• Title/Summary/Keyword: mobile distributed environment

Search Result 292, Processing Time 0.025 seconds

Performance Analysis of Trellis Coded 8PSK Systems in Fading Environment (페이딩 환경하에서 Trellis 부호화된 8PSK 시스팀의 성능 분석)

  • 김현주;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.3
    • /
    • pp.301-309
    • /
    • 1993
  • The performance of trellis coded 8-PSK systems over m-distributed fading channel is analyzed. To compensate the performance degradation due to the fading in mobile communication channels, the trellis code which can obtain the coding gain without bandwidth expansion is used. Using the Chernoff bound and generating function techniques for the trellis coded 8-PSK systems with 4-state and 8-state, the upper bound of the bit error probability is derived. The trellis code of 8-state is better than that of 4-state in the capability of error correction. The coded performance is much better under severe fading environment.

  • PDF

NoSQL-based User Behavior Detection System in Cloud Computing Environment (NoSQL 기반 클라우드 사용자 행동 탐지 시스템 설계)

  • Ahn, Kwang-Min;Lee, Bong-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.804-807
    • /
    • 2012
  • Cloud service provider has to protect client's information securely since all the resources are offered by the service provider, and a large number of users share the resources. In this paper, a NoSQL-based anomaly detection system is proposed in order to enhance the security of mobile cloud services. The existing integrated security management system that uses a relational database can not be used for real-time processing of data since security log from a variety of security equipment and data from cloud node have different data format with unstructured features. The proposed system can resolve the emerging security problem because it provides real time processing and scalability in distributed processing environment.

  • PDF

Mobile Transaction Processing in Hybrid Broadcasting Environment (복합 브로드캐스팅 환경에서 이동 트랜잭션 처리)

  • 김성석;양순옥
    • Journal of KIISE:Databases
    • /
    • v.31 no.4
    • /
    • pp.422-431
    • /
    • 2004
  • In recent years, different models in data delivery have been explored in mobile computing systems. Particularly, there were a lot of research efforts in the periodic push model where the server repetitively disseminates information without explicit request. However, average waiting time per data operation highly depends on the length of a broadcast cycle and different access pattern among clients may deteriorate the response time considerably. In this case, clients are preferably willing to send a data request to the server explicitly through backchannel in order to obtain optimal response time. We call the broadcast model supporting backchannel as hybrid broadcast. In this paper, we devise a new transaction processing algorithm(O-PreH) in hybrid broadcast environments. The data objects which the server maintains are divided into Push_Data for periodic broadcasting and Pull_Data for on-demand processing. Clients tune in broadcast channel or demand the data of interests according to the data type. Periodic invalidation reports from the server support maintaining transactional consistency. If one or more conflicts are found, conflict orders are determined not to violate the consistency(pre-reordering) and then the remaining operations have to be executed pessimistically. Through extensive simulations, we demonstrate the improved throughput of the proposed algorithm.

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

A Distributed Altruistic Locking Scheme For Multilevel Secure Database in Wireless Mobile Network Environments (무선 이동 네트워크 환경에서 다단계 보안 데이터베이스를 위한 분산 이타적 잠금 기법)

  • Kim, Hee-Wan;Park, Dong-Soon;Rhee, Hae-Kyung;Kim, Ung-Mo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.235-242
    • /
    • 2002
  • We propose an advanced transaction scheduling protocol for concurrency control of multilevel secure databases in wireless mobile network environment. Wireless communication is characterized by frequent spurious disconnections. So short-lived transaction must quickly access database without any delay by long-lived one. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure databases in wireless mobile network environment. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of a1truism has also been deployed for extended a1truistic locking. This is in a way that scope of data to he early released is enlarged to include even data initially not intended to be donated. Our protocol is based on extended altruistic locking, but a new method, namely bi-directional donation locking for multilevel secure databases (MLBiDL), is additionally used in order to satisfy security requirements and concurrency. We showed the Simulation experiments that MLBiDL outperforms the other locking protocols in terms of the degree of throughput and average waiting time.

Performance Enhancement Architecture for HLR System Based on Distributed Mobile Embedded System (분산 모바일 임베디드 시스템 기반의 새로운 위치정보 관리 시스템)

  • Kim Jang Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12B
    • /
    • pp.1022-1036
    • /
    • 2004
  • In mobile cellular network the ever-changing location of a mobile host necessitates the continuous tracking of its current position and efficient management of location information. A database called Home Location Register(HLR) plays a major role in location management in this distributed environment, providing table management, index management, and backup management facilities. The objectives of this paper are to identify the p개blems of the current HLR system through rigorous analysis, to suggest solutions to them, and to propose a new architecture for the HLR system. In the HLR system, a main memory database system is used to provide real-time accesses and updates of subscriber's information. Thus it is suggested that the improvement bemade to support better real-time facilities, to manage subscriber's information more reliably, and to accommodate more subscribers. In this paper, I propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. Insertion md deletion overhead of the chained bucket hashing method is less than that of modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solve the performance degradation problem caused by frequent registration-location operations. Performance analysis has been performed to evaluate the proposed techniques based on a system with subscribers. The results show that, in comparison with the current techniques, the memory requirement is reduced by more than 62%,directory operations, and backup operation by more than 80%.

The Study of Diffusion and Outlook for Smart Phone in Smart Nomad Era (스마트 노매드 시대 스마트폰의 확산과 전망에 대한 연구)

  • Nam, Chong-Hoon
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.315-322
    • /
    • 2010
  • This study focused on mobile trend in diffusion of smart phone. Presently, it has been evolved from digital nomad to smart nomad. Smart nomad era is based on digital technology with mobility and being smart. Smart nomad that is made up high-end device and intellectual content has changed structure of industry and life style. Smart phone is a core key in smart nomad era. In 2010 smart phone has been distributed about 2.5 hundreds million which is 20% of whole mobile phone sales and the volume of smart phone sales will be getting bigger and bigger in near future. Although, there are various reasons for success of smart phone market, this research focused 4 reasons: first, development of mobile device, second, evolution of mobile content distribution, third, support of government system, fourth, success of Docomo i-mode and Apple i phone. Smart phone will grow up more rapidly. Smart phone eco-system will be more competitive in the world. In Korea, smart phone eco-system also will be very competitive. For success in the middle of this competitive environment, Korea should lead the competitive phase with development of ability of creation software and content, construction of various partnership and evolution of next generation technology and service.

Design of a Wi-Fi Remote Ordering System Using the BYOD Environment (BYOD 환경을 활용한 WiFi 원격주문 시스템 설계)

  • Suk, Myung-gun;Jang, Seok-woo;Kim, Chang-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.759-762
    • /
    • 2015
  • As a result of the popularization of smart devices, smart phones or the tablets have become necessities in modern society. In this current of the times, the bring-your-own-device environment, in which personally owned smart devices are utilized in life, is attracting attention. In this context, this paper designed a Wi-Fi remote ordering system focused on the BYOD environment. If the Wi-Fi remote ordering system based on the BYOD environment is popularized, positive effects can be expected such as the enhancement of efficiency and the increase of customer benefits. As a typical example, real-time customer requests via smart devices enable the provision of fast services. This paper designed a mobile app for customers' remote ordering and web pages on which member stores can inquire details of orders, manage a menu, and register statistical data on sales. If the Wi-Fi remote ordering system designed by this paper is widely distributed internationally, it is expected that the system will be used usefully by many people.

  • PDF

Development of Realtime Multimedia Streaming Service using Mobile Smart Devices (모바일 스마트 단말을 활용한 실시간 멀티미디어 스트리밍 서비스 개발)

  • Park, Mi-Ryong;Sim, Han-Eug
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.51-56
    • /
    • 2014
  • Thesedays, there are many smart device applications developed, especially on the using various sensors included in the smart device. Smart devices have several sensors which are camera, GPS, mike, and communication module for collecting ubiquitous environment, and many applications are developed by using such sensors. In this paper, we developed the multimedia stream architecture and examined the smart device applications based on open source with front and back-end server clouds for developing the conceptual architecture. Also, we examined the back-end distributed servers, realtime multimedia stream transferring, multi-media store, and media relay for other server and smart devices. We test the examined architecture on the real target environment to collect the SIP initial setup time, media stream delay, and end-to-end play time. The test results show that there have good network operation environment to provide realtime multimedia services, and we need to improve the end-to-end play time by minimizing the initial setup time.

Efficient Hop-based Access Control for Private Social Networks (소셜 네트워크에서 프라이버시를 보호하는 효율적인 거리기반 접근제어)

  • Jung, Sang-Im;Kim, Dong-Min;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.505-514
    • /
    • 2012
  • Because people usually establish their online social network based on their offline relationship, the social networks (i.e., the graph of friendship relationships) are often used to share contents. Mobile devices let it easier in these days, but it also increases the privacy risk such as access control of shared data and relationship exposure to untrusted server. To control the access on encrypted data and protect relationship from the server, M. Atallah et al. proposed a hop-based scheme in 2009. Their scheme assumed a distributed environment such as p2p, and each user in it shares encrypted data on their social network. On the other hand, it is very inefficient to keep their relationship private, so we propose an improved scheme. In this paper, among encrypted contents and relationships, some authenticated users can only access the data in distributed way. For this, we adopt 'circular-secure symmetric encryption' first. Proposed scheme guarantees the improved security and efficiency compared to the previous work.