• Title/Summary/Keyword: User Internet

Search Result 4,263, Processing Time 0.028 seconds

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene

  • Li, Zhi;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4025-4041
    • /
    • 2020
  • Mobile edge computing (MEC) is capable of providing services to smart devices nearby through radio access networks and thus improving service experience of users. In this paper, an offloading strategy for the joint optimization of computing and communication resources in multi-user and multi-MEC overlapping scene was proposed. In addition, under the condition that wireless transmission resources and MEC computing resources were limited and task completion delay was within the maximum tolerance time, the optimization problem of minimizing energy consumption of all users was created, which was then further divided into two subproblems, i.e. offloading strategy and resource allocation. These two subproblems were then solved by the game theory and Lagrangian function to obtain the optimal task offloading strategy and resource allocation plan, and the Nash equilibrium of user offloading strategy games and convex optimization of resource allocation were proved. The simulation results showed that the proposed algorithm could effectively reduce the energy consumption of users.

Integrated Service Platform for High Quality Interactive Multimedia Service, Digital Broadcasting, and Internet Services

  • Park, Taesang;Park, Young-Duk;Jaewooo-Yang
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.73-78
    • /
    • 1998
  • Our platform introduced in this paper is based on DAVIC specifications which define high quality multimedia services with some extensions to provide user friendly and uniform interface to its users. We designed and implemented an integrated service platform for high quality interactive multimedia services, swithed digital broadcasting, and Internet services. The integration in terms of a service provider system, a delivery system, and a service user system is taken into account. Our research results in the development of integrated high quality interactive and digital broadcasting multimedia services with web-based common user interface and its experience will be feedback to the field trial service which will be launched from next year.

  • PDF

Performance Analysis of Space-Time Codes on OFDM-CDMA based Broadband Wireless Access Networks (OFDM-CDMA기반의 광대역 무선접속시스템에서 공간-시간부호의 성능분석)

  • Kang Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.173-178
    • /
    • 2006
  • In this paper, a channel estimation based on the time-domain windowing and its imperfectness in OFDM-based multiple-antenna transmission systems are analyzed with an emphasis on a preamble design for multi-channel separation, From the computer simulation results, the OFDM-CDMA system applying a space-time-frequency diversity with a full-rate full diversity code can give the diversity of D = 4 and D = 8 for both multi-user cases of maximum user and half user capacities, respectively

  • PDF

A Multi-password Management Scheme using Pseudopia Function (슈도피아 함수를 이용한 다중 패스워드 관리 방안)

  • Jang, Hwa-Sik;Shin, Weon;Rhee, Kyung-Hyune
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3438-3444
    • /
    • 2000
  • In this paper, we propose an efficient passwork management scheme using the Pseudopia function which performs a mukti-password management and change scheme in the cyberspace. For a givne user and a web-site, the Pseudopia automatically generates a user name and a password that can be used to establish an anonvous account at the web-site. In the proposed scheme, a user can protect his password using " the personal etropy" which relates to his own life experiences, that identified only by himself. The proposed scheme can be applied to the broad tools for the internet related applications such as electronic commerce and Internet banking system.

  • PDF

Trust-based business model in trust economy: External interaction, data orchestration and ecosystem value

  • Minzheong, Song
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.32-41
    • /
    • 2018
  • The aim of this study is to formulate a trust-based business model of Internet services in so called the "trust economy." For it, firstly concepts of trust and trust economy are discussed. Then, we present previous literatures' review of trust in social science prism and trust economy in economic prism. This study classified the literatures' stances with two viewpoints of the 'system' and the 'user'. With this backdrop, we discuss three contradictory stances: Internal optimization vs. external interaction, personal data control vs. orchestration, and end-user vs. ecosystem value. In the result, we formulate a trust-based business model framework with three trust issues in user perspective and suggests three strategic directions related three issues along with representative use cases.

Design of Network Protocol based on P2P Collaboration and User's Content Using Information (P2P 협업 및 사용자 콘텐츠 이용 정보 기반의 네트워크 프로토콜 설계)

  • Nahm, Eui-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.3
    • /
    • pp.575-580
    • /
    • 2017
  • In these days, the big-size and high resolution multimedia file is widely used through networks. To transfer and service effectively, the internet network technology is necessary to substitute broadcasting. Normally Content Delivery Network(CDN) is widely used in conventional internet for multimedia services. But it has a small bandwidth to service. So to solve this problems, many researchers have suggest the protocol for download, content distribution/saving, server synchronization, caching, pushing rate, and streaming etc. But all of these has some defects like low resolution, packets loss and delay, real application implementations etc. So, this paper suggests a new method of network protocol based on P2P collaboration and user's content using information. And it evaluated the performance of suggested method. As the results, it showed the effectiveness of 4 performances indices : download speed, decreasing rate of connected user in same time, adaptive hit ratio, traffic decreasing rate.

Cooperative Spectrum Sensing using Kalman Filter based Adaptive Fuzzy System for Cognitive Radio Networks

  • Thuc, Kieu-Xuan;Koo, In-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.287-304
    • /
    • 2012
  • Spectrum sensing is an important functionality for cognitive users to look for spectrum holes before taking transmission in dynamic spectrum access model. Unlike previous works that assume perfect knowledge of the SNR of the signal received from the primary user, in this paper we consider a realistic case where the SNR of the primary user's signal is unknown to both fusion center and cognitive radio terminals. A Kalman filter based adaptive Takagi and Sugeno's fuzzy system is designed to make the global spectrum sensing decision based on the observed energies from cognitive users. With the capacity of adapting system parameters, the fusion center can make a global sensing decision reliably without any requirement of channel state information, prior knowledge and prior probabilities of the primary user's signal. Numerical results prove that the sensing performance of the proposed scheme outperforms the performance of the equal gain combination based scheme, and matches the performance of the optimal soft combination scheme.

Achievable Power Allocation Interval of Rate-lossless non-SIC NOMA for Asymmetric 2PAM

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • In the Internet-of-Things (IoT) and artificial intelligence (AI), complete implementations are dependent largely on the speed of the fifth generation (5G) networks. However, successive interference cancellation (SIC) in non-orthogonal multiple access (NOMA) of the 5G mobile networks can be still decoding latency and receiver complexity in the conventional SIC NOMA scheme. Thus, in order to reduce latency and complexity of inherent SIC in conventional SIC NOMA schemes, we propose a rate-lossless non-SIC NOMA scheme. First, we derive the closed-form expression for the achievable data rate of the asymmetric 2PAM non-SIC NOMA, i.e., without SIC. Second, the exact achievable power allocation interval of this rate-lossless non-SIC NOMA scheme is also derived. Then it is shown that over the derived achievable power allocation interval of user-fairness, rate-lossless non-SIC NOMA can be implemented. As a result, the asymmetric 2PAM could be a promising modulation scheme for rate-lossless non-SIC NOMA of 5G networks, under user-fairness.

The Study on the Evaluation Factor for Security of Age Verification Information (연령 검증정보의 안정성을 위한 평가인자에 대한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • Some laws and regulations may require internet service providers to provide services based on the age of users. Age verification in the online environment should be used as a tool to provide service that is appropriate to child based on age. Using the minimum attribute information, processes on age verification provides the proper guidance to the internet services. However, there is a lack of a globally accepted trust framework for age verification process including evaluation factors for age verification information. In this paper the federation model of user attributes were described and evaluation factors for the age verification information were suggested. Also using the suggested evaluation factors, performance evaluation of federation model of user evaluation was performed. To meet the requirements of evaluation factors, framework of federation model should consider the unlinkability pseudonym support, eavesdropping protection and cloning protection.

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users

  • Ko, Hye-Kyeong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.82-89
    • /
    • 2021
  • Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.