• Title/Summary/Keyword: information source usage

Search Result 148, Processing Time 0.024 seconds

A study on improvement of policing perfomance by usage parameter control in asynchronous transfer mode networks (ATM망에서 사용자 변수 제어에 의한 감시 성능 개선에 관한 연구)

  • 한길성;오창석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.6
    • /
    • pp.1480-1489
    • /
    • 1996
  • In ATM networks there are two methods in traffic control as schemes advancing the quality of service. One is reactive control after congestion and the other which is generally recommended, is preventive control before congestion, including connection admission control on call leel and usage parameter control, network parameter control, priority control and congestion control on cell level. In particular, usage parameter control is required for restricting the peak cell rate of bursy tracffic to the parameter negotiated at call set-up phase since the peak cell rate significantly influences the network quality of service. The scheme for progressing quality of service by usage parameter control is themethod using VSA(Virtual Scheduling Algorlithm) recommended ITU-T. The method using VSSA(Virtual Scheduling Suggested Algorlithm) in this paper is suggested by considering cell delay variation and token rate of leaky bucket, compared VSA and VSANT(Virtual Scheduling Algolithm with No Tolerance) with VSSA which polices violated cell probability of conformed peak cell rate and intentionally excessive peak cell rate. VSSA method using IPP(Interruped Poisson Process) model of input traffic source showed more quality of service than VSA and VSANT methods as usage parameter control because the suggested method reduced the violated cell probability of contformed peak cell rate and intentionally excessive peak cell rate.

  • PDF

Intelligence in the Internet Era: Understanding OSINT and Case Analysis (인터넷 시대의 정보활동: OSINT의 이해와 적용사례분석)

  • Lee, Wan-Hee;Yun, Min-Woo;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.259-278
    • /
    • 2013
  • With advances of information technology (IT) and the Internet, it became much easier to search and collect information through many different types of web search engine. Such information only restricted to the intelligence services became available to the public, and the increased open source changed the intelligence collection activities of governments. Open Source Intelligence (OSINT) was introduced to organize and analyze the large volumes of information. OSINT is actively used after the 9/11 terrorist attack, and the United States government invest a huge amount of budget to conduct research and develope technology about OSINT. Although many Western countries recognize the importance of OSINT and deal with open source as priority, South Korea has not fully understand the important role of OSINT. Therefore, this study introduces the fundamental principles of OSINT and provides practical examples of OSINT usage. OSINT is an effective source to prevent terrorist attacks as well as a variety of crimes. Extensive discussion and suggestions for future usages are provided.

  • PDF

Need Assessment for Smartphone-Based Cardiac Telerehabilitation

  • Kim, Ji-Su;Yun, Doeun;Kim, Hyun Joo;Ryu, Ho-Youl;Oh, Jaewon;Kang, Seok-Min
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.283-291
    • /
    • 2018
  • Objectives: To identify the current status of smartphone usage and to describe the needs for smartphone-based cardiac telerehabilitation of cardiac patients. Methods: In 2016, a questionnaire survey was conducted in a supervised ambulatory cardiac rehabilitation (CR) program in a university affiliated hospital with the participation of heart failure or heart transplantation patients who were smartphone users. The questionnaire included questions regarding smartphone usage, demands for smartphone-based disease education, and home health monitoring systems. Results were described and analyzed according to principal diagnosis. Results: Ninety-six patients (66% male; mean age, $5{\pm}11$ years), including 56 heart failure and 40 heart transplantation patients, completed the survey (completion rate, 95%). The median daily smartphone usage time was 120 minutes (interquartile range, 60-300), and the most frequently used smartphone function was text messaging (61.5%). Of the patients, 26% stated that they searched for health-related information using their smartphones more than 1 time per week. The major source of health-related information was Internet browsing (50.0%), and the least sought source was the hospital's website (3.1%). Patients with heart failure expressed significantly higher needs for disease education on treatment plan, home health monitoring of blood pressure, and body weight (${\chi}^2=5.79$, 6.27, 4.50, p < 0.05). Heart transplantation patients expressed a significant need for home health monitoring of body temperature (${\chi}^2=5.25$, p < 0.05). Conclusions: Heart failure and heart transplantation patients show high usage of and interest in mobile health technology. A smartphone-based cardiac telerehabilitation program should be developed based on high demand areas and modified to suit to each principal diagnosis.

User Resistance in the Adoption of Open Source Software

  • Aung, Hnin Hnin;Kim, Hee-Woong
    • 한국경영정보학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.17-22
    • /
    • 2008
  • The emergence of open source software (OSS) with its successful projects and its most prominent advantages creates a vast interest among academics and practitioners. However, it has been found that focusing on the developments of OSS to be successful is not adequate and the adoption of OSS by uses is also very important. Although there are a great number of useful and easy to use OSS has been developed, the adoption of OSS and usage in the market is very low. Based on the technology equity implementation model (EIM), this study examines user resistance in the adoption of OSS (i.e., switching from the current system to OSS). A survey has done regarding the adoption of Linux as the case of study. We have found that user resistance to change has negative effect on adoption intention, and switching benefits, switching costs and perceived value have significant relationships with user resistance to change.

  • PDF

Quality Evaluation Method of Open Source Software (오픈소스 소프트웨어의 품질 수준 평가 방법)

  • Park, Ju-Byung;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.5
    • /
    • pp.2353-2359
    • /
    • 2012
  • Today, the use of the open source software is rapidly increasing. But, it is also true that the quality aspect of the open source software is not being considered seriously enough. As we see, the future prospect of the open source software seems to demand the development of a set of quality assessment technology for the open source software due to the current status of quality problems and sustained growth in its usage. Therefore, in this study a set of open source assessment models are analyzed to establish evaluation criteria, with which the open source software are to be evaluated.

A Technique to Analyze Heap Usage of Java Programs Using Code Inserting (코드삽입을 이용한 자바프로그램의 힙 사용정보 분석기법)

  • Joo, Seong-Yong;Jo, Jang-Wu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.29-36
    • /
    • 2007
  • In the Java a profiler interface such as JVM TI is provided for communication between a Java virtual machine and a profiler. The JVM TI specification, however does not require an implementation of a profiler interface. Consequently the JVM without an implementation of a profiler interface cannot use a profiler with the JVM TI. For solving the problem, we propose a technique which analyzes heap usage without a profiler interface. This technique inserts codes to extract heap usage into source files in the Java. We implemented a code inserter to verify the proposed technique. We experimented with Java programs that are frequently used and opened. the experimental result presents the number of created objects. the maximum number of allocated objects, and the used pattern of the objects.

  • PDF

User Process Resource Usage Measurement for Grid Accounting System

  • Hwang Ho Jeon;Kim Beob Kyun;Doo Gil Su;An Dong Un;Chung Seung Jong
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.608-611
    • /
    • 2004
  • Grid computing environment can be used to interconnect a wide variety of geographically distributed heterogeneous computing resources based on high-speed network. To make business service, it is necessary for Grid accounting system to measure the computational cost by consuming computer resources. To collect resource consumption data, and to keep track of process without needing to recompile kernel source, we use system call wrapping. By making use of this technique, we modifies system call table and replace existing system call to new system call that can monitor processes running in CPU kernel currently. Therefore we can measure user process resource usage for Grid accounting system.

  • PDF

Behaviors of Vitamin Mineral Supplement Usage by Healthy Adolescents Attending General Middle or High Schools in Korea (인문계 중.고등학교 재학생이 비타민.무기질 보충제 복용 행동 조사)

  • 한지혜
    • Journal of Nutrition and Health
    • /
    • v.33 no.3
    • /
    • pp.332-342
    • /
    • 2000
  • Vitamin mineral supplement usage by self-prescription is popular behavior among adolescents. This study was conducted to investigate the behaviors of vitamin·mineral supplement usage and the relationship between demographic variables and supplement usage by healthy adolescents. Nine hundred seventy two boys and girls, aged 13-18 years, attending general middle or high schools were chosen from various cities and rural communities in Korea. As a result, vitamin·]mineral supplements were taken by 31.3% of subjects. Users tended to take vitamin·mineral supplements more frequently when they were healthy than when they suffered from disease. The taking period of supplements was different according to school type such as middle or high school(p<.05), sex(p<.001) and residence of subjects(p<.01). The main information source of supplements was newspaper/magazine/TV, and it was affected by sex(p<.05) and residence(p<.01). Vitamin·mineral supplements were generally recommended by their mothers instead of health professionals. The commonly cited taking reason of supplements was affected by sex(p<.01)and socioeconomic status of family(p<.05). The frequently responded effect obtained from supplement use was recovery from fatigue and it was different according to sex(p<.01). The major mentioned reason of not taking vitamin·mineral supplements by non-users was 'I eat a balanced diet'. The most frequently consumed supplements were vitamin C, followed by multi-vitamins supplements, and this pattern was different according to school type(p<.001), sex(p<.01) and residence(p<.05). These findings show that the behaviors of vitamin·mineral supplement usage by subjects are not resonable, and their supplement usage tends to be affected by demographic variables. Therefore, nutritional understanding and education that are intended to form the resonable behaviors toward vitamin·mineral supplement usage of adolescents should be provided with considering the relationship between demographic variables and supplement usage.

  • PDF

Privacy Inferences and Performance Analysis of Open Source IPS/IDS to Secure IoT-Based WBAN

  • Amjad, Ali;Maruf, Pasha;Rabbiah, Zaheer;Faiz, Jillani;Urooj, Pasha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.1-12
    • /
    • 2022
  • Besides unexpected growth perceived by IoT's, the variety and volume of threats have increased tremendously, making it a necessity to introduce intrusion detections systems for prevention and detection of such threats. But Intrusion Detection and Prevention System (IDPS) inside the IoT network yet introduces some unique challenges due to their unique characteristics, such as privacy inference, performance, and detection rate and their frequency in the dynamic networks. Our research is focused on the privacy inferences of existing intrusion prevention and detection system approaches. We also tackle the problem of providing unified a solution to implement the open-source IDPS in the IoT architecture for assessing the performance of IDS by calculating; usage consumption and detection rate. The proposed scheme is considered to help implement the human health monitoring system in IoT networks

On the Aggregation of Multi-dimensional Data using Data Cube and MDX

  • Ahn, Jeong-Yong;Kim, Seok-Ki
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.1
    • /
    • pp.37-44
    • /
    • 2003
  • One of the characteristics of both on-line analytical processing(OLAP) applications and decision support systems is to provide aggregated source data. The purpose of this study is to discuss on the aggregation of multi-dimensional data. In this paper, we (1) examine the SQL aggregate functions and the GROUP BY operator, (2) introduce the Data Cube and MDX, (3) present an example for the practical usage of the Data Cube and MDX using sample data.

  • PDF