• Title/Summary/Keyword: network gains

Search Result 201, Processing Time 0.025 seconds

Comparative Interactivity Analysis in Multiview Video Coding Schemes

  • Yang, You;Dai, Qionghai;Jiang, Gangyi;Ho, Yo-Sung
    • ETRI Journal
    • /
    • v.32 no.4
    • /
    • pp.566-576
    • /
    • 2010
  • In a multiview video system, interactivity is important for users and should be considered in the design of multiview video coding (MVC). In this paper, we present an interactivity evaluation model for MVC schemes by using both weighted random graph and Markov approaches. The main factors that affect both the interactivity and rate-distortion (RD) performances of MVC schemes are analyzed and discussed in detail. By taking these factors into consideration, a new MVC scheme is proposed for high interactivity and RD gains. Experimental results show that the proposed scheme has a significant interactivity gain with little coding loss, compared to the state-of-the-art benchmark. As an extension to RD performance analysis, the interactivity evaluation model can be used as a design tool of alternative schemes for a future interactive multiview video system.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Fast Cooperative Sensing with Low Overhead in Cognitive Radios

  • Dai, Zeyang;Liu, Jian;Li, Yunji;Long, Keping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.58-73
    • /
    • 2014
  • As is well known, cooperative sensing can significantly improve the sensing accuracy as compared to local sensing in cognitive radio networks (CRNs). However, a large number of cooperative secondary users (SUs) reporting their local detection results to the fusion center (FC) would cause much overhead, such as sensing delay and energy consumption. In this paper, we propose a fast cooperative sensing scheme, called double threshold fusion (DTF), to reduce the sensing overhead while satisfying a given sensing accuracy requirement. In DTF, FC respectively compares the number of successfully received local decisions and that of failed receptions with two different thresholds to make a final decision in each reporting sub-slot during a sensing process, where cooperative SUs sequentially report their local decisions in a selective fashion to reduce the reporting overhead. By jointly considering sequential detection and selective reporting techniques in DTF, the overhead of cooperative sensing can be significantly reduced. Besides, we study the performance optimization problems with different objectives for DTF and develop three optimum fusion rules accordingly. Simulation results reveal that DTF shows evident performance gains over an existing scheme.

Content-Aware D2D Caching for Reducing Visiting Latency in Virtualized Cellular Networks

  • Sun, Guolin;Al-Ward, Hisham;Boateng, Gordon Owusu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.514-535
    • /
    • 2019
  • Information-centric networks operate under the assumption that all network components have built-in caching capabilities. Integrating the caching strategies of information centric networking (ICN) with wireless virtualization improves the gain of virtual infrastructure content caching. In this paper, we propose a framework for software-defined information centric virtualized wireless device-to-device (D2D) networks. Enabling D2D communications in virtualized ICN increases the spectral efficiency due to reuse and proximity gains while the software-defined network (SDN) as a platform also simplifies the computational overhead. In this framework, we propose a joint virtual resource and cache allocation solution for latency-sensitive applications in the next-generation cellular networks. As the formulated problem is NP-hard, we design low-complexity heuristic algorithms which are intuitive and efficient. In our proposed framework, different services can share a pool of infrastructure items. We evaluate our proposed framework and algorithm through extensive simulations. The results demonstrate significant improvements in terms of visiting latency, end user QoE, InP resource utilization and MVNO utility gain.

Power-Efficient DCNN Accelerator Mapping Convolutional Operation with 1-D PE Array (1-D PE 어레이로 컨볼루션 연산을 수행하는 저전력 DCNN 가속기)

  • Lee, Jeonghyeok;Han, Sangwook;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.2
    • /
    • pp.17-26
    • /
    • 2022
  • In this paper, we propose a novel method of performing convolutional operations on a 2-D Processing Element(PE) array. The conventional method [1] of mapping the convolutional operation using the 2-D PE array lacks flexibility and provides low utilization of PEs. However, by mapping a convolutional operation from a 2-D PE array to a 1-D PE array, the proposed method can increase the number and utilization of active PEs. Consequently, the throughput of the proposed Deep Convolutional Neural Network(DCNN) accelerator can be increased significantly. Furthermore, the power consumption for the transmission of weights between PEs can be saved. Based on the simulation results, the performance of the proposed method provides approximately 4.55%, 13.7%, and 2.27% throughput gains for each of the convolutional layers of AlexNet, VGG16, and ResNet50 using the DCNN accelerator with a (weights size) x (output data size) 2-D PE array compared to the conventional method. Additionally the proposed method provides approximately 63.21%, 52.46%, and 39.23% power savings.

The Differential Impacts of 'Communication'and 'Computing' Functions in Smartphones on Individuals' Performance and the Moderating Role of Organizational Roles

  • Kyung Young Lee;Minwoo Lee;Kimin Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.4
    • /
    • pp.191-215
    • /
    • 2017
  • This study investigated the antecedents and the performance impact of two types of Smartphone functions (communication vs. computing functions) in organizational environment and the moderating impact of Smartphone users' organizational roles. More specifically, identifying two distinct types of Smartphone functions such as communication functions and computing functions (including informational, social network, and resource management functions), we investigated the impact of three antecedents (Smartphone dependency, task mobility, and perceived critical mass) on the use of the two Smartphone functions and how organizational workers' perceived performance gains differ by using these two different Smartphone functions for their workplace activities. We tested our hypotheses with survey data collected from 176 organizational workers. Our findings suggest that Smartphone dependency, task mobility and perceived critical mass of Smartphone use are significantly associated with the use of the two different functions, and that the use of computing functions is more strongly associated with perceived performance gain than the use of communication functions. We also found that managerial roles played by individual workers differently moderate the impact of Smartphone use on perceived performance gain. The present findings enable researchers and practitioners to better understand the impact of Smartphone use in workplaces.

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.

Design of a Dual-Mode Planar Antenna Using a Reconfigurable Matching Network (재구성 정합 회로를 이용한 평판형 이중 모드 안테나 설계)

  • Kim, Yoon Geon;Kay, Youngchul;Choo, Hosung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.12
    • /
    • pp.1337-1342
    • /
    • 2012
  • In this paper, we propose a novel reconfigurable antenna that can change the electrical shape of the matching network using RF switches of PIN diodes. The designed antenna operates at two different modes that are Mode 1 (HSDPA band, 2.1~2.2 GHz) and Mode 2(WiBro WiFi band, 2.3~2.5 GHz). The antenna is built on both sides of a polyarcylate substrate. The measured reflection coefficient shows a matching bandwidth of 547 MHz($S_{11}$ <-3 dB, 2.035~2.582 GHz) for Mode 1 and 600 MHz($S_{11}$ <-3 dB, 2.2~2.8 GHz) for Mode 2, and it shows average vertical gains of -4.4 dBi and -4.5 dBi in x-y plane, respectively.

Opportunistic Relay Selection for Joint Decode-and-Forward Based Two-Way Relaying with Network Coding

  • Ji, Xiaodong;Zheng, Baoyu;Zou, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1513-1527
    • /
    • 2011
  • This paper investigates the capacity rate problems for a joint decode-and-forward (JDF) based two-way relaying with network coding. We first characterize the achievable rate region for a conventional three-node network scenario along with the calculation of the corresponding maximal sum-rate. Then, for the goal of maximizing the system sum-rate, opportunistic relay selection is examined for multi-relay networks. As a result, a novel strategy for the implementation of relay selection is proposed, which depends on the instantaneous channel state and allows a single best relay to help the two-way information exchange. The JDF scheme and the scheme using relay selection are analyzed in terms of outage probability, after which the corresponding exact expressions are developed over Rayleigh fading channels. For the purpose of comparison, outage probabilities of the amplify-and-forward (AF) scheme and those of the scheme using relay selection are also derived. Finally, simulation experiments are done and performance comparisons are conducted. The results verify that the proposed strategy is an appropriate method for the implementation of relay selection and can achieve significant performance gains in terms of outage probability regardless of the symmetry or asymmetry of the channels. Compared with the AF scheme and the scheme using relay selection, the conventional JDF scheme and that using relay selection perform well at low signal-to-noise ratios (SNRs).

Calibration Method of Channels' Initial Phase Shift in Active Phased Array Antenna (능동 위상배열 안테나 채널의 초기위상 천이 보정 방법)

  • Mun, Yeong-Chan;Park, Chan-Gu;Pyo, Cheol-Sik;Jeon, Sun-Ik
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.7
    • /
    • pp.18-23
    • /
    • 2000
  • An active phased away antenna consists of many channels including radiator and active circuitary that contains low noise amplifiers and phase shifters. Each channel has different initial phase shift and gain because of inequality in active circuitary itself, interface between radiator and active circuitary, beam forming network and other antenna configurations. This is an inherent problem in active phased away antenna, therefore each channels' initial phase shifts and gains should be calibrated for obtaining the designed radiation pattern and antenna gain. In this paper, an efficient calibration method for the active phased array antenna is presented. By performing the above method, thhe antenna gain is increased more than 2.0 dB after calibrating considerably unequal 12 channels' initial phase shifts and gains.

  • PDF