• Title/Summary/Keyword: 공유 자원

Search Result 1,486, Processing Time 0.022 seconds

Soft Decision based Advanced Receiver to Suppress and Cancel the Interference in D2D Communication Underlaying Cellular Network (셀룰러 네트워크상의 D2D 통신 시스템에서 간섭 억제 및 제거를 위한 연판정 기반 향상된 수신기)

  • Moon, Sangmi;Chu, Myeonghun;Kim, Hanjong;Kim, Daejin;Kim, Cheolsung;Hwang, Intae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.10-21
    • /
    • 2015
  • Cellular Network assisted device-to-device (D2D) communication has been growing to reduce the overload of eNodeB and mitigate the frequency shortage. However, by sharing the uplink frequency resource with the cellular network, the interference between cellular and D2D is increased. In this paper, we propose the advanced receiver based on soft decision to reduce the interference between cellular and D2D. The proposed receiver can suppress and cancel the interference by calculating the unbiased estimation value of interference signal using minimum mean square error (MMSE) or interference rejection combing (IRC) receiver. The interference signal is updated using soft information expressed by log-likelihood ratio (LLR). We perform a system level simulation based on the 20-MHz bandwidth of the 3GPP LTE-A system. Simulation results show that the proposed receiver can improve SINR, throughput and spectral efficiency compared to conventional receivers.

Introduction of CB Policy in Korea and Community Business Policy in Japan (지역활성화를 위한 커뮤니티 비즈니스 도입방안 -일본의 사례를 중심으로-)

  • Lee, Min-Kyu;Ryu, Sang-Il;Lee, Seok-Pyo;Kang, Hyoung-Kee
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.130-142
    • /
    • 2013
  • The objective of the present study was to analyze the functions and requirements of CB (community business) centering on the activation of localities based on research and cases in Japan where CB is discussed actively, and to suggest the necessity and plans for introducing CB in Korea. That is, we examined the utilization of CB fittingly for the condition of Korea centering on success factors derived from research and cases in Japan, and attempted to improve the roles of the government and related organizations in introducing CB as an excellent tool for the activation of localities. Analyze the cause of success factors of CB in Japan, success factors is separated institutional dimension from operational dimension. In the institutional dimension, efficient support systems for activating CB have been established in the central government, local governments, and regions. and in the operational dimension, CB leaders are enthusiastic, members participate actively, and intermediary supporting agencies make a great contribution to CB operation.

Hierarchical Internet Application Traffic Classification using a Multi-class SVM (다중 클래스 SVM을 이용한 계층적 인터넷 애플리케이션 트래픽의 분류)

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.7-14
    • /
    • 2010
  • In this paper, we introduce a hierarchical internet application traffic classification system based on SVM as an alternative overcoming the uppermost limit of the conventional methodology which is using the port number or payload information. After selecting an optimal attribute subset of the bidirectional traffic flow data collected from the campus, the proposed system classifies the internet application traffic hierarchically. The system is composed of three layers: the first layer quickly determines P2P traffic and non-P2P traffic using a SVM, the second layer classifies P2P traffics into file-sharing, messenger, and TV, based on three SVDDs. The third layer makes specific classification of the entire 16 application traffics. By classifying the internet application traffic finely or coarsely, the proposed system can guarantee an efficient system resource management, a stable network environment, a seamless bandwidth, and an appropriate QoS. Also, even a new application traffic is added, it is possible to have a system incremental updating and scalability by training only a new SVDD without retraining the whole system. We validate the performance of our approach with computer experiments.

Developing an Endangered Species Habitat Management System based on Location Information (위치정보 기반 멸종위기종 서식지 관리시스템 개발)

  • Kim, Sun-Jib;Kim, Sang-hyup
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.3
    • /
    • pp.67-73
    • /
    • 2020
  • The research status of endangered amphibians in Korea was mainly studied the life-cycle and distribution status of species from the 1980s to the early 2000s. Although a relatively diverse range of studies have been conducted on mackerels, studies on habitat prediction, analysis, change and management are insufficient. WEB, which provides biota information using location information in Korea, is a site operated by the National Bio Resource Center under the Ministry of Environment, but there is no information on endangered species and general species information has also been found to be very scantily. For this research, we secured a database of location information of Narrow-mouth frog, an endangered species, by combining literature and field research, and established a system by applying new technologies and open-based platform technologies that can be easily accessed by non-technical personnel of IT among IT technologies. The system was divided into administrator functions and user functions to prevent indiscriminate sharing of information through authentication procedures through user membership of users. The established system was authorized to show the distance between the current location and the location of the Narrow-mouth frog. Considering the ecological characteristics of the Narrow-mouth frog, which is an endangered species, a radius of 500m was marked to determine the habitat range. The system is expected to be applied to the legal system to change existing protected areas, etc. and to select new ones. It is estimated that practical reduction measures can be derived by utilizing the development plan for reviewing the natural environment. In addition, the deployed system has the advantage of being able to apply to a wide variety of endangered species by modifying the information entered.

A Study of Material Information System Model For Building Finishes (건축 마감자재정보 시스템 모델 연구)

  • Won, Seo-Kyung;Kang, Min-Woo;Woo, Ji-Youn;Kim, Sun-Kuk
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.597-601
    • /
    • 2006
  • There are considerable amount of man power and time spent for analysis and selection of various materials due to the inadequate application system and rapid searching process of material related information in each stage of building production process. Also, due to the insufficiency in recycling system of important information created for each process, they are hoarded at each task stage and project completion. As a result, because of the repetition of the similar/identical tasks on each process, it is the major reason for impeding the efficient employment of manpower of the company and decreasing competition of the company. Moreover, in selecting finish material in the project field, there are many difficulties due to the lack of technical information such as product characteristics and field applications. The construction quality also affects the profit and loss of the product which calls for a need to develop continued information management system that the finish material related examples could be shared in real time. The objective of this study is to propose a building finish material information which the real time research and application is possible to raise the productivity. TO do this, the current material information task status analysis and questionnaire research should be conducted to understand the demand of system development and reflect the result onto the system for easy access and application. Therefore, the building finish material information system for enhancement of productivity of construction task proposed in this study is expected to be utilized in enhancement of construction quality, maximization of company profit, and strengthening of company competition.

  • PDF

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Transmitting Devices Selection Based on Viewpoint Popularity for Wireless Free-Viewpoint Video Streaming (무선 자유시점 비디오 스트리밍에서 인기도 기반 전송 기기 선택 기법)

  • Koo, Jae-Woo;Cho, Young-Jong;Kang, Kyungran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.546-554
    • /
    • 2016
  • Free-viewpoint video (FVV) is a synthesization technology that generates a virtual viewpoint video using multiple videos recorded via wireless devices at heterogeneous locations. In order to introduce a new service that grafts the FVV onto the real-time streaming service using wireless devices, we need to overcome several constraints. Two main factors of those constraints are the limited wireless capacity that are shared fairly by multiple devices, and the transmission time constraint with which live streaming services have to comply. Therefore, for optimal quality of entire videos, a set of transmitting devices should be effectively selected depending on the condition of wireless channel and the required video popularity of specific viewpoint requested from users. For optimal selection, this study proposes a heuristic algorithm that takes into account the aforementioned factors from possible wireless transmission error behaviors and the requested viewpoint popularity. Through analysis and simulation, we show that with this algorithm, quality of most popular viewpoint videos is guaranteed. Furthermore, performance comparison against the existing scheme which is based only on the location of recording devices is made.

Feasibility of Massive Device-to-Device Communications in Cellular Networks (셀룰러 네트워크에서의 대규모 D2D 통신의 실현 가능성 연구)

  • Hwang, YoungJu;Sung, Ki Won;Kim, Seong-Lyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1091-1101
    • /
    • 2012
  • Device-to-device (D2D) communication is expected to offer local area services with low transmit power and short link distance, even not via any infrastructures. These advantages will lead to the deployment of D2D systems in a massive scale, where the order of magnitude of D2D user density is higher than that of cellular user density. Network-assisted D2D systems, where D2D resources are managed by cellular networks, are unable to support the large number of D2D devices, due to the signaling overhead for control signals. In this case, no coordination can be an answer. This paper considers uncoordinated D2D systems, which is implemented with a number of D2D devices in a large scale. By analyzing the transmission capacity of D2D systems, we found a feasibility condition under which the uncoordinated D2D communications possibly coexist within cellular networks, sharing the uplink spectrum. In addition, we provide guidelines for the operational points of massive D2D communications, giving some knowledge about proper transmit power level and link distance of uncoordinated D2D.

Design and Implementation of Library Information System Using Collective Intelligence and Cloud Computing (집단지성과 클라우드 컴퓨팅을 활용한 도서관 정보시스템 설계 및 구현)

  • Min, Byoung-Won
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.49-61
    • /
    • 2011
  • In recent, library is considered as an integrated knowledge convergence center that can respond to various requests about information service of users. Therefor it is necessary to establish a novel information system based on information communications technologies of the era. In other words, it is currently required to develop mobile information service available in portable devices such as smart phones or tablet PCs, and to establish information system reflecting cloud computing, SaaS, Annotation, and Library 2.0 etc. In this paper we design and implement a library information system using collective intelligence and cloud computing. This information system can be adapted for the varieties of mobile service paradigm and abruptly increasing amount of electronic materials. Advantages of this concept model are resource sharing, multi-tenant supporting, configuration, and meta-data supporting etc. In addition it can offer software on-demand type user services. In order to test the performance of our system, we perform an effectiveness analysis and TTA authentication test. The average response time corresponding to variance of data reveals 0.692 seconds which is very good performance in timing effectiveness point of view. And we detect maturity level-3 or 4 authentication in TTA tests such as SaaS maturity, performance, and application programs.

Dynamic States Consideration for Next Hop Nodes Selection Method to Improve Energy Efficiency in LEAP based Wireless Sensor Networks (LEAP기반의 무선 센서 네트워크에서 가변적 상태를 고려한 에너지 효율적 다음 홉 노드 선택 기법)

  • Nam, Su-Man;Cho, Tae-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.6
    • /
    • pp.558-564
    • /
    • 2013
  • Wireless sensor networks (WSNs) contain limited energy resources and are left in open environments. Since these sensor nodes are self-operated, attacks such as sinkhole attacks are possible as they can be compromised by an adversary. The sinkhole attack may cause to change initially constructed routing paths, and capture of significant information at the compromised node. A localized encryption and authentication protocol (LEAP) has been proposed to authenticate packets and node states by using four types of keys against the sinkhole attack. Even though this novel approach can securely transmits the packets to a base station, the packets are forwarded along the constructed paths without checking the next hop node states. In this paper, we propose the next hop node selection method to cater this problem. Our proposed method evaluates the next hop node considering three factors (i.e., remaining energy level, number of shared keys, and number of filtered false packets). When the suitability criterion for next hop node selection is satisfied against a fix threshold value, the packet is forwarded to the next hop node. We aim to enhance energy efficiency and a detour of attacked areas to be effectively selected Experimental results demonstrate validity of the proposed method with up to 6% energy saving against the sinkhole attack as compared to the LEAP.