• Title/Summary/Keyword: Telephone operators

Search Result 26, Processing Time 0.019 seconds

Optimizing Multi-way Join Query Over Data Streams (데이타 스트림에서의 다중 조인 질의 최적화 방법)

  • Park, Hong-Kyu;Lee, Won-Suk
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.459-468
    • /
    • 2008
  • A data stream which is a massive unbounded sequence of data elements continuously generated at a rapid rate. Many recent research activities for emerging applications often need to deal with the data stream. Such applications can be web click monitoring, sensor data processing, network traffic analysis. telephone records and multi-media data. For this. data processing over a data stream are not performed on the stored data but performed the newly updated data with pre-registered queries, and then return a result immediately or periodically. Recently, many studies are focused on dealing with a data stream more than a stored data set. Especially. there are many researches to optimize continuous queries in order to perform them efficiently. This paper proposes a query optimization algorithm to manage continuous query which has multiple join operators(Multi-way join) over data streams. It is called by an Extended Greedy query optimization based on a greedy algorithm. It defines a join cost by a required operation to compute a join and an operation to process a result and then stores all information for computing join cost and join cost in the statistics catalog. To overcome a weak point of greedy algorithm which has poor performance, the algorithm selects the set of operators with a small lay, instead of operator with the smallest cost. The set is influenced the accuracy and execution time of the algorithm and can be controlled adaptively by two user-defined values. Experiment results illustrate the performance of the EGA algorithm in various stream environments.

Implications of TMF and QuEST Programs to Global Standardization Activities on Internet QoS in the Era of Digital Convergence (ITU-T와 IETF의 NGN 중심의 디지털 컨버전스 시대의 인터넷 QoS 가치사슬과 관련된 글로벌 표준화 활동)

  • Kim, Do-Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.35 no.3
    • /
    • pp.37-46
    • /
    • 2007
  • Our society is increasingly dependent on the Internet, and this trend will be accelerating in the ear of All-IP convergence. As the core infrastructure of the All-IP convergence, the next generation Internet should enable end-to-end Quality of Service(e2e QoS). For that purpose, major international standardization institutes such as ITU(International Telecommunication Union) and IETF(Internet Engineering Task Force) are building the concept and architecture of the Next Generation Network(NGN). However, these institutes focus only on technical issues, and leave many business/policy-oriented challenges unresolved. For example, the standards raised by ITU assume that the entire service delivery process for e2e QoS services is perfectly working. But required is a standardized business interface and process for seamless inter-operations across many stakeholders including ISPs(Internet Service Providers), CPs(Content Providers), so on. On the other hand, TMF(TeleManagement Forum) and QuEST(Quality Excellence for Suppliers of Telecommunication) Forum, global consortiums of telecom operators and vendors, present sets of interface rules and process which playa crucial role as de facto standards: for example, NGOSS/eTOM and TL9000 authorization system. However, these standards focus on telephone services, and provide little principle for the next generation Internet. Our study seeks a way to combine these two strains for a successful implementation of NGN. In particular, we find a missing link in the NGN architecture and the elements that could be complemented with the help of NGOSS/eTOM and TL9000. Finally, presented is a strategic direction that our standardization policy should purse in order to reinforce our global leadership for the next generation Internet.

Hardware Implementation of Radio Port Controller System for Wireless Local Loop Radio Network (무선 가입자망의 기지국 제어기 시스템 하드웨어 구현)

  • Koo, Je-Gil
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.1
    • /
    • pp.50-57
    • /
    • 2000
  • By supporting wireless communication technology, there is gradually expansion of the commercial application for Wireless Local Loop(WLL) technology, which is to replace existing telephone line with wireless one. The WLL system application helps a operator to have merits of the installation and maintenance of line and also a subscriber to make a high speed value-added service. As mentioned above reasons for both sides, many manufactories and operators are concerned with development and application respectively. This paper presents hardware implementation of Radio Port Controller(RPC) and also describes the system configuration, functions, and Inter Processor Communication(IPC) structure of RPC. We performed inter-module communication test via IPC backplane bus. And inter-module integration test also completed through data communication and signal waveform measurement repeatedly.

  • PDF

A Study on Voice over Internet Protocol Security Response Model for Administrative Agency (행정기관 인터넷전화 보안 대응 모델 개발 연구)

  • Park, Dea-Woo;Yang, Jong-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.237-240
    • /
    • 2011
  • Voice over Internet Protocol calls using administrative agency to build a national information and communication service, 'C' group, providers, the KT, SK Broadband, LG U+, Samsung SDS, as there are four operators. To prepare for an attack on Voice over Internet Protocol for administrative agency, security is a need for research to support the model. In this paper, the Internet telephone business of Administrative Agency to investigate and analyze the specific security measures to respond. Should set priorities around confidentiality about five security threats from NIS to Study of Voice over Internet Protocol Security Response Model for Administrative Agency. (1) Illegal wiretapping, (2) call interception, (3) service misuse, (4) denial of service attacks, (5) spam attacks, write about and analyze attack scenarios. In this paper, an analysis of protection by security threats and security breaches through a step-by-step system to address the research study is a step-by-step development of the corresponding model.

  • PDF

A Study on the Actual Use of Mobile Electronic Notification Service (모바일 전자고지서비스의 사용실태에 대한 조사 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.167-180
    • /
    • 2021
  • Due to the development of IT technology and the spread of infectious diseases, online non-face-to-face services are rapidly expanding. In particular, the information delivery process is also changing from the past postal branch-based to an information delivery system using mobile devices. This change is due to the change from the information delivery using the telephone line to the information delivery system using the Internet. Mobile notification service is a service that sends electronic notices to mobile devices held by users to deliver information and is validated for delivery, which has the advantage of reducing the benefits of unnecessary mail production, exposure to personal information, and misdelivery. However, user identification information must be provided to operators that provide mobile electronic notification services. In this paper, the current state of use of the mobile electronic notice service, which has been in effect since 2019, is investigated and analyzed, and the current mobile electronic notice service is to be safely provided and to take appropriate protection measures for personal information. In providing the mobile electronic notification service to users, it is possible to identify the service standards required by the sending agency, and based on this, prepare the technical standards for the mobile electronic notification service that the sending agency must comply with in advance and use it for the mobile electronic notification service.

Development of Work-related Musculoskeletal Disorder Questionnaire Using Receiver Operating Characteristic Analysis (Receiver Operating Characteristic 분석법을 이용한 업무관련성 근골격계질환 설문지 개발)

  • Kwon, Ho-Jang;Ju, Yeong-Su;Cho, Soo-Hun;Kang, Dae-Hee;Sung, Joo-Hon;Choi, Seong-Woo;Choi, Jae-Wook;Kim, Jae-Young;Kim, Don-Gyu;Kim, Jai-Yong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.32 no.3
    • /
    • pp.361-373
    • /
    • 1999
  • Objectives: Receive Operating Characteristic(ROC) curve with the area under the ROC curve(AUC) is one of the most popular indicator to evaluate the criterion validity of the measurement tool. This study was conducted to develop a standardized questionnaire to discriminate workers at high-risk of work-related musculoskeletal disorders using ROC analysis. Methods: The diagnostic results determined by rehabilitation medicine specialists in 370 persons(89 shipyard CAD workers, 113 telephone directory assistant operators, 79 women with occupation, and 89 housewives) were compared with participant's own replies to 'the questionnair on the worker's subjective physical symptoms'(Kwon, 1996). The AUC's from four models with different methods in item selection and weighting were compared with each other. These 4 models were applied to 225 persons, working in an assembly line of motor vehicle, for the purpose of AUC reliability test. Results: In a weighted model with 11 items, the AUC was 0.8155 in the primary study population, and 0.8026 in the secondary study population(p=0.3780). It was superior in the aspects of discriminability, reliability and convenience. A new questionnaire of musculoskeletal disorder could be constructed by this model. Conclusion: A more valid questionnaire with a small number of items and the quantitative weight scores useful for the relative comparisons are the main results of this study. While the absolute reference value applicable to the wide range of populations was not estimated, the basic intent of this study, developing a surveillance fool through quantitative validation of the measures, would serve for the systematic disease prevention activities.

  • PDF