• Title/Summary/Keyword: Link Exchange

Search Result 142, Processing Time 0.025 seconds

Implementation of Multi-Protocol Interface for Web-based Collaborative Service (웹 기반 공동작업을 위한 다중 프로토콜 인터페이스 방법의 구현)

  • 이은령;김지용;설동명;김두현;임기욱
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.340-351
    • /
    • 2003
  • We introduce our experiences of the design and implementation of the Page Together system that has expanded hyperlink metaphor to utilize human resources in the web. This system supports that a user connects with others in the web, communicates through video/audio channel, navigates same web pages simultaneously and cooperates some work on Internet. For these functions, it comprises Collaborative Browsing Module (CBM), Multimedia Conferencing Module(MCM) Data Conferencing Module(I)CM) and Multi Protocol Interface(MPI). We adopted three standard protocols, IEC, H.323 and T.120 for each nodule and it allows developers to use them easily. We also defined MPI to synchronize information of session among modules. Each module exchanges information each other in session creating process and session terminating process. After a session is created once, each module works independently as its won protocol. Interferences among modules are reduced as minimizing to exchange information. We also introduce a web site that provides web board service based on the Page Together system. A user may post a notice with a link to himself/herself on our web board. After then, if someone read that notice and has any question about it, he or she can try to connect to the writer as clicking the link in that notice and communicate each other. This service site shows that our system can be applied to diverse internet services such as distance teaming and distance conference.

  • PDF

Hybrid Offloading Technique Based on Auction Theory and Reinforcement Learning in MEC Industrial IoT Environment (MEC 산업용 IoT 환경에서 경매 이론과 강화 학습 기반의 하이브리드 오프로딩 기법)

  • Bae Hyeon Ji;Kim Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.263-272
    • /
    • 2023
  • Industrial Internet of Things (IIoT) is an important factor in increasing production efficiency in industrial sectors, along with data collection, exchange and analysis through large-scale connectivity. However, as traffic increases explosively due to the recent spread of IIoT, an allocation method that can efficiently process traffic is required. In this thesis, I propose a two-stage task offloading decision method to increase successful task throughput in an IIoT environment. In addition, I consider a hybrid offloading system that can offload compute-intensive tasks to a mobile edge computing server via a cellular link or to a nearby IIoT device via a Device to Device (D2D) link. The first stage is to design an incentive mechanism to prevent devices participating in task offloading from acting selfishly and giving difficulties in improving task throughput. Among the mechanism design, McAfee's mechanism is used to control the selfish behavior of the devices that process the task and to increase the overall system throughput. After that, in stage 2, I propose a multi-armed bandit (MAB)-based task offloading decision method in a non-stationary environment by considering the irregular movement of the IIoT device. Experimental results show that the proposed method can obtain better performance in terms of overall system throughput, communication failure rate and regret compared to other existing methods.

A Centralized QoS Routing Architecture with No Dynamic Network State Information Exchange Overhead (동적 네트워크 상태정보 교환 오버헤드를 제거한 중앙 집중적 QoS 라우팅 구조)

  • Kim, Sung-Ha;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.573-582
    • /
    • 2002
  • We propose centralized server based QoS routing schemes, where a route server is responsible for determining QoS paths on behalf of all the routers in a routing domain. In the proposed server based schemes, the dynamic link QoS state information, which is required for a QoS path computation, is implicitly maintained at route server as it assigns or gets back QoS paths. By maintaining the network state information this way, we may not only eliminate the overhead to exchange network state update message but also achieve higher routing performance by utilizing accurate network state information in path computation. We discuss path caching techniques for reducing the amount of path computation overhead at the route server, and evaluate the performance of the proposed schemes using simulation. The simulation results show that the path caching schemes may significantly reduce the route server load. The proposed schemes are also compared to the distributed QoS routing schemes proposed in the literature. It has been shown that the proposed server based schemes not only enhance the routing performance, but they are also competitive with respect to routing overheads.

An Analysis of Waterfront Development Type based on Residents' Attitudes - Focused on Yeoju-Si - (지역주민 태도에 의한 수변공간 개발 형태 분석 - 여주시를 중심으로 -)

  • You, Soo-Jin;Seok, Young-Sun;Choi, Yun Eui;Chon, Jinhyung
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.6
    • /
    • pp.171-184
    • /
    • 2013
  • The importance for local development, which residents' attitudes have reflected, is well known. Therefore, in order to formulate an approach for sustainable development, a study on sustainable waterfront development has become necessary. This study performed the first step analysis of Limits of Acceptable Change(LAC) System that considers the local residential attitude to make the analysis and standard for acceptable development type in the waterfront. This study used the characteristics of the residents, the social exchange theory, and the LAC System. This was done because it is useful to ensure that basic data can be used for the establishment of management objectives. Yeoju-Si was selected as the site for the investigation. A total of 240 surveys were obtained. Analyses were conducted to 1) determine the relationships between the residents' attitudes toward the waterfront development type and the acceptable development type and 2) to examine relationships between the residents' characteristics and the residents' attitudes toward the waterfront development. The results of this study are as follows: The development pertaining to the parameter 'nature education' arguably has the potential to generate substantial revenues for Yeoju-Si and could link the local development and conservation. This study concludes that the area of residence were closely correlated with the residents' attitudes.

Spectrum Hole Utilization in Cognitive Two-way Relaying Networks

  • Gao, Yuan;Zhu, Changping;Tang, Yibin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.890-910
    • /
    • 2014
  • This paper investigates the spectrum hole utilization of cooperative schemes for the two-way relaying model in order to improve the utilization efficiency of limited spectrum holes in cognitive radio networks with imperfect spectrum sensing. We propose two specific bidirectional secondary data transmission (BSDT) schemes with two-step and three-step two-way relaying models, i.e., two-BSDT and three-BSDT schemes, where the spectrum sensing and the secondary data transmission are jointly designed. In the proposed cooperative schemes, the best two-way relay channel between two secondary users is selected from a group of secondary users serving as cognitive relays and assists the bi-directional communication between the two secondary users without a direct link. The closed-form asymptotic expressions for outage probabilities of the two schemes are derived with a primary user protection constraint over Rayleigh fading channels. Based on the derived outage probabilities, the spectrum hole utilization is calculated to evaluate the percentage of spectrum holes used by the two secondary users for their successful information exchange without channel outage. Numerical results show that the spectrum hole utilization depends on the spectrum sensing overhead and the channel gain from a primary user to secondary users. Additionally, we compare the spectrum hole utilization of the two schemes as the varying of secondary signal to noise ratio, the number of cognitive relays, and symmetric and asymmetric channels.

The Development of the ±80kV 60MW HVDC System in Korea

  • Park, Kyoung-Ho;Baek, Seung-Taek;Chung, Yong-Ho;Jang, Gil-Soo
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.594-600
    • /
    • 2017
  • HVDC transmission systems can be configured in many ways to take into account cost, flexibility and operational requirements. [1] For long-distance transmission, HVDC systems may be less expensive and suffer lower electrical losses. For underwater power cables, HVDC avoids the heavy currents required to charge and discharge the cable capacitance of each cycle. For shorter distances, the higher cost of DC conversion equipment compared to an AC system may still be warranted, due to other benefits of direct current links. HVDC allows power transmission between unsynchronized AC transmission systems. Since the power flow through an HVDC link can be controlled independently of the phase angle between the source and the load, it can stabilize a network against disturbances due to rapid changes in power. HVDC also allows the transfer of power between grid systems running at different frequencies, such as 50 Hz and 60 Hz. This improves the stability and economy of each grid, by allowing the exchange of power between incompatible networks. This paper proposed to establish Korean HVDC technology through a cooperative agreement between KEPCO and LSIS in 2010. During the first stage (2012), a design of the ${\pm}80kV$ 60MW HVDC bipole system was created by both KEPCO and LSIS. The HVDC system was constructed and an operation test was completed in December 2012. During the second stage, the pole#2 system was fully replaced with components that LSIS had recently developed. LSIS also successfully completed the operation test. (2014.3)

Access Control for XML Documents Using Extended RBAC (확장된 RBAC를 이용한 XML문서에 대한 접근제어)

  • Kim, Jong-Hun;Ban, Yong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.869-881
    • /
    • 2005
  • XML(eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Internet. XML documents contain information of different sensitivity degrees, so that XML Document must selectively shared by user communities. There is thus the need for models and mechanisms enabling the specification and enforcement of access control policies for XML documents. Mechanisms are also required enabling a secure and selective dissemination of documents to users, according to the authorizations which the users have. In this paper, we give an account of access control model and mechanisms, which XML documents can be securely protected in web environments. We make RBAC Based access Control polices to the problem of secure and selective access of XML documents. The proposed model and mechanism guarantee that the secure use for XML documents through definition of authority for element, attribute, link within XML document as well as XML document.

  • PDF

Recovering Network Joining State for Normal/Abnormal Termination of Battlefield Management System (전장관리시스템의 정상/비정상 종료 시 망 가입상태 복원)

  • Choi, YoonChang;Kwon, DongHo
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.749-759
    • /
    • 2017
  • The weapon system based on voice call can cause delay, error or damage to the message during the exchange of information. Furthermore, since the weapon system has a unique message format, it has limited data distribution. Therefore, a Korea Variable Message Format(KVMF) has been developed in this study to utilize a standard sized data format to guarantee the transmission quality and minimize the transmission amount. The ground tactical data link system quickly and accurately shares tactical information by incorporating a field management system that utilizes the KVMF standard message in the mobile weapon system. In this study, we examine the possibility of performing the mission immediately by recovering the state of network joining when a normal/abnormal termination situation of the battlefield management system occurs.

Global Collaborative Activities on GLORIAD (국제 협업 연구를 위한 글로리아드(GLORIAD) 활용)

  • Lee, Minsun;Oh, Choongsik;Lee, Hyungjin;Ryu, Jinseung;Jang, Haegjin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.586-588
    • /
    • 2007
  • The Moore's law states that the number of transistors on a chip doubles about every 18 months. And it was reported that the network speed has been doubled about every 9 months. This indicates that computing power and network is no longer the obstacles for the high performance applications requiring terabits networks. We believe that the application motivates the network and vice versa. This presentation will introduce the GLORIAD which is the first ring network connecting six countries around the world and provides scientists with advanced networking tools that improve a communications and data exchange. The GLORIAD trans-Pacific link started its service on August 1, 2005. Since then, there has been remarkable demonstrations were performed through major conferences like Supercomputing Conference. This paper will introduce the global collaborative works on demonstrations of VMT, high energy physics, SDSS and HD video transmission during SC'06 in Tampa, FL.

  • PDF

Boundary-Spanning Roles in Strategic Approach to Coping with Environmental Uncertainty in the Area of Performing Arts Organization (환경 불확실성에 대처하는 공연예술 콘텐츠 조직의 경계탐색 전략)

  • Park, Moonsik
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.9
    • /
    • pp.84-95
    • /
    • 2015
  • The aim of this research is to find out how to cope with and manage environmental uncertainty to be effective. Environmental conditions of complexity and change create a greater need to gather information and to respond based on that information. Despite of the governmental campaign 'creative economy, flourishing culture', governmental subsidies are becoming more unstable. The prosperity of culture means that artists can create great works and people can enjoy them without boundaries. This research investigated Boundary-spanning roles through the strategic formulation and implementation. Key factors of strategy are information and knowledge management. Boundary-spanning roles link and coordinate an organization with important elements in the external environment. It is primarily concerned with the exchange of information to detect and bring into the organization information about changes in the environment and send information into the environment that presents the organization in a favorable light. Two themes in this article are that organizations can learn and adapt to the environment and that organizations can change and control the environment.