• Title/Summary/Keyword: System Calls

Search Result 430, Processing Time 0.023 seconds

Resource Management System for Multimedia Service in Wireless Mobile Networks (무선 이동 통신망에서의 멀티미디어 서비스를 위한 자원 제어 시스템)

  • Lee, Won-Yeoul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1153-1164
    • /
    • 2007
  • One of the most challenging technical issues in mobile communication for multimedia is Quality of Service (QoS) management of handover calls. This paper proposes a 2-level handover control system to copy with this problem. A 2-level handover control system consists of resource reservation and call admission control modules. The resource reservation module divides the network resource into Hard and Soft reserved resource. The Hard reserved resource is only for the handover calls while the Soft reserved resource is for both the handovers and the new calls. And also, the resource reservation module classifies handovers into primary and secondary handovers based on often they occur. The call admission control module deals with the primary and secondary handover calls in different ways. The new calls can use Soft reserved resource only if there is sufficient amount available in the Hard reserved resource. Proposed system is evaluated using an M/M/c/c queueing model. It is shown that proposed system allows more efficient utilization of network resource without degrading QoS comparing with the legacy handover control systems.

  • PDF

Approximation Method for QoS Analysis of Wireless Cellular Networks with Impatient Calls

  • Eom, Hee-Yeol;Kim, Che-Soong;Melikov, Agassi;Fattakhova, Mehriban
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.4
    • /
    • pp.339-347
    • /
    • 2010
  • Simple-closed expressions for approximate calculation of quality of service (QoS) metrics of isolated cell of wireless networks with either finite or infinite queues of both new and handover calls are developed. It is assumed that both kinds of calls might leave the system without receiving service if their waiting times exceed some threshold value. For the models with infinite queues of heterogeneous calls easily checkable ergodicity conditions are proposed. The high accuracy of the developed approximation formulas is shown. Results of numerical experiments are given.

(Performance Analysis of Channel Allocation Schemes Allowing Multimedia Call Overflows in Hierarchical Cellular Systems) (계층셀 시스템 환경에서 멀티미디어 호의 오버플로우를 허용한 채널할당기법 성능분석)

  • 이상희;임재성
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.316-328
    • /
    • 2003
  • In this paper, we propose and analyze two adaptive channel allocation schemes for supporting multimedia traffics in hierarchical cellular systems. It is guaranteed to satisfy the required quality of service of multimedia traffics according to their characteristics such as a mobile velocity for voice calls and a delay tolerance for multimedia calls. In the scheme 1, only slow-speed voice calls are allowed to overflow from macrocell to microcell and only adaptive multimedia calls can overflow from microcell to macrocell after reducing its bandwidth to the minimum channel bandwidth. In the scheme II, in addition to the first scheme, non-adaptive multimedia calls can occupy the required channel bandwidth through reducing the channel bandwidth of adaptive multimedia calls. The proposed scheme I is analyzed using 2-dimensional Markov model. Through computer simulations, the analysis model and the proposed schemes are compared with the fixed system and two previous studies. In the simulation result, it is shown that the proposed schemes yield a significant improvement in terms of the forced termination probability of handoff calls and the efficiency of channel usage.

A study of utilization pattern on emergency patients in Gwangju Emergency Medical Information Center during the Lunar New Year and Chuseok holidays (명절 연휴기간 내 광주응급의료정보센터 이용현황 분석 - 설과 추석을 중심으로 -)

  • Kim, Mi-Seon
    • The Korean Journal of Emergency Medical Services
    • /
    • v.13 no.1
    • /
    • pp.61-72
    • /
    • 2009
  • Purpose : This study was conducted to understand the unforeseen phone calls placed through the 1339 emergency medical communication system by residents of the Gwangju/Jeonnam area during the Lunar New Year and Chuseok holidays. Methods : A descriptive research method was implemented using SPSS to analyze 9,047 reported and received consultation phone calls made during the 2008 Lunar New Year holiday (February 6-10) and the 2008 Chuseok holiday (September 13-15) for frequency and percentages. Results : Among the general characteristics of subjects during the Lunar New Year and Chuseok holidays, an examination of the distribution for gender showed more men than women and the distribution for age showed most subjects were thirties, followed by forties, and finally under ten years of age. According to the status of situational calls during the Lunar New Year holiday most were used for in the following order : providing resource information, misdialing and prank calls, and additional consultations. According to the status of situational calls during the Chuseok holiday most were used for in the following order : providing resource information, additional consultations, misdialing and prank calls. According to region most came from Gwangju Metropolitan City Bukgu, followed by Yeosu, Suncheon, and Mokpo in Jeonnam. According to callers, the majority were non-medical persons. According to time most were made between 9:01 and 12:00, while the fewest were made during 3:01 and 6:00. According to treatment department most were made in the following order : internal medicine, pharmacy, and pediatrics. Most medical resource information provided regarded areas outside the callers location. Conclusion : Emergency medical technician will play a central role in the emergency medical information system in the near future.

  • PDF

A Methodology for Translation of Operating System Calls in Legacy Real-time Software to Ada (Legacy 실시간 소프트웨어의 운영체제 호출을 Ada로 번역하기 위한 방법론)

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2874-2890
    • /
    • 1997
  • This paper describes a methodology for translation of concurrent software expressed in operating system (OS) calls to Ada. Concurrency is expressed in some legacy software by OS calls that perform concurrent process/task control. Examples considered in this paper are calls in programs in C to Unix and calls in programs in CMS-2 to the Executive Service Routines of ATES or SDEX-20 other software re/reverse engineering research has focused on translating the OS calls in a legacy software to calls to another OS. In this approach, the understanding of software has required knowledge of the underlying OS, which is usually very complicated and informally documented. The research in this paper has focused on translating the OS calls in a legacy software into the equivalent protocols using the Ada facilities. In translation to Ada, these calls are represented by Ada equivalent code that follow the scheme of a message-based kernel oriented architecture. To facilitate translation, it utilizes templates placed in library for data structures, tasks, procedures, and messages. This methodology is a new approach to modeling OS in Ada in software re/reverse engineering. There is no need of knowledge of the underlying OS for software understanding in this approach, since the dependency on the OS in the legacy software is removed. It is portable and interoperable on Ada run-time environments. This approach can handle the OS calls in different legacy software systems.

  • PDF

Taxi Telematics Service System (택시 텔레매틱스 서비스 시스템 구현)

  • Kim, Nam-Hyun;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.28 no.B
    • /
    • pp.27-32
    • /
    • 2008
  • In this paper, we implement the taxi telematics service system based on location based service(LBS). The system implementation is composed of 3 major parts : the mobile device with which a user requests taxi calls, the taxi client which resides inside a taxi and supports multimedia environments with navigation function, and the server which manages moving taxies and receives user taxi calls. From the mobile device's GPS information, the server finds the closest taxi which is then sent to the user with the mobile device.

  • PDF

A Case Study on Forecasting Inbound Calls of Motor Insurance Company Using Interactive Data Mining Technique (대화식 데이터 마이닝 기법을 활용한 자동차 보험사의 인입 콜량 예측 사례)

  • Baek, Woong;Kim, Nam-Gyu
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.99-120
    • /
    • 2010
  • Due to the wide spread of customers' frequent access of non face-to-face services, there have been many attempts to improve customer satisfaction using huge amounts of data accumulated throughnon face-to-face channels. Usually, a call center is regarded to be one of the most representative non-faced channels. Therefore, it is important that a call center has enough agents to offer high level customer satisfaction. However, managing too many agents would increase the operational costs of a call center by increasing labor costs. Therefore, predicting and calculating the appropriate size of human resources of a call center is one of the most critical success factors of call center management. For this reason, most call centers are currently establishing a department of WFM(Work Force Management) to estimate the appropriate number of agents and to direct much effort to predict the volume of inbound calls. In real world applications, inbound call prediction is usually performed based on the intuition and experience of a domain expert. In other words, a domain expert usually predicts the volume of calls by calculating the average call of some periods and adjusting the average according tohis/her subjective estimation. However, this kind of approach has radical limitations in that the result of prediction might be strongly affected by the expert's personal experience and competence. It is often the case that a domain expert may predict inbound calls quite differently from anotherif the two experts have mutually different opinions on selecting influential variables and priorities among the variables. Moreover, it is almost impossible to logically clarify the process of expert's subjective prediction. Currently, to overcome the limitations of subjective call prediction, most call centers are adopting a WFMS(Workforce Management System) package in which expert's best practices are systemized. With WFMS, a user can predict the volume of calls by calculating the average call of each day of the week, excluding some eventful days. However, WFMS costs too much capital during the early stage of system establishment. Moreover, it is hard to reflect new information ontothe system when some factors affecting the amount of calls have been changed. In this paper, we attempt to devise a new model for predicting inbound calls that is not only based on theoretical background but also easily applicable to real world applications. Our model was mainly developed by the interactive decision tree technique, one of the most popular techniques in data mining. Therefore, we expect that our model can predict inbound calls automatically based on historical data, and it can utilize expert's domain knowledge during the process of tree construction. To analyze the accuracy of our model, we performed intensive experiments on a real case of one of the largest car insurance companies in Korea. In the case study, the prediction accuracy of the devised two models and traditional WFMS are analyzed with respect to the various error rates allowable. The experiments reveal that our data mining-based two models outperform WFMS in terms of predicting the amount of accident calls and fault calls in most experimental situations examined.

SMDP-Based Optimization Model for Call Admission Control in an OFDMA Wireless Communication Systems (OFDMA 무선통신시스템의 호접속 제어를 위한 SMDP 기반 최적화모형)

  • Paik, Chunhyun;Chung, Yongjoo
    • IE interfaces
    • /
    • v.25 no.4
    • /
    • pp.450-457
    • /
    • 2012
  • This study addresses the call admission control(CAC) problem for OFDMA wireless communication systems in which both subcarriers and power should be considered together as the system resources. To lessen the exccessive allocation of radio resources for protecting handoff calls, the proposed CAC allows the less data rate than their requirements to handoff calls. The CAC problem is formulated as a semi-Markov decision process(SMDP) with constraints on the blocking probabilities of handoff calls. Some extensive experiments are conducted to show the usefulness of the proposed CAC model.

ANNs on Co-occurrence Matrices for Mobile Malware Detection

  • Xiao, Xi;Wang, Zhenlong;Li, Qi;Li, Qing;Jiang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2736-2754
    • /
    • 2015
  • Android dominates the mobile operating system market, which stimulates the rapid spread of mobile malware. It is quite challenging to detect mobile malware. System call sequence analysis is widely used to identify malware. However, the malware detection accuracy of existing approaches is not satisfactory since they do not consider correlation of system calls in the sequence. In this paper, we propose a new scheme called Artificial Neural Networks (ANNs) on Co-occurrence Matrices Droid (ANNCMDroid), using co-occurrence matrices to mine correlation of system calls. Our key observation is that correlation of system calls is significantly different between malware and benign software, which can be accurately expressed by co-occurrence matrices, and ANNs can effectively identify anomaly in the co-occurrence matrices. Thus at first we calculate co-occurrence matrices from the system call sequences and then convert them into vectors. Finally, these vectors are fed into ANN to detect malware. We demonstrate the effectiveness of ANNCMDroid by real experiments. Experimental results show that only 4 applications among 594 evaluated benign applications are falsely detected as malware, and only 18 applications among 614 evaluated malicious applications are not detected. As a result, ANNCMDroid achieved an F-Score of 0.981878, which is much higher than other methods.

The Implementation of a Lift Emergency Video Call System based on WebRTC using OpenAPI

  • Woon-Yong Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.155-161
    • /
    • 2023
  • In this paper, we present a WebRTC-based emergency video call system structure that builds a service system in a constant monitoring environment to increase the usability and stability of elevator emergency call devices. The proposed system provides a smooth call environment between the emergency call system in the elevator and maintenance managers in case of an emergency, performs rapid response processing to elevator emergency calls through monitoring of the target elevator, and handles any emergency calls that may occur in the physical space of the elevator. The purpose is to build an environment that can implement low-latency, real-time video call services of voice and video by overcoming the physical constraints required for video calls. To this end, we have established a service environment based on OpenAPI, which is currently used in various fields and its performance has been proven, and provides video calls and emergency situation dissemination through rapid messaging by providing low-latency call quality. The presented system structure will be able to provide a basis for expanding various functions and constructing a reliable service environment and intelligent model for the elevator system through combination with the elevator control panel and various devices.