• Title/Summary/Keyword: multi-user and multi-service

Search Result 436, Processing Time 0.026 seconds

Design of A new Algorithm by Using Standard Deviation Techniques in Multi Edge Computing with IoT Application

  • HASNAIN A. ALMASHHADANI;XIAOHENG DENG;OSAMAH R. AL-HWAIDI;SARMAD T. ABDUL-SAMAD;MOHAMMED M. IBRAHM;SUHAIB N. ABDUL LATIF
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1147-1161
    • /
    • 2023
  • The Internet of Things (IoT) requires a new processing model that will allow scalability in cloud computing while reducing time delay caused by data transmission within a network. Such a model can be achieved by using resources that are closer to the user, i.e., by relying on edge computing (EC). The amount of IoT data also grows with an increase in the number of IoT devices. However, building such a flexible model within a heterogeneous environment is difficult in terms of resources. Moreover, the increasing demand for IoT services necessitates shortening time delay and response time by achieving effective load balancing. IoT devices are expected to generate huge amounts of data within a short amount of time. They will be dynamically deployed, and IoT services will be provided to EC devices or cloud servers to minimize resource costs while meeting the latency and quality of service (QoS) constraints of IoT applications when IoT devices are at the endpoint. EC is an emerging solution to the data processing problem in IoT. In this study, we improve the load balancing process and distribute resources fairly to tasks, which, in turn, will improve QoS in cloud and reduce processing time, and consequently, response time.

A Study on Smart Grid and Cyber Security Strategy (지능형 전력망 도입과 사이버보안 전략)

  • Lee, Sang-Keun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.95-108
    • /
    • 2011
  • Smart Grids are intelligent next generating Electric Power System (EPS) that provide environment-friendliness, high-efficiency, and high-trustworthiness by integrating information and communication technology with electric power technology. Smart grids help to supply power more efficiently and safely than past systems by bilaterally exchanging information between the user and power producer. In addition, it alleviates environmental problems by using renewable energy resources. However, smart grids have many cyber security risks because of the bilateral service, the increase of small and medium-sized energy resources, and the installation of multi-sensors or control devices. These cyber risks can cause critical problems within a national grid through even small errors. Therefore, in order to reduce these risks, it is necessary to establish a cyber security strategy and apply it from the developmental stage to the implementation stage. This thesis analyzes and recommends security strategy in order to resolve the security risks. By applying cyber security strategy to a smart grid, it will provide a stepping-stone to creating a safe and dependable smart grid.

A Preliminary Study of the Application of Prototyping Tools for Design Education Plans; Focusing on Open Source Microcontroller Boards

  • Nam, Wonsuk
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.107-116
    • /
    • 2018
  • In the past, design has been recognized as a means to determine colors, shapes, and functions Recently, however, it has been accepted in a wider sense, namely designing the entire service, including product and user experience design. In this way, in addition to creativity and expressive power that designers have as their main competence, according to the expansion of this design object, designers are required to have comprehensive abilities in related fields and accompanying technical professional abilities. If designing as a technology application as a direction toward this situation, design education can be carried out by approaching technology as a method of expression or design subject. It can also be an effective alternative towards improving the understanding of technology. Meanwhile, many small microcontroller board products with advanced functions and multi-functional specialized programming integrated development environments (IDEs) are becoming widespread due to their open source, low cost, and scalable features. However, students in the design department who lack the basic knowledge of science and engineering have difficulties learning, which requires considerable time and is required for practical use. From this point of view, we have made advancements in the technical understanding of design education by conducting fundamental research to the effectiveness of microcontroller-based prototyping tools as means of expression. We also conducted basic education of microcontroller boards for a certain period of time on students who majored in design in conjunction with the basic survey and investigated the obstacle factors using a questionnaire. Through these surveys, we have confirmed the necessity of designing microcontroller boards of low difficulty, which simplify the coding process that can act as a barrier in difficulty for design students to apply smoothly in design education. In addition, we intend to carry out a basic study on the guideline of microcontroller design for design education and composition of education programs.

A study on the Design of Recipe Sharing Service for Single-Person Households (1인 가구를 위한 레시피 공유 서비스 디자인 연구 -백주부 요리 레시피를 중심으로-)

  • Kim, Han-Jun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.419-425
    • /
    • 2020
  • This study proposes functional services within the cooking recipe sharing application. Many single-person households often eat alone, and eating out. their usual eating habits are not considered well. when living alone, the risk of exposure to mental illnesses increases compared than multi-person households, and if nutrition has unbalanced, it can be easily exposed to diseases. in this study, define these problems and emphasize the importance of maintaining physical and mental health of one-person households, and explored user experience and expectations through cano models, focusing on the Baekjubu fooe recipe is often used by 20-30s. and users can feel the cooking process is not a hassle. and they will have a cooking themselves and even manage their mental health through communication with neighbors.

Smart Jewelry System for Health Management based on IoT (사물인터넷 기반 건강관리 스마트 주얼리 시스템)

  • Kang, Yun-Jeong;Yin, Li;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1494-1502
    • /
    • 2016
  • With the increasing availability of medical sensors and Internet of Things(IoT) devices for personal use, considering the interaction with users, it is planned to add intelligent function design to the fashionable jewelry, and develop composite multi-function intelligent jewelry through sensors identification. By means of IoT technology, while possessing communication function of intelligent jewelry, the function of intelligent jewelry can be expanded to the linkage network. In order to rapidly manage the mass data produced by intelligent jewelry sensors based on IoT, an intelligent jewelry system for health management is designed and an ontology model of intelligent jewelry system based on IoT is worked out. After the state of the services through the smart phone application is shown. The application provides a personalized service to the user and to determine the risk to show the guide lines according to the disease.

A Study on Network Hierarchy Model which uses a Dynamic Segmentation Technique (동적 분할 기법을 이용한 네트워크 계층 모델에 관한 연구)

  • Joo, Yong-Jin;Lee, Yong-Ik;Moon, Kyung-Ky;Park, Soo-Hong
    • Spatial Information Research
    • /
    • v.14 no.2 s.37
    • /
    • pp.245-260
    • /
    • 2006
  • A practical use of the location information and user requirement are increased in a mobile environment which supports the portability. And Various service which GIS is related with a Spatial DB have been processed. Generally, logical relation of a traffic network which organizes the Road DB uses a basic node-link structure. In this way, Designed structure can not be flexible at various model apply and are not efficient with a database retrieval in a maintenance management side. In this research, We supplement with the problem of a existing network model and the limitation of the building through the design of a network model which uses dynamic segmentation. And we tried to implement efficient hierarchy model at the retrieval of the network and presentation. Designed model supports a stage presentation of various level and a hierarchy entity relation and We are expected to supplement a network spatial modelling function which the GIS has.

  • PDF

A Reservation-based HWMP Routing Protocol Design Supporting E2E Bandwidth in TICN Combat Wireless Network (TICN 전투무선망에서의 종단간 대역폭을 보장하는 예약 기반 HWMP 라우팅 프로토콜 설계)

  • Jung, Whoi Jin;Min, Seok Hong;Kim, Bong Gyu;Choi, Hyung Suk;Lee, Jong Sung;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.160-168
    • /
    • 2013
  • In tactical environment, tactical wireless networks are generally comprised of Tactical MANETs(T-MANETs) or Tactical WMNs(T-WMNs). The most important services in tactical network are voice and low rate data such as command control and situation awareness. These data should be forwarded via multi-hop in tactical wireless networks. Urgent and mission-critical data should be protected in this environment, so QoS(Quality of Service) must be guaranteed for specific type of traffic for satisfying the requirement of a user. In IEEE 802.11s, TDMA-based MAC protocol, MCCA(MCF Controlled Channel Access), has a function of resource reservation. But 802.11s protocol can not guarantee the end-to-end QoS, because it only supports reservation with neighbors. In this paper, we propose the routing protocol, R-HWMP(Reservation-based HWMP) which has the resource reservation to support the end-to-end QoS. The proposed protocol can reserve the channel slots and find optimal path in T-WMNs. We analyzed the performance of the proposed protocol and showed that end-to-end QoS is guaranteed using NS-2 simulation.

Mental Healthcare Digital Twin Technology for Risk Prediction and Management (정신건강 위험 예측 및 관리를 위한 멘탈 헬스케어 디지털 트윈 기술 연구)

  • SeMo Yang;KangYoon Lee
    • The Journal of Bigdata
    • /
    • v.7 no.1
    • /
    • pp.29-36
    • /
    • 2022
  • The prevalence of stress and depression among emotional workers is increasing due to the rapid increase in emotional labor and service workers. However, the current mental health management of emotional workers is difficult to consider the emotional response at the time of stress situations, and the existing mental health management is limited because the individual's base state is not reflected. In this study, we present mental healthcare digital twin solution technology, a personalized stress risk management solution. For mental health risk management due to emotional labor, a solution simulation is performed to accurately predict stress risk through synchronization/modeling of dynamic objects in virtual space by extracting individual stress risk factors such as emotional/physical response and environment into various modalities. It provides a mental healthcare digital twin solution for predicting personalized mental health risks that can be configured with modalities and objects tailored to the environment of emotional workers and improved according to user feedback.

Advanced Mandatory Authentication Architecture Designed for Internet Bank (인터넷은행을 위한 개선된 본인확인 구조)

  • Hong, Ki-seok;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1503-1514
    • /
    • 2015
  • Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.

A New Resource Allocation Technique to Mitigate Co-Channel Interference in Cellular OFDMA Systems (OFDMA 시스템에서 셀 외곽지역의 동일 채널간섭 최소화를 위한 자원할당 기법)

  • Kim Dai-Kwan;Kim Jong-Kyung;Seo Jong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6A
    • /
    • pp.603-610
    • /
    • 2006
  • This paper considers the problem of mitigating CCI(Co-channel Interference) in cellular OFDMA downlink systems. The users in the cell-edge area suffer from large CCIs, and their SINR requirements are hard to be maintained. To guarantee their QoS, we propose a new exclusive sub-carrier allocation and power control algorithm. The performance of the proposed two-step algorithm is simulated in SUI-A path-loss model, and it is compared with that of the conventional algorithm. The simulation results show that the data transmission rate in the cell-edge area was increased by 600Kbps within the same power constraint. The results indicate that with proposed algorithm, the data rate stability can be achieved independently of the user location in the cell.