• Title/Summary/Keyword: communication networks

Search Result 5,474, Processing Time 0.036 seconds

A New Communication Network Model for Chat Agents in Virtual Space

  • Kim, Jong-Woo;Ji, Seong-Hyun;Kim, Seon-Yeong;Cho, Hwan-Gue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.287-312
    • /
    • 2011
  • Internet chat programs and instant messaging services are becoming increasingly popular among Internet users. One of the crucial issues with Internet chat is how to manage the corresponding pairs of questions and answers in a sequence of conversations. Although many novel methodologies have been introduced to cope with this problem, most are poor in managing interruptions, organizing turn-taking, and conveying comprehension. The Internet environment is recently evolving into a 3D environment, but the problems with managing chat dialogues with the standard 2D text-based chat have remained. Therefore, we propose a more realistic communication model for chat agents in 3D virtual space in this paper. First, we propose a new method to measure the capacity of communication between chat agents and a novel visualization method to depict the hierarchical structure of chat dialogues. In addition, we are concerned with communication networks for virtual people (avatars) living in virtual worlds. In this paper we consider a microscopic aspect of a social network in a relatively short period of time. Our experiments show that our model is highly effective in a virtual chat environment, and the communication network based on our model greatly facilitates investigation of a very large and complicated communication network.

Modeling Green-light Fiber Amplifiers for Visible-light Communication Systems

  • Khushik, Muhammad Hanif Ahmed Khan;Jiang, Chun
    • Current Optics and Photonics
    • /
    • v.3 no.2
    • /
    • pp.105-110
    • /
    • 2019
  • The visible-light communication (VLC) system is a promising candidate to fulfill the present and future demands for a high-speed, cost-effective, and larger-bandwidth communication system. VLC modulates the visible-light signals from solid-state LEDs to transmit data between transmitter and receiver, but the broadcasting and the line-of-sight propagation nature of visible-light signals make VLC a communication system with a limited operating range. We present a novel architecture to increase the operating range of VLC. In our proposed architecture, we guide the visible-light signals through the fiber and amplify the dissipated signals using visible-light fiber amplifiers (VLFAs), which are the most important and the novel devices needed for the proposed architecture of the VLC. Therefore, we design, analyze, and apply a VLFA to VLC, to overcome the inherent drawbacks of VLC. Numerical results show that under given constant conditions, the VLFA can amplify the signal up to 35.0 dB. We have analyzed the effects of fiber length, active ion concentration, pump power, and input signal power on the gain and the noise figure (NF).

A Novel Self-Learning Filters for Automatic Modulation Classification Based on Deep Residual Shrinking Networks

  • Ming Li;Xiaolin Zhang;Rongchen Sun;Zengmao Chen;Chenghao Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1743-1758
    • /
    • 2023
  • Automatic modulation classification is a critical algorithm for non-cooperative communication systems. This paper addresses the challenging problem of closed-set and open-set signal modulation classification in complex channels. We propose a novel approach that incorporates a self-learning filter and center-loss in Deep Residual Shrinking Networks (DRSN) for closed-set modulation classification, and the Opendistance method for open-set modulation classification. Our approach achieves better performance than existing methods in both closed-set and open-set recognition. In closed-set recognition, the self-learning filter and center-loss combination improves recognition performance, with a maximum accuracy of over 92.18%. In open-set recognition, the use of a self-learning filter and center-loss provide an effective feature vector for open-set recognition, and the Opendistance method outperforms SoftMax and OpenMax in F1 scores and mean average accuracy under high openness. Overall, our proposed approach demonstrates promising results for automatic modulation classification, providing better performance in non-cooperative communication systems.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

Standardization Trends and Military Communication Applications of Core Technologies of 5G NR (5G NR 핵심 기술의 표준동향 및 군 통신 적용 시나리오)

  • Seongjin Lee;Eunsoo Kim;Kihun Kim;Jongman Lee;Wan Choi
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.5
    • /
    • pp.611-618
    • /
    • 2024
  • 5G New Radio(NR) technology, with its focus on high speed, low latency, and connectivity, introduces crucial advancements like MIMO for enhanced reliability and transmission rates, edge computing for reduced latency, and IAB for extended coverage. However, military communication networks face challenges such as limited capacity, unpredictable mobility and communication dead zones. This paper delves into the trends of the above 5G NR technologies outlined by the 3GPP standard, exploring their potential applications within military infrastructure networks. Our aim is to underscore the benefits of harnessing these technologies in military settings. Additionally, through simulation, we forecast the advantages associated with integrating these core 5G NR technologies, thereby paving the way for enhanced military communication capabilities.

Network Time Protocol Extension for Wireless Sensor Networks (무선 센서 네트워크를 위한 인터넷 시각 동기 프로토콜 확장)

  • Hwang, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2563-2567
    • /
    • 2011
  • Advances in smart sensors, embedded systems, low-power design, ad-hoc networks and MEMS have allowed the development of low-cost small sensor nodes with computation and wireless communication capabilities that can form distributed wireless sensor networks. Time information and time synchronization are fundamental building blocks in wireless sensor networks since many sensor network applications need time information for object tracking, consistent state updates, duplicate detection and temporal order delivery. Various time synchronization protocols have been proposed for sensor networks because of the characteristics of sensor networks which have limited computing power and resources. However, none of these protocols have been designed with time representation scheme in mind. Global time format such as UTC TOD (Universal Time Coordinated, Time Of Day) is very useful in sensor network applications. In this paper we propose network time protocol extension for global time presentation in wireless sensor networks.

Prediction Model of Energy Consumption of Wired Access Networks using Machine Learning (기계학습을 이용한 유선 액세스 네트워크의 에너지 소모량 예측 모델)

  • Suh, Yu-Hwa;Kim, Eun-Hoe
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.1
    • /
    • pp.14-21
    • /
    • 2021
  • Green networking has become a issue to reduce energy wastes and CO2 emission by adding energy managing mechanism to wired data networks. Energy consumption of the overall wired data networks is driven by access networks, expect for end devices. However, on a global scale, it is more difficult to manage centrally energy, measure and model the real energy use and energy savings potential of the access networks. This paper presented the multiple linear regression model to predict energy consumption of wired access networks using supervised learning of machine learning with data collected by existing investigated materials, actual measured values and results of many models. In addition, this work optimized the performance of it by various experiments and predict energy consumption of wired access networks. The performance evaluation of the regression model was achieved by well-knowned evaluation metrics.

Efficient All-to-All Personalized Communication Algorithms in Wormhole Networks (웜홀 방식 망에서의 효율적인 완전교환 통신 알고리즘)

  • Kim, Si-Gwan;Maeng, Seung-Ryoul;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.5
    • /
    • pp.464-474
    • /
    • 2000
  • All-to-all personalized communication, or complete exchange, is at the heart of numerous applications, such as matrix transposition, fast Fourier Transform(FFT), and distributed table lookup.We present an efficient all-to-all personalized communication algorithm for a 2D torus inwormhole-routed networks. Our complete exchange algorithm adopts divide-and-conquer approach toreduce the number of start-up latency significantly, which is a good metric for network performancein wormhole networks. First, we divide the whole network into 2x2 basic cells, After speciallydesignated nodes called master nodes have collected messages to transmit to the rest of the basic cell,only master nodes perform complete exchange with reduced network size, N/2 x N/2. When finishedwith this complete exchange in master nodes, these nodes distribute messages to the rest of the masternode, which results in the desired complete exchange communication. After we present our algorithms,we analyze time complexities and compare our algorithms with several previous algorithms. And weshow that our algorithm is efficient by a factor of 2 in the required start-up time which means thatour algorithm is suitable for wormhole-routed networks.

  • PDF

Performance Evaluation of WUSB over WBAN Communication Structure for Wireless Wearable Computers (무선 웨어러블 컴퓨터를 위한 WUSB over WBAN 통신 구조의 성능 분석)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.839-847
    • /
    • 2014
  • A recent major development in computer technology is the advent of the wearable computer system that is based on human-centric interface technology trends and ubiquitous computing environments. Wearable computer systems can use the wireless universal serial bus (WUSB) that refers to USB technology that is merged with WiMedia PHY/MAC technical specifications. In this paper, we focus on an integrated system of the wireless USB over the wireless body area networks (WBAN) for wireless wearable computer systems supporting U-health services. To construct the WUSB over WBAN communication systems, we propose a WBAN beaconing structure to assign WUSB communication periods. In the proposed structure, WUSB uses private periods of WBAN. In our performance evaluations, we compare theoretical results and simulation results about throughputs of WUSB under various WBAN channel occupations to evaluate the effectiveness of proposed structure in WUSB over WBAN communications.

Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks

  • Zhang, Aiqing;Ye, Xinrong;Chen, Jianxin;Zhou, Liang;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2375-2393
    • /
    • 2016
  • Key agreement is paramount in secure wireless communications. A promising approach to address key agreement schemes is to extract secure keys from channel characteristics. However, because channels lack randomness, it is difficult for wireless networks with stationary communicating terminals to generate robust keys. In this paper, we propose a Robust Secure Key Agreement (RSKA) scheme from Received Signal Strength (RSS) in stationary wireless networks. In order to mitigate the asymmetry in RSS measurements for communicating parties, the sender and receiver normalize RSS measurements and quantize them into q-bit sequences. They then reshape bit sequences into new l-bit sequences. These bit sequences work as key sources. Rather than extracting the key from the key sources directly, the sender randomly generates a bit sequence as a key and hides it in a promise. This is created from a polynomial constructed on the sender's key source and key. The receiver recovers the key by reconstructing a polynomial from its key source and the promise. Our analysis shows that the shared key generated by our proposed RSKA scheme has features of high randomness and a high bit rate compared to traditional RSS-based key agreement schemes.