• Title/Summary/Keyword: network base control

Search Result 355, Processing Time 0.03 seconds

Mobile Edge Computing based Charging Infrastructure considering Electric Vehicle Charging Efficiency (전기자동차 충전 효율성을 고려한 모바일 에지 컴퓨팅 기반 충전 인프라 구조)

  • Lee, Juyong;Lee, Jihoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.669-674
    • /
    • 2017
  • Due to the depletion of fossil fuels and the increase in environmental pollution, electric vehicles are attracting attention as next-generation transportation and are becoming popular all over the world. As the interest in electric vehicles and the penetration rate increase, studies on the charging infrastructure with vehicle-to-grid (V2G) technology and information technology are actively under way. In particular, communication with the grid network is the most important factor for stable charging and load management of electric vehicles. However, with the existing centralized infrastructure, there are problems when control-message requests increase and the charging infrastructure cannot efficiently operate due to slow response speed. In this paper, we propose a new charging infrastructure using mobile edge computing (MEC) that mitigates congestion and provides low latency by applying distributed cloud computing technology to wireless base stations. Through a performance evaluation, we confirm that the proposed charging infrastructure (with low latency) can cope with peak conditions more efficiently than the existing charging infrastructure.

Projection Facade and Game System for Multi-Audience Participation using Smart Devices (스마트 기기를 활용한 다중 관람자 참여형 프로젝션 파사드 및 게임 시스템)

  • Jang, Seungeun;Tang, Jiamei;Kim, Sangwook
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.7
    • /
    • pp.1-8
    • /
    • 2013
  • As yet the use of 3D projection mapping facade has been limited to advertising and performance in the outside. And interactive elements are lacking. In this paper, propose a interaction system which control of projection mapping facade for multi-audience participation using smart devices. The system can be interaction for the multi-façade. And single or multiple can participate in the game. A user test based on the result confirmed an effectiveness of the proposed method. This research showed a practical method in which interaction of projection facade system can be used to user devices. The results of this study can be used as a base module for projection facade interaction system. In addition, It can be utilized for converged content development such as performances, games, education and various applications services.

A Study on the Prediction of the Nonlinear Chaotic Time Series Using Genetic Algorithm based Fuzzy Neural Network (유전 알고리즘을 이용한 퍼지신경망의 시계열 예측에 관한 연구)

  • Park, In-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.91-97
    • /
    • 2011
  • In this paper we present an approach to the structure identification based on genetic algorithm and to the parameter identification by hybrid learning method in neuro-fuzzy-genetic hybrid system in order to predicate the Mackey-Glass Chaotic time series. In this scheme the basic idea consists of two steps. One is the construction of a fuzzy rule base for the partitioned input space via genetic algorithm, the other is the corresponding parameters of the fuzzy control rules adapted by the backpropagation algorithm. In an attempt to test the performance the proposed system, three patterns, x(t-3), x(t-6) and x(t-9), was prepared according to time interval. It was through lots of simulation proved that the initial small error of learning owed to the good structural identification via genetic algorithm. The performance was showed in Table 2.

User Scheduling Algorithm for Cell Capacity Maximization in Full Duplexing Wireless Cellular Networks (전이중 무선 셀룰라 네트워크에서 셀 용량 최대화를 위한 사용자 스케쥴링 방식)

  • Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2613-2620
    • /
    • 2014
  • In this paper, we consider a full duplexing (FD) wireless cellular network where a central base station (BS) works in the FD mode while the downlink (DL) and uplink (UL) users work in the time division duplexing (TDD) mode. Since this FD system induces the inter-user interference from UL user to DL user, the main challenge for maximizing the system performances is user scheduling that makes a pair of DL user and UL user to use the same radio resource simultaneously. We formulate an optimization problem for user pairing to maximize the cell capacity and propose a suboptimal user scheduling algorithm with low complexity. This scheduling algorithm is designed in a way where the DL user with a better signal quality has a higher priority to choose its UL user that causes less interference. Simulation results show that the FD system using the proposed user scheduling algorithm achieves the optimal performance and significantly outperforms the conventional TDD system in terms of the cell capacity.

MAC Protocol based on Resource Status-Sensing Scheme for Integrated Voice/Data Services (음성/데이타 통합 서비스를 위한 자원 상태 감지 기법 기반 MAC프로토콜)

  • Lim, In-Taek
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.141-155
    • /
    • 2002
  • A medium access control protocol is proposed for integrated voice and data services in the packet CDMA network with a small coverage. Uplink channels are composed of time slots and multiple spreading codes for each slot. This protocol gives higher access priority to the delay-sensitive voice traffic than to the data traffic. During a talkspurt, voice terminals reserve a spreading code to transmit multiple voice packets. On the other hand, whenever generating a data packet, data terminals transmit a packet based on the status information of spreading codes in the current slot, which is received from base station. In this protocol, voice packet does not come into collision with data packet. Therefore, this protocol can increase the maximum number of voice terminals.

Agent based Multicast Handoff Mechanism for All-IP Wireless Network (All-IP 무선망을 위한 에이전트 기반의 멀티캐스트 랜드오프 메커니즘)

  • Kim, Byung-Soon;Han, Ki-Jun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.197-203
    • /
    • 2002
  • This paper proposes a new agent based mechanism called a Multicast Handoff Agent (MHA) to reduce handoff latency for IP multicast. The MHA acts as a proxy for an Internet Group Management Protocol (IGMP) of Mobile Nodes (MNs) at each Base Station (BS) and keeps information for members of multicast groups in a cell. When an MN moves to a next cell, the MHA immediately sends unsolicited reports without waiting for the IGMP query. The mechanism was evaluated through simulation and analysis and compared with the IGMPv2 for micro-mobility and the IGMP traffic. Simulation results show that handoff latency for micro-mobility can be largely reduced and the IGMP control traffic on the wireless links during the duration of membership can be eliminated. Thus, this mechanism is superior to the existing mechanism in both micro-mobility and battery duration, as the need not to reply to a query conserves battery power.

Injectable hydrogels delivering therapeutic agents for disease treatment and tissue engineering

  • Lee, Jin Hyun
    • Biomaterials Research
    • /
    • v.22 no.4
    • /
    • pp.235-248
    • /
    • 2018
  • Background: Injectable hydrogels have been extensively researched for the use as scaffolds or as carriers of therapeutic agents such as drugs, cells, proteins, and bioactive molecules in the treatment of diseases and cancers and the repair and regeneration of tissues. It is because they have the injectability with minimal invasiveness and usability for irregularly shaped sites, in addition to typical advantages of conventional hydrogels such as biocompatibility, permeability to oxygen and nutrient, properties similar to the characteristics of the native extracellular matrix, and porous structure allowing therapeutic agents to be loaded. Main body: In this article, recent studies of injectable hydrogel systems applicable for therapeutic agent delivery, disease/cancer therapy, and tissue engineering have reviewed in terms of the various factors physically and chemically contributing to sol-gel transition via which gels have been formed. The various factors are as follows: several different non-covalent interactions resulting in physical crosslinking (the electrostatic interactions (e.g., the ionic and hydrogen bonds), hydrophobic interactions, ${\pi}$-interactions, and van der Waals forces), in-situ chemical reactions inducing chemical crosslinking (the Diels Alder click reactions, Michael reactions, Schiff base reactions, or enzyme-or photo-mediated reactions), and external stimuli (temperatures, pHs, lights, electric/magnetic fields, ultrasounds, or biomolecular species (e.g., enzyme)). Finally, their applications with accompanying therapeutic agents and notable properties used were reviewed as well. Conclusion: Injectable hydrogels, of which network morphology and properties could be tuned, have shown to control the load and release of therapeutic agents, consequently producing significant therapeutic efficacy. Accordingly, they are believed to be successful and promising biomaterials as scaffolds and carriers of therapeutic agents for disease and cancer therapy and tissue engineering.

Analysis of Defense Method for HTTP POST DDoS Attack base on Content-Length Control (Content-Length 통제기반 HTTP POST DDoS 공격 대응 방법 분석)

  • Lee, Dae-Seob;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.809-817
    • /
    • 2012
  • One of the OSI 7 Layer DDoS Attack, HTTP POST DDoS can deny legitimate service by web server resource depletion. This Attack can be executed with less network traffic and legitimate TCP connections. Therefore, It is difficult to distinguish DDoS traffic from legitimate users. In this paper, I propose an anomaly HTTP POST traffic detection algorithm and http each page Content-Length field size limit with defense method for HTTP POST DDoS attack. Proposed method showed the result of detection and countermeasure without false negative and positive to use the r-u-dead-yet of HTTP POST DDoS attack tool and the self-developed attack tool.

A Study on the National Cryptographic Policy : About the Right to Access the Cryptographic (국가 암호정책에 대한 연구 : 암호접근권한을 중심으로)

  • Kim, Dong-hoon;Kwon, Hun-yeong;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.99-109
    • /
    • 2021
  • With the recent development of ICT, information exchange through data communication network is increasing. Cryptography is widely used as the base technology to protect it. The initial cryptography technology was developed for military use and authorized only by the nation in the past. However, nowadays, much of the authority was unwillingly transferred to the private due to the pervasive use of ICT. As a result, there have been conflicts between the private demand to use cryptography and the nation's authority. In this paper, we survey the conflicts between nations and the private in the process of formulating the cryptography policy. Morever, we investigate the reality of the cryptography policy in Korea. Our investigations are expected to help the government apply cryptographic control policy in a balanced manner and plan development of cryptography industries. Lastly, we propose a need to establish a cryptanalysis organization and to legislate a legal sanction against fraudulent use of cryptography.

Accuracy Analysis of Cadastral Control Points Surveying using VRS case by Jinju city parts (가상기지국을 활용한 지적기준점 관측 정확도 분석 -진주시 일원을 중심으로-)

  • Choi, Hyun;Kim, Kyu Cheol
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.4
    • /
    • pp.413-422
    • /
    • 2012
  • After development of GPS in the 1960's, the United States released SA(Selective Availability) in 2000 and then the GPS has become commercialized to the present. The result of repeatedly developed GPS observation, the GPS real-time observation methods is RTK which basically always needs two base stations and has a fault of the accuracy decreasing as the distance between a mobile station and a receiver is increasing. Because of these weakness, VRS method has come out. VRS(Virtual Reference Station) generates the imaginary point near mobile station from several observatory datum of GPS, sets the accurate location of mobile station, thus shows high reliability and mobility. Now, the cadastral datum point is used with azimuth, repetition, and graphical traversing method for traverse network. The result of measurement indicates many problems because of different accomplishment interval given point, restrictions on the length of the conductor, many errors on the observations. So, this study did comparative analysis of the cadastral datum points through VRS method by Continuously Operating Reference Station. Through the above comparative analysis, The comparative result between surveyed result with repetition method through total station observed Cadastral Control Points and surveyed result with VRS-RTK has shown that average error of x-axis is -0.08m, average error of y-axis, +0.07m and average distance error is +0.11m.