• Title/Summary/Keyword: Service Register

Search Result 174, Processing Time 0.029 seconds

VTF: A Timer Hypercall to Support Real-time of Guest Operating Systems (VIT: 게스트 운영체제의 실시간성 지원을 위한 타이머 하이퍼콜)

  • Park, Mi-Ri;Hong, Cheol-Ho;Yoo, See-Hwan;Yoo, Chuck
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.1
    • /
    • pp.35-42
    • /
    • 2010
  • Guest operating systems running over the virtual machines share a variety of resources. Since CPU is allocated in a time division manner it consequently leads them to having the unknown physical time. It is not regarded as a serious problem in the server virtualization fields. However, it becomes critical in embedded systems because it prevents guest OS from executing real time tasks when it does not occupy CPU. In this paper we propose a hypercall to register a timer service to notify the timer request related real time. It enables hypervisor to schedule a virtual machine which has real time tasks to execute, and allows guest OS to take CPU on time to support real time. The following experiment shows its implementation on Xen-Arm and para-virtualized Linux. We also analyze the real time performance with response time of test application and frames per second of Mplayer.

Automatically Registering Schedules from SMS Messages on Handheld Devices (휴대전화에서 단문 메시지로부터 일정 자동 등록)

  • Kim, Jae-Hoon;Kim, Hyung-Chul
    • Korean Journal of Cognitive Science
    • /
    • v.22 no.1
    • /
    • pp.1-18
    • /
    • 2011
  • With rapid spread of handheld devices like cellular or smart phones, a short message service (SMS) comes on the public as a communication means. SMS is very cheap and can be easily written down on the storage in order not to forget it, hence it is widely used to inform schedules (time and place). In this paper, we develop a system for automatically registering schedules extracted from SMS text messages. SMS text messages are very short and concise, but include a lot of Internet words like slangs and abbreviations. These have made it difficult to extract information on schedules from them. Also handheld devices have some limitations on computing power and storage and then applying general natural language processing modules like morphological analysis to the devices are somewhat hard. To relax these burdens, we extract schedule informations from SMS messages using machine learning methods like condition random field (CRF) without using any language processing modules and register the informations on the schedule management system of handheld devices. Our proposed automatic schedule registration system has implemented on Samsung Omnia phone for experiments.

  • PDF

Automatic Determination of Usenet News Groups from User Profile (사용자 프로파일에 기초한 유즈넷 뉴스그룹 자동 결정 방법)

  • Kim, Jong-Wan;Cho, Kyu-Cheol;Kim, Hee-Jae;Kim, Byeong-Man
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.2
    • /
    • pp.142-149
    • /
    • 2004
  • It is important to retrieve exact information coinciding with user's need from lots of Usenet news and filter desired information quickly. Differently from email system, we must previously register our interesting news group if we want to get the news information. However, it is not easy for a novice to decide which news group is relevant to his or her interests. In this work, we present a service classifying user preferred news groups among various news groups by the use of Kohonen network. We first extract candidate terms from example documents and then choose a number of representative keywords to be used in Kohonen network from them through fuzzy inference. From the observation of training patterns, we could find the sparsity problem that lots of keywords in training patterns are empty. Thus, a new method to train neural network through reduction of unnecessary dimensions by the statistical coefficient of determination is proposed in this paper. Experimental results show that the proposed method is superior to the method using every dimension in terms of cluster overlap defined by using within cluster distance and between cluster distance.

SDR Adaptation for Multimode Maritime Wireless Communications (다중모드 해상 무선통신 지원을 위한 SDR 적용 방안)

  • Kim, Jae-Myoung;Lee, Joa-Hyoung;Shim, Woo-Seong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.173-176
    • /
    • 2011
  • New paradigm is based on the e-navigation policy which is the harmonised collection, integration, exchange, presentation and analysis of maritime information onboard and ashore by electronic means to enhance berth to berth navigation and related services, for safety and security at sea and protection of the marine environment. One of the requirements is seamless communications between various communication systems. So we need the maritime wireless communications based on the SDR technology. In this paper we analyse characteristics and issues of maritime wireless communication technology and service framework and propose a SDR based maritime system platform which can operate in multi-mode.

  • PDF

Development of a Hash Function and a Stream Cipher and Their Applications to the GSM Security System (해쉬함수와 스트림 암호기의 개발 및 GSM 보안 시스템에의 적용)

  • Kim, Bun-Sik;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8
    • /
    • pp.2421-2429
    • /
    • 2000
  • With the advance of wireless communications technology, mobile communications have become more convenient than ever. Nowadays, people can communicate with each other on any place at any time. However, because of the openness of wireless communications, the way to protect the privacy between communicating parties is becoming a very important issue. In this paper, we present a study on the authentication and message encryption algorithm to support roaming service to the GSM network. To propose an authentication and message encryption algorithm applicable to the GSM system, the security architecture of the GSM outlined in the GSM standard is briefly introduced. In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on Linear Feedback Shift Register(LFSR) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

  • PDF

Hazard Risk Assessment for National Roads in Gangneung City (강릉지역 국도의 재해위험성 평가)

  • Kim, Gi-Hong;Won, Sang-Yeon;Youn, Jun-Hee;Song, Yeong-Sun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.4
    • /
    • pp.33-39
    • /
    • 2008
  • Typhoon Lusa in 2002 and Typhoon Maemi in 2003 caused the worst damage of landslide and debris flow to Gangwon-do. This damage includes severe damage in riverside road. The damage register indicates that this damage is concentrated on mountain areas in Gangwon-do. In recent years, the studies on GIS application to predicting landslide and debris flow have been progressing actively. Landslide risk map managed by The Forest Service is the representative one. In this study, we generated landslide and debris flow hazard maps using statistical analysis and deterministic analysis in Gangnung area where Typhoons caused severe damage to riverside roads. We built damage point GIS DB from damage registers of National Road Maintenance Agency and field survey, and verified accuracy of landslide and debris flow hazard maps using GIS methods.

  • PDF

Post Sender Recognition using SIFT (SIFT를 이용한 우편영상의 송신자 인식)

  • Kim, Young-Won;Jang, Seung-Ick;Lee, Sung-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.48-57
    • /
    • 2010
  • Previous post sender recognition study was focused on recognizing the address of receiver. Relatively, there was lack of study to recognize the information of sender's address. Post sender recognition study is necessary for the service and application using sender information such as returning. This paper did the experiment and suggested how to recognize post sender using SIFT. Although SIFT shows great recognition rate, SIFT had problems with time and mis-recognition. One is increased time to match keypoints in proportion as the number of registered model. The other is mis-recognition of many similar keypoints even though they are all different models due to the nature of post sender. To solve the problem, this paper suggested SIFT adding distance function and did the experiment to compare time and function. In addition, it is suggested how to register and classify models automatically without the manual process of registering models.

The Development of the User-Customizable Favorites-based Smart Phone UX/UI Using Tap Pattern Similarity (탭 패턴 유사도를 이용한 사용자 맞춤형 즐겨찾기 스마트 폰 UX/UI개발)

  • Kim, Yeongbin;Kwak, Moon-Sang;Kim, Euhee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.8
    • /
    • pp.95-106
    • /
    • 2014
  • In this paper, we design a smart phone UX/UI and a tap pattern recognition algorithm that can recognize tap patterns from a tapping user's fingers on the screen, and implement an application that provides user-customizable smart phones's services from the tap patterns. A user can generate a pattern by tapping the input pad several times and register it by using a smart phone's favorite program. More specifically, when the user inputs a tap pattern on the input pad, the proposed application searches a stored similar tap pattern and can run a service registered on it by measuring tap pattern similarity. Our experimental results show that the proposed method helps to guarantee the higher recognition rate and shorter input time for a variety of tap patterns.

Development of a Smart Application for Protecting Dementia Patients (치매환자의 보호를 위한 스마트 앱 개발)

  • Hwang, Hyun Suk;Ko, Yun Seong;Ban, Ga Un;Kim, Chang Soo
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.9
    • /
    • pp.1089-1097
    • /
    • 2013
  • The applications for considering their position and daily patterns of dementia patients have been developed in an early stage even if the older patients who have weaker or serious symptoms has increased in various forms. In this paper, we develop an android-based application which displays positions and pathways of patients on maps and provide messages in the cases of dangerous situations. Guardians need to register schedules including safe areas and personal information of their patients. This system registers behavior status categorized as normal or abnormal each position which is sent to a database. In particular, the deviation status is assigned in case the patients are not within the safe areas that their guardians registered on their schedule. The wandering status is assigned in case the patients are repeatedly passed by their pathways. This smart application contains the modules such as patient position sending, guardian and patient information, patient schedule and safe zone registration, position and behavior status registration, pathway display and message sending, and rescue request. This system sends the notification and alarm service providing normal and abnormal behavior with deviation and wandering status of patients respectively.

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.