• 제목/요약/키워드: Future internet

검색결과 2,215건 처리시간 0.028초

WDM 광 버스트 스위칭을 위한 버스트 스케줄링 기법의 성능 평가 (Performance Evaluation of Burst Scheduling Schemes for WDM Optical Burst Switching)

  • 차윤호;소원호;노선식;김영천
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(1)
    • /
    • pp.177-180
    • /
    • 2000
  • Optical burst switching(OBS) is a new switching paradigm to supporting bursty traffic on the Internet efficiently. OBS separates burst level and control level. To handle data burst efficiently, the scheduling schemes in optical burst switching systems must keep track of future resource availability when assigning arriving data bursts to wavelength channels. In this paper, we evaluate the performance of three scheduling schemes which are called Horizon, Single-gap and Multiple-gap, as a basic study for the future research of Optical Internet. Thus, firstly, we analyze the trade-off between the performance and the processing overhead of each scheme. In addition, the performance of OBS system which uses Multiple-gap scheduling is evaluated in detail under various network size. We use simulation for performance evaluation in terms of burst loss rate(BLR), wavelength channel utilization and the number of management data.

  • PDF

A Named Data Networking Testbed with Global NDN Connection

  • ;임헌국
    • 한국통신학회논문지
    • /
    • 제40권12호
    • /
    • pp.2419-2426
    • /
    • 2015
  • Named Data Networking (NDN) is one of the powerfully evolving future internet architectures. In this paper installation, configuration and several tests are addressed to show how well and properly our NDN testbed have been prepared and established using NDN platform, in order to have interoperability with global NDN testbed. Global NDN testbed status with our NDN node participation was addressed. To verify one reachability on the NDN connection to global NDN testbed, a latency result is presented using NDN ping test.

Smart WLAN Discovery for Power Saving of Dual-Mode Terminals

  • Park, Hyunho;Lee, Hyeong Ho
    • ETRI Journal
    • /
    • 제35권6호
    • /
    • pp.1144-1147
    • /
    • 2013
  • Dual-mode terminals (DMTs) equipped with cellular and WLAN interfaces have become popular in recent years. Users of DMTs can enjoy high-speed WLAN Internet access and wide area Internet access to cellular networks. However, a DMT may consume power inefficiently when discovering a WLAN with inherently limited service coverage. In this letter, we propose to use smart WLAN discovery (SWD) to minimize the power consumption required for WLAN discovery. To minimize the power consumption of a DMT, an SWD DMT activates its WLAN interface only when the DMT transfers data within the WLAN coverage area. The simulation results of SWD show an improved power-saving performance compared to previous WLAN discovery schemes.

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis

  • Hussain, Israr;Zeng, Jishen;Qin, Xinhong;Tan, Shunquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1228-1248
    • /
    • 2020
  • Steganalysis & steganography have witnessed immense progress over the past few years by the advancement of deep convolutional neural networks (DCNN). In this paper, we analyzed current research states from the latest image steganography and steganalysis frameworks based on deep learning. Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques. The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis. Finally, technical challenges of current methods and several promising directions on deep learning steganography and steganalysis are suggested to illustrate how these challenges can be transferred into prolific future research avenues.

RFID-based Secure Communication for Smart Device in Future Home Network Environment

  • Li, Nong-Jun;Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제5권1호
    • /
    • pp.18-22
    • /
    • 2013
  • We introduce, in this paper, a novel approach of protection mechanism for data which are transmitted not only between the networked devices but also between the digital media devices. As the devices are getting more powerful and more storage capacity, they can process the encoded/encrypted data autonomously. However, all devices must know the secret key that used to encrypt data, and also use secure method to distribute that key. Moreover, there are no protection mechanisms supporting end-to-end copy protection which result in the fact that the data passed through various devices can be manipulated or captured. Therefore, we propose a RFID-based key distribution and protection mechanism to resolve these problems.

A Review of Deep Learning Research

  • Mu, Ruihui;Zeng, Xiaoqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.1738-1764
    • /
    • 2019
  • With the advent of big data, deep learning technology has become an important research direction in the field of machine learning, which has been widely applied in the image processing, natural language processing, speech recognition and online advertising and so on. This paper introduces deep learning techniques from various aspects, including common models of deep learning and their optimization methods, commonly used open source frameworks, existing problems and future research directions. Firstly, we introduce the applications of deep learning; Secondly, we introduce several common models of deep learning and optimization methods; Thirdly, we describe several common frameworks and platforms of deep learning; Finally, we introduce the latest acceleration technology of deep learning and highlight the future work of deep learning.

Energy-Efficient Last-Level Cache Management for PCM Memory Systems

  • Bahn, Hyokyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권1호
    • /
    • pp.188-193
    • /
    • 2022
  • The energy efficiency of memory systems is an important task in designing future computer systems as memory capacity continues to increase to accommodate the growing big data. In this article, we present an energy-efficient last-level cache management policy for future mobile systems. The proposed policy makes use of low-power PCM (phase-change memory) as the main memory medium, and reduces the amount of data written to PCM, thereby saving memory energy consumptions. To do so, the policy keeps track of the modified cache lines within each cache block, and replaces the last-level cache block that incurs the smallest PCM writing upon cache replacement requests. Also, the policy considers the access bit of cache blocks along with the cache line modifications in order not to degrade the cache hit ratio. Simulation experiments using SPEC benchmarks show that the proposed policy reduces the power consumption of PCM memory by 22.7% on average without degrading performances.

Applied Practices on the Application of VR/AR/MR Technologies to LVC Training Systems

  • Jong-Hoon Lee;Hun-Keun Park
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.149-159
    • /
    • 2023
  • The Republic of Korea (ROK) Army is developing the Army Synthetic Battlefield Training System and plans divisional-level Live, Virtual, and Constructive (LVC) integrated training. This study proposes a plan to apply VR/AR/MR (Virtual Reality/Augmented Reality/Mixed Reality) technology to LVC integrated training systems to enhance the efficiency and effectiveness of future LVC integrated training. The study investigated immersive military training systems in the ROK and advanced countries. As a result, we confirm that immersive technology can significantly improve the efficiency and effectiveness of military training. Accordingly, we review the key technologies required for building a defense training system with immersive features and propose training subjects that can be enhanced in effectiveness and efficiency when built with an immersive approach. We also propose a plan to apply immersive technology to the Live, Virtual, and Constructive systems for the development of future LVC integrated training system.

웹을 이용한 실시간 소성가공의 해석에 관한 연구 (A Study on the Real Time Analysis of Plastic Deformation Process using WWW(World Wide Web))

  • 이상돈;최호준;방세윤;임중연;이호용
    • 소성∙가공
    • /
    • 제12권2호
    • /
    • pp.110-115
    • /
    • 2003
  • This paper is concerned with the compression test and forming process of flange by using virtual reality and analysis(simulation) program. This virtual manufacturing can be carried out one personal computer without any expensive devices for experiment. The virtual manufacturing composed of three modules such as the imput, calculation and the output modules on internet. Internet user can give the material's property and process parameters to the sever computer at the input module. On the calculation module, a simulator computes the virtual manufacturing process by analysis program and stores the data as a file. The output module is the program in which internet user can confirm virtual manufacturing results by showing tables, graphs, and 3D animation. This programs is designed by an internet language such as HTML, CGI, VRML and JAVA ,while analysis programs use the finite increasing, the virtual manufacturing technique will substitute many real experiments in the future.

프라이버시 염려 영향요인이 인터넷 이용자의 신뢰와 온라인 거래의도에 미치는 영향 (Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users)

  • 유일;신정신;이경근;최혁라
    • Journal of Information Technology Applications and Management
    • /
    • 제15권4호
    • /
    • pp.37-59
    • /
    • 2008
  • This study focuses on the antecedents to the privacy concerns and their influence on trust and online transaction intention. Based on previous exploratory works and the literature review of privacy concerns, four antecedents are identified-Internet literacy, social awareness, perceived vulnerability, and perceived ability to information control. Incorporating these antecedents, privacy concerns, trust and online transaction intention, a conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that Internet literacy, social awareness, and perceived vulnerability have statistically significant effect on the privacy concerns of users and the privacy concerns has a positive influence on the trust. Finally, the trust has a positive effect on the online transaction intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

  • PDF