• Title/Summary/Keyword: IT Resource Sharing

Search Result 297, Processing Time 0.026 seconds

Resource Allocation Scheme Based on Spectrum Sensing for Device-to-Device Communications Underlaying Cellular Networks (셀룰러 네트워크 환경에서 D2D 통신을 위한 스펙트럼 센싱 기반 자원 할당 기법)

  • Kang, Gil-Mo;Shin, Oh-Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.10
    • /
    • pp.898-907
    • /
    • 2013
  • For D2D communications underlaying cellular networks, it is essential to consider the mutual interference between the existing cellular communications and D2D communications as well as the spectral efficiency, as they need to share the same frequency. Accordingly, a resource allocation scheme should be designed in such a way that minimizes the mutual interference and maximizes the spectrum utilization efficiency at the same time. In this paper, we propose a resource allocation scheme based on cooperation of the base station and D2D terminals. Specifically, a D2D terminal senses the cellular spectrum to recognize the interference condition, chooses the best cellular resource, and reports the information to the base station. The base station allocates D2D resource such that the corresponding D2D link and cellular link share the same resource. The performance of the proposed resource allocation scheme is ated through compu under 3GPP LTE-Advanced scenarios.

Constant-Size Ciphertext-Policy Attribute-Based Data Access and Outsourceable Decryption Scheme (고정 크기 암호 정책 속성 기반의 데이터 접근과 복호 연산 아웃소싱 기법)

  • Hahn, Changhee;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.933-945
    • /
    • 2016
  • Sharing data by multiple users on the public storage, e.g., the cloud, is considered to be efficient because the cloud provides on-demand computing service at anytime and anywhere. Secure data sharing is achieved by fine-grained access control. Existing symmetric and public key encryption schemes are not suitable for secure data sharing because they support 1-to-1 relationship between a ciphertext and a secret key. Attribute based encryption supports fine-grained access control, however it incurs linearly increasing ciphertexts as the number of attributes increases. Additionally, the decryption process has high computational cost so that it is not applicable in case of resource-constrained environments. In this study, we propose an efficient attribute-based secure data sharing scheme with outsourceable decryption. The proposed scheme guarantees constant-size ciphertexts irrespective of the number of attributes. In case of static attributes, the computation cost to the user is reduced by delegating approximately 95.3% of decryption operations to the more powerful storage systems, whereas 72.3% of decryption operations are outsourced in terms of dynamic attributes.

Soft Load Balancing Using the Load Sharing Over Heterogeneous Wireless Networks (이기종 무선 환경에서 Load sharing을 이용한 Soft Load Balancing 기술)

  • Son, Hyuk-Min;Lee, Sang-Hoon;Kim, Soo-Chang;Shin, Yeon-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.7A
    • /
    • pp.757-767
    • /
    • 2008
  • Start Ongoing next generation networks are expected to be deployed over current existing networks, in the form of overlayed heterogeneous networks, in particular, in hot spot areas. Therefore, it will be necessary to develop an interworking technique such as load balancing, to achieve increased overall resource utilization in the various heterogeneous networks. In this paper, we present a new load balancing mechanism termed 'soft' load balancing where the IP(Internet Protocol) traffic of a user is divided into sub-traffic, each of which flows into a different access network. The terminology of soft load balancing involves the use of both load sharing and handover techniques. Through a numerical analysis, we obtain an optimal LBR (Load Balancing Ratio) for determining the volume of traffic delivered to each network over an overlayed multi-cell environment. Using the optimal LBR, a more reliable channel transmission can be achieved by reducing the outage probability efficiently for a given user traffic.

Dynamic Resource Allocation and Scheduling for Cloud-Based Virtual Content Delivery Networks

  • Um, Tai-Won;Lee, Hyunwoo;Ryu, Won;Choi, Jun Kyun
    • ETRI Journal
    • /
    • v.36 no.2
    • /
    • pp.197-205
    • /
    • 2014
  • This paper proposes a novel framework for virtual content delivery networks (CDNs) based on cloud computing. The proposed framework aims to provide multimedia content delivery services customized for content providers by sharing virtual machines (VMs) in the Infrastructure-as-a-Service cloud, while fulfilling the service level agreement. Furthermore, it supports elastic virtual CDN services, which enables the capabilities of VMs to be scaled to encompass the dynamically changing resource demand of the aggregated virtual CDN services. For this, we provide the system architecture and relevant operations for the virtual CDNs and evaluate the performance based on a simulation.

Interference-limited Resource Allocation in Cognitive Radio Networks with Primary User Protection.

  • Mui, Nguyen Van;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.352-354
    • /
    • 2011
  • The performance of multihop cognitive radio networks (CRN) can be improved significantly by using multiple channels in spectrum underlay fashion. However, interference due to the sharing of common radio channel and congestion due to the contention among those flows that share the same links become an obstacle to meet this challenge. How to control efficiently congestion and allocate power optimally to obtain a high end-to-end throughput is a key objective in this work. We reexamined the Network Utility Maximum (NUM) problem with a new primary outage constraint and proposed a novel resource allocation strategy to solve it effectively and efficiently.

Energy D2D Tx-Rx assignment in the Cellular System

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.41-46
    • /
    • 2017
  • In this paper, we investigate the D2D Transmitter(Tx) and Receiver(Rx) pair assignment problem in the cellular system where D2D users share the uplink resource of the cellular system. Sharing the uplink resource of the cellular system may cause interference to the cellular system, though it is beneficial to improve the D2D user Capacity. Therefore, to protect the cellular users, D2D transmit power should be carefully controlled. In this work, we focus on optimal Tx-Rx assignment in such a way that the total transmit power of users is minimized. First, we consider the optimum Tx-Rx assignment in general and the corresponding complexity. Then, we propose an iterative D2D Tx-Rx assignment algorithm with low complexity that can minimize total transmit power of users. Finally, we present the numerical examples that show the complexity and the convergence to the unique transmit power level.

A Study on the Global Competitiveness and Way of Coexistence of Korean ICT Industries

  • Chang, Young-Hyun
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.124-130
    • /
    • 2015
  • Infinite competition on ICT industries is starting again. The basis of competence over global dominance will be human resource, a global ecosystem for products and national agenda for science and technology, etc.. This paper presents the six solution for the Global Competitiveness and Coexistence of Korean ICT Industries. Korea should nurture the brand of "World Best Korean ICT Forever" to secure technical competency of ICT related fields in global market. All ICT technologies should be aligned to global standard and market demand from beginning and the ecosystem around product needs to be established. System framework for utilizing the resource of core SW experts must be established. Through global partnership with China as manufacturing base for Korea-developed products, technical competency can be maintained including product planning. Security measure for technical assets is mandatory. Finally, core technology that will drive the future of ICT industries in Korea should be regarded as core subjects.

Analyzing RDF Data in Linked Open Data Cloud using Formal Concept Analysis

  • Hwang, Suk-Hyung;Cho, Dong-Heon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.6
    • /
    • pp.57-68
    • /
    • 2017
  • The Linked Open Data(LOD) cloud is quickly becoming one of the largest collections of interlinked datasets and the de facto standard for publishing, sharing and connecting pieces of data on the Web. Data publishers from diverse domains publish their data using Resource Description Framework(RDF) data model and provide SPARQL endpoints to enable querying their data, which enables creating a global, distributed and interconnected dataspace on the LOD cloud. Although it is possible to extract structured data as query results by using SPARQL, users have very poor in analysis and visualization of RDF data from SPARQL query results. Therefore, to tackle this issue, based on Formal Concept Analysis, we propose a novel approach for analyzing and visualizing useful information from the LOD cloud. The RDF data analysis and visualization technique proposed in this paper can be utilized in the field of semantic web data mining by extracting and analyzing the information and knowledge inherent in LOD and supporting classification and visualization.

The Effect of New brand's Entry on the Price Strategy of Incumbent Retailers

  • Lee, Suhhyue
    • Asia Marketing Journal
    • /
    • v.17 no.3
    • /
    • pp.73-103
    • /
    • 2015
  • According to Resource Dependence theory, an organization's behavior and strategy is affected by external resources. An organization has diverse resources interacting with environment. Because organization cannot focus on all those resources, it concentrates on its critical resources. In market environment, firm responds to other firms by controlling their internal critical resources or manages interdependency with environment to get market share. Thus Firm should choose best behavior and strategy when internal and external resources are change. When new brand enters, incumbents might change their strategy to protect their market share depending on critical value. More precisely, incumbents sharing market with entrant respond, but incumbents having competitive internal resources do not. In this article, we study incumbent's responses to a new brand entry and long-term effect. We show that how incumbents change their price strategy in reaction to the new brand' entry and also show these responses vary depending on interdependency of internal resources and external environments and ownership.

Web Resources Based Collection Development for Digital Libraries (디지털 도서관의 웹자원 기반 장서개발)

  • Lee, Jee-Yeon;Kim, Sung-Un
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.111-127
    • /
    • 2003
  • Web-based information resources should be managed and used methodically in the same manner as the paper-based resources are managed and used. It is necessitated by the prevalence of web-based delivery of a variety of information. To develop a web-based digital collection, it is critical to establish a set of standardized evaluation criteria for web-resources. The evaluation criteria needs to include authority, trustworthy, reliability, functionality, relatedness, accessibility, structure, design, user support, and security related matters. However, it is also necessary to have certain flexibility to either emphasize or include particular evaluation criteria to reflect varying characteristics of the web resources especially for the purpose of developing an effective digital collection. In addition, it is essential to review the evaluation criteria with respect to value, demand, duplication prevention, and intellectual property, which are relevant to the web-based digital collection development. Finally, various strategies were suggested as means to develop more effective web-based digital resource collection. These strategies include organizing a selection committee to ensure the objectivity and consistency in web-resource evaluation; developing a model for web-based digital resource collection; sharing new standards, protocols, markups, and metadata with other digital libraries; and developing user-centered digital resource collection.