• Title/Summary/Keyword: Time and access

Search Result 3,932, Processing Time 0.032 seconds

Evaluation of Service Quality Factors on the Nailcare Shop (네일 샵의 서비스 품질 요인에 대한 평가)

  • Kim, Soon-Sim;Rhee, Sung-Suk;Kim, Hyeon-Ju
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.11 no.3
    • /
    • pp.153-162
    • /
    • 2009
  • The purpose of this study was to examine the differences in the service quality evaluation on the skill and expert, the shop facilities and atmosphere, the time and access, and the price and benefit of a nail care shop by age, income, spendings of appearance and a nail care, and a regular nail care. The survey was performed with questionnaires and the subjects were was 240 consumers who used the nail care. The data were analyzed by frequencies, F-test, T-test, Factor Analysis, one way ANOVA. The results of the study were as follows: Service quality evaluation were classified four factors- the price and benefits, the skill and expertness, the facilities and atmosphere, the time and access. There were no statistically significant differences in the price and benefits by age, income, spendings of appearance and a nail care, and a regular nail care, but there were statistically significant differences in the skill and expertness, the facilities and atmosphere, and the time and access. The service quality on the time and access was evaluated as high by the consumer in the 30s, with more income, and with high appearance and nail care spendings. The service quality on the shop facilities and atmosphere was evaluated as high by the consumers with high nail care spending. The consumers with a regular nail care evaluated the service quality on the skill and expertness, the time and access, the shop facilities and atmosphere as high.

  • PDF

Design of MJPEG Encoder for FH/TDD Multiple Transmissions (FH/TDD 다중전송용 MJPEG 부호화기 설계)

  • Kang, Min-Goo;Sonh, Seung-Il
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.45-50
    • /
    • 2011
  • In this paper, the encoding time delay of FH/TDD(Frequency Hopping/Time Division Duplex) based Motion JPEG image compression CODEC is analyzed for radio video transmissions of multi-camera systems in a vehicle. And, Synchronized connection of minimum channel collision is designed with synchronized shift and access according to channel status for Motion JPEG based FH/TDD multiple access.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

The effects of prehospital care on on-scene time in patients with major trauma (중증외상환자에서 병원전 외상 처치가 현장체류시간에 미치는 영향)

  • Yang, Jin-Cheol;Moon, Jun-Dong
    • The Korean Journal of Emergency Medical Services
    • /
    • v.24 no.1
    • /
    • pp.67-76
    • /
    • 2020
  • Purpose: Effective time management, as well as life-saving care, are important in maximizing the prognosis of patients who have sustained major traumas. This study evaluated the appropriateness of emergency medical system (EMS) provider's essential care and how this care impacted on-scene time in patients with major traumas. Methods: This retrospective observational study analyzed the EMS major trauma documents, classified according to the physiological criteria (Glasgow coma scale <14, systolic blood pressure <90mmHg, Respiration rate <10 or >29) in Daejeon, from January, 2015 to December, 2018. Results: Of the 707 major trauma cases, the mean on-scene time was 7.75±4.64 minutes. According to EMS guidelines, essential care accuracy was 67.5% for basic airway, 36.4% for advanced airway, 91.2% for cervical collar, 81.5% for supplemental oxygen, 47.0% for positive pressure ventilation, 19.9% for intravenous access and fluid administration, and 96.0% for external hemorrhage control. Factors affecting on-scene time were positive pressure ventilation (p<.004), and intravenous access and fluid administration (p<.002). Conclusion: Adherence to guidelines was low during advanced airway procedures, positive pressure ventilation, intravenous access, and fluid administration. In addition, the on-scene time was prolonged when the practitioner provided positive pressure ventilation, intravenous access, and fluid administration; however, these durations did not exceed the recommended 10 minutes.

An Analysis of Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting (안전한 브로드 캐스팅을 위한 Time-Bound Hierarchical Key Management 스킴 비교 분석)

  • Kim, Hyun-Cheol;Goo, Woo-Guen;Lee, Jun-Ho;Lee, Dong-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.556-558
    • /
    • 2008
  • Secure broadcasting is requirement for payment of TV systems, government or company. Hierarchical key management for access control provides efficient key management in those environment. Also, time-bound hierarchical key management technique generates different keys in each time period. In 2004, Tzeng proposed a time-bound cryptgraphic key assignment scheme for access control in a hierarchy and in 2008, Bertino et al proposed an efficient time-bound hierarchical key management scheme for secure broadcasting. Tzeng's scheme and Bertino et al's scheme are organized in different environment and primitive. In this paper, we analysis above two time-bound hierarchical key management scheme.

  • PDF

An Energy Efficient MAC Protocol Providing Guaranteed Service for Wireless Sensor Network

  • Kim, Dong-Won;Park, Tae-Geon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.123-140
    • /
    • 2011
  • In this paper, we propose an Energy Efficient Media Access Control (EE-MAC) protocol for wireless sensor networks. The proposed scheme is designed to save power consumption and guarantee quality-of-service for real-time traffic. EE-MAC uses the superframe structure which is bounded by the transmission of a beacon frame and can have an active and an inactive portion. The active period is divided into the contention free period (CFP) for real-time traffic transmission and the contention access period (CAP) for non-real-time traffic transmission. We propose the exclusively allocated backoff scheme which assigns a unique backoff time value to each real-time node based on bandwidth allocation and admission control. This scheme can avoid collision between real-time nodes by controlling distributed fashion and take effect a statistical time division multiple access. We also propose the algorithm to change the duty cycle adaptively according to channel utilization of media depending on network traffic load. This algorithm can prolong network lifetime by reducing the amount of energy wasted on idle listening.

Mutable Encryption for Oblivious Data Access in Cloud Storage

  • Ahmad, Mahmood;Hussain, Shujjat;Pervez, Zeeshan;Lee, Sungyoung;Chung, Tae Choong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.157-158
    • /
    • 2013
  • Data privacy and access control policies in computer clouds are a prime concerns while talking about the sensitive data. Authorized access is ensured with the help of secret keys given to a range of valid users. Granting the role access is a trivial matter but revoking user access is tricky and compute intensive. To revoke a user and making his data access ineffective the data owner has to compute new set of keys for the rest of effective users. This situation is inappropriate where user revocation is a frequent phenomenon. Time based revocation is another way to deal this issue where key for data access expires automatically. This solution rests in a very strong assumption of time determination in advance. In this paper we have proposed a mutable encryption for oblivious data access in cloud storage where the access key becomes ineffective after defined number of threshold by the data owner. The proposed solution adds to its novelty by introducing mutable encryption while accessing the data obliviously.

Dynamic Data Migration in Hybrid Main Memories for In-Memory Big Data Storage

  • Mai, Hai Thanh;Park, Kyoung Hyun;Lee, Hun Soon;Kim, Chang Soo;Lee, Miyoung;Hur, Sung Jin
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.988-998
    • /
    • 2014
  • For memory-based big data storage, using hybrid memories consisting of both dynamic random-access memory (DRAM) and non-volatile random-access memories (NVRAMs) is a promising approach. DRAM supports low access time but consumes much energy, whereas NVRAMs have high access time but do not need energy to retain data. In this paper, we propose a new data migration method that can dynamically move data pages into the most appropriate memories to exploit their strengths and alleviate their weaknesses. We predict the access frequency values of the data pages and then measure comprehensively the gains and costs of each placement choice based on these predicted values. Next, we compute the potential benefits of all choices for each candidate page to make page migration decisions. Extensive experiments show that our method improves over the existing ones the access response time by as much as a factor of four, with similar rates of energy consumption.

A Study on the VADAMA improvements of latency performance through control message collision avoid in MF-TDMA satellite network

  • Su-Hoon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.9
    • /
    • pp.115-123
    • /
    • 2024
  • This paper proposes a method to reduce the delay time caused by control message conflicts in VADAMA (Virtual Allocation Demand Assigned Multiple Access) technology, which is a virtual allocation based on-demand multiple access technology in MF-TDMA (Multi-Frequency Time Division Multiple Access) satellite network. Traditionally, satellite networks have had the problem that all network transmissions have long delay times due to control messages. In this study, in order to improve the delay time caused by terminal control message conflicts in VADAMA technology, the concept of virtual allocation is used to reduce the delay time. VADAMA-PTR (VADAMA Periodic Transmission) divides all terminals into subnets and transmits control. The method is proposed, and the performance analysis of the existing DAMA technology, delay time and data processing rate is performed using Matlab. The results show that the performance is improved.

A cross-domain access control mechanism based on model migration and semantic reasoning

  • Ming Tan;Aodi Liu;Xiaohan Wang;Siyuan Shang;Na Wang;Xuehui Du
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1599-1618
    • /
    • 2024
  • Access control has always been one of the effective methods to protect data security. However, in new computing environments such as big data, data resources have the characteristics of distributed cross-domain sharing, massive and dynamic. Traditional access control mechanisms are difficult to meet the security needs. This paper proposes CACM-MMSR to solve distributed cross-domain access control problem for massive resources. The method uses blockchain and smart contracts as a link between different security domains. A permission decision model migration method based on access control logs is designed. It can realize the migration of historical policy to solve the problems of access control heterogeneity among different security domains and the updating of the old and new policies in the same security domain. Meanwhile, a semantic reasoning-based permission decision method for unstructured text data is designed. It can achieve a flexible permission decision by similarity thresholding. Experimental results show that the proposed method can reduce the decision time cost of distributed access control to less than 28.7% of a single node. The permission decision model migration method has a high decision accuracy of 97.4%. The semantic reasoning-based permission decision method is optimal to other reference methods in vectorization and index time cost.