• Title/Summary/Keyword: User Scenario

Search Result 481, Processing Time 0.025 seconds

A Novel Resource Scheduling Scheme for CoMP Systems

  • Zhou, Wen'an;Liu, Jianlong;Zhang, Yiyu;Yang, Chengyi;Yang, Xuhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.650-669
    • /
    • 2017
  • Coordinated multiple points transmission and reception (CoMP) technology is used to mitigate the inter-cell interference, and increase cell average user normalized throughput and cell edge user normalized throughput. There are two kinds of radio resource schedule strategies in LTE-A/5G CoMP system, and they are called centralized scheduling strategy and distributed scheduling strategy. The regional centralized scheduling cannot solve interference of inter-region, and the distributed scheduling leads to worse efficiency in the utilize of resources. In this paper, a novel distributed scheduling scheme named 9-Cell alternate authorization (9-CAA) is proposed. In our scheme, time-domain resources are divided orthogonally by coloring theory for inter-region cooperation in 9-Cell scenario [6]. Then, we provide a formula based on 0-1 integer programming to get chromatic number in 9-CAA. Moreover, a feasible optimal chromatic number search algorithm named CNS-9CAA is proposed. In addition, this scheme is expanded to 3-Cell scenario, and name it 3-Cell alternate authorization (3-CAA). At last, simulation results indicate that 9/3-CAA scheme exceed All CU CoMP, 9/3C CU CoMP and DLC resource scheduling scheme in cell average user normalized throughput. Especially, compared with the non-CoMP scheme as a benchmark, the 9-CAA and 3-CAA have improved the edge user normalized throughput by 17.2% and 13.0% respectively.

Unified Identification for Event Driven Service in User-Centric Environments

  • Lee, Soong-Hee;Kim, Dong-Il;Jeon, Hyung-Goo;Jang, Jong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.177-182
    • /
    • 2011
  • Considerations for user-centric environments are regarded as essential for the successful deployment of convergence services in BcN. Event driven service (EDS) is regarded as a typical convergence service converging different functions of multiple service providers to support user-centric environments. This paper first describes the deployment model and service scenario of EDS, a convergence service for user-centric environments in BcN. The user-centric environments stimulates the unified identifier management, namely unified identification (U-ID), to enable users to be provided convergence services without awareness of multiple providers. Then the designed structure and implementation results are given.

Development of an Integrated IoT System for Searching Dependable Device based on User Property (사용자 요소 기반의 신뢰성 있는 기기 탐색을 위한 사물인터넷 통합 시스템 개발)

  • Ryu, Shinhye;Kim, Sangwook
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.791-799
    • /
    • 2017
  • With the development of the internet of things, sensor and device are can be applied to various scenario. Overall improving of the dependability index of internet of things is the ultimate goal. And reliability aims to increase the success rate of internet of things service delivery. Many studies about internet of things system have been made on the system to assess a dependability for providing reliable service to user, but it has difficult to reflect the user context for evaluating the device reliability. Also, most do not consider the availability of content information. In this paper, it proposed dependable device searching system in the internet of things environment. This system evaluates device dependability based on device status and measured data. Through the proposed system, it can be provided reliable context information for user-centric service.

A Study on the User Experience and Scenario to Find the New Opportunity of LCD Monitor. (LCD 모니터의 미래 디자인 니즈 전망을 위한 기초 연구)

  • 탁희선;김소희;김명석;조재승
    • Proceedings of the Korea Society of Design Studies Conference
    • /
    • 2000.11a
    • /
    • pp.86-87
    • /
    • 2000
  • 기술의 급격한 발달로 이제 소비자는 다양한 유형의 정보를 접하게 되었으며, 디지털화의 급속한 변화는 디자인 환경에 커다란 변화를 주고 있다. 따라서 디자인 대상의 다양화, 다변화 현상이 나타나고 있으며 이와 함께 소비자의 욕구 역시 복잡하고 다양한 형태를 가지게 되었다. (중략)

  • PDF

The Classification of Ubiquitous Service Model (유비쿼터스 서비스 모델 분류)

  • Lee, Chang-Mug;Kwon, Oh-Young;Son, Young-Sung
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.3
    • /
    • pp.144-151
    • /
    • 2010
  • Ubiquitous computing which is providing various convenient services to user will prevail in future. To realize ubiquitous service, analyzing technical and information factors for service implementation is necessary. This paper defines ubiquitous service model to satisfy user demands and we analyze technical and information factors in order to realize services. Based on the factors, we extracts and classifies common compositions of ubiquitous services to suggest guidelines of service design.

Implementation of Visualization for USN Application Scenario based on Web (웹 기반에서의 USN 응용 시나리오 시각화 구현)

  • Ahn, Byeong-Tae;Han, Jae-Il;Kim, Min-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1873-1880
    • /
    • 2010
  • Recently, the world's Information Society, already central to humankind, is rapidly changing towards a fully ubiquitous computing society through the development of USN technology. USN application web services provide convenience through environment recognition as well as automatic recognition of specific situations all through the use of USN technology. It has been proven that it can also enable the safety of human life by providing an optimal service through real-time management. Therefore, USN application web services using such technology can be applied to various aspects of life. In this paper, we have implemented a scenario of with a specific user requirement regarding collected meta-data and sensing data based USN technology. We have implemented a visualization of the solutions suitable for each scenario.

An Watermarking Algorithm for Multimodal Biometric Systems (다중 생체인식 시스템에 적합한 워터마킹 알고리즘)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Chung, Yong-Wha;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.93-100
    • /
    • 2005
  • In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects on verification accuracy quantitatively. To hide biometric data with watermarking techniques, we first consider possible two scenarios. In the scenario 1, we use a fingerprint image as a cover work and hide facial features into it. On the contrary, we hide fingerprint features into a facial image in the Scenario 2. Based on the experimental results, we confirm that the Scenario 2 is superior to the Scenario 1 in terms of the verification accuracy of the watermarking image.

A Graphical User Interface Design for Surveillance and Security Robot (감시경계 로봇의 그래픽 사용자 인터페이스 설계)

  • Choi, Duck-Kyu;Lee, Chun-Woo;Lee, Choonjoo
    • The Journal of Korea Robotics Society
    • /
    • v.10 no.1
    • /
    • pp.24-32
    • /
    • 2015
  • This paper introduces a graphical user interface design that is aimed to apply to the surveillance and security robot, which is the pilot program for the army unmanned light combat vehicle. It is essential to consider the activities of robot users under the changing security environment in order to design the efficient graphical user interface between user and robot to accomplish the designated mission. The proposed design approach firstly identifies the user activities to accomplish the mission in the standardized scenarios of military surveillance and security operation and then develops the hierarchy of the interface elements that are required to execute the tasks in the surveillance and security scenarios. The developed graphical user interface includes input control component, navigation component, information display component, and accordion and verified by the potential users from the various skilled levels with the military background. The assessment said that the newly developed user interface includes all the critical elements to execute the mission and is simpler and more intuitive compared to the legacy interface design that was more focused on the technical and functional information and informative to the system developing engineers rather than field users.

A Novel Security Scheme with Message Level Security for Hybrid Applications

  • Ma, Suoning;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.215-217
    • /
    • 2016
  • With the popularity of smart device, mobile applications are playing more and more important role in people's daily life, these applications stores various information which greatly facilitate the user's daily life. However due to the frequent transmission of data in the network also increases the risk of data leakage, more and more developers began to focus on how to protect user data. Current mainstream development models include Native development, Web development and Hybrid development. Hybrid development is based on JavaScript and HTML5, it has a cross platform advantages similar to Web Apps and a good user experience similar to Native Apps. In this paper according to the features of Hybrid applications, we proposed a security scheme in Hybrid development model implements message-level data encryption to protect user information. And through the performance evaluation we found that in some scenario the proposed security scheme has a better performance.