• Title/Summary/Keyword: User Connection

Search Result 578, Processing Time 0.032 seconds

Database Connection Pool Architecture for User Interconnections Access (동시접속 사용자 접근을 고려한 데이터베이스 커넥션 풀 아키텍처)

  • Kim, Young-Chan;Kim, Tae-Gan;Lee, Se-Hoon;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.89-97
    • /
    • 2009
  • The use of database system in application increases day by day. This brought out the DBMS interconnection access problem with rapid increase of the user. To solve these database connection problem, database connection pool has been presented. However, there is much to be desired on user's interconnection access. To improve previous connection pool architecture, we have designed the sub connection pool besides main connection pool in this paper. We defined connection pool broker to manage both main and sub connection pool connection. When main connection pool reached its limitation, connection pool broker transfers a connection from a main connection pool to a sub connection pool. When the interconnection access user increased rapidly, we have proved that the suggested sub pool architecture is more effective on response time by comparing it with other existing DBMS connection pool architectures using simulation.

Combination-mode BLE Device Profile for Connection & Non-connection Methods

  • Jiang, Guangqiu;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.897-899
    • /
    • 2016
  • In recent years, BLE technology has received extensive attention and has been applied to all aspects of life. The existing BLE device has two methods, one is the connection method, and the other is a non-connection method. The representative profile of the connection method is the proximity file. The most typical example of Non-connection method BLE device is a beacon. However, they are both independent and have their own shortcomings. Connection method device can provide service for only one user, others can't use. Security performance of Non-connection method BLE device is poor and the device can't be controlled by the user. In this paper, a combination-mode BLE device profile design scheme is presented, which combines with the previous two methods, and solves the defaults. And We define a dual purpose advertising package that can be used in a normal environment as well as in a disaster environment. Finally, a unidirectional Control idea is proposed. Through performance evaluation, we found that the device has strong stability and low power consumption.

Discriminating a User Indirect Trust Considering Connection Relationship and Influence of Users in Social Networks (소셜 네트워크에서 연결 관계와 영향력을 고려한 사용자 간접 신뢰도 판별)

  • Seo, Indeok;Song, Heesub;Jeong, Jaeyun;Park, Jaeyeol;Kim, Minyoung;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.280-291
    • /
    • 2018
  • Recently, various interactions have been actively conducted through sharing and expressing opinions among users in social networks. In this process, since malicious users and fault information spread misinformation, trust is reduced irrespective of their will. To solve this problem, studies have been conducted to determine the trust of a user through direct-connected users. In this paper, we propose a enhanced user indirect trust discrimination scheme considering the connection relation and influence of users. The proposed indirect trust computation scheme derives the user's area of interest through user interaction and reconstructs the existing network considering the user connection relationship. The final indirect trust is also detected by determining whether the user is a malicious user through the influence of the user. Through various performance evaluations, we show that the proposed scheme achieves better performance than the existing method.

Research for Adaptive Wireless AP Profile selection via Efficient network connection of Android System-based (안드로이드 시스템 기반의 적응적 무선 AP 프로파일 선택을 통한 효율적 네트워크 연결에 관한 연구)

  • Back, Jong-Kyung;Han, Kyung-Sik;Sonh, Seung-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.632-634
    • /
    • 2012
  • In order for the connection to the wireless network from the list of priorities of the wireless AP to AP profile automatic connection by selecting the preferred method to register a profile, which is determined at the time of the change, the user does not respond to the demands of the part. In this study, the frequency of the user's access in accordance with the wireless AP, and by creating a profile, the user needs to meet with regard to network access adaptive research.

  • PDF

Efficient Intranet Connection Methodology for Remote and Mobile User (원격, 이동 사용자를 위한 효율적 인트라넷 접속 방법론)

  • Mun, Hyun-Wuk;Oh, Kie-Sung
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.36T no.4
    • /
    • pp.110-114
    • /
    • 1999
  • In this paper, we present formal three methodologies for intranet connection to remote and mobile user. The most important issue is information communication security in intranet solution. The structure of this methodology is composed of several remote and mobile connection methods. By three methodologies and experimental building network, we suggest direction for valid solution of intranet connection.

  • PDF

Scheduling Performance Evaluation and Testing Functions of a Connection-Oriented Packet Switching Processor (연결지향형 패킷교환 처리기의 스케줄링 성능평가 및 시험 방안 연구)

  • Kim, Ju-Young;Choi, Ki-Seok
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.40 no.1
    • /
    • pp.135-139
    • /
    • 2014
  • In a connection-oriented packet switching network, the data communication starts after a virtual circuit is established between source and destination. The virtual circuit establishment time includes the queue waiting times in the direction from source to destination and the other way around. We use this two-way queueing delay to evaluate scheduling policies of a packet switching processor through simulation studies. In this letter, we also suggest user testing functions for the packet switching processor to manage virtual circuits. By detecting error causes, the user testing helps the packet switching processor provide reliable connection-oriented services.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Methodology for Designing Inter-device Connectivity by Classifying User Experience Step (사용자 경험단계의 분류를 통한 기기간 연결성디자인 방법론)

  • Hong, Sung-Soo;Yoo, Soung-Min;Ahn, Hyo-In;Ko, Chang-Suk
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.456-459
    • /
    • 2008
  • We are now in the era of digital convergence with CE products and PC at the center, but product diversification occurs in the same breath. Each device may perform its own functions itself independently, but proportion of the inter-device usage is increasing gradually by concept of a home network and ubiquitous widely prevailed. The consumer's need of inter-device connection will take the dominative position of the market. Therefore, we can easily forecast that diversification of the products may inevitably lead connectivity patterns complicated considering recent market situation and trends. In this paper, we propose the methodology for designing inter-device connectivity which covers issues such like segmenting numerous number of connectivity pattern, and establishing their structure of control. Our methodology also supports the inter-device connection with extensive latitudes and a multi-device simultaneous control. In order to present inter-device connectivity guideline, we define four stages of a user experience - Connection, Configuration, Use, Disconnection. Based on the 4 user experience stages, we suggest a specific connectivity designing guideline for each step.

  • PDF

Method of network connection management in module based personal robot for fault-tolerant (모듈기반 퍼스널 로봇의 결함 허용 지원을 위한 네트워크 연결 유지 관리 기법)

  • Choi, Dong-Hee;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.300-302
    • /
    • 2006
  • Middleware offers function that user application program can transmit data independently of network device. Connection management about network connection of module is important for normal service of module base personal robot. Unpredictable network disconnection is influenced to whole robot performance in module base personal robot. For this, Middleware must be offer two important function. The first is function of error detection and reporting about abnormal network disconnection. Therefore, middleware need method for network error detection and module management to consider special quality that each network device has. The second is the function recovering that makes the regular service possible. When the module closed from connection reconnects, as this service reports connection state of the corresponding module, the personal robot resumes the existing service. In this paper proposed method of network connection management for to support fault tolerant about network error of network module based personal robot.

  • PDF

A Predictive Connection Admission Control Using Neural Networks for Multiclass Cognitive Users Radio Networks (멀티 클래스 인지 사용자 네트워크에서 신경망을 이용한 예측 연결수락제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.435-441
    • /
    • 2013
  • This paper proposes a neural net based-predictive connection admission control (CAC) scheme for multiclass users in wireless cognitive radio networks. We classifies cognitive users(cu) into real and non real time services, and then permit only real time services to reserve the demanded resource for spectrum handoff in guard channel for provisioning the desired QoS. Neural net is employed to predict primary user's arrival on time and demanded channels. Resource scheduling scheme is based on $C_IA$(cognitive user I complete access) shown in this paper. For keeping primary users from interference, the CAC is performed on only cognitive user not primary user. Simulation results show that our schemes can guarantee the desired QoS by cognitive real time services.