• Title/Summary/Keyword: Service control

Search Result 6,185, Processing Time 0.031 seconds

A Buffer-based Video Quality Control Scheme for HTTP Adaptive Streaming in Long-Delay Networks (높은 지연을 갖는 네트워크에서 HTTP 적응적 스트리밍을 위한 버퍼 기반의 비디오 품질 조절 기법)

  • Park, Jiwoo;Kim, Dongchil;Chung, Kwangsue
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.824-831
    • /
    • 2014
  • HTTP (Hypertext Transfer Protocol) Adaptive Streaming is gaining attention because it changes bitrates to adapt changing network conditions. Since HAS (HTTP Adaptive Streaming) client downloads the video data based on TCP (Transmission Control Protocol), it estimates incorrectly the available bandwidth and leads to an unnecessary video quality change in long-delay networks. In this paper, we propose a buffer-based quality control scheme in order to improve the service quality and smooth playback in the HAS. The proposed scheme estimates accurately the available bandwidth based on a modified streaming model that considers network delay. It also calculates the sustainability of the video quality to prevent an unnecessary quality change and determines the inter-request time on the basis of the buffer status. Through the simulation, we prove that our scheme improves the QoS (Quality of Service) of the HAS service and controls the video quality smoothly in long-delay networks.

Refining and Validating a Two-stage and Web-based Cancer Risk Assessment Tool for Village Doctors in China

  • Shen, Xing-Rong;Chai, Jing;Feng, Rui;Liu, Tong-Zhu;Tong, Gui-Xian;Cheng, Jing;Li, Kai-Chun;Xie, Shao-Yu;Shi, Yong;Wang, De-Bin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.24
    • /
    • pp.10683-10690
    • /
    • 2015
  • The big gap between efficacy of population level prevention and expectations due to heterogeneity and complexity of cancer etiologic factors calls for selective yet personalized interventions based on effective risk assessment. This paper documents our research protocol aimed at refining and validating a two-stage and web-based cancer risk assessment tool, from a tentative one in use by an ongoing project, capable of identifying individuals at elevated risk for one or more types of the 80% leading cancers in rural China with adequate sensitivity and specificity and featuring low cost, easy application and cultural and technical sensitivity for farmers and village doctors. The protocol adopted a modified population-based case control design using 72, 000 non-patients as controls, 2, 200 cancer patients as cases, and another 600 patients as cases for external validation. Factors taken into account comprised 8 domains including diet and nutrition, risk behaviors, family history, precancerous diseases, related medical procedures, exposure to environment hazards, mood and feelings, physical activities and anthropologic and biologic factors. Modeling stresses explored various methodologies like empirical analysis, logistic regression, neuro-network analysis, decision theory and both internal and external validation using concordance statistics, predictive values, etc..

Chemical Pest Management System in Eggplant Greenhouse (시설가지 주요 해충 방제를 위한 약제 방제 체계)

  • Moon, Hyung-Cheol;Im, Ju-Rak;Hwang, Chang-Yeon;Kim, Ju;Ryu, Jeong;Shin, Yung-Kyu
    • Journal of Bio-Environment Control
    • /
    • v.17 no.4
    • /
    • pp.330-335
    • /
    • 2008
  • This experiment was carried out to investigate the effects of insecticide control system in eggplant greenhouse. In all treatments, the average densities of Frankliniella occidentalis and Tetranychus urticae were $0.3{\sim}1.8$ and 0.0 per leaf at 28 days after treatment, respectively. These results indicate the alternate application of Abamectin EC and Spinosad GW can be useful in control for F. occidentalis and T. urticae in eggplant greenhouse. The density suppression effect against Liriomyza trifolii and Trialeurodes vaporariorum was maintained for 28 days after treatment, but control effect was low at 28 days after treatment.

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

Metabolic Rate Estimation for ECG-based Human Adaptive Appliance in Smart Homes (인간 적응형 가전기기를 위한 거주자 심박동 기반 신체활동량 추정)

  • Kim, Hyun-Hee;Lee, Kyoung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.486-494
    • /
    • 2014
  • Intelligent homes consist of ubiquitous sensors, home networks, and a context-aware computing system. These homes are expected to offer many services such as intelligent air-conditioning, lighting control, health monitoring, and home security. In order to realize these services, many researchers have worked on various research topics including smart sensors with low power consumption, home network protocols, resident and location detection, context-awareness, and scenario and service control. This paper presents the real-time metabolic rate estimation method that is based on measured heart rate for human adaptive appliance (air-conditioner, lighting etc.). This estimation results can provide valuable information to control smart appliances so that they can adjust themselves according to the status of residents. The heart rate based method has been experimentally compared with the location-based method on a test bed.

Compensation for Position Control of a Robot Manipulator Using a Modified Disturbance Observer (DOB) based on an Accelerometer (가속도 센서기반의 변형된 외란 관측기를 이용한 로봇 매니퓰레이터의 위치 제어의 보상)

  • Bae, Yeong-Geol;Jung, Seul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.5
    • /
    • pp.462-467
    • /
    • 2013
  • This paper presents a modified disturbance observer (MDOB) for controlling two arms of a manipulator designed for a home service robot. The MDOB is slightly different from the original DOB in that it uses an accelerometer to measure acceleration of the robot arm. Then it uses the acceleration to estimate the disturbance to cancel out in the control loop. Relying on the acceleration information of the robot arm, a partial model-based control structure is formed. Experimental studies of position control of 2 DOF robot arm are conducted to evaluate the performance of the proposed position control by an MDOB method.

A predictive fuzzy control algorithm for elevator group control (엘리베이터 군제어를 위한 예견퍼지 제어알고리즘)

  • Choi, Don;Park, Ji-Hyun;Park, Hee-Chul;Woo, Kwang-Bang
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10a
    • /
    • pp.731-736
    • /
    • 1993
  • In this paper, a predictive fuzzy control algorithm to supervise the elevator system with plural elevator cars is proposed and its performance is evaluated. Elevator group controller must decide the service elevator for a registered hall call to satisfy the multiple control objects. The proposed group control algorithm ensures the efficient operations of the group cars and provides the improved level of service, coping with multiple control objects and uncertainty of system state. The feasibility of the proposed control algorithm is evaluated by simulation on computer.

  • PDF

ANALYSIS OF AN MMPP/G/1/K FINITE QUEUE WITH TWO-LEVEL THRESHOLD OVERLOAD CONTROL

  • Lee, Eye-Min;Jeon, Jong-Woo
    • Communications of the Korean Mathematical Society
    • /
    • v.14 no.4
    • /
    • pp.805-814
    • /
    • 1999
  • We consider an MMPP/G/1/K finite queue with two-level threshold overload control. This model has frequently arisen in the design of the integrated communication systems which support a wide range applications having various Quality of Service(QoS) requirements. Through the supplementary variable method, se derive the queue length distribution.

  • PDF