• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.024 seconds

Practical Quality Model for Measuring Service Performance in SOA (SOA 서비스 성능 측정을 위한 실용적 품질모델)

  • Oh, Sang-Hun;Choi, Si-Won;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.235-246
    • /
    • 2008
  • Service-Oriented Architecture (SOA) is emerging as an effective approach for developing applications by dynamically discovering and composing reusable services. Generally, the benefits of SOA are known as low-development cost, high agility, high scalability, business level reuse, etc. However, a representative problem for widely applying SOA is the performance problem. This is caused by the nature of SOA such as service deployment and execution in distributed environment, heterogeneity of service platforms, use of a standard message format, etc. Therefore, performance problem has to be overcome to effectively apply SOA, and service performance has to be measured precisely to analyze where and why the problem has occurred. Prerequisite for this is a definition of a quality model to effectively measure service performance. However, current works on service performance lacks in defining a practical and precise quality model for measuring performance which adequately addresses the execution environment and features of SOA. Hence, in this paper, we define a quality model which includes a set of practical metrics for measuring service performance and an effective technique to measure the value of the proposed metrics. In addition, we apply the metrics for Hotel Reservation Service System (HRSS) to show the practicability and usefulness of the proposed metrics.

A Wireless AP Power Saving Algorithm by Applying Sleep Mode and Transmission Power Coordination in IoT Environments (사물 인터넷 환경에서 무선 AP의 수면 모드 운영 및 송출 전력 조절을 통한 전력 소비 절감 알고리즘)

  • Jeong, Kyeong Chae;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.393-402
    • /
    • 2014
  • We have experienced an explosive increase of the IoT(Internet of Things) technology based devices including smart phones and the wireless communications. Also the growing power consumption in IEEE 802.11 WLANs(Wireless LANs) driven by these dramatic increases in not only mobile users and but also wireless APs(Access Points). To reduce the power consumption, this paper proposes a wireless AP power saving algorithm, which minimizes the transmission power without decrease the transmission and carrier sense ranges. A wireless AP which is use in our algorithm checks its own original coverage periodically for whether there is a new STA(Station) or not when its transmission power is decreased. Moreover, if there are no signaling message to connect the wireless AP, it changes its operation mode Wake-up to sleep. A Result shows that the proposed AP algorithm can reduce the total power consumption of the wireless AP approximated 18% and 35% compared to the conventional wireless AP with and without the existing power saving algorithm, respectively.

The Effect of Nonverbal Communication in University Teaching: Moderating Role of Academic Self-Efficacy (대학 강의에서 비언어적 행위의 효과: 학업적 자기효능감의 조절효과)

  • Lee, Kyung-Tag
    • Journal of vocational education research
    • /
    • v.30 no.4
    • /
    • pp.69-87
    • /
    • 2011
  • Until now, most of the attention related information and knowledge transmission is on the verbal message provided by educators. But recently, many researchers are emphasizing importance of nonverbal communication behavior in the evaluation of communicator include educators. When nonverbal messages reinforce verbal messages, meaning is conveyed quickly and easily and with increased comprehension. The purpose of this study is to analyze the effect of professor nonverbal communication on students' academic achievement. In this study, nonverbal communication was divided into the three dimensions of kinesis, proxemics, paralanguage, and physical appearance. It was studied to examine the direct or indirect effects of nonverbal communication on attitude toward the professor and academic achievement. Additionally, it examined the moderating effect of academic self-efficacy in the relationship between attitude toward the professor and academic achievement. The data were collected from 214 college students using an online survey. The results showed that the kinesis, proxemics, and physical appearance, except paralanguage, have significantly positive influence on attitude toward the professor. And the moderating effect of academic self-efficacy has also been founded.

Design of Programming Failure Feedback System Based on Control Flow of Test Case to Support Programming Training (프로그래밍 훈련 지원을 위한 테스트케이스의 제어흐름에 기반한 프로그래밍 실패 피드백 시스템 설계)

  • Lee, Sunghee;Kim, Deok Yeop;Seo, Kang Bok;Lee, Woo Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.8
    • /
    • pp.317-322
    • /
    • 2019
  • Programming judge systems for programming training support are typically built on the Web, where the examiners uploads a programming problem, which the student reads and submits an answer to the problem. The judge system executes the submitted answer of source code to provide feedback such as pass, failure, and error messages. Students who receive the feedback except for the pass continues debugging the source code until they are judged to pass. We developed an online judge system to support programming training and analyzed answers submitted by the students and found that many of the students who were not judged to pass that test did not know exactly where they were wrong but continued to solve the problem. The current judge system generally feeds runtime error messages back to students. However, with only runtime error message, it is difficult for student who train to find the wrong part of the answer. Therefore, in this paper, we propose a system that provides the feedback of programming failure by analyzing the control flow of the test cases used in the source code submitted by the student. The proposed system helps students find the wrong parts more quickly by feeding back the paths where faults in the control flow may exist. In addition, we show that this system is applicable to the answer source code that the actual student submitted.

Development of Eco-friendly Electric Transmission Towers in KEPCO (환경조화형 철탑 개발)

  • Lee, Won-kyo;Mun, Sung-Duk;Shin, Kooyong
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.5 no.3
    • /
    • pp.135-140
    • /
    • 2019
  • Lattice towers and tubular steel poles have been commonly used for electrical power transmission in Korea. They are durable, structurally stable, simple and can easily be constructed in limited spaces. However, residents are opposed to construct transmission lattice towers in their areas because they are not visually attractive, and electrical field occur at the transmission lines. Underground transmissions have been used instead of the traditional towers to resolve these problems, however they are not cost effective to construct and run. Therefore, we have developed eco-friendly towers that are more attractive, well blending into the surrounding environment, and much more economical than underground transmissions. There are four categories of the eco-friendly electric transmission towers about design aspects. Firstly, there is decoration type such as tree tower and ensemble tower. Tree tower looks like actual trees with leaves and branches so it blends into surroundings. Ensemble towers were designed after pair of crane birds. Those towers have decoration features and art works. Structural examination and manufacturing this type would be very similar to the conventional transmission towers. Secondly, there is arm design type such as traditional tower. Design features are added to the existing towers. As partial design can be adoptable on these types, it can easily meet height regulations and attach to conventional lattice towers and tubular steel poles. Also, these towers are more economical than others. Third category is multipurpose type such as Sail Tower. These towers have simple pole or tubular structure with features which can be used as information message board, public relations and much more. This type will face greater wind pressure because of the area of the board, also visibility must take into consideration. Lastly, there is moulding type such as arc pylon. It is different shape to the conventional towers - lattice towers and tubular steel poles. Dramatic design changes have been adapted - from a hard and static tower to a soft and curved tower. These towers will well stand out in the field. However, structural examination and manufacturing this type would be difficult and costly. Also certain towers of this type would require scaffolding or false work to construct, which will result in limitations of the construction area. This paper shows KEPCO 154 kV Sail tower in detail. KEPCO 154 kV Sail tower that is included in fabrication of sample tower and tower testing has developed and the results are presented in this paper. We hope that sail tower is also considered as a solution to have public acceptance or to create a familiar atmosphere among towers and people in coastal area.

Irony in The Locked Room: A Biographer Searching for His Own Identity (『잠긴 방』의 아이러니: 자신의 정체성을 탐구하는 전기 작가)

  • Son, Dongchul
    • English & American cultural studies
    • /
    • v.14 no.1
    • /
    • pp.95-116
    • /
    • 2014
  • Paul Auster's The Locked Room, the third novel of The New York Trilogy, has been examined by many critics in terms of anti-detective fiction or postmodernism. However, this paper focuses upon how the author adopts and utilizes some key elements of the traditional detective novel and its literary tradition. Mystery storytelling is one of Auster's literary strategies and the theme of the double is another. For his novel Auster explores the theme of the double as in Poe's "William Wilson." In The Locked Room, the narrator "I" is described as a shadow of his childhood friend Fanshawe. After Fanshawe's disappearance "I" becomes a literary agent for his friend, and becomes a husband of his friend's wife and a father of his friend's child. Searching for information to write a biography of his friend, he realizes that his friend has always been living inside his skull condemned to a mystical solitude. When Fanshawe appears in the narrator's mind as an image of the door of a locked room, the locked room is also a metaphor for the closed consciousness of the narrator. In his strategy of mystery storytelling, Auster employs the quest of detective fiction as well as the irony of Oedipus the King, where the criminal pursued by the king turns out to be himself. The Locked Room starts with the mystery of Fanshawe's disappearance, and as the novel develops, the narrator pursues numerous clues about his biographical subject like a private eye. Ironically, however, he finds that the ghost of Fanshawe has always been with him and that this is inevitable. As the narrator resolves to quit his life as a double, he contrives to name a strange man Fanshawe as if he tries to turn his biographical subject into a fictional character in the same way Fanshawe has controlled the narrator like a character in Fanshawe's novel. Beaten by the fictional Fanshawe and recovering from a near-death experience, the narrator prepares for his final showdown with Fanshawe. The transcendence of his existence as a double is epitomized by his act to tear off the red notebook handed to him by Fanshawe, which confusingly delivers a message that a life is doomed to be a failure. The narrator's act to cut off Fanshawe's influence bespeaks his breaking out of his locked consciousness and a new start for his life with his own identity.

Senior' Use of Text Messages and SNS and Contact with Informal Social Network Members (노인의 문자메시지 및 SNS 활용역량과 비공식적 사회관계망과의 접촉에 관한 연구)

  • Jung, Chanwoo;Choi, Heejeong
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.401-414
    • /
    • 2021
  • The purpose of this study was to examine the associations of Korean older adults' use of Social Network Service (SNS) and text messages with frequency of contact with 1) non-coresident adult children, 2) siblings and relatives, or 3) friends, neighbors, and acquaintances. Data were drawn from the 2017 Survey of Living Conditions and Welfare Needs of Korean Older Persons 65+ (N=8,392), and older adults were categorized into 4 groups depending on their familiarity with use of SNS and text messages. Ordinary Least Squares regression models were estimated for analyses. Results revealed that older users of both types of communication media reported frequent exchanges of calls, text messages, etc. with both family and friends. However, using SNS and text messages was consistently related to more face-to-face contact with non-family members. To conclude, older adults' familiarity with communication media could be key to exchanges of emotional and instrumental support with informal social network members and quality of life in the community. Overall, our results highlight the importance of information communication education targeting older adults for continued involvement with their informal social network members.

A Study on Secure Encoding for Visible Light Communication Without Performance Degradation (가시광 통신에서 성능 저하 없는 보안 인코딩 연구)

  • Kim, Minchul;Suh, Taeweon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.1
    • /
    • pp.35-42
    • /
    • 2022
  • Visible light communication (VLC) is a method of transmitting data through LED blinking and is vulnerable to eavesdropping because the illumination affects the wide range of area. IEEE standard 802.15.7 defines On-Off Keying (OOK), Variable Pulse Position Modulation (VPPM), and Color Shift Keying (CSK) as modulation. In this paper, we propose an encryption method in VPPM for secure communication. The VPPM uses an encoding method called 4B6B where 16 different outputs are represented with 6-bit. This paper extends the number of outputs to 20, to add complexity while not violating the 4B6B generation conditions. Then each entry in the extended 4B6B table is scrambled using vigenère cipher. The probability of decrypting each 6-bit data is $\frac{1}{20}$. Eavesdropper should perform $\sum\limits_{k=1}^{n}20^k$ number of different trials to decrypt the message if the number of keys is n. The proposed method can be applied to OOK of PHY II and CSK of PHY III. We further discuss the secure encoding that can be used in OOK and CSK without performance degradation.

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.

Performance Evaluation of CoMirror System with Video Call and Messaging Function between Smart Mirrors (스마트 미러간 화상 통화와 메시징 기능을 가진 CoMirror 시스템의 성능평가)

  • Kitae Hwang;Kyung-Mi Kim;Yu-Jin Kim;Chae-Won Park;Song-Yeon Yoo;In-Hwan Jung;Jae-Moon Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.51-57
    • /
    • 2023
  • Smart mirror is an IoT device that attaches a display and an embedded computer to the mirror and provides various information to the user along with the mirror function. This paper presents performance evaluation of the CoMirror system as an extension of the previous research in which proposed and implemented the CoMirror system that connects Smart Mirrors using a network. First, the login performance utilizing face recognition was evaluated. As result of the performance evaluation, it was concluded that the 40 face images are most suitable for face learning and only one face image is most suitable for face recognition for login. Second, as a result of evaluating the message transmission time, the average time was 0.5 seconds for text, 0.63 seconds for audio, and 2.9 seconds for images. Third, as a result of measuring a video communication performance, the average setup time for video communication was 1.8 seconds and the average video reception time was 1.9 seconds. Finally, according to the performance evaluation results, we conclude that the CoMirror system has high practicality.