• Title/Summary/Keyword: multi-user

Search Result 2,169, Processing Time 0.025 seconds

An Offloading Strategy for Multi-User Energy Consumption Optimization in Multi-MEC Scene

  • Li, Zhi;Zhu, Qi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4025-4041
    • /
    • 2020
  • Mobile edge computing (MEC) is capable of providing services to smart devices nearby through radio access networks and thus improving service experience of users. In this paper, an offloading strategy for the joint optimization of computing and communication resources in multi-user and multi-MEC overlapping scene was proposed. In addition, under the condition that wireless transmission resources and MEC computing resources were limited and task completion delay was within the maximum tolerance time, the optimization problem of minimizing energy consumption of all users was created, which was then further divided into two subproblems, i.e. offloading strategy and resource allocation. These two subproblems were then solved by the game theory and Lagrangian function to obtain the optimal task offloading strategy and resource allocation plan, and the Nash equilibrium of user offloading strategy games and convex optimization of resource allocation were proved. The simulation results showed that the proposed algorithm could effectively reduce the energy consumption of users.

Superposition Coding in SUS MU-MIMO system for user fairness (사용자 공정성을 위한 MU-MIMO 시스템에서 반직교 사용자 선택 알고리즘에 중첩 코딩 적용 연구)

  • Jang, Hwan Soo;Kim, Kyung Hoon;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.99-104
    • /
    • 2014
  • Nowadays, various researches fulfill in many communication engineering area for B4G (Beyond Forth Generation). Next LTE-A (Long Term Evolution Advanced), MU-MIMO (Multi-User Multi Input Multi Output) method raises to upgrade throughput performance. However, the method of user selection is not decided because of many types and discussions in MU-MIMO system. Many existing methods are powerful for enhancing performance but have various restrictions in practical implementation. Fairness problem is primary restriction in this area. Existing papers emphasis algorithm to increase sum-rate but we introduce an algorithm about dealing with fairness problem for real commercialization implementation. Therefore, this paper introduces new user selection method in MU-MIMO system. This method overcomes a fairness problem in SUS (Semiorthogonal User Selection) algorithm. We can use the method to get a similar sum-rate with SUS and a high fairness performance. And this paper uses a hybrid method with SC-SUS (Superposition Coding SUS) algorithm and SUS algorithm. We find a threshold value of optimal performance by experimental method. We show this performance by computer simulation with MATLAB and analysis that results. And we compare the results with another paper's that different way to solve fairness problem.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

Analysis and Evaluation of Multi-view UCV(User Created Video) Service through Adjusting Camera Angle (카메라 앵글 조정 방식을 통한 다시점 UCV(User Created Video) 서비스 분석과 평가)

  • Sung, Bokyung;Ko, Ilju
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.2
    • /
    • pp.39-47
    • /
    • 2014
  • Fast advancement and dynamic diffusion of Smart device make big change to personal user. They have been extended from consumer only watching video to prosumer recording and sharing User Created Video(UCV). With this reason, as a platform for various kind of content service. Especially, UCVs for the purpose of sharing experience are recorded from same event on limited time and space by some people. These are also produced by various cameras that has each angle similar like broadcasting videos. In this paper, we present multi-view characteristic of UCV and propose Multi-view UCV service that is watching UCVs from same event through adjusting camera angle. Through user satisfaction survey, we knew that adjusting camera angle is preferred for watching UCV including overlapping part more than linear watching.

A User Scheduling with Interference-Aware Power Control for Multi-Cell MIMO Networks (다중안테나 다중셀 네트워크에서 간섭인지 기반 전력제어 기술을 이용한 사용자 스케쥴링)

  • Cho, Moon-Je;Ban, Tae-Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1063-1070
    • /
    • 2015
  • In this paper, we propose a distributed user scheduling with transmit power control based on the amount of generating interference to other base stations (BSs) in multi-cell multi-input multi-output (MIMO) networks. Assuming that the time-division duplexing (TDD) system is used, the interference channel from users to other cell BSs is obtained at each user. In the proposed scheduling, each user first generates a transmit beamforming vector by using singular value decompositon (SVD) over MIMO channels and reduces the transmit power if its generating interference to other BSs is larger than a predetermined threshold. Each BS selects the user with the largest effective channel gains among users, which reflects the adjusted power of users. Simulation results show that the proposed technique significantly outperforms the existing user scheduling algorithms.

A Study on Blind Adaptive Algorithm for Multi-User Detection in DS-CDMA (DS-CDMA에서 다중사용자 검출을 위한 블라인드 적응 알고리즘에 관한 연구)

  • 우대호
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1998.06c
    • /
    • pp.213-216
    • /
    • 1998
  • This paper proposes improved algorithm for multi-user detection in DS-CDMA. Each of algorithm is based on CMA algorithm. Improved LMS-CMS and LMAD-CMA are combined to macthed filter. Simulations results shown that Improved LMAD-CMA algorithm has a higher capacity than MOE in steady-state convergence properties.

  • PDF

Blind Multi-User Detector Using Code-Constrained Minimum Variance Method (코드 제한 최소 분산 방법을 이용한 블라인드 다중 사용자 검파기)

  • 임상훈;정형성이충용윤대희
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.215-218
    • /
    • 1998
  • This paper proposes a blind multi-user detector using Code-Constrained Minimum Variance (CCMV) method which directly detects the DS-CDMA signals in a multipath fading channel without estimating the channels. This algorithm reduces the complexity of computation by making a small size data matrix with the order of the channel length. Advantageously it requires to know the spreading code and the time delay of only the desired user.

  • PDF

Contextual Inquiry on Multi-tasking Using a Mobile Phone (모바일폰에서의 멀티태스킹 사용 맥락조사)

  • Chung, Seung-Eun;Rhee, Jeong-Yoon;Lee, Shin-Hae;Ryoo, Han-Young
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.938-943
    • /
    • 2009
  • This paper presents the minimum groups of tasks that should allow for multi-tasking by each main task when using a mobile phone. Imaging the situation that various tasks are seamlessly happened and making clear which tasks they need are not simple for users. Thus, we explore multi-tasking needs between every two tasks first, out of entire 16 functions selected from general functions that mobile phones have. Next, we create multi-tasking scenarios by analogy connecting each previous task to appropriate tasks that user's needs are revealed. In this manner, 11 scenarios are introduced finally. We expect that the result of our research is possible to be applicable to the development of user-centered design that multi-tasking contexts are considered.

  • PDF

Design and Implementation of A Multi-Point Multimedia Conference System Using IP Grouping (IP 그룹화를 이용한 다자간 멀티미디어 회의시스템의 설계 및 구현)

  • Sung Baek-Kyon;Seong Dong-Su;Lee Keon-Bae;Hyun Don-Whan
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.1012-1021
    • /
    • 2005
  • This paper describes the design and implementation of an efficient multi-point multimedia conference system using IP grouping. Existing multi-point multimedia conference systems are difficult for multi-user to perform efficient cooperation due to bandwidth limitation for data transmission of video, audio and documentation. In the case that multi-user uses limited bandwidth, smooth cooperation does not accomplish due to transmission delay for the real-time transmission of image and speech data. A hybrid transfer method which is mixed with distributed and centralized methods is used for smooth cooperation, and the network bandwidth is reduced by forming multi-user conference systems of IP grouping in this paper. Also, adaptive image frame variations are used to solve bottleneck effect according to the number of users. An efficient multi-user conference system is designed to support audio quality.

  • PDF

Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3699-3719
    • /
    • 2017
  • Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.