• Title/Summary/Keyword: Real-time System Call

Search Result 124, Processing Time 0.029 seconds

Traffic carring capacity of the ISDN switching system (ISDN 교환기의 트래픽 용량 분석)

  • 이강원
    • Korean Management Science Review
    • /
    • v.10 no.1
    • /
    • pp.107-125
    • /
    • 1993
  • Modern telecommunication switching systems are SPC(Stored Program Control) machines handling voice, data and other kinds of traffic, in an environment which tends to be fully digital switching and transmission. The throughput of such systems is determined by the real time capacity of its centralized or distributed control processors and by the traffic capacity of the switching network. Designers must verify the traffic and call processing capacity of the switching system and check its performance under traffic load before it is put into service. Verification of traffic and call processing capacity of switching systems is one of the problems treated by teletraffic studies ; teletraffic studies are based on stochastic process, queueing theory, simulations and other quantitative methods of decision making. This study suggests the general methodology to evaluate the throughput and performance of the ISDN switching system. TDX-10 ISDN switching system are employed to give illustrative examples of the methodologies discussed in this study.

  • PDF

Traffic Capacity Analysis of the Digital Switching System (전전자 교환기의 트래픽 용량 분석)

  • Lee, Gang-Won;Park, Yeon-Gi;Seo, Jae-Jun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.13 no.2
    • /
    • pp.17-34
    • /
    • 1987
  • Modern telecommunication switching systems are SPC (Stored Program Control) machines handling voice, data and other kinds of traffic, in an environment which tends to be fully digital switching and transmission. The throughput of such systems is determined by the real time capacity of its centralized or distributed control processors and by the traffic capacity of the switching network. Designers must verify the traffic and call processing capacity of the switching system and check its performance under traffic load before it is put into service. Verification of traffic and call processing capacity of switching systems is one of the problems treated by teletraffic studies; teletraffic studies are based on stochastic process, queueing theory, simulations and other quantitative methods of decision making. This paper reviews the general methodologies to evaluate the throughput and performance of the digital switching system. TDX-10, which is a fully digital switching system under development in ETRI, is employed to give illustrative examples of the methodologies discussed in this paper.

  • PDF

Development of the Context-Aware System for Senior Citizen based on Case-Based Reasoning (고령자를 위한 사례기반추론에 기반한 상황인식 시스템 개발)

  • Kim, Jung-Sook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.5
    • /
    • pp.419-424
    • /
    • 2015
  • The entry of an aging society require a safety of senior citizens against emergency. However, a home and a residence of senior citizens should not consider a characteristic of safety and the unfortunate accidents could happen in the house or the residence. Especially if the elders live alone then they have a help function using a call button in a bathroom or a closed area. But, a sliding or an overbalance in a bathroom or a closed area of a home may happen suddenly how can require a help in real time. That is a very serious accident to senior citizens. In this paper, we developed the context-aware system using the various sensors for collecting the data which is an activities of daily living of elders and we designed the recognition method using case-based reasoning for detecting the anomaly and the emergency context in the bathroom or the closed area in house. After that, if the anomaly or the emergency are detected then it call to a family or a relative or an administration in real-time.

Real-Time File Integrity Checker for Intrusion Recovery and Response System (침입 복구 및 대응 시스템을 위한 실시간 파일 무결성 검사)

  • Jeun Sanghoon;Hur Jinyoung;Choi Jongsun;Choi Jaeyoung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.279-287
    • /
    • 2005
  • File integrity checking is the most reliable method to examine integrity and stability of system resources. It is required to examine the whole data whenever auditing system's integrity, and its process and result depends on administrator's experience and ability. Therefore the existing method is not appropriate to intrusion response and recovery systems, which require a fast response time. Moreover file integrity checking is able to collect information about the damaged resources, without information about the person who generated the action, which would be very useful for intrusion isolation. In this paper, we propose rtIntegrit, which combines system call auditing functions, it is called Syswatcher, with file integrity checking. The rtlntegrit can detect many activities on files or file system in real-time by combining with Syswatcher. The Syswatcher audit file I/O relative system call that is specified on configuration. And it can be easily cooperated with intrusion response and recovery systems since it generates assessment data in the standard IDMEF format.

Design and Implementation of Call Object Management mechanism for Customer Channel integration of Customer Relationship Management Environment (CRM 환경의 고객 채널 통합을 위한 콜 객체 관리 메저니즘 설계 및 구현)

  • Han, Yun-Ki;Koo, Yong-Wan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.520-533
    • /
    • 2007
  • The CRM(Customer Relationship Management) is the business strategy model for higher profits and competitive power of the enterprise in a new business environment. The large-scale customer response service technique uses internet, e-mail, SMS (Short Message Service), Telephony service, DM(Direct Mail) by customer channel point. Recently, business model diversify for new contract and retaining existing customer to the effort for a profitable model of business. This paper is based on Avaya PDS(Predictive Dialing System) model for CRM bond center. If the number of "available" agents are less than the number of inbound channels, then there may be real-time response problems in PDS system implemented. The Organization cannot afford to have many agents in available mode because of the high cost of manpower. This paper provides two contributions to the study. First, we present Call Object Management Mechanism of Customer Channel integration for reduce outbound consulting and reduce CallBack data in the PDS. Second, we design and implement the proposed system. Our simulation results show analysis of old model and proposed model. The proposed model can be efficiently used in Large-scale CRM.

A Shared Library as an Active Memory Object for Application Software Development of Large Scale Real-time Systems (대형 실시간 시스템의 응용 소프트웨어 개발을 위한 능동적 메로리 개체로서의 공유 라이브러리)

  • 정부금;차영준김형환임동선
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.233-236
    • /
    • 1998
  • In this paper, we present a novel approach named a shared library as an active memory object for application software development of large-scale real-time systems. Unlike the general passive shared memory, shared library proposed in this paper can be activated as an execution object. Moreover this is not tightly coupled with application programs unlike the normal libraries. To implement this mechanism, operating system makes the shared memory as an active object and shared library realizes the indirect call structure. This mechanism enhanced the utilization of main memory and communication performance. And this is successfully applied to the HANbit ACE ATM switching system and the TDX-10 switching system.

  • PDF

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung;Kim, Hyoungshick;Gkelias, Athanasios
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.865-875
    • /
    • 2014
  • Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.

Design of Real-Time Video System for Mathematics Education (수학교육을 위한 화상교육 시스템의 설계)

  • Park, Ji Su;Choi, Beom Soon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.1
    • /
    • pp.29-34
    • /
    • 2021
  • The real-time video education is used as an effective method of operating classes that replaces face-to-face education of instructors and learners in remote areas. However, the existing video call and video conferences system is mainly used, and this is effective in linguistic education because it focuses on lecture through video, but it is not utilized in other education. In this paper, we propose a design model of real-time video system that can improve the effectiveness of science curriculum and mathematics education by providing the functions that can be utilized during class by improving limitations of image - oriented image education.

Control of a cart system using genetic algorithm

  • Kim, Sung-Soo;Woo, Kwang-Bang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1994.10a
    • /
    • pp.385-389
    • /
    • 1994
  • So far many researches have studied to control a cart system with a pole on the top of itself (forwards we call it simply a cart system) which is movable only to the directions to which a cart moves, using neural networks and genetic algorithms. Especially which it wag solved by genetic algorithms, it was possible to control a cart system more robustly than ordinary methods using neural networks but it had problems too, i.e., the control time to be achieved was short and the processing time for it was long. However we could control a cart system using standard genetic algorithm longer than ordinary neural network methods (for example error backpropagation) and could see that robust control was possible. Computer simulation was performed through the personal computer and the results showed the possibility of real time control because the cpu time which was occupied by processes was relatively short.

  • PDF

A Study on Prediction Reputation System for Prevention of SPIT (SPIT 차단을 위한 예측 평판도 기법에 대한 연구)

  • Bae, Kwang-Yong;Lee, Jae-Eun;Kim, Young-Beom
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.152-160
    • /
    • 2013
  • This paper proposes a prediction reputation system for the anti-SPIT solution in real-time VoIP environment. The existing schemes need to get the user's feedback and/or have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme predicts the reputation through the statistical analysis based on the period of session initiation of each caller and the call duration of each receiver. As per the second mentioned problem, this scheme performs the prediction before session initiation, therefore, it's proper for real-time VoIP environment.