• Title/Summary/Keyword: Session Management

Search Result 518, Processing Time 0.024 seconds

The Study on the Dynamic Bandwidth Allocation Algorithm using Cell Delay Variation (셀지연변이를 이용한 동적 대역폭 할당 알고리즘에 관한 연구)

  • 신승호;박상민
    • Journal of the Korea Safety Management & Science
    • /
    • v.2 no.4
    • /
    • pp.165-176
    • /
    • 2000
  • Broadband networks are designed to support a wide variety of services with different traffic characteristics and demands for Quality of Services. Bandwidth allocation methods can be classified into two major categories: static and dynamic. In static allocation, bandwidth is allocated only at call setup time and the allocated bandwidth is maintained during a session. In dynamic allocation, the allocated bandwidth is negotiated during a session. The purpose of this paper is to develop policies for deciding and for adjusting the amount of bandwidth requested for a best effort connection over such as ATM networks.. This method is to develop such policies that a good trade off between utilization and latency using cell delay variation to the forecast the incoming traffic in the next period. The performances of the different polices are compared by simulations.

  • PDF

The Study on the Dynamic Bandwidth Allocation Algorithm using by Cell Delay Variation (셀지연변이를 이용한 동적 대역폭 할당 알고리즘에 관한 연구)

  • 신승호;박상민
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2000.11a
    • /
    • pp.131-134
    • /
    • 2000
  • Broadband networks are designed to support a wide variety of services with different traffic characteristics and demands for Quality of Services. Bandwidth allocation methods can be classified into two major categories: static and dynamic. In static allocation, bandwidth is allocated only at call setup time and the allocated bandwidth is maintained during a session. In dynamic allocation, the allocated bandwidth is negotiated during a session. The purpose of this paper is to develop policies for deciding and for adjusting the amount of bandwidth requested for a best effort connection over such as ATM networks. This method is to develop such policies that a good trade off between utilization and latency using cell delay variation to the forecast the incoming traffic in the next period. The performances of the different polices are compared by simulations.

  • PDF

Hop-constrained multicast route packing with bandwidth reservation

  • Gang Jang Ha;Park Seong Su
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.402-408
    • /
    • 2002
  • Multicast technology allows the transmission of data from one source node to a selected group of destination nodes. Multicast routes typically use trees, called multicast routing trees, to minimize resource usage such as cost and bandwidth by sharing links. Moreover, the quality of service (QoS) is satisfied by distributing data along a path haying no more than a given number of arcs between the root node of a session and a terminal node of it in the routing tree. Thus, a multicast routing tree for a session can be represented as a hop constrained Steiner tree. In this paper, we consider the hop-constrained multicast route packing problem with bandwidth reservation. Given a set of multicast sessions, each of which has a hop limit constraint and a required bandwidth, the problem is to determine a set of multicast routing trees in an arc-capacitated network to minimize cost. We propose an integer programming formulation of the problem and an algorithm to solve it. An efficient column generation technique to solve the linear programming relaxation is proposed, and a modified cover inequality is used to strengthen the integer programming formulation.

  • PDF

Development of a Packet-Switched Public computer Communication Network -PART 1: KORNET Overview and Development of Network Management Center (Packet Switching에 의한 공중 Computer 통신망 개발 연구 -제1부: Kornet 개요 및 NMC 개발)

  • 은종관;이경근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.6
    • /
    • pp.103-113
    • /
    • 1985
  • This is the first part of the four-part paper describing the development of a packet-switched computer network named the KORNET In this paper, we present the overview of the KORNET, and discuss various aspects on the development of the netwo management center (NMC). The NMC acts as a nerve center of the network, performing such functions as network monitoring, subscriber and network management and routing manage-ment using operator dialogues. In the implementation of the NMC, we have developed various application softwares that include operator interface, primary/srcondary pan, session layer and packet level adaptor. As for packet, link and physical level protocols, we have modified the XODIAC X.25 originally developed by Data General, Inc. All the net-work protocols we have developed comply completely with the CCITT recommendations.

  • PDF

A Study on Prediction Reputation System Improvement for Prevention of SPIT (SPIT 차단을 위한 예측 평판도 기법 개선에 대한 연구)

  • Bae, Kwang-yong;Jo, Hwa;Yoon, Oh-jun;Jang, Sung-jin;Shin, Yongtae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1568-1576
    • /
    • 2015
  • This paper proposes a prediction reputation system for the anti-SPIT solution in real-time VoIP environment. Increased accuracy of the determination as to whether spam or not by deriving a threshold based on SPIT presence in the existing paper. The existing schemes need to get the user's feedback and/or have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme predicts the reputation through the statistical analysis based on the period of session initiation of each caller and the call duration of each receiver. As per the second mentioned problem, this scheme performs the prediction before session initiation, therefore, it's proper for real-time VoIP environment.

Single-session associative protocol for dentin hypersensitivity management: a 1-year randomized, blinded clinical study

  • Thayna Carolina Zeni;Poliana Maria de Faveri Cardoso;Rafael da Silva Vanolli;Marcio Jose Mendonca;Julio Katuhide Ueda;Veridiana Camilotti
    • Restorative Dentistry and Endodontics
    • /
    • v.49 no.2
    • /
    • pp.15.1-15.11
    • /
    • 2024
  • Objectives: This study aimed to establish a single-session associative protocol for nonrestorative management of dentin hypersensitivity (DH). Materials and Methods: Twenty-four individuals with DH and a minimum sensitivity level of 4 on the visual analog scale (VAS) were selected. The study was conducted in a split-mouth design, with each participant (n = 20) having at least 1 affected tooth in all quadrants. The management protocols consisted of control group: universal adhesive, Neural Desensitizing Protocol group: 5% potassium nitrate, Mixed Desensitizing Protocol (PAM) group: 5% sodium fluoride and 5% potassium nitrate, Remineralizing Desensitizing Protocol (PDR) group: surface-partially reacted glass technology photopolymerizable varnish. Evaluations were performed immediately after application, at 1 week, 1 month, 2 months, and 12 months using the VAS sensitivity test. Results: The scores were subjected to statistical analysis using the Friedman test (p < 0.05), Durbin-Conover test (p < 0.05), and Wilcoxon test (p < 0.05). At the 12-month evaluation, all groups showed statistically significant differences compared to the initial assessment. For the evaluation after 12 months, there was a statistically significant difference between the PAM group, the control group, and the PDR group. Conclusions: It can be concluded that all groups were effective in controlling DH, but there were significant results in the control group and PDR group. The clinical relevance of this study is to demonstrate that the application of single-session desensitizing protocols can be effective in controlling DH for up to 12 months.

Encryption Algorithm Technique for Device's key Protect in M2M environment (M2M 환경의 디바이스 키 보호를 위한 암호 알고리즘 응용 기법)

  • Choi, Do-Hyeon;Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.343-351
    • /
    • 2015
  • With the diverse services of the current M2M environment being expanded to the organizations, the corporations, and the daily lives, the possibility of the occurrence of the vulnerabilities of the security of the related technologies have become an issue. In order to solve such a problem of the vulnerability of the security, this thesis proposes the technique for applying the cryptography algorithm for the protection of the device key of the M2M environment. The proposed technique was based on the elliptic curve cryptography Through the key exchange and the signature exchange in the beginning, the security session was created. And the white box cipher was applied to the encryption that creates the white box table using the security session key. Application results cipher algorithm, Elliptic Curve Cryptography provides a lightweight mutual authentication, a session key for protecting the communication session and a conventional white-box cipher algorithm and was guaranteed the session key used to encrypt protected in different ways. The proposed protocol has secure advantages against Data modulation and exposure, MITM(Man-in-the-middle attack), Data forgery and Manipulation attack.

Ram Mating Behaviour under Different Social Conditions

  • Patel, M.;Das, N.;Pandey, H.N.;Yadav, M.C.;Girish, P.S.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.20 no.1
    • /
    • pp.112-118
    • /
    • 2007
  • The present study was conducted to investigate the attributes of ram sexual behaviour under different social conditions. Six intact rams and eight overiectomized ewes were used in this experiment. Ewes were artificially brought into oestrus. All mating traits were recorded every 10 sec during a 1 h mating session under five social conditions viz., ram exposed to single oestrus ewe, ram exposed to single oestrus ewe and audience ram, ram exposed to multiple oestrus ewes, ram exposed to single oestrus ewe with competitor ram and ram exposed to multiple oestrus ewes with competitor ram. Mean intensity of the mating activities during the 1 h mating session under five social conditions was compared. Either vocalization or leg kicking was found to be the predominant teasing activity under all five conditions. Sniffing differed significantly (p<0.05) between different social conditions. Vocalization, leg kicking, and leg kicking with vocalization did not differ significantly (p<0.05) between different social conditions. Mounts/h in the multiple oestrus ewe condition was higher and differed significantly (p<0.05) from other social conditions. Ejaculations/h for the experimental ram was higher when exposed to multiple oestrus ewes in comparison to other social conditions. Mounts/ejaculation was low in the audience ram condition in comparison to the other four social conditions.

Effects of an Integrated Case Management Program on Medication Adherence, Pain, Physical Function and Depression among Korean Medical Aid Beneficiaries with Osteoarthritis (의료급여 관절염환자의 복약순응향상을 위한 통합중재프로그램의 효과)

  • Ahn, Yang Heui
    • Journal of Korean Public Health Nursing
    • /
    • v.28 no.1
    • /
    • pp.32-45
    • /
    • 2014
  • Purpose: The purpose of this study was to test the effectiveness of an eight session integrated case management program for improvement of medication adherence, physical function, pain, and depression among medical aid beneficiaries with osteoarthritis. Method: A nonequivalent control group pre-posttest design was employed. Participants were 55 medical aid beneficiaries who agreed to participate in this study, and were assigned to an experimental group (n=28) or control group (n=27). The framework of this research derived from Cox's Interaction Model of Client Health Behavior guided the overall intervention and the components. The program led by a case manager with a medication calendar, motivating interviewing and coaching strategies and collaboration with a pharmacist. Analysis included change in scores, ${\chi}^2$-test, and t-test. Result: The results showed significant increase in medication adherence, physical function and decrease joint pain, joint stiffness and depression in the experimental group compared to the control group. Conclusion: The eight session integrated case management program indicated an effect on medication adherence, pain, physical function, and depression. Partnership with a pharmacist is recommended for medication adherence and conduct of further studies will be needed in order to determine the long-term effect of an extended integrated program on health outcomes.

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • Journal of Integrative Natural Science
    • /
    • v.11 no.4
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.