• Title/Summary/Keyword: User's Requirement

Search Result 278, Processing Time 0.028 seconds

Routing Optimization using the Complementary MPLS for QoS Provisioning (서비스 품질 보장을 위한 상보형 MPLS를 이용한 라우팅 최적화)

  • 장석기;이경수;박광채
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.381-385
    • /
    • 2004
  • In this paper, We consider various service models and mechanisms as a part of study for offering QoS with the requirement of user and discuss genetic algorithm and hybrid genetic algorithm for routing optimization in broa㏈and convergence network. If routing optimization based on OSPF is not sufficient, a number of MPLS paths can be set up to further improve QoS. We propose two mixed-integer programming models for the complementary MPLS problem, and consider the maximum link utilization within the network as the relevant network QoS measure

  • PDF

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.

A Real Time Scan Detection System against Attacks based on Port Scanning Techniques (포트 스캐닝 기법 기반의 공격을 탐지하기 위한 실시간 스캔 탐지 시스템 구현)

  • 송중석;권용진
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.171-178
    • /
    • 2004
  • Port scanning detection systems should rather satisfy a certain level of the requirement for system performance like a low rate of “False Positive” and “False Negative”, and requirement for convenience for users to be easy to manage the system security with detection systems. However, public domain Real Time Scan Detection Systems have high rate of false detection and have difficulty in detecting various scanning techniques. In addition, as current real time scan detection systems are based on command interface, the systems are poor at user interface and thus it is difficult to apply them to the system security management. Hence, we propose TkRTSD(Tcl/Tk Real Time Scan Detection System) that is able to detect various scan attacks based on port scanning techniques by applying a set of new filter rules, and minimize the rate of False Positive by applying proposed ABP-Rules derived from attacker's behavioral patterns. Also a GUI environment for TkRTSD is implemented by using Tcl/Tk for user's convenience of managing network security.

A QoS-aware Web Services Selection for Reliable Web Service Composition

  • Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.586-589
    • /
    • 2012
  • Web Services have been utilized in a wide variety of applications and have turned into a key technology in developing business operations on the Web. Originally, Web Services can be exploited in an isolated form, however when no single Web Service can satisfy the functionality required by a user, there should be a possibility to compose existing services together in order to fulfill the user requirement. However, since the same service may be offered by different providers with different non-functional Quality of Service (QoS), the task of service selection for Web Service composition is becoming complicated. Also, as Web Services are inherently unreliable, how to deliver reliable Web Services composition over unreliable Web Services should be considered while composing Web Services. In this paper, we propose an approach on a QoS-aware Web Service selection for reliable Web Service composition. In our approach, we select and classify Web Services using Decision Tree based on QoS attributes provided by the client. Service classifier will improve selection of relevant Web Services early in the composition process and also provide flexibility to replace a failed Web Services with a redundant alternative Web Services, resulting in high availability and reliability of Web Service composition. We will provide an implementation of our proposed approach along with efficiency measurements through performance evaluation.

A Study for Key Generation and Access Control Protocol in BYOD Environments (BYOD환경에서 키 생성 및 접근 제어 프로토콜에 관한 연구)

  • Min, So-Yeon;Jin, Byung-Wook;Lee, Kwang-Hyoung;Lee, Keun-Wang
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.27-35
    • /
    • 2015
  • Depending on the smart device user growth and development of communication technology, the area about working environment was extended without constraints of time and places. It is introducing to work using user's devices and this environment is called 'BYOD(Bring Your On Device)'. But it is vulnerable to security threat that happened in existing wireless environment and its security threat issue which is caused by inside information leak by an inside job and lost or stolen terminal which is caused by careless user is getting heated. So we studied about access control protocol by user rights under the BYOD situation make a session key based on the user information. We make a session key based on the user information and user device information, after that we design an access control protocol. The protocol we suggest can protect from attack under the BYOD situation and wireless communication situation and also safety and security requirement from inside information leak because it controls user rights.

QoS-Aware Power Management of Mobile Games with High-Load Threads (CPU 부하가 큰 쓰레드를 가진 모바일 게임에서 QoS를 고려한 전력관리 기법)

  • Kim, Minsung;Kim, Jihong
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.328-333
    • /
    • 2017
  • Mobile game apps, which are popular in various mobile devices, tend to be power-hungry and rapidly drain the device's battery. Since a long battery lifetime is a key design requirement of mobile devices, reducing the power consumption of mobile game apps has become an important research topic. In this paper, we investigate the power consumption characteristics of popular mobile games with multiple threads, focusing on the inter-thread. From our power measurement study of popular mobile game apps, we observed that some of these apps have abnormally high-load threads that barely affect the user's gaming experience, despite the high energy consumption. In order to reduce the wasted power from these abnormal threads, we propose a novel technique that detects such abnormal threads during run time and reduces their power consumption without degrading user experience. Our experimental results on an Android smartphone show that the proposed technique can reduce the energy consumption of mobile game apps by up to 58% without any negative impact on the user's gaming experience.

A Web-based Spatial Layout Planning System with Constraint Satisfaction Problems (웹 환경 하에서의 제약 만족 기법에 의한 공간 계획 시스템)

  • Jung, Jae-Eun;Jeon, Seung-Bum;Jo, Geun-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.216-224
    • /
    • 2000
  • The spatial layout planning system allocates rectangular resources in the limited space according to user requirements, This system also can optimizes the spatial allocation problem to maximize the user's requirement. The spatial layout planning Problems for this system can be solved by searching a wide area of space since this problem entails the non-polynomial algorithm. By accommodating the user's dynamic requirements, the modification of a specific space and the redesign of the whole area can be accomplished. In this paper, the spatial layout planning problem is solved efficiently with a resource allocation method based on CSP. The dynamic constraints by adding user requirements are accommodated through the intelligent user Interface. The 3-D layout on the web environment by using VRML is also shown for providing for the visual verification of the 2-D layout and, thereafter, the additional modification of the 2-D layout.

  • PDF

A Study on Design Requirements for Smart Parking Services Considering User'S Stated Preferences (사용자 잠재선호특성을 고려한 스마트 주차서비스 설계요건 연구)

  • Jang, Jeong-Ah;Lee, Hyun-Mi;Lee, Won-Woo;Kim, Hyeon-Mi;Kim, Tae-Hyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.6
    • /
    • pp.1279-1286
    • /
    • 2021
  • This study suggests the user's needs for a smart parking service that enables parking lot search and advance reservation service, and is a study on the user's preference selection model related to fees (reservation fee, penalty fee), etc. Two types of user preference models in the form of logit models were constructed by composing a response questionnaire for smart parking service. The first is a model for selecting a smart parking lot, which suggests a situation in which the probability of selection is higher than that of a general parking lot in the relationship between usage fee and cost. The second is a parking ticket reservation discount selection model, and the smart parking service selection probability was analyzed through the relationship model between the reservation amount and the penalty. It can be used as a design requirement that enables sophisticated and various types of smart parking service considering users' preferences.

Analysis and Requirement of Model-based User Interface Model (모델 기반의 사용자 인터페이스 모델 분석 및 요구사항 도출)

  • Yu, So-Ra;Kim, Sung-Han;Lee, Seung-Yun;Lim, Han-Gil;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.512-513
    • /
    • 2012
  • User interface technology due to the user interface to manipulate the menu system is changing technology. Recently a user interface for the convenience of users at home and abroad for the study is underway. In this paper, we study the model-based interface technology, which is fundamental to develop UI for the user's convenience. For this we study the verification process by analyzing elements of the user interface technology, analyzing the standards of the UI, and finding requirements for the model-based user interface model. This will be used in order to secure the technology for web-application measures and to apply next-generation web-application.

  • PDF

A Study on the User Behavior in the Outpatient Department of Psychiatry (외래진료부문 정신건강의학과 이용자 행태 관찰 연구)

  • Lee, Hyunji;Lee, Haekyung;Chai, Choulgyun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.2
    • /
    • pp.45-53
    • /
    • 2015
  • Purpose: This study is to derive the behavioral characteristics of the users appear in the outpatient department of psychiatry. Methods: By referencing John Zeisel's Tools for environment-behavior research, observation of user behavior and expert interviews as a method of the study has been carried out. Results: The results of this study are as follows. First, adjacent placement among children, youth and regular the outpatient department of psychiatry is necessary and easy access to internal medicine department and family medicine department is required in order to allow cooperated treatments. Secondly, depending on the characteristics of the outpatient department of psychiatry treatment, adjustment of space requirement or the change of kinds of necessary space is required. Third, considering the psychological and behavioral characteristics of mental illness and guardians, various search for the environment that can support this. Implications: This study is a basic research for space improvement and evaluation of the outpatient department of psychiatry, and need to be followed by further study using various perspectives and methods.