areas as business re engineering, process remodeling, office automation, and organizational restructuring.

  • PDF

A Study on the Effect of Learning Activities and Feedback Seeking Behavior toward the End Users' Faithful Appropriation of Information Security System (조직내 최종사용자의 합목적적인 정보보호 시스템 사용 내재화와 학습, 피드백 추구 행동 연구)

  • Kim, Min Woong;Cheong, Ki Ju
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.117-146
    • /
    • 2016
  • Purpose The purpose of this paper is to examine factors and mechanism inducing end users' faithful appropriation of information security behavior through the information security system. This study is also trying to find out the role of Employees' adaptive activities like learning and feedback seeking behavior for the information security in organizations. Design/methodology/approach An empirical study was carried out with a sample of employees working in the financial service company. Employees(n = 268) completed a written questionnaire. Structural equation modeling was used to analyze the data. Findings Results indicated that employees' learning activities and feedback seeking behavior fully mediated the effect of major information security factors toward end users' faithfulness of appropriation of information security systems. In order to increase the level of employees information security behavior in accordance with security guideline, organizations should facilitate interactions that support the feedback seeking process between employees on information security awareness and behavior. Additionally, organizations may reinforce these behaviors by periodical training and adopting bounty hunter systems.

Developing End-User Oriented Quality Dimensions for BcN Service (사용자 중심의 광대역통합망 서비스 품질척도 연구)

  • Eun, Hyun-Ji;Kim, Seong-Cheol
    • Korean Management Science Review
    • /
    • v.23 no.3
    • /
    • pp.119-132
    • /
    • 2006
  • Since the guaranteed service quality(QoS) is spotlighted as a strategic competitive tool to Broadband Convergence Network(BcN) service providers, many scholars have dealt with QoS issues in the BcN environment. However, just a few researchers focus on end-users and most are lean toward service providers or technology itself. In this paper, therefore, we investigated how end-users could measure service quality in the BcN environment, and moreover, proposed the end-user oriented measurement guideline for BcN QoS. Through literature review and two surveys, four QoS dimensions and nineteen measurement items were derived from end-user's perspective. proposed QoS dimension and items would be utilized as meaningful tools for future BcN service.

Characteristics of a Corona between a Wiring Clamp (Dead End Clamp) and a Porcelain Insulator Used in a 154kV Power Receptacle

  • Han, Woon-Ki
    • International Journal of Safety
    • /
    • v.7 no.1
    • /
    • pp.21-25
    • /
    • 2008
  • The occurrence of a corona is that electrical discharge due to the heterogeneity that occurs when an electrical field is concentrated in an electrode due to a cusp formed on said electrode. Wire treatment at the end of a 154kV dead end clamp for end users accelerates the occurrence of corona, which in turn leads to power loss and noise. In this study, the characteristics of the corona which occurs between porcelain insulators and support clamps of overhead lines used in l54kV power receiving facilities for end users were investigated. The corona, which cannot be identified by one common method, was measured utilizing a UV image camera. A risk assessment for fire damage and its status was suggested. The stress distribution of the electrical field by length of bare wire was suggested by means of the finite element method (FEMLAB). As a result, it was found to affect a porcelain insulators. These results can be utilized for the enhancement of clamp installation and safety in power facilities.

Evaluating Modified IKONOS RPC Using Pseudo GCP Data Set and Sequential Solution

  • Bang, Ki-In;Jeong, Soo;Kim, Kyung-Ok
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.82-87
    • /
    • 2002
  • RFM is the sensor model of IKONOS imagery for end-users. IKONOS imagery vendors provide RPC (Rational Polynomial Coefficients), Ration Function Model coefficients for IKONOS, for end-users with imagery. So it is possible that end-users obtain geospatial information in their IKONOS imagery without additional any effort. But there are requirements still fur rigorous 3D positions on RPC user. Provided RPC can not satisfy user and company to generate precision 3D terrain model. In IKONOS imagery, physical sensor modeling is difficult because IKONOS vendors do not provide satellite ephemeris data and abstract sensor modeling requires many GCP well distributed in the whole image as well as other satellite imagery. Therefore RPC modification is better choice. If a few GCP are available, RPC can be modified by method which is introduced in this paper. Study on evaluation modified RPC in IKONOS reports reasonable result. Pseudo GCP generated with vendor's RPC and additional GCP make it possible through sequential solution.

  • PDF

A Study on the Classification Framework of Information Services (지역정보화과정에서의 정보서비스에 관한 연구-초고속망응용서비스의 분류체계를 중심으로-)

  • 김재전;이대용;정용기;고일상
    • The Journal of Information Systems
    • /
    • v.6 no.1
    • /
    • pp.181-221
    • /
    • 1997
  • In order to provide effective information services in a province, we should first select vendors who enable to meet end-users' needs and develop information services for the sake of end-users. Cases, policies, technological and legislative issues in information services have been researched well. But no research has been done on potential information services in the future and their classification. In this study, based on literature survey, future information services are gathered, described, and classified with respect to the needs of end-users, and finally a framework for the classification of information services is developed. This framework can be used as a criterion to select, with a priority, information services to be provided in province through the information super highway. The framework will contribute to accomplishing the effective use of information resources in the province, and eventually balancing the level of information utilization between provinces.

  • PDF

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

A Study on Traffic Volume Prediction for e-Commerce Systems (전자상거래 시스템의 트래픽량 예측에 관한 연구)

  • Kim, Jeong-Su
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.31-44
    • /
    • 2011
  • The applicability of network-based computing depends on the availability of the underlying network bandwidth. Such a growing gap between the capacity of the backbone network and the end users' needs results in a serious bottleneck of the access network in between. As a result, ISP incurs disadvantages in their business. If this situation is known to ISP in advance, or if ISP is able to predict traffic volume end-to-end link high-load zone, ISP and end users would be able to decrease the gap for ISP service quality. In this paper, simulation tools, such as ACE, ADM, and Flow Analysis, were used to be able to perceive traffic volume prediction and end-to-end link high-load zone. In using these simulation tools, we were able to estimate sequential transaction in real-network for e-Commerce. We also imported virtual network environment estimated network data, and create background traffic. In a virtual network environment like this, we were able to find out simulation results for traffic volume prediction and end-to-end link high-load zone according to the increase in the number of users based on virtual network environment.

An Architecture for User Level End-to-end QoS using Overlay in NGN (NGN에서 오버레이를 이용한 사용자 관점의 End-to-end QoS 지원 구조)

  • Lee Jihyun;Lim Kyungshik;Oh Hangseok;Nam Taekyong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.781-792
    • /
    • 2005
  • This study proposes an Architecture for user level End-to-end Quality of Service(QoS) using overlay In Next Generation Network(NGN). Inexisting NGNs, the IMS of a control plane provides user QoS through direct traffic control and resource-reservation over the IP packet transport network of a user plane. Further, a set of torrent studies are ongoing not only to maximize the QoS for users, but also to minimize the quality deterioration for supporting the user End-to-end QoS. Along with that, an extended QoS in user level must be considered, for Instance, differentiating service quality to support users' expectation, providing optimized contents by users' equipments, and so forth. Accordingly, the Overlay Service Network Architecture proposed by this study provides protocol adaptation for maximum throughput on transport layer by using the most efficient transport layer protocol to various network circumstances. Also, the Overlay Service Network Architecture on application layer distributes processing delay from the data transformation process of the user equipment to the network, and it is capable of intermediate processing depending on user service level. application service feature, and equipment circumstance as well. Thus, this study mainly proposes the Overlay Service Network Architecture for user level end-to-end QoS in NGN with the quality control features both on the transport layer and the application layer, an internal component feature, and a service scenario providing the QoS linking with 3GPP.