• Title/Summary/Keyword: Deployment Analysis

Search Result 552, Processing Time 0.025 seconds

Distributed Server based Data Management and Device Control Scheme for Efficient IoT Service in Smart Building (스마트 빌딩에서의 효율적인 사물인터넷 서비스를 위한 분산 서버 기반 데이터 관리 및 제어 기법)

  • Choi, Sang-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.547-550
    • /
    • 2017
  • With the deployment of Internet of Things (IoT) services, the interest of smart building management system is rapidly increased. However, existing smart building management system has some limitations such as single point of failure, scalability, processing delay by using the centralized service platform server. To overcome these limitations, in this paper, the distributed server based smart building management scheme is proposed. In the proposed scheme, it is possible to provide fast and efficient IoT services, regardless of the scale of smart building, by using the distributed server of each floor. From the numerical analysis, it is shown that the proposed scheme provides better performance than the existing centralized scheme in terms of stability of database and service processing delay.

  • PDF

A Proposal on Cryptographic Synchronization for T4 Link Encryption (T4급 링크 암호에 적합한 암호 동기방식 제안)

  • Lee, HoonJae;Kim, KiHwan;Kang, YongJin;Lee, Sang-Gon;Ryu, Young-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.202-210
    • /
    • 2018
  • The modern battlefield is being developed as a network-centric warfare where priority is given to rapid status grasp and power deployment through scientification and modernization. Therefore, tactical data link has been continuously improving the network speed, and recently, security technology is required for wireless communication with the UAV and various devices for reconnaissance. In addition, the future information warfare will utilize advanced IT technology positively. Efforts are needed to integrate various systems and networks. However, these efforts are meaningful only when they can assume sufficient security in a newly changing information and communication environment. In this paper, we propose a new cryptographic synchronization for link encryption suitable for tactical data links. The proposed cryptographic synchronization is useful for T4 UAV link encryption, and it is also adaptable for lower BER, then we analyze the performances analysis of that.

Big Data Meets Telcos: A Proactive Caching Perspective

  • Bastug, Ejder;Bennis, Mehdi;Zeydan, Engin;Kader, Manhal Abdel;Karatepe, Ilyas Alper;Er, Ahmet Salih;Debbah, Merouane
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.549-557
    • /
    • 2015
  • Mobile cellular networks are becoming increasingly complex to manage while classical deployment/optimization techniques and current solutions (i.e., cell densification, acquiring more spectrum, etc.) are cost-ineffective and thus seen as stopgaps. This calls for development of novel approaches that leverage recent advances in storage/memory, context-awareness, edge/cloud computing, and falls into framework of big data. However, the big data by itself is yet another complex phenomena to handle and comes with its notorious 4V: Velocity, voracity, volume, and variety. In this work, we address these issues in optimization of 5G wireless networks via the notion of proactive caching at the base stations. In particular, we investigate the gains of proactive caching in terms of backhaul offloadings and request satisfactions, while tackling the large-amount of available data for content popularity estimation. In order to estimate the content popularity, we first collect users' mobile traffic data from a Turkish telecom operator from several base stations in hours of time interval. Then, an analysis is carried out locally on a big data platformand the gains of proactive caching at the base stations are investigated via numerical simulations. It turns out that several gains are possible depending on the level of available information and storage size. For instance, with 10% of content ratings and 15.4Gbyte of storage size (87%of total catalog size), proactive caching achieves 100% of request satisfaction and offloads 98% of the backhaul when considering 16 base stations.

Adaptive Mitigation of Narrowband Interference in Impulse Radio UWB Systems Using Time-Hopping Sequence Design

  • Khedr, Mohamed E.;El-Helw, Amr;Afifi, Mohamed Hossam
    • Journal of Communications and Networks
    • /
    • v.17 no.6
    • /
    • pp.622-633
    • /
    • 2015
  • The coexistence among different systems is a major problem in communications. Mutual interference between different systems should be analyzed and mitigated before their deployment. The paper focuses on two aspects that have an impact on the system performance. First, the coexistence analysis, i.e. evaluating the mutual interference. Second aspect is the coexistence techniques, i.e. appropriate system modifications that guarantee the simultaneous use of the spectrum by different technologies. In particular, the coexistence problem is analyzed between ultra-wide bandwidth (UWB) and narrow bandwidth (NB) systems emphasizing the role of spectrum sensing to identify and classify the NB interferers that mostly affect the performance of UWB system. A direct sequence (DS)-time hopping (TH) code design technique is used to mitigate the identified NB interference. Due to the severe effect of Narrowband Interference on UWB communications, we propose an UWB transceiver that utilizes spectrum-sensing techniques together with mitigation techniques. The proposed transceiver improves both the UWB and NB systems performance by adaptively reducing the mutual interference. Detection and avoidance method is used where spectrum is sensed every time duration to detect the NB interferer's frequency location and power avoiding it's effect by using the appropriate mitigation technique. Two scenarios are presented to identify, classify, and mitigate NB interferers.

An Efficient Peer-to-Peer System in Ad-Hoc Networks (애드혹 망에서 효율적인 P2P 시스템)

  • Choi, Hyun-Duk;Park, Ho-Hyun;Woo, Mi-Ae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.200-207
    • /
    • 2007
  • Many P2P systems which are designed to implement large-scale data sharing have been introduced in internet recently. They exhibit interesting features like sell-configuration, sell-healing and complete decentralization, which make them appealing for deployment in ad hoc environments as well. This paper proposes an Gnutella-based P2P system that can operate efficiently in ad hoc networks. The objectives of this paper are to extend the overall system lifetime, to reduce overheads, and to provide enhanced performance. The proposed system uses an ultrapeer election scheme based on metric values and proactive distribution of ultrapeer information. According to the simulation results, the proposed system can provide better performance than Gnutella in terms of query success rate, query response time, overhead and residual battery power by utilizing network resources efficiently.

LIMITED OXIDATION OF IRRADIATED GRAPHITE WASTE TO REMOVE SURFACE CARBON-14

  • Smith, Tara E.;Mccrory, Shilo;Dunzik-Gougar, Mary Lou
    • Nuclear Engineering and Technology
    • /
    • v.45 no.2
    • /
    • pp.211-218
    • /
    • 2013
  • Large quantities of irradiated graphite waste from graphite-moderated nuclear reactors exist and are expected to increase in the case of High Temperature Reactor (HTR) deployment [1,2]. This situation indicates the need for a graphite waste management strategy. Of greatest concern for long-term disposal of irradiated graphite is carbon-14 ($^{14}C$), with a half-life of 5730 years. Fachinger et al. [2] have demonstrated that thermal treatment of irradiated graphite removes a significant fraction of the $^{14}C$, which tends to be concentrated on the graphite surface. During thermal treatment, graphite surface carbon atoms interact with naturally adsorbed oxygen complexes to create $CO_x$ gases, i.e. "gasify" graphite. The effectiveness of this process is highly dependent on the availability of adsorbed oxygen compounds. The quantity and form of adsorbed oxygen complexes in pre- and post-irradiated graphite were studied using Time of Flight Secondary Ion Mass Spectrometry (ToF-SIMS) and Xray Photoelectron Spectroscopy (XPS) in an effort to better understand the gasification process and to apply that understanding to process optimization. Adsorbed oxygen fragments were detected on both irradiated and unirradiated graphite; however, carbon-oxygen bonds were identified only on the irradiated material. This difference is likely due to a large number of carbon active sites associated with the higher lattice disorder resulting from irradiation. Results of XPS analysis also indicated the potential bonding structures of the oxygen fragments removed during surface impingement. Ester- and carboxyl-like structures were predominant among the identified oxygen-containing fragments. The indicated structures are consistent with those characterized by Fanning and Vannice [3] and later incorporated into an oxidation kinetics model by El-Genk and Tournier [4]. Based on the predicted desorption mechanisms of carbon oxides from the identified compounds, it is expected that a majority of the graphite should gasify as carbon monoxide (CO) rather than carbon dioxide ($CO_2$). Therefore, to optimize the efficiency of thermal treatment the graphite should be heated to temperatures above the surface decomposition temperature increasing the evolution of CO [4].

OFDMA FD-MAC Protocol Based on the Channel Information (채널정보 기반 OFDMA FD-MAC 프로토콜)

  • Cheon, Hye-Rim;Kim, Jae-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.451-458
    • /
    • 2015
  • The deployment density of AP increases as well as the density WLAN stations due to increase of WLAN use and the real performance of WLAN is degraded. To improve the performance, there are many PHY/MAC technologies and OFDMA and full duplex are promising technologies among them. In conventional OFDMA WLAN MAC relate works, there are some limitations in terms of channel utilization and collision probability. Thus, it need to research for effective channel allocation protocol. Full duplex can transmit data on the same time and same frequency resource so it can allocate channel more flexible than half duplex. In this paper, we prose the OFDMA FD-MAC(Full Duplex MAC) protocol that it allocates the sub-channels based on the idle channel information for full duplex pair. In addition, it shows the throughput improvement by performance analysis.

Deployment and Performance Analysis of Data Transfer Node Cluster for HPC Environment (HPC 환경을 위한 데이터 전송 노드 클러스터 구축 및 성능분석)

  • Hong, Wontaek;An, Dosik;Lee, Jaekook;Moon, Jeonghoon;Seok, Woojin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.9
    • /
    • pp.197-206
    • /
    • 2020
  • Collaborative research in science applications based on HPC service needs rapid transfers of massive data between research colleagues over wide area network. With regard to this requirement, researches on enhancing data transfer performance between major superfacilities in the U.S. have been conducted recently. In this paper, we deploy multiple data transfer nodes(DTNs) over high-speed science networks in order to move rapidly large amounts of data in the parallel filesystem of KISTI's Nurion supercomputer, and perform transfer experiments between endpoints with approximately 130ms round trip time. We have shown the results of transfer throughput in different size file sets and compared them. In addition, it has been confirmed that the DTN cluster with three nodes can provide about 1.8 and 2.7 times higher transfer throughput than a single node in two types of concurrency and parallelism settings.

Development of the Human Satisfaction Dimension for Customer-Oriented Quality Evaluation of Shoes (제화류의 고객지향적 품질평가를 위한 감성만족도 요소 개발에 관한 연구)

  • 김진호;황인극
    • Science of Emotion and Sensibility
    • /
    • v.7 no.2
    • /
    • pp.107-121
    • /
    • 2004
  • Although consumer needs for better products force manufactures to put emphasis on design, often development of a product has been done without the formal phase to consider human needs. In order to identify the implicit needs of customers and the areas of potential demand on a product, several analysis scheme such as QFD(quality function deployment) has been developed. For this, first of all, the methods for evaluating consumers satisfaction about their needs must be determined. However there were only few systematic methods on shoe design. In this paper we developed an innovative framework for human satisfaction evaluation of shoes. As a result, we uncovered 29 dominant human satisfaction dimensions for customer-oriented quality evaluation of a comfortable shoes. Here, 29 satisfaction dimensions were identified as the dimensions that represent the human sensitivity and psychological feeling on comfortable shoes. This study helped the designers and developers clarify the conceptual and abstract aspect of the design evaluation by proposing a more systematic and process-oriented method.

  • PDF

Analysis and Design of Functional Blocks for IIPv4/IPv6 Protocol and Address Translation (IPv4/IPv6 프로토콜 및 주소변환 기능의 요소기술 분석 및 설계)

  • 이승민;진재경;민상원
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.117-125
    • /
    • 2003
  • IPv6 (IP version 6), which was standardized by the IETF (Internet Engineering Task Force) to cope with existing IPv4 problems, needs several approaches for interoperation with IPv4. The internetworking of IPv6 with IPv4 is an important key to the deployment of the next generation Internet. As the solutions to the transition mechanism, both tunneling and translator methods have been proposed. In this paper, we analyze functional elements for implementation design of a transition mechanism based on the NAT-PT (NAT-Protocol Translation), and propose an extension algorithm that uses ports for effective use of global IPv4 addresses. The algorithm presented in this paper is a method of combining NAT-PT with Port Translation mechanism. The algorithm does not assign an IPv4 address to the host that needs IPv4 address, but allocates a single temporary IPv4 address and a port number in order to identify host.