• Title/Summary/Keyword: User's Requirement

Search Result 278, Processing Time 0.026 seconds

Opportunistic Packet Scheduling Method Considering QoS Requirement in MMR (MMR에서 QoS를 고려한 기회적 패킷 스케줄링 방법)

  • Lee, Kang-Won;Kook, Kwang-Ho;Oh, Dong-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3A
    • /
    • pp.244-257
    • /
    • 2009
  • We analysed the opportunistic scheduling method in MMR proposed by Samsung Electronic Cooperation and confirmed the efficiency by simulation. We also investigated the relationship between the throughput and fairness under the proposed method. The main objective of this study is to propose an opportunistic packet scheduling method in MMR, which considers the QoS requirement of user. Using the simulation the performance of the proposed method is compared with those of i) pure opportunistic packet scheduling method which doesn't consider QoS requirement and ii) packet scheduling method which only consider the QoS requirement, but does not utilize opportunistic packet scheduling.

A Study On User-centric Identity Information Management Model In Internet Environment (인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구)

  • Rhy, Hae-Gyu;Shin, Hyeon-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.37-50
    • /
    • 2009
  • With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

A Multi Upper Bound Access Control Model with Inheritance Attributes

  • Kim, Seok-Woo
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.162-166
    • /
    • 1997
  • A message server have two basic functionalities, a server role for processing the processing the user environment as well as an entity role for transferring message to other entity in message system environment. The user who is going to send and receive his important information really wants to keep his own security requests. To satisfy this requirement, message server must be enforced by two seperated security policies- one for message processing security policy under department's computer working environment, the other for send/receive security policy under message system's communication path environment. Proposed access control model gurantees the user's security request by combining constrained server access control and message system access control with multi upper bound properties which come from inheritance attributes of originating user security contexts.

  • PDF

A Quantitative ERRC Analysis Method via Requirements Cost Estimation (요구사항의 비용산출을 통한 정량적인 ERRC 분석 방법)

  • Eom, Jeong-Yong;Kim, Neung-Hoe;Lee, Dong-Hyun;In, Hoh Peter
    • Journal of Information Technology Services
    • /
    • v.8 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Value-based requirements engineering process, called The ViRE(Value-Innovative Requirement Engineering) was suggested to create an uncontested market using ERRC(Eliminate, Reduce, Raise, Create) requirements analysis. But ViRE did not provides a quantitative data analysis method for ERRC decision so as to make objective decisions for customers. In this paper, to solve this problem, we suggest a quantitative ERRC analysis method by estimating requirements cost. Our method defines user requirements and decides their weight. Then, it makes quality level table for all the identified requirements and function modules and estimate implementation cost based on their quality levels. Finally, assess each requirement's impact and then evaluate ERRC value. We could get the more objective ERRC values by evaluate the requirement weight. functional module weight, and implementation cost. And we proved the efficiency of our model by a case study, smart student ID system.

Development Moodle Customization Guidelines and Supporting Tools (무들 커스터마이제이션 체계화 및 지원 도구 구현)

  • Kim, Jeong Ah;Park, Sun Kyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.2
    • /
    • pp.81-90
    • /
    • 2012
  • Open Source Softwares(OSS) are increasingly deployed in several domains, many educational organization have tried to deploy the OSS LMS(Learning Management System). For deploying OSS LMS, customization for specific environment is critical requirement. In this paper, we implemented the supporting environment to integrate the Moodle and school information system for user and course management. It is the most important customization requirement for introducing the Moodle to school. Also, we implemented supporting environment for the most important requirement so that we verified the usability of our guideline. We applied our environment to verify the efficiency of customization process.

A Study on the Estimation of Remodeling Method by Focused on Apartment House User's Request (공동주택 사용자 중심의 리모델링 방법 평가에 관한 연구)

  • Yoo, In-Geun;Kim, Chun-Hag;Yoon, Yer-Wan;Yang, Keek-Young
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.8 no.4
    • /
    • pp.211-222
    • /
    • 2004
  • Lately construction industry tends to prefer remodeling of existing buildings rather than new construction or reconstruction of buildings due to strengthening of several restriction related to real estates along with prolonged depression. And also, remodeling of building costs less and creates less wastes compared to reconstruction and so it is more profitable in financial and environmental view. However remodeling is process of creating new environment with existing building. Therefor remodeling must follow the procedure realizing problem and fix the problem based on through investigation on existing building and users requirement must be faithfully reflected. Specially in case of apartment houses, since vagueness on ownership and management authority on common parts exists. Hereupon, in this study we are to present the procedure of analyzing apartment house remodeling method through user requirement by approaching to several considerable factors in user request side.

Cross-layer Resource Allocation Algorithm for Downlink OFDM System

  • Guo, Qianjing;Hwang, Sung-Sue;Kim, Suk-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8A
    • /
    • pp.828-834
    • /
    • 2010
  • In this paper, an adaptive cross-layer resource allocation algorithm for the downlink multi-user OFDM system is proposed. The proposed algorithm does not only concern the wireless characteristics of physical (PHY) layer, but also pays attention to the user's quality of service (QoS) requirement, fairness, and packet queue state information of medium access control (MAC) layer. The algorithm is composed of two parts: one is to decide the priority of the user, and the other is to assign the radio resource according to its priority. Simulation results show that the proposed algorithm has both steady QoS and low computation complexity, even though the mobile users have different receiving signal to noise ratio (SNR).

A Study of Product Trade Service using Mobile Agent (모바일 에이전트를 이용한 상품거래서비스에 관한 연구)

  • 안성욱;오기욱
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.3
    • /
    • pp.1-10
    • /
    • 2001
  • Recently, way of Electronic Commerce is changing with increment of Internet users. In the previous way of commerce, users used to search for information by themselves. However, for user's convience, it can be done for users from one site. Mobile in order to provide users with such service. By the mobile agent-based Electronic Commerce system, users can get information from one site, and service companies can provide various and useful information to users. This is very important for construction of reliable Electronic Commerce environment, However, in generally used mobile agent-based platforms, the user should know URL information. and it is based on search engines. And as user's requirement levels become higher, they want to be provided with integrated and summarized service. In this paper, we implement product-trading system by applying mobile agent concept in order to satisfy user's requirement of getting required information from one site with minimal mouse click. For implementing the product trading system, E-speak, which is a platform for E-Service, is used And contents are saved as XML documents and data are shared based on these documents.

  • PDF

Intelligent Forging Simulation Techniques and AFDEX (지능적 단조 시뮬레이션 기술과 AFDEX)

  • Joun, M.S.;Lee, M.C.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2008.05a
    • /
    • pp.225-229
    • /
    • 2008
  • We present an intelligent forging simulator AFDEX. The intelligent forging simulator is determined by the adaptive and optimal mesh generation technique and many intelligent application-oriented special functions which minimize the user-intervention during forging simulation. Of course, the solution accuracy should be optimized in the intelligent simulation. We have developed AFDEX to meet the requirement on intelligent simulation. Its characteristics are introduced with the help of typical application examples.

  • PDF

Object Extraction and Modeling Method from the User Requirements with Fillmore's Case Grammar (Fillmore의 Case Grammar를 통한 사용자 요구사항으로부터 객체 추출 및 모델링 방법)

  • Ahn, Sung-Bin;Kim, Dong-Ho;Seo, Chae-Yun;Kim, R.Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.985-989
    • /
    • 2010
  • The near future smart ubiquitous computing oriented system will have to provide the optimal (right) service through interactions between users and the system. To provide the right services what the user needs, we should choose the user-centered development for reflecting the user needs, but not the developer-centered development. To do this, we proposed User Behavior Analysis Based Needs Extraction Method [1]. In this paper, we propose Object Extraction and Modeling Method from the user requirements with Fillmore's Case Grammar.