• Title/Summary/Keyword: Multiple Users

Search Result 1,617, Processing Time 0.031 seconds

Development of a Scalable Clustering A/V Server for the Internet Personal-Live Broadcasting (인터넷 개인 생방송을 위한 Scalable Clustering A/V Server 개발)

  • Lee, Sang-Moon;Kang, Sin-Jun;Min, Byung-Seok;Kim, Hag-Bae;Park, Jin-Bae
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.107-114
    • /
    • 2002
  • In these days, rapid advances of the computer system and the high speed network have made the multimedia services popularized among various applications and services in the internet. Internet live broadcasting, a part of multimedia services, makes it possible to provide not only existing broadcasting services including audio and video but also interactive communications which also expand application scopes by freeing from both temporal and spatial limitation. In the Paper, an interned Personal-live broadcasting server system is developed by allowing individual users to actively create or join live-broadcasting services with such basic multimedia devices as a PC camera and a sound card. As the number of broadcasters and participants increases, concurrent multiple channels are established and groups are to be expanded. The system should also guarantee High Availability (HA) for continuous services even in the presence of partial failure of the cluster. Furthermore, a transmission mode switching is supported to consider network environments in the user system.

Application of the Web Design Elements using the Aesthetic Evaluation (감성평가를 이용한 웹 디자인 요소의 활용방안)

  • 김미영;정홍인
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.413-420
    • /
    • 2004
  • New design method has been required for web designers to grasp the proper emotion, impression, and feeling of a web site and reflect these elements in web design. It is certain that such a new methodology can be a useful design tool, although web designers have only relied on their intuition and experience to induce users to perceive specific emotion of web sites. In this study, Kansei Engineering Type Ⅰ (Nagamachi, 2002 and Park, 2000) method was applied to develop the methodology. One hundred thirty six web sites believed to convey emotions effectively were first selected by recommendation of professional web designers and twenty two web sites were finally chosen and evaluated using questionnaire. The web sites were then objectively and quantitatively assessed by measuring the degree of utilization of the design elements, balance, overall density, and homogeneity. We examined the cause-and-effect between the results of emotional and quantitative analysis by multiple regression and introduced the design methodology based on the examination. The research method and procedures applied to this study would be applicable to design studies related to the emotional inducement.

  • PDF

Cooperative Spectrum Sensing for Cognitive Radio Technology Considering Heterogeneous Primary User (이종 일차 시스템을 고려한 인지 라디오 기술에서의 협력 대역 센싱 방안)

  • Lee, Woongsup;Jung, Bang-Chul;Ban, Taewon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1546-1553
    • /
    • 2015
  • In cognitive radio technology, the overall capacity of communications systems can be improved without allocating additional bands by allowing secondary system to utilize the band when a primary system who has right to use the band does not utilize it. Therefore, spectrum sensing to determine the existence of primary system is utmost important in the cognitive radio technology. In this work, we consider a novel cooperative spectrum sensing in cognitive cellular systems. Especially, we consider the case in which heterogeneous primary systems coexist, i.e., heterogenous transmission power and sensing requirement of primary system, such that only portion of users in cognitive cellular systems are able to detect the primary system. In this case, we propose new cooperative spectrum sensing with multiple sensing stages to properly detect the existence of primary systems in this kind of situations. Moreover, we analyze the performance of conventional cooperative spectrum sensing schemes such as OR-rule, AND-rule and MAJORITY-rule under the existence of heterogeneous primary systems. Finally, we investigate the performance of the proposed scheme through computer based simulations and show that the existence of primary systems can be determined accurately by using our proposed scheme.

Automatic Detection of Usability Issues on Mobile Applications (모바일 앱에서의 사용자 행동 모델 기반 GUI 사용성 저해요소 검출 기법)

  • Ma, Kyeong Wook;Park, Sooyong;Park, Soojin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.7
    • /
    • pp.319-326
    • /
    • 2016
  • Given the attributes of mobile apps that shorten the time to make purchase decisions while enabling easy purchase cancellations, usability can be regarded to be a highly prioritized quality attribute among the diverse quality attributes that must be provided by mobile apps. With that backdrop, mobile app developers have been making great effort to minimize usability hampering elements that degrade the merchantability of apps in many ways. Most elements that hamper the convenience in use of mobile apps stem from those potential errors that occur when GUIs are designed. In our previous study, we have proposed a technique to analyze the usability of mobile apps using user behavior logs. We proposes a technique to detect usability hampering elements lying dormant in mobile apps' GUI models by expressing user behavior logs with finite state models, combining user behavior models extracted from multiple users, and comparing the combined user behavior model with the expected behavior model on which the designer's intention is reflected. In addition, to reduce the burden of the repeated test operations that have been conducted by existing developers to detect usability errors, the present paper also proposes a mobile usability error detection automation tool that enables automatic application of the proposed technique. The utility of the proposed technique and tool is being discussed through comparison between the GUI issue reports presented by actual open source app developers and the symptoms detected by the proposed technique.

A Study on MAC Protocol Design for Mobile Healthcare (모바일 헬스케어를 위한 MAC 프로토콜 설계에 관한 연구)

  • Jeong, Pil-Seong;Kim, Hyeon-Gyu;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.323-335
    • /
    • 2015
  • Mobile healthcare is a fusion of information technology and biotechnology and is a new type of health management service to keep people's health at anytime and anywhere without regard to time and space. The WBAN(Wireless Body Area Network) technology that collects bio signals and the data analysis and monitoring technology using mobile devices are essential for serving mobile healthcare. WBAN consisting of users with mobile devices meet another WBAN during movement, WBANs transmit data to the other media. Because of WBAN conflict, several nodes transmit data in same time slot so a collision will occur, resulting in the data transmission being failed and need more energy for re-transmission. In this thesis, we proposed a MAC protocol for WBAN with mobility to solve these problems. First, we proposed a superframe structure for WBAN. The proposed superframe consists of a TDMA(Time Division Muliple Access) based contention access phase with which a node can transmit data in its own time slot and a contention phase using CSMA/CA algorithm. Second, we proposed a network merging algorithm for conflicting WBAN based on the proposed MAC protocol. When a WBAN with mobility conflicts with other WBAN, data frame collision is reduced through network reestablishment. Simulations are performed using a Castalia based on the OMNeT++ network simulation framework to estimate the performance of the proposed superframe and algorithms. We estimated the performance of WBAN based on the proposed MAC protocol by comparing the performance of the WBAN based on IEEE 802.15.6. Performance evaluation results show that the packet transmission success rate and energy efficiency are improved by reducing the probability of collision using the proposed MAC protocol.

Personal Values and their Relationships with Public Library Use (개인의 가치관과 공공도서관 이용간의 관계성 분석)

  • Kwon, Nahyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.2
    • /
    • pp.143-164
    • /
    • 2018
  • The purpose of this study was to investigate the relationship between public library use and the individual's personal value system. The personal value system was measured by Schwartz's (1992) Theory of Basic Human Values. The theory includes ten universal values, which can be categorized into four higher-order values: namely, self-transcendence vs. self-enhancement; and openness to change vs. conservation. The data were collected on the web from 1,000 Korean adults who were 18 years old or above using a quota sampling method with respect to the distributions of gender, age, and geographic locations of the general Korean adult population. The collected data were analyzed using multi-dimensional scaling method, t-tests, and multiple correlations. The results showed that the public library is more likely to be used by the individuals who value "openness to change" (representing self-direction and stimulation), and "self-enhancement"(representing achievement, power, hedonism/sensuous pleasure) than those who value "conservation" (representing safety, stability of society, conformity to rules, tradition) and "self-transcendence" (representing interest in other's well-being, and tolerance, welfare of humanity and community). The findings suggest that public library uses reflect the characteristics of major library services, such as reading and self-learning, which are very autonomous and individualistic in their nature. The findings are valuable in understanding the nature of the functions performed by the current Korean public libraries that are reflected in the personal values of Korean adult library users.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Unconventional Issues and Solutions in Developing IoT Applications (IoT 애플리케이션 개발에서 비전형적 이슈 및 솔루션)

  • Ra, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.337-350
    • /
    • 2014
  • Internet-of-Things(IoT) is the computing paradigm converged with different technologies, where diverse devices are connected via the wireless network, acquire environmental information from their equipped sensors, and are actuated. IoT applications provide smart services to users by interacting with multiple devices connected to the network. IoT devices provide the simple set of the information and also offer smart services by collaborating with other devices. That is, IoT applications always interact with IoT devices which are becoming very popular at a fast pace. However, due to this fact, developing IoT application results in unconventional technical challenges which have not been observed in typical software applications. Moreover, since IoT computing has its own characteristics which are distinguished from other former paradigms such as embedded computing and mobile computing, IoT applications also reveal their own technical challenges. Therefore, we analyze technical challenges occurring in developing IoT applications and present effective solutions to overcome the challenges. To verify identified issues and presented solutions, we present the result of performing a case study of developing an IoT application. Through the case study, we verify how the unconventional technical issues are raised in a real domain and analyze effectiveness of applying the solutions to the application.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

SINR Maximizing Collaborative Beamforming with Enhanced Robustness Against Antenna Correlation (안테나 간 상관도에 강건한 SINR 최대화 협력적 빔포밍 기법)

  • Kim, Jae-Won;Sung, Won-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.4
    • /
    • pp.95-103
    • /
    • 2009
  • In this paper, a generation method of transmit and receive beamforming vectors based on base station cooperation is proposed which maximizes the user SINR in mobile cellular multi-user MIMO systems. There are two main sources of interference which deteriorate the performance of the system, i.e. the inter-user interference caused by the usage of the same radio resource for multiple users in the system, and the inter-cluster interference from neighboring base stations which are not participating in cooperative transmission. The proposed scheme cancels out the inter-user interference by using the block diagonalization(BD) method, and mitigate the inter-cluster interference by using optimal transmit and receive beamforming vectors based on optimal combining(OC) with the statistic information of inter-cluster interference. We perform computer simulations to verify the performance of the proposed scheme, and compare the result to the conventional performance obtained from utilizing the receiver side information only or utilizing the information from neither sides. The performance evaluations are conducted not only over the independent MIMO channels, but over correlated MIMO channels to demonstrate the robustness of the proposed scheme over the channels with correlation among antennas.