• Title/Summary/Keyword: Channel management

Search Result 1,335, Processing Time 0.025 seconds

Wireless Mobile Sensor Networks with Cognitive Radio Based FPGA for Disaster Management

  • Ananthachari, G.A. Preethi
    • Journal of Information Processing Systems
    • /
    • v.17 no.6
    • /
    • pp.1097-1114
    • /
    • 2021
  • The primary objective of this work was to discover a solution for the survival of people in an emergency flood. The geographical information was obtained from remote sensing techniques. Through helpline numbers, people who are in need request support. Although, it cannot be ensured that all the people will acquire the facility. A proper link is required to communicate with people who are at risk in affected areas. Mobile sensor networks with field-programmable gate array (FPGA) self-configurable radios were deployed in damaged areas for communication. Ad-hoc networks do not have a centralized structure. All the mobile nodes deploy a temporary structure and they act as a base station. The mobile nodes are involved in searching the spectrum for channel utilization for better communication. FPGA-based techniques ensure seamless communication for the survivors. Timely help will increase the survival rate. The received signal strength is a vital factor for communication. Cognitive radio ensures channel utilization in an effective manner which results in better signal strength reception. Frequency band selection was carried out with the help of the GRA-MADM method. In this study, an analysis of signal strength for different mobile sensor nodes was performed. FPGA-based implementation showed enhanced outcomes compared to software-based algorithms.

Comparison of Success Rates of Supply Chain Contract using Simulation (시뮬레이션을 이용한 공급사슬 계약 성사율 비교)

  • Gao, Yang;Seo, Dong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • This study compares and analyzes wholesale(or price-only) contract, revenue-sharing contract, quantity-flexibility contract, and channel-rebate contract in a decentralized supply chain consisting of one supplier and one retailer. By setting the parameters of each coordination contract based on the previous results, we conduct simulations using @RISK for several combinations of these parameters. Under the supply chain coordination, we evaluate the probability of successfully signing a contract and the participant in favor of each contract. As a result, the quantity-flexibility contracts is most advantageous for the retailer and the channel-rebate contracts is most advantageous for the supplier. It revealed that revenue-sharing contracts can be used more flexibly because they can be selected in the widest range to redistribute profits between supplier and retailer.

Digital Bank Channel Distribution: Predictors of Usage Attitudes in Jakarta's Gen Z

  • Eko Retno, INDRIYARTI;Michael, CHRISTIAN;Henilia, YULITA;Titik, ARYATI;Regina Jansen, ARSJAH
    • Journal of Distribution Science
    • /
    • v.21 no.2
    • /
    • pp.21-34
    • /
    • 2023
  • Purpose: The goal of this study is to examine what makes young people more likely to use digital banking. This is because digital banking services and their distribution channels are technologically advanced, which can be a double-edged sword between ease of use and resistance to technology. Research design, data and methodology: This study included 320 participants from generation Z in Jakarta who use digital bank and used a quantitative method with PLS-SEM. Results: This study explains how, in addition to usefulness, costs, and self-efficacy, resistance to technology has a direct effect on usage attitudes. Meanwhile, if the attitude of use is preceded by aspects of usefulness, self-efficacy, and awareness, resistance to technology will be felt indirectly. Conclusions: This demonstrated that most discussed factors, such as Ease-of-Use and security of use, are important for Generation Z users but no longer a major consideration in accepting digital banking. Aside from being more open to the use of technology in digital banks, Generation Z also desires a balance of technology services and benefits. The limitations of this study are that it excludes social variables, uses certain generations, and limits the research area to one large city, which can be expanded in future studies.

MIMO-aided Efficient Communication Resource Scheduling Scheme in VDES

  • Sung, Juhyoung;Cho, Sungyoon;Jeon, Wongi;Park, Kyungwon;Ahn, Sang Jung;Kwon, Kiwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2736-2750
    • /
    • 2022
  • As demands for the maritime communications increase, a variety of functions and information are required to exchange via elements of maritime systems, which leads communication traffic increases in maritime frequency bands, especially in VHF (Very High Frequency) band. Thus, effective resource management is crucial to the future maritime communication systems not only to the typical terrestrial communication systems. VHF data exchange system (VDES) enables to utilize more flexible configuration according to the communication condition. This paper focuses on the VDES communication system among VDES terminals such as shore stations, ship stations and aids to navigation (AtoN) to address efficient resource allocation. We propose a resource management method considering a MIMO (Multiple Input Multiple Output) technique in VDES, which has been widely used for modern terrestrial wireless networks but not for marine environments by scheduling the essential communication resources. We introduce the general channel model in marine environment and give two metrics, spectral and the energy efficiencies to examine our resource scheduling algorithm. Based on the simulation results and analysis, the proposed method provides a possibility to enhance spectral and energy efficiencies. Additionally, we present a trade-off relationship between spectral and energy efficiencies. Furthermore, we examine the resource efficiencies related to the imperfect channel estimation.

Marketability analysis and commercialization methodology analysis system using big dataof Digital Policy & Management (빅데이터를 활용한 시장분석 및 사업화방법론 분석시스템)

  • Yong-Ho Kim;Hyung-Beom Park
    • Journal of Digital Convergence
    • /
    • v.21 no.2
    • /
    • pp.27-32
    • /
    • 2023
  • This study is about a marketability analysis and commercialization methodology analysis system using big data, and a marketability analysis and commercialization methodology analysis system that can analyze the marketability of the product based on a content channel capable of viral marketing. The marketability analysis and commercialization methodology analysis system using big data according to this study analyzes the marketability of the products to be analyzed by analyzing the marketing content provided on the content channel, so it has the advantage of determining more accurate viral marketing effects on the products to be analyzed.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

An ANP-based Resource Management Scheme in Heterogeneous Wireless Networks Considering Multiple Criteria (다기준 요소를 고려한 ANP 기반 이기종 무선 네트워크 자원관리 방안)

  • Shin, Choong-Yong;Cho, Jin-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.910-920
    • /
    • 2011
  • In a heterogeneous wireless environment, a variety of Radio Access Technologies (RATs) coexist. Since the number of RATs is anticipated to increase in the near future, it is desirable to have radio and network resources managed in a cooperative manner using the Common Radio Resource Management (CRRM) strategy. In order to make RAT-specific radio resources manageable in CRRM, this paper proposes the Analytical Network Process (ANP) based resource management scheme that efficiently allocates resources among heterogeneous wireless networks. The proposed ANP-based method is flexible enough to be used in any network environment and can consider a multitude of decision factors. In addition, the proposed scheme uses a radio bandwidth model, which properly reflects transmission rates under given channel conditions, as the actual radio resources to be allocated. The model considers the AMC (Adaptive Modulation and Coding) scheme that is widely used in current broadband wireless access technologies, and thus, packet service characteristics, such as response time, can be analyzed. The effectiveness and flexibility of the proposed method are demonstrated by implementing a number of existing factors on heterogeneous networks environment.

A High-speed Masking Method to protect ARIA against Side Channel Analysis (부채널 분석에 안전한 고속 ARIA 마스킹 기법)

  • Kim, Hee-Seok;Kim, Tae-Hyun;Ryoo, Jeong-Choon;Han, Dong-Guk;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.69-77
    • /
    • 2008
  • In the recent years, power attacks were widely investigated, and so various countermeasures have been proposed. In the case of block ciphers, masking methods that blind the intermediate results in the algorithm computations(encryption, decryption, and key-schedule) are well-known. Applications of masking methods are able to vary in different block ciphers, therefore suitable masking methods about each ciphers have been researched. Existed methods of ARIA have many revisions of mask value. And because existed masking methods pay no regard for key schedule, secret information can be exposed. In the case of ARIA, this problem is more serious than different block ciphers. Therefore we proposes an efficient masking scheme of ARIA including the key-schedule. Our method reduces time-complexity of ARIA encryption, and solve table-size problem of the general ARIA masking scheme from 256*8 byte to 256*6 byte.

New Efficient Scalar Multiplication Algorithms Based on Montgomery Ladder Method for Elliptic Curve Cryptosystems (타원곡선암호시스템에서 Montgomery ladder 방법에 기반한 새로운 스칼라 곱셈 알고리즘)

  • Cho, Sung-Min;Seo, Seog-Chung;Kim, Tae-Hyun;Park, Yung-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.3-19
    • /
    • 2009
  • This paper proposes efficient scalar multiplication algorithms based on Montgomery ladder method. The proposed algorithm represents the scalar as ternary or quaternary and applies new composite formulas utilizing only x coordinate on affine coordinate system in order to improve performance. Furthermore, side-channel atomicity mechanism is applied on the proposed composite formulas to prevent simple power analysis. The proposed methods saves at least 26% of running time with the reduced number of storage compared with existing algorithms such as window-based methods and comb-based methods.

The Adoption of New Service-Deliverly Channel under the Multi-channel Usage (다채널 이용 상황에서 신규 서비스채널의 수용에 관한 연구)

  • Kim, Hyun-Cheol;Han, Jang-Hui;Choi, Ji-Ho
    • Journal of Distribution Research
    • /
    • v.12 no.2
    • /
    • pp.23-49
    • /
    • 2007
  • Recently, mobile marketing is becoming one of the major topics of interest to the marketing discipline. Emerging from rapid developments in mobile technology, it has created opportunities for new and innovative mobile services. Also, it is enabling to conduct always-on connections that consumers can interact anytime and anywhere. Especially, mobile devices place themselves to the core means of mobile-commerce which to execute a function as a distribution channel in mobile environments. Although the adoption researches about innovative services or technologies had executed in marketing areas over the past decades, most researches just expanded or modified existing theories and explanation models. There has been little study on the comprehensive and systematic review of adoption process. Therefore, it deserves to be considered prior usage experiences of the existing channels(CL) and attractiveness of the new channel(CLalt) based on social exchange theory. In order to address this void, this study unifies components of perceived attributes in the each dimensions (ie. benefit, cost, and risk dimensions) and explores prior usage experiences of the existing channels on adoption intention in electronic financial service channels through developing comprehensive model and employing empirical test for the hierarchy of effects model. Based on these empirical results, this study suggests managerial implications for new channel management in electronic financial service areas by focusing on the prior usage experiences of the existing objects on adoption intention and perceived attributes of ubiquitous-based mobile service channel.

  • PDF