• Title/Summary/Keyword: hybrid access

Search Result 343, Processing Time 0.024 seconds

Design and Performance Analysis of Multi-Swap Architectures for Mobile Devices (모바일 기기를 위한 다중 스왑 아키텍처의 설계 및 성능 분석)

  • Hyokyung Bahn;Jisun Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.4
    • /
    • pp.53-58
    • /
    • 2023
  • As smartphones increasingly support the execution of various applications, the function of virtual memory swapping is becoming important. However, unlike traditional computer systems, mobile platforms do not basically support swapping. This is because swapping results in frequent writes to flash memory, which may degrade the performance of smartphone's storage significantly. To cope with this situation, this paper suggests two multi-swap architectures, hierarchical swapping and hybrid swapping, and compares their performance quantitatively. Specifically, this paper shows that hybrid swapping with the consideration of single-access data can reduce swapping traffic to flash memory, and improve the performance compared to traditional swapping.

Keywords and Spatial Based Indexing for Searching the Things on Web

  • Faheem, Muhammad R.;Anees, Tayyaba;Hussain, Muzammil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1489-1515
    • /
    • 2022
  • The number of interconnected real-world devices such as sensors, actuators, and physical devices has increased with the advancement of technology. Due to this advancement, users face difficulties searching for the location of these devices, and the central issue is the findability of Things. In the WoT environment, keyword-based and geospatial searching approaches are used to locate these devices anywhere and on the web interface. A few static methods of indexing and ranking are discussed in the literature, but they are not suitable for finding devices dynamically. The authors have proposed a mechanism for dynamic and efficient searching of the devices in this paper. Indexing and ranking approaches can improve dynamic searching in different ways. The present paper has focused on indexing for improving dynamic searching and has indexed the Things Description in Solr. This paper presents the Things Description according to the model of W3C JSON-LD along with the open-access APIs. Search efficiency can be analyzed with query response timings, and the accuracy of response timings is critical for search results. Therefore, in this paper, the authors have evaluated their approach by analyzing the search query response timings and the accuracy of their search results. This study utilized different indexing approaches such as key-words-based, spatial, and hybrid. Results indicate that response time and accuracy are better with the hybrid approach than with keyword-based and spatial indexing approaches.

Machine Learning Based Hybrid Approach to Detect Intrusion in Cyber Communication

  • Neha Pathak;Bobby Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.190-194
    • /
    • 2023
  • By looking the importance of communication, data delivery and access in various sectors including governmental, business and individual for any kind of data, it becomes mandatory to identify faults and flaws during cyber communication. To protect personal, governmental and business data from being misused from numerous advanced attacks, there is the need of cyber security. The information security provides massive protection to both the host machine as well as network. The learning methods are used for analyzing as well as preventing various attacks. Machine learning is one of the branch of Artificial Intelligence that plays a potential learning techniques to detect the cyber-attacks. In the proposed methodology, the Decision Tree (DT) which is also a kind of supervised learning model, is combined with the different cross-validation method to determine the accuracy and the execution time to identify the cyber-attacks from a very recent dataset of different network attack activities of network traffic in the UNSW-NB15 dataset. It is a hybrid method in which different types of attributes including Gini Index and Entropy of DT model has been implemented separately to identify the most accurate procedure to detect intrusion with respect to the execution time. The different DT methodologies including DT using Gini Index, DT using train-split method and DT using information entropy along with their respective subdivision such as using K-Fold validation, using Stratified K-Fold validation are implemented.

Service Deployment Strategy for Customer Experience and Cost Optimization under Hybrid Network Computing Environment

  • Ning Wang;Huiqing Wang;Xiaoting Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3030-3049
    • /
    • 2023
  • With the development and wide application of hybrid network computing modes like cloud computing, edge computing and fog computing, the customer service requests and the collaborative optimization of various computing resources face huge challenges. Considering the characteristics of network environment resources, the optimized deployment of service resources is a feasible solution. So, in this paper, the optimal goals for deploying service resources are customer experience and service cost. The focus is on the system impact of deploying services on load, fault tolerance, service cost, and quality of service (QoS). Therefore, the alternate node filtering algorithm (ANF) and the adjustment factor of cost matrix are proposed in this paper to enhance the system service performance without changing the minimum total service cost, and corresponding theoretical proof has been provided. In addition, for improving the fault tolerance of system, the alternate node preference factor and algorithm (ANP) are presented, which can effectively reduce the probability of data copy loss, based on which an improved cost-efficient replica deployment strategy named ICERD is given. Finally, by simulating the random occurrence of cloud node failures in the experiments and comparing the ICERD strategy with representative strategies, it has been validated that the ICERD strategy proposed in this paper not only effectively reduces customer access latency, meets customers' QoS requests, and improves system service quality, but also maintains the load balancing of the entire system, reduces service cost, enhances system fault tolerance, which further confirm the effectiveness and reliability of the ICERD strategy.

Energy-efficient Low-delay TDMA Scheduling Algorithm for Industrial Wireless Mesh Networks

  • Zuo, Yun;Ling, Zhihao;Liu, Luming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2509-2528
    • /
    • 2012
  • Time division multiple access (TDMA) is a widely used media access control (MAC) technique that can provide collision-free and reliable communications, save energy and bound the delay of packets. In TDMA, energy saving is usually achieved by switching the nodes' radio off when such nodes are not engaged. However, the frequent switching of the radio's state not only wastes energy, but also increases end-to-end delay. To achieve high energy efficiency and low delay, as well as to further minimize the number of time slots, a multi-objective TDMA scheduling problem for industrial wireless mesh networks is presented. A hybrid algorithm that combines genetic algorithm (GA) and simulated annealing (SA) algorithm is then proposed to solve the TDMA scheduling problem effectively. A number of critical techniques are also adopted to reduce energy consumption and to shorten end-to-end delay further. Simulation results with different kinds of networks demonstrate that the proposed algorithm outperforms traditional scheduling algorithms in terms of addressing the problems of energy consumption and end-to-end delay, thus satisfying the demands of industrial wireless mesh networks.

A Study of HFC Network quality as BcN(Broadband convergence Network) access network. (광대역통합망 구축을 위한 HFC망의 활용 가능성 연구)

  • Kim, Tae-Woong;Chung, Moo-Il;Kim, Hong-Iq;Im, Joon-Soon;Park, Sung-Kwon
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.167-170
    • /
    • 2005
  • We performed field test and analyzed results of field test in variable HFC(Hybrid Fiber Coaxial) network environments. And we investigated whether the test results is satisfied in DOCSIS(Data-over-Cable Service Interface Specification) 2.0 and OpenCable standard. Also, we propose HFC improvement problem for HFC Network quality as BcN(Broadband convergence Network) access network. We tested three sample areas. The sample areas represent various type of SO(System Operator) in korea. The field test was to measure signal level about digital channels. In results of multiple digital channels, in case of "Equalizer ON", we could be obtained very good test results. The results of field test were shown in satisfying recommended values in DOCSIS 2.0 and OpenCable. So, we could have confidence through field test that BcN will be possible to be adapted to environment of korea HFC network.

  • PDF

performance analysis of the CSMA/CA protocol using stop-and-wait ARQ method in iwreless LANs (무선 근거리 통신망에서의 Stop-and-wait ARQ 방식을 사용하는 충돌회피 프로토콜 성능분석)

  • 김재현;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1208-1220
    • /
    • 1996
  • In this paper, the performance of a Carrier Sense Multiple Access/Collision avoidance (CSMA/CA) protocol using stop-and-Wait automatic Repeat reQuest, which is adapted as a draft standard in IEEE 802.11, is analyzed using a mathematical method based on a renewal theory, and simulation checks are performed, which confirm the goodness of our anlysis. In order to anlayze of CSMA/CA, we model that network is composed of finite populationand channel is slotted. And, we consider the CSMA/CA protocol as a hybrid protocol of 1-persistent CSMA and p-persistent CSMA protocol. As resuls of analysis, we have found that the throughput is degraded and packet delay is increased as the number of stations, Acknowledgement (ACK) length and Distributed coordination function Inter Frame Space (DIFS) length are increased.

  • PDF

Subject Searching Using Controlled Vocabulary Versus Uncontrolled Vocaburary in Online Catalog System: Focusing on Multilingual Environment

  • Choi, Hee-Yoon
    • Journal of Information Management
    • /
    • v.26 no.2
    • /
    • pp.61-79
    • /
    • 1995
  • The purpose of this paper is to investigate search efficiency of controlled vocabulary versus uncontrolled vocabulary subject access in online catalog systems. The question of the effectiveness of controlled versus uncontrolled vocabulary in information retrieval has been raised in many literatures. A debate continues in the Library and Information Science Professions over the relative merit, appropriateness, and efficiency of uncontrolled vocabulary subject access in online catalog systems. Actually users used to combine uncontrolled vocabulary subject searching with controlled vocabulary subject searching. But the success of user's subject search depends on his choice of search terms. Also the technical developments that facilitate cooperation among information services in general make it increasingly possible for such cooperation to take place on an international level. In this study, several common types of vocabularies on online catalog systems are described and compared, especially usages of vocabularies in multilingual environment are analyzed.

  • PDF

A methodology for sustainable monitoring of micro locations at remote, hard-to-access and unsafe places

  • Trcek-Pecak, Tamara;Trcek, Denis;Belic, Igor
    • Smart Structures and Systems
    • /
    • v.15 no.5
    • /
    • pp.1363-1372
    • /
    • 2015
  • Smart structures and intelligent systems play pivotal roles in numerous areas of applied sciences ranging from civil engineering to computer and communications systems engineering. Although such structures and systems have been intensively deployed in these areas, they have been, interestingly, very rarely deployed in the field of cultural heritage preservation.This paper presents one of thefirst such attempts. A new methodology is describedthat deploys smart structures andlinks them with artificial intelligence methods.These solutions are referred toas advanced hybrid engineering artefacts. By their use,important environmental factors can be monitoredin hard to access, remote or unsafe locationsby minimizing the need for human involvement. In addition toproviding safety the methodologyalso reduces costs and, most importantly,providesa new way to modelany particular micro-environment in a much more efficient way than this is possible with traditional ways. Last but not least, although themethodology has been developed for cultural heritage preservation, its application areas are much broader and it is expected that it will find its applicationin other domains like civil engineering and ecology.

Digital Library in the Notion of Publishing, II : Practical Design of the Hybrid Digital Library (출판기능이 부여된 디지털도서관 II - 하이브리드 디지털도서관의 모형 설계 -)

  • Chung, Jun Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.109-128
    • /
    • 2014
  • A digital library could be understood as not a part of information cycling, but whole process of information production, circulation and reproduction. This study suggests that a digital library should be a creator as which it is publishing, circulating, and re-producing the information resources. Therefore, the role of intrinsic DRM (Digital Resources Management) can be interpreted as a digital library. Open access model have been already adopted to many university libraries, many university libraries are publishing free access online research resources by themselves. Also, research collection based on cloud computing can be extended to networked research collection and share with other university libraries. These evidences show future library can be the digital library with online and open accessible publishing function.