• Title/Summary/Keyword: Resource management scheme

Search Result 313, Processing Time 0.022 seconds

A Priority-Based Bandwidth Management Method in Public Safety Networks (재난 안전 통신망에서 우선순위를 고려한 대역폭 관리 방법)

  • Lee, Sang-Hoon;Kim, Hyun-Woo;Yoon, Hyun-Goo;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.102-110
    • /
    • 2016
  • After Sewol ferry disaster occurred in April 2014, Korean government began investing to deploy LTE-based public safety network until the year of 2017. In order to reduce the operating and capital costs, resource sharing scheme among public safety network and commercial LTE networks is considered as one of the viable approaches. This thesis proposes a method of allocating bandwidth of public safety network based on various priorities required for disaster scenarios and stages in a resource sharing environment. In order to obtain the highest efficiency, we formulate the bandwidth allocation problem as a Fractional Knapsack Problem. Greedy algorithm was applied to solve the problem. For performance evaluation, we created several disaster scenarios and set suitable parameters for each scenario based on a disaster manual. The proposed method is compared with two typical methods, which are Class-based bandwidth allocation and Uniform bandwidth allocation. The results showed that the better performance in terms of the sum of the values and the amount of lost bytes.

A Metadata Representation Scheme based on XML Schema for Special Digital Collections (디지털 특수자료를 위한 XML 스키마 기반의 메타데이터 표현 체계)

  • Oh, Sam-Gyun;Chae, Jin-Seok
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.109-131
    • /
    • 2004
  • As there are diverse delivery media and forms of information resources, their management schemes are diverse as well. In library community, cataloguing. rules for describing information resources such as AACR and KCR have been developed. The efforts to automate management of information resources based on these rules resulted in the development of MARC. However, MARC records are restricted in describing the information resources and MARC has various and distinct characteristics of the structural rigidity, which does not support the representation of extended semantic structures that exist among bibliographic entities. Therefore, since the data model for MARC is single-layer data model, it is not appropriate for describing information resources represented by multi-layer data model which can be used to set up the relationships among various objects in digital libraries. In this paper, we propose an a metadata model for digital libraries based on the IFLA FRBR basic model which supports multi-layer data model and a representation scheme based on XML Schema to manage the metadata about old books, old documents, resource related to music, conferences and seminars.

A Study on the Improvement of Plastic Boat Manufacturing Process Using TOC & Statistical Analysis (TOC와 통계적 분석에 의한 플라스틱보트 제조공정 개선에 관한 연구)

  • Yoon, Gun-Gu;Kim, Tae-Gu;Lee, Dong-Hyung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.1
    • /
    • pp.130-139
    • /
    • 2016
  • The purpose of this paper is to analyze the problems and the sources of defective products and draw improvement plans in a small plastic boat manufacturing process using TOC (Theory Of Constraints) and statistical analysis. TOC is a methodology to present a scheme for optimization of production process by finding the CCR (Capacity Constraints Resource) in the organization or the all production process through the concentration improvement activity. In this paper, we found and reformed constraints and bottlenecks in plastic boat manufacturing process in the target company for less defect ratio and production cost by applying DBR (Drum, Buffer, Rope) scheduling. And we set the threshold values for the critical process variables using statistical analysis. The result can be summarized as follows. First, CCRs in inventory control, material mix, and oven setting were found and solutions were suggested by applying DBR method. Second, the logical thinking process was utilized to find core conflict factors and draw solutions. Third, to specify the solution plan, experiment data were statistically analyzed. Data were collected from the daily journal addressing the details of 96 products such as temperature, humidity, duration and temperature of heating process, rotation speed, duration time of cooling, and the temperature of removal process. Basic statistics and logistic regression analysis were conducted with the defection as the dependent variable. Finally, critical values for major processes were proposed based on the analysis. This paper has a practical importance in contribution to the quality level of the target company through theoretical approach, TOC, and statistical analysis. However, limited number of data might depreciate the significance of the analysis and therefore it will be interesting further research direction to specify the significant manufacturing conditions across different products and processes.

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

Inter-cell Interference Coordination Method Based on Active Antenna System in Heterogeneous Networks (이종망 환경에서 능동 안테나 시스템 기반의 셀간 간섭 제어 방법)

  • Kim, Byoung-June;Park, Haesung;Kim, Duk Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.9
    • /
    • pp.548-556
    • /
    • 2014
  • To cope with recently increasing demand for data traffics, heterogeneous networks have been actively studied, where small cells are deployed within a macro cell coverage with the same frequency band. To mitigate the interference from the macro cell to small cells, an enhanced Inter-cell Interference Coordination (eICIC) technique has been proposed, where ABS (Almost Blank Subframe) is used in time domain. However, there is a waste of resource since no data is transmitted in a macro-cell in ABS. In this paper, we propose a new interference management method by using a 3D sector beam based on Active Antenna System (AAS), where Genetic Algorithm (GA) is applied to reduce the antenna gain toward a small-cell. With the proposed scheme, the macro-cell and small cells can transmit data at the same time with the AAS antenna pattern generating reduced interference to small cells. The performance of the proposed scheme is evaluated by using an LTE-Advanced system level simulator.

Representation and Management of e-Learning Object Metadata Using ebXML (ebXML 등록저장소를 이용한 이러닝 객체 메타데이터의 표현과 관리)

  • Kim, Hyoung-Do
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.249-259
    • /
    • 2006
  • E-learning objects should be appropriately described and classified using standard metadata for facilitating the processes of e-learning resource description, discovery and reuse. These metadata need to be published in a registry to reduce duplication of effort and enhance semantic interoperability. This paper describes how standard ebXML registries can be used for annotating, storing, discovering and retrieving e-learning object metadata. For semantic annotation of e-learning objects, IEEE LOM is adopted as the metadata ontology. In order to support the e-learning metadata ontology in interoperable ebXML registries, a mapping scheme between LOM and ebXML information model is proposed. The usefulness of standard ebXML registries for sharing e-learning metadata is demonstrated by prototyping an e-learning registry called ebRR4LOM based on the scheme.

  • PDF

A Novel D2D Communication Scheme for Location-Based OTT Service in Cellular Networks (셀룰러 통신망에서 위치기반 OTT 서비스 지원을 위한 D2D 통신 방안)

  • Han, Kyeong-Il;Min, Sang-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.195-207
    • /
    • 2017
  • Since the smart phone was first introduced, the amount of mobile traffic has increased explosively. The OTT service with personal broadcasting and TV contents and the number of users have been increased in wired network, and there are needs to expand the OTT service to mobile network. In the case of the OTT service in mobile network, the relative small and finite resource may cause the overload of the network due to the massive and high transfer rate. In this paper, we consider a future situation of the OTT user services in the cellular network and propose a novel D2D communication scheme for location-based OTT service, which can reduce and distribute the amount of video traffics. To effectively handle the traffic of OTT services, we propose D2DS and LCS functional blocks in EPC network, which can provide location-based service and D2D management. And, we suggest additional procedures for the location-based service of both content provider and contents receiver UEs with the operation of the proposed D2DS and LCS function block.

Local Update-based Multicasting Scheme for Mobile Sinks in Wireless Sensor Networks (무선 센서 망에서 이동싱크 지원을 위한 지역 수정 기반 멀티캐스팅 기법)

  • Lee, Jeong-Cheol;Park, Ho-Sung;Oh, Seung-Min;Jung, Ju-Hyun;Park, Soo-Chang;Lee, Eui-Sin;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.80-84
    • /
    • 2010
  • Data multicasting from a source to multiple sinks in wireless sensor networks is used to achieve both reducing communication costs and energy efficiency. Almost all existing schemes for the multicasting might be effectively performed by optimal construction of a multicasting tree between a source and multiple stationary sinks. However, in practical sensor applications, sinks could move around on the wireless sensor networks for own missions, such as scouting of soldiers and saving lives of victims by firefighters. Unfortunately, the sink mobility causes frequent entire reconstruction of the multicasting tree and thus it leads to exhaustion of battery power of sensors. Hence, we propose an energy-efficient multicast protocol to support multiple mobile sinks by the local multicast tree reconstruction, called Local Update-based geographic Multicasting for Mobile sinks (LUMM) for wireless sensor networks. Our simulation results show that our scheme for mobile sinks is more efficient in terms of energy resource management than other exist works.

Efficient Power and Resource Scheduling for Bluetooth Piconet (블루투스 피코넷에서의 효율적인 전력 및 자원 스케줄링)

  • Park, Sae-Rom;Woo, Sung-Je;Im, Soon-Bin;Lee, Tae-Jin
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.555-562
    • /
    • 2004
  • We consider differentiated bandwidth allocation for a piconet in short-range wireless personal network systems : Bluetooth. Since bandwidth requirements nay vary among applications/services, and/or it may change over time, it is important to decide how to allocate limited resources to various service classes to meet their service requirements. We propose a simple and efficient bandwidth allocation mechanism which meets bandwidth requirements of various service types while saving power consumption by a Power saying mode, i.e., sniff node. We compare our proposed mechanism with a conventional (weighted) round-robin polling scheme and show that it achieves significant improvement of hroughput, delay, and power consumption.

Client Collaboration for Power and Interference Reduction in Wireless Cellular Communication

  • Nam, Hyungju;Jung, Minchae;Hwang, Kyuho;Choi, Sooyong
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.117-124
    • /
    • 2012
  • A client collaboration (CC) system is proposed for a user relay system. The proposed scheme focuses on the management of transmit power and leakage interference. In the proposed CC system, edge users transmit signals to the masters considered as user relays. The masters relay the signals of the edge users to the base station using the resource blocks (RBs) that are assigned to the edge users. The leakage interference and power consumption were analyzed in the CC system. In addition, an optimal master location problem was formulated based on the signal-to-leakage-plus-noise ratio (SLNR). Because the optimal master location problem is quite complex, a sub-optimal master location problem was proposed and a closed-form sub-optimal master location was obtained. The edge users generate smaller leakage interference and power consumption in the proposed CC system compared to the system without the CC. The numerical results showed that the edge users generate smaller leakage interference and power consumption in the proposed CC system compared to the system without the CC, and the average throughput increases.

  • PDF