• Title/Summary/Keyword: Policy Information Resources

Search Result 832, Processing Time 0.027 seconds

Optimal SMDP-Based Connection Admission Control Mechanism in Cognitive Radio Sensor Networks

  • Hosseini, Elahe;Berangi, Reza
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.345-352
    • /
    • 2017
  • Traffic management is a highly beneficial mechanism for satisfying quality-of-service requirements and overcoming the resource scarcity problems in networks. This paper introduces an optimal connection admission control mechanism to decrease the packet loss ratio and end-to-end delay in cognitive radio sensor networks (CRSNs). This mechanism admits data flows based on the value of information sent by the sensor nodes, the network state, and the estimated required resources of the data flows. The number of required channels of each data flow is estimated using a proposed formula that is inspired by a graph coloring approach. The proposed admission control mechanism is formulated as a semi-Markov decision process and a linear programming problem is derived to obtain the optimal admission control policy for obtaining the maximum reward. Simulation results demonstrate that the proposed mechanism outperforms a recently proposed admission control mechanism in CRSNs.

QoS-Sensitive Admission Policy for Non-Real Time Data Packets in Voice/Data CDMA Systems (음성/데이터 CDMA 시스템에서의 서비스 품질을 고려한 비 실시간 데이터 패킷 전송 제어 정책)

  • Seungjae Bahng;Insoo Koo;Jeongrok Yang;Kim, Kiseon
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.125-128
    • /
    • 1999
  • In this paper, we propose a QoS-sensitive admission threshold method for the transmission of the non-real tine data packet such that the quality of services for both voice and data traffics are maintained to a required level. By detecting the active voice traffic during the current time slot, the non-real-time data packets are transmitted up to an admission threshold level during the next time slot. We found out that the optimum admission threshold is four voice traffic resources lower from the maximum allowable threshold to maintain the outage probability within 1% when the connected voice users are 15.

  • PDF

A Study on Design of Vocational Education and Training Curriculum with Key Competencies (직업능력표준을 활용한 교육훈련과정 설계방안)

  • Gu, Ja-Gil;Lee, Jae-Gik
    • Journal of Digital Convergence
    • /
    • v.5 no.2
    • /
    • pp.109-122
    • /
    • 2007
  • The original element for development in current society is recognized as knowledge, technology and information. It has been developed and improved the human resources development system through the occupational standards that closely connected system among work, education training and qualification in every country. This study is for development of the occupation standards that was standardized the required competency element, performance criteria, range statement, assessment guideline in machinery industry, also developing the education training program based on competency to be able to apply department of relevant machinery industry in vocational high school. Occupational standards and key competencies were developed by expert in field engineer and verified about contents and level system by questionnaire and interviewing. Education training program was developed on SCID model, and the effectiveness and suitability of the training program was verified by teacher, professor and student belonging to training organization.

  • PDF

Packet Scheduling Algorithm Considering a Minimum Bit Rate for Non-realtime Traffic in an OFDMA/FDD-Based Mobile Internet Access System

  • Kim, Dong-Hoi;Ryu, Byung-Han;Kang, Chung-Gu
    • ETRI Journal
    • /
    • v.26 no.1
    • /
    • pp.48-52
    • /
    • 2004
  • In this letter, we consider a new packet scheduling algorithm for an orthogonal frequency division multiplexing access/frequency division duplex (OFDMA/FDD)-based system, e.g., mobile broadband wireless access or high-speed portable internet systems, in which the radio resources of both time and frequency slots are dynamically shared by all users under a proper scheduling policy. Our design objective is to increase the number of non-realtime service (e.g., WWW) users that can be supported in the system, especially when the minimum bit rate requirement is imposed on them. The simulation results show that our proposed algorithm can provide a significant improvement in the average outage probability performance for the NRT service, i.e., significantly increasing the number of NRT users without much compromising of the cell throughput.

  • PDF

Growth characteristics by age measurement of Prunus yedoensis on Jeju Island, Korea (제주도 자생 왕벚나무의 연륜생장 특성 분석)

  • Seo, Yeon Ok;Kim, Chan-Soo;Song, Gwan Pil;Jung, Sung Cheol
    • Journal of Environmental Science International
    • /
    • v.27 no.7
    • /
    • pp.555-560
    • /
    • 2018
  • This study conducted to analyze the growth characteristics of old Prunus yedoensis on Jeju island. The diameter growth per year was measured using a DTRS-2000 instrument. The DBH, ground DBH and height of the investigated P. yedoensis were 137 cm, 143 cm, and 15.5 m, respectively. Our analysis showed that the age of the old P. yedoensis was 93 years. An annual diameter growth of $2.85mm{\pm}0.96$ was observed. The result of age estimation, about $265{\pm}64$ years in P. yedoensis on Jeju island. This information could be useful to understand the annual diameter growth characteristics the P. yedoensis distributed on Jeju island.

Prioritized Resource Allocation in Wireless Spectrum Pooling

  • Biglieri, Ezio;Lozano, Angel;Alrajeh, Nabil
    • Journal of Communications and Networks
    • /
    • v.14 no.5
    • /
    • pp.495-500
    • /
    • 2012
  • A standard paradigm for the allocation of wireless resources in communication demands symmetry, whereby all users are assumed to be on equal footing and hence get equal shares of communication capabilities. However, there are situations in which "prime users" should be given higher priority, as for example in the transmission of emergency messages. In this paper, we examine a prioritization policy that can be implemented at the physical layer. In particular, we evaluate the performance of a prioritized transmission scheme based on spectrum pooling and on the assignment of higher signal-to-noise ratio channels to higher-priority users. This performance is compared to that of unprioritized (or "symmetric") schemes, and the impact of prioritization on the unprioritized users is discussed.

A Survey of Arabic Thematic Sentiment Analysis Based on Topic Modeling

  • Basabain, Seham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.155-162
    • /
    • 2021
  • The expansion of the world wide web has led to a huge amount of user generated content over different forums and social media platforms, these rich data resources offer the opportunity to reflect, and track changing public sentiments and help to develop proactive reactions strategies for decision and policy makers. Analysis of public emotions and opinions towards events and sentimental trends can help to address unforeseen areas of public concerns. The need of developing systems to analyze these sentiments and the topics behind them has emerged tremendously. While most existing works reported in the literature have been carried out in English, this paper, in contrast, aims to review recent research works in Arabic language in the field of thematic sentiment analysis and which techniques they have utilized to accomplish this task. The findings show that the prevailing techniques in Arabic topic-based sentiment analysis are based on traditional approaches and machine learning methods. In addition, it has been found that considerably limited recent studies have utilized deep learning approaches to build high performance models.

HOUSING PRICE MODEL USING GIS IN SEOUL (APPLICATIONS OF STRUCTURAL EQUATION MODELING)

  • Kyong-Hoon Kim;Jae-Jun Kim;Bong-Sik Kim
    • International conference on construction engineering and project management
    • /
    • 2007.03a
    • /
    • pp.366-375
    • /
    • 2007
  • Our nation has a problem with discrimination of income distribution and inefficient of resources distribution caused by real estate price rising from a sudden economy growth and industrialization. Specially, in recent years, there is a great disparity of condominium price between the north and south of the Han river. Because the housing price is deciede by the immanent value of a house and neighborhood effects of the regional where the house is situated, the housing price is occurred difference. In this study, I analyzed the differences of housing price determinants about condominium developments in the old and new residential areas, and found the important factors that affect the condominium price using Structural Equation Modeling(SEM) The purpose of study is to analyze the influence of various factors of housing price. Also, this study tried to predict real estate market and to establish previous effective real estate policy.

  • PDF

The Current Status of Utilization and Demand on Cancer Information in the Faculties of Medical School in Korea (국내 의과대학 교수의 암정보 활용 현황과 요구도)

  • Lim, Min-Kyung;Park, Sook-Kyung;Yang, Jeong-Hee;Lee, Young-Sung
    • Journal of Preventive Medicine and Public Health
    • /
    • v.36 no.1
    • /
    • pp.39-46
    • /
    • 2003
  • Objectives : To investigate the availability and demand for overall cancer-related information, and to establish a basic plan for the construction of a cancer database and information system based on the research results from Korea. Methods : Postal and telephone surveys were carried out, between August 2001 and November 2001, of 323 affiliated faculty professors from medical universities and colleges in Korea. The data were analyzed with descriptive statistical methods, with regard to the present status and demand for health and cancer-related information. Results : Most (over 80%) subjects studied utilized the health-related information provided on Internet website from foreign countries, such as Medline, but similar comprehensive information system lacked in Korea. The construction of a cancer-related database of domestic research results was revealed to be in a great demand. Information on registration and statistics (52.8%), study results (48.5%) and study resources (37.4%) were the major ingredients required in the database. In constructing a database of the cancer-related research results, a full-text service, continuous updating of data, and the development of standardized user-friendly searching tool were regarded as the necessary components. The formulation of an information sharing system, regarding cancer-related clinical trials, was investigated as being quite feasible. Conclusion : This study demonstrated the great importance of cancer information systems, and much demand for an available cancer-related database based on Korean research results.

A study on the Development for the National Cybersecurity Capability Assessment Criteria (국가 사이버보안 역량 평가를 위한 평가항목 연구)

  • Bae, Sunha;Park, Sangdon;Kim, So Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1293-1314
    • /
    • 2015
  • As ICT is becoming a major social infrastructure, the need to strengthen cyber capabilities are emerging. In the major advanced countries including the United States, has a continuing interest in strengthening cyber capabilities and has studied in enhancements of cyber capabilities. The cyber capability assessment is necessary in order to determine the current level of the country, establish policy directions and legislations. The selection of criteria has very important meaning to suggest future policy direction as well as an objective assessment of cybersecurity capabilities. But there are variable criteria for national cyber capabilities assessment such as strategy, legislation, technology, society and culture, and human resources. In this paper we perform the analysis of criteria for the other country's cybersecurity assessments including the U.S. and Europe. And we proposed the criteria for the national cybersecurity assessment reflecting the our country's characteristics.