• Title/Summary/Keyword: User Network

Search Result 4,628, Processing Time 0.045 seconds

Outage Probability Analysis for a Two-Way Relay Network with User Selection in the Presence of Interference (간섭이 존재하는 양방향 중계네트워크에서의 사용자 선택을 통한 불능확률 분석)

  • Kwon, Younghoon;Im, Gyeongrae;Lee, Jae Hong
    • Journal of Broadcast Engineering
    • /
    • v.21 no.1
    • /
    • pp.109-112
    • /
    • 2016
  • This paper analyzes the outage performance of a two-way relay network in the presence of interference from multiple interferers. We investigate a two-way relay network where a single user communicates with a selected other user via a relay during three phases. We propose a user selection scheme and analyze an outage probability. Numerical results verify our analysis by comparison with computer simulation and show effects of the number of users and the number of interferers on its the outage probability.

A Study on the Factors Influencing the Use of Social Networking Services in China (중국의 사회 연결망 서비스 이용에 영향을 미치는 요인에 관한 연구)

  • Fang, Hualong;Kwon, Sun-Dong
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.2
    • /
    • pp.45-63
    • /
    • 2009
  • China has the largest number of the user of web 2.0 such as messengers and blogs, as of 2008 year. Chinese Internet digital market will grow from $85 billion in 2007 to $264 billion in 2015. The importance of Chinese Internet business is increasing, because of its size and growth potential. This research is focused on following two questions. First, what are the major characteristics of social networking services in China? In order to find out the answer about this question, the case study on Tencent QQ and Sina Poco, the most representative social networking services company in China, was done. And the reason of the use of social networking services, their contents, and the attitude toward the paid service were identified. Second, what are the major factors influencing the use of social networking services in China. User participation, network effect, usefulness, and system quality were inferred as the factors influencing the use. These factors were based on motivation theory, technology acceptance model, and the related research papers. This research model was proved by data analysis using Partial Least Square. As results, the use of social networking services was influenced by usefulness, network effect, user participation, and system quality. But social influence was not significant of the use of social networking services.

  • PDF

The measurement temperature and analysis used embedded system by internet explorer (인터넷 익스플로러를 통한 임베디드 시스템 기반의 온도 측정 및 분석)

  • 김희식;김영일;설대연;남철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1003-1006
    • /
    • 2004
  • In this paper have developed a system for monitoring and processing the real time sensor data in remote site through network. For realizing this system, measurement equipment and protocol are used to transmit the measurement data to remote server and to process measurement data. In server part, the received data from remote site sensor is converted to text or graphic charts for user. The measurement device in sensor part receives the sensor data form sensor and store the received data to its internal memory for transmitting data to server part through Internet. Also the measurement device can receive data form server. The temperature sensor is connected to the measurement device located in laboratory and the measurement device measures temperature of laboratory which can be confirmed by user through Internet. We have developed a server programworking on the Linux to store measurement data from measurement device to server memory. The program is use for SNMP(Simple Network Management Protocol) to exchange data with measurement device. Also the program changes the measurement data into text and graphic charts for user display. The program is use apache PHP program for user display and inquiry. The real time temperature measurement system can be apply for many parts of industry and living.

  • PDF

First- and Second-best Pricing in Stable Dynamic Models (안정동력학 모형에서 최선 통행료 및 차선 통행료)

  • Park, Koo-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.4
    • /
    • pp.123-138
    • /
    • 2009
  • This study examined the first- and second-best pricing by stable dynamics in congested transportation networks. Stable dynamics, suggested by Nesterov and de Palma (2003), is a new model which describes and provides a stable state of congestion in urban transportation networks. The first-best pricing in user equilibrium models introduces user-equilibrium in the system-equilibrium by tolling the difference between the marginal social cost and the marginal private cost on each link. Nevertheless, the second-best pricing, which levies the toll on some, but not all, links, is relevant from the practical point of view. In comparison with the user equilibrium model, the stable dynamic model provides a solution equivalent to system-equilibrium if it is focused on link flows. Therefore the toll interval on each link, which keeps up the system-equilibrium, is more meaningful than the first-best pricing. In addition, the second-best pricing in stable dynamic models is the same as the first-best pricing since the toll interval is separately given by each link. As an effect of congestion pricing in stable dynamic models, we can remove the inefficiency of the network with inefficient Braess links by levying a toll on the Braess link. We present a numerical example applied to the network with 6 nodes and 9 links, including 2 Braess links.

Determining Diffusion Power Users in a Blog Network (블로그 연결망에서 파급력을 가진 파워 유저의 파악 기법)

  • Lim, Seung-Hwan;Kim, Sang-Wook;Park, Sun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.377-382
    • /
    • 2010
  • For business purposes, it is important to identify diffusion power users, a group of users who have big influence on other users in diffusing content. In this paper, we use the independent cascade model for determining diffusion power users, and to do so, we need a method for calculating the assimilation probability between users. This paper proposes the concepts of user delivery power and a way to quantifying the value of this. User delivery power is used to compute the assimilation probability with user content power. We analyze the proposed method by comparing its performance with those of existing methods through experiments using a real blog network data.

An analysis of the component of Human-Robot Interaction for Intelligent room

  • Park, Jong-Chan;Kwon, Dong-Soo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2143-2147
    • /
    • 2005
  • Human-Robot interaction (HRI) has recently become one of the most important issues in the field of robotics. Understanding and predicting the intentions of human users is a major difficulty for robotic programs. In this paper we suggest an interaction method allows the robot to execute the human user's desires in an intelligent room-based domain, even when the user does not give a specific command for the action. To achieve this, we constructed a full system architecture of an intelligent room so that the following were present and sequentially interconnected: decision-making based on the Bayesian belief network, responding to human commands, and generating queries to remove ambiguities. The robot obtained all the necessary information from analyzing the user's condition and the environmental state of the room. This information is then used to evaluate the probabilities of the results coming from the output nodes of the Bayesian belief network, which is composed of the nodes that includes several states, and the causal relationships between them. Our study shows that the suggested system and proposed method would improve a robot's ability to understand human commands, intuit human desires, and predict human intentions resulting in a comfortable intelligent room for the human user.

  • PDF

Joint Cell Grouping and User Association Scheme for Clustered Heterogeneous Cellular Networks (클러스터 이기종 셀룰러 네트워크를 위한 합동 셀 그룹핑 및 사용자 접속 기법)

  • Park, Jin-Bae;Lee, Hyung Yeol;Choi, Uri;Kim, Kwang Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.6
    • /
    • pp.520-527
    • /
    • 2013
  • In this paper, a joint cell grouping and user association technique proposed for a semi-dynamic grouped network MIMO in a clustered heterogeneous cellular network (HCN). With the conventional macro BSs, small cells are being overlaid to increase a spectral efficiency per area and these small cells are expected to be concentrated to support exponentially increasing data traffic in hot spot areas. The main culprits of performance degradation in the clustered HCN are interference and load imbalance. The proposed scheme jointly handles them to maximize a proportional-fair metric. It is shown that the proposed technique can largely improve user average rate and proportional fairness among users than any other conventional schemes in the clustered HCN.

Statistically Controlled Opportunistic Resource Block Sharing for Femto Cell Networks

  • Shin, Dae Kyu;Choi, Wan;Yu, Takki
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.469-475
    • /
    • 2013
  • In this paper, we propose an efficient interference management technique which controls the number of resource blocks (or subcarriers) shared with other cells based on statistical interference levels among cells. The proposed technique tries to maximize average throughput of a femto cell user under a constraint on non-real time control of a femto cell network while guaranteeing a target throughput value of a macro cell user. In our proposed scheme, femto cells opportunistically use resource blocks allocated to other cells if the required average user throughput is not attained with the primarily allocated resource blocks. The proposed method is similar to the underlay approach in cognitive radio systems, but resource block sharing among cells is statistically controlled. For the statistical control, a femto cell sever constructs a table storing average mutual interference among cells and periodically updates the table. This statistical approach fully satisfies the constraint of non-real time control for femto cell networks. Our simulation results show that the proposed scheme achieves higher average femto user throughput than conventional frequency reuse schemes for time varying number of users.

User-oriented Paper Search System by Relative Network (상대네트워크 구축에 의한 맞춤형 논문검색 시스템 모델링)

  • Cho Young-Im;Kang Sang-Gil
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.3
    • /
    • pp.285-290
    • /
    • 2006
  • In this paper we propose a novel personalized paper search system using the relevance among user's queried keywords and user's behaviors on a searched paper list. The proposed system builds user's individual relevance network from analyzing the appearance frequencies of keywords in the searched papers. The relevance network is personalized by providing weights to the appearance frequencies of keywords according to users' behaviors on the searched list, such as 'downloading,' 'opening,' and 'no-action.' In the experimental section, we demonstrate our method using 100 users' search information in the University of Suwon.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.