• Title/Summary/Keyword: Channel management

Search Result 1,338, Processing Time 0.076 seconds

Application of Adaptive Neuro-Fuzzy Inference System for Interference Management in Heterogeneous Network

  • Palanisamy, Padmaloshani;Sivaraj, Nirmala
    • ETRI Journal
    • /
    • v.40 no.3
    • /
    • pp.318-329
    • /
    • 2018
  • Femtocell (FC) technology envisaged as a cost-effective approach to attain better indoor coverage of mobile voice and data service. Deployment of FCs over macrocell forms a heterogeneous network. In urban areas, the key factor limits the successful deployment of FCs is inter-cell interference (ICI), which severely affects the performance of victim users. Autonomous FC transmission power setting is one straightforward way for coordinating ICI in the downlink. Application of intelligent control using soft computing techniques has not yet explored well for wireless networks. In this work, autonomous FC transmission power setting strategy using Adaptive Neuro Fuzzy Inference System is proposed. The main advantage of the proposed method is zero signaling overhead, reduced computational complexity and bare minimum delay in performing power setting of FC base station because only the periodic channel measurement reports fed back by the user equipment are needed. System level simulation results validate the effectiveness of the proposed method by providing much better throughput, even under high interference activation scenario and cell edge users can be prevented from going outage.

A Location Dependent Group Key Management Scheme for High Confidential Information in Tactical Wireless Networks (전술 무선 네트워크에서 고비밀성 정보 공유를 위한 위치 종속적 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.658-664
    • /
    • 2018
  • In this paper, we propose a group key management scheme for very high confidential information in tactical wireless networks. For the proposed scheme, we consider the tactical networks that has a hierarchical topology and the nature of high confidential information. The leader node, which may have higher probability of good channel state than others, provides some data to all the network member in order to generate a geographical group key and it transmits the encrypted information with minimum transmission power level to others. By this scheme, the security and reliability for sharing confidential information is ensured. The performance of the proposed scheme is validated by mathematical analysis. It shows that the proposed scheme makes nodes to share a high confidential information securely if the proper parameters for network design are selected.

GIS-based strategic approach for the estimation of soil erosion (토사유실평가를 위한 GIS기반의 전략적 접근 방법)

  • Lee, Geun-Sang;Koh, Deuk-Koo;Je, Seong-Jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.413-416
    • /
    • 2006
  • This paper presents a strategic approach to effective soil conservation planning and management. To do this, the soil loss model, Revised Universal Soil Loss Equation (RUSLE) was used to quantify soil erosion in two basins (Andong and Imha basin), which are distinct in terms of sedimentation in the reservoir of each basin. Areas with high soil erosion potential were analyzed on the basis of land surface characteristics handled by geographic information system (GIS), especially dividing the basin into several sub-basins and then examination was emphasized near the river channel (water-pollutant buffering zone), along which human activities are large. Modeling results show the approach suggested herein provides a basis and guideline for choosing prior erosion risk areas to be examined for soil conservation planning and management. Also, this approach is relatively simple and has wide practical applicability.

  • PDF

Design of serializability Algorithm for Concurrency Control of Multi Transaction in Database (데이터베이스에서 다중 트랜잭션의 동시성 제어를 위한 직렬성 알고리즘 설계)

  • 김홍진;오상엽;김영선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.1-7
    • /
    • 2001
  • The database development is in need or transaction management composed of operations about data, efficiency database management and security of information data in necessity of as well as the new thinking about data security. When users approach data, transaction concurrency is controlled by the users security authentication and security level of data. So, existing secure algorithm occurred the problems which don't satisfy serializability of high level transaction which is delayed high level transaction repeatedly by the low level transaction, because existing secure algorithm is focused on the part which removes the security channel. Therefore this proposed algorithm which prevents waste of resource from the high level transaction reexecution and delay by stopping serializability offense problem by the increase of efficiency of concurrency control.

An Analysis of Management Factors for Environmentally-Friendly Rice's Production Farms (수도작 친환경농법 수용농가의 경영실태 및 요인분석)

  • Kim, Dong-Wan;Chang, Chi-Jin;Choi, Dong-Chil;Yu, Chan-Ju
    • Korean Journal of Organic Agriculture
    • /
    • v.14 no.3
    • /
    • pp.251-266
    • /
    • 2006
  • This study was surveyed and analyzed in 2005 year for environmentally-friendly rice's production 78 farmers in korea. The major results was as follows: The average age of farmers were 54 years old, the experiences of environmentally-friendly rice's production farms was 7.4 years, the cultivated scales of environmentally-friendly rice's production was 3.4ha. The 74%'s Farmers of all unified rice's breeds for rice's production of high-grade in quality, the ranking of rice's breeds selection were the high-grade rice's breeds of government>japan rice's breeds. The control of damage by blight and insects were needed environmentally-friendly control, the endured study of this control were very important. To cut down cost of the environmentally-friendly rice for income security of farmers and sustenance of farming will. To receive reasonable price of environmentally-friendly rice, the brand image were raised to consumers, the variety and miniaturization of rice packaging unit were needed in view of consumers. In addition to must be campaigns of publicity through the press and event to consumers, were managed the exchange of rice goods and exchanged e-mail together consumers for the maintenance of confidence. To drive direct marketing between environmentally-friendly rice farmers and consumers through experiential marketing, to diversify the marketing channel. To strengthen public relations at regional level and relationship at the consumers.

  • PDF

Water-Quality Analysis for Gokgyo Stream in Chonan Asan Region and Pollution Source Control Strategy Using GIS (천안/아산권역내 곡교천의 수질분석 및 지리정보체계를 이용한 유역 오염원 관리방안에 관한 연구)

  • 황병기;이상호
    • Journal of Environmental Science International
    • /
    • v.9 no.6
    • /
    • pp.443-447
    • /
    • 2000
  • Chonan and Asan city have been a focal point due to rapid development as the first station for Express Railroad and key cities West Coast Development Region. Gokgyo stream adjacent to the cities plays an important role as a drainage channel for an agriculture and a discharger of urban storm water. Waster quality of the stream has been deteriorating caused by pollution sources such as a untreated wastewater discharge and runoff from the watershed. In the study, we conducted 4 surveys in April, May, July, and September to understand the current state of water quality for the stream and to make it possibe to predict future water-quality variation for future development. The system runs on a personal computer under the windows enviroment and provides extensive graphic user interface(GUI) for user-friendly assessment. Using the pull-down menus provided by the GUI panel, the user is able to operate the system by pointing and clicking the icon to identify the state of water-quality at locations concerned. Furthermore, we developed an integrated watershed management system. The constructed system could be a useful tool as a decesion maker for pollution source control strategy.

  • PDF

A Custom Code Generation Technique for ASIPs from High-level Language (고급 언어에서 ASIP을 위한 전용 부호 생성 기술 연구)

  • Alam, S.M. Shamsul;Choi, Goangseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.31-43
    • /
    • 2015
  • In this paper, we discuss a code generation technique for custom transport triggered architecture (TTA) from a high-level language structure. This methodology is implemented by using TTA-based Co-design Environment (TCE) tool. The results show how the scheduler exploits instruction level parallelism in the custom target architecture and source program. Thus, the scheduler generates parallel TTA instructions using lower cycle counts than the sequential scheduling algorithm. Moreover, we take Tensilica tool to make a comparison with TCE. Because of the efficiency of TTA, TCE takes less execution cycles compared to Tensilica configurations. Finally, this paper shows that it requires only 7 cycles to generate the parallel TTA instruction set for implementing Cyclic Redundancy Check (CRC) applications as an input design, and presents the code generation technique to move complexity from the processor software to hardware architecture. This method can be applicable lots of channel Codecs like CRC and source Codecs like High Efficiency Video Coding (HEVC).

Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations

  • Bui, Quy-Anh;Lee, Wei-Bin;Lee, Jung-San;Wu, Hsiao-Ling;Liu, Jo-Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.437-454
    • /
    • 2020
  • According to the privacy regulations of the health insurance portability and accountability act (HIPAA), patients' control over electronic health data is one of the major concern issues. Currently, remote access authorization is considered as the best solution to guarantee the patients' control over their health data. In this paper, a new biometric-based key management scheme is proposed to facilitate remote access authorization anytime and anywhere. First, patients and doctors can use their biometric information to verify the authenticity of communication partners through real-time video communication technology. Second, a safety channel is provided in delivering their access authorization and secret data between patient and doctor. In the designed scheme, the user's public key is authenticated by the corresponding biometric information without the help of public key infrastructure (PKI). Therefore, our proposed scheme does not have the costs of certificate storage, certificate delivery, and certificate revocation. In addition, the implementation time of our proposed system can be significantly reduced.

Development of the Theoretical Model on Electronic-Store Success (전자상점 성과에 관한 이론적 모형 구축)

  • 윤철호;김상훈
    • Korean Management Science Review
    • /
    • v.20 no.2
    • /
    • pp.113-133
    • /
    • 2003
  • This study developed the ISM (Electronic Store Success Model) by basing upon the revised D&M IS Success Model and reflecting the characteristics of marketing and e business. The theoretical rationale of this model was as following : 1) Though the revised D&M IS Success Model (2002) must be more logical and complete model than the original D&M IS Success Model (1992), it did not reflect characteristics of marketing and e business. 2) In the marketing studios, Service Quality has been suggested as one of basic strategies for success. 3) In e business studies, Trust has been emerging as a potentially important antecedent of e loyalty. 4) There has been a paradigm shift from satisfaction to loyalty in marketing emphasis. 5) Nowadays, ERP (Enterprise Resource Planning) has been pervaded in many organizations and has supported PCA (Profit Center Accounting) or Channel based Accounting, so it has not been difficult to evaluate financial performance of Electronic Store. The ESM that has six dimensions (System Quality, information Quality. Service Quality, Trust, Loyalty, Financial Performance) and expresses the causal relationship among them was proposed and was compared with BSC (Balanced Scorecard), WebQual, and EWAM (Extended Web Assessment Method). The results showed that the ESM coincides with BSC and contains dimensions of WebQual, and EWAM.

MRCT: An Efficient Tag Identification Protocol in RFID Systems with Capture Effect

  • Choi, Sunwoong;Choi, Jaehyuk;Yoo, Joon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1624-1637
    • /
    • 2013
  • In RFID systems, one important issue is how to effectively address tag collision, which occurs when multiple tags reply simultaneously to a reader, so that all the tags are correctly identified. However, most existing anti-collision protocols assume isotropic collisions where a reader cannot detect any of the tags from the collided signals. In practice, this assumption turns out to be too pessimistic since the capture effect may take place, in which the reader considers the strongest signal as a successful transmission and the others as interference. In this case, the reader disregards the other collided tags, and in turn, fails to read the tag(s) with weaker signal(s). In this paper, we propose a capture effect-aware anti-collision protocol, called Multi-Round Collision Tree (MRCT) protocol, which efficiently identifies the tags in real RFID environments. MRCT deals with the capture effect as well as channel error by employing a multi-round based identification algorithm. We also analyze the performance of MRCT in terms of the number of slots required for identifying all tags. The simulation results show that MRCT significantly outperforms the existing protocol especially in a practical environment where the capture effect occurs.