• Title/Summary/Keyword: network-selection

Search Result 1,785, Processing Time 0.031 seconds

Packet Delay Budget Aware AMC Selection for 3G LTE of Evolved Packet System (Evolved Packet System의 3G LTE에서 패킷별 지연허용시간을 고려한 AMC 선택 기법)

  • Jun, Kyung-Koo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8A
    • /
    • pp.787-793
    • /
    • 2008
  • 3GPP evolved packet system (EPS) is an all-IP based system that supports various access networks such LTE, HSPA/HSPA+, and non-3GPP networks. Recently, the support of IP flows with packet level QoS profiles was added to the requirements of the EPS. This paper proposes an adaptive modulation and coding (AMC) scheme that supports the QoS of such IP flows in the 3G LTE access network of the EPS. Defining the retransmission as a critical factor for QoS, the proposed scheme applies different maximum packet error probability $P_{max}$ to each packet when selecting the AMC transmission mode. In determining $P_{max}$, the QoS constraints and NACK-to-ACK error as well as channel condition are considered, balancing two objectives: the satisfaction of the QoS and the maximization of spectral efficiency. The simulation results show that it is able to reduce both delay violation and status report by 10%, while improving the throughput 10% in comparison with an existing scheme.

Routing Control Algorithm for SS7 Signaling Traffic with Distributed Message Handling Processors (분산 메시지처리기 구조에서의 공통선 신호 트래픽루팅 제어 기법)

  • Cho, Young-So;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1797-1803
    • /
    • 1997
  • Message handling function of the SS7(Signaling System N0.7) provides signaling traffic routing capabilities to transfer the signaling traffic to the destination nodes in the signaling network. This message handling function should be handled without any transfer delay for real time processing of large amount of signaling traffic for data communication service, and visual information service. In this paper, we suggest two routing algorithms working on the distributed message handling processors which were specially designed for message handling function. The one is an internal distributing algorithm for equal distribution of signaling traffic among the distributed message handling processors and the other is a distributing algorithm for distribution of signaling traffic in the multiple signaling routes. Both of algorithms are using signaling link selection codes labled in each signaling messages. It is shown that the suggested algorithms are very efficient for routing signaling traffic at the fault condition of signaling routes and the restoration of unavailable signaling routes.

  • PDF

(A Centroid-based Backbone Core Tree Generation Algorithm for IP Multicasting) (IP 멀티캐스팅을 위한 센트로이드 기반의 백본코아트리 생성 알고리즘)

  • 서현곤;김기형
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.424-436
    • /
    • 2003
  • In this paper, we propose the Centroid-based Backbone Core Tree(CBCT) generation algorithm for the shared tree-based IP multicasting. The proposed algorithm is based on the Core Based Tree(CBT) protocol. Despite the advantages over the source-based trees in terms of scalability, the CBT protocol still has the following limitations; first, the optimal core router selection is very difficult, and second, the multicast traffic is concentrated near a core router. The Backbone Core Tree(BCT) protocol, as an extension of the CBT protocol has been proposed to overcome these limitations of the CBT Instead of selecting a specific core router for each multicast group, the BCT protocol forms a backbone network of candidate core routers which cooperate with one another to make multicast trees. However, the BCT protocol has not mentioned the way of selecting candidate core routers and how to connect them. The proposed CBCT generation algorithm employs the concepts of the minimum spanning tree and the centroid. For the performance evaluation of the proposed algorithm, we showed the performance comparison results for both of the CBT and CBCT protocols.

Ensemble Classifier with Negatively Correlated Features for Cancer Classification (암 분류를 위한 음의 상관관계 특징을 이용한 앙상블 분류기)

  • 원홍희;조성배
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.12
    • /
    • pp.1124-1134
    • /
    • 2003
  • The development of microarray technology has supplied a large volume of data to many fields. In particular, it has been applied to prediction and diagnosis of cancer, so that it expectedly helps us to exactly predict and diagnose cancer. It is essential to efficiently analyze DNA microarray data because the amount of DNA microarray data is usually very large. Since accurate classification of cancer is very important issue for treatment of cancer, it is desirable to make a decision by combining the results of various expert classifiers rather than by depending on the result of only one classifier. Generally combining classifiers gives high performance and high confidence. In spite of many advantages of ensemble classifiers, ensemble with mutually error-correlated classifiers has a limit in the performance. In this paper, we propose the ensemble of neural network classifiers learned from negatively correlated features using three benchmark datasets to precisely classify cancer, and systematically evaluate the performances of the proposed method. Experimental results show that the ensemble classifier with negatively correlated features produces the best recognition rate on the three benchmark datasets.

Improvement of OLSR Through MIMC's Decreased Overhead in MANET (모바일 애드 혹 네트워크 환경 하에서 멀티인터페이스 멀티채널의 오버헤드 감소를 통한 OLSR의 성능 개선)

  • Jang, Jae-young;Kim, Jung-ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.3
    • /
    • pp.55-70
    • /
    • 2016
  • The most critical research issue in MANET environment is on supporting reliable communication between various devices. Various Multi-Hop Routing Protocol studies have proceeded. However, some problems you might have found when you use the existing link state routing technique are that it increases Control Message Overhead and it is unstable when node moves in CR circumstance which has transformation of using channel and MIMC circumstance which uses a number of interfaces. This essay offers a technique which is based on On-Demand Hello and the other technique which used Broadcast Interface of optimization as a solution to decrease Control Message Overhead. Also it proposes Quick Route Restoration technique which is utilized by GPS and MPR Selection technique which consider mobility as a solution of stable communication when node moves. Those offered Routing Protocol and OPNET based simulator result will be expected to be an excellent comparison in related research fields.

A Study on Sustainable Outdoor Space of Regional Public Hospitals (지역거점공공병원의 지속가능한 외부공간에 대한 연구)

  • Yoon, Eunji;Lim, Yeonghwan
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.23 no.4
    • /
    • pp.17-25
    • /
    • 2017
  • Purpose: Since hospitals have a big impact on the natural and social environment, hospitals' sustainability must be considered in various aspects including environmental, social, and economical aspects. So far, research on sustainable hospitals has mainly been conducted on indoor environment, but outdoor space of hospital is as important as well. The purpose of this research is to study the sustainability of hospital outdoor space and to make proposals for improving sustainable regional public hospitals. Methods: Through preceding research analysis and literature review, the concept of sustainable outdoor space of hospital was defined. Also, the evaluation contents of outdoor space were extracted from domestic and foreign green building certification criteria. With this analytic frame, we visited 4 regional public hospitals in Korea, interviewed the facility managers, and analyzed sustainability of hospital outdoor space. Results: Analysis of 4 regional public hospitals reveals that there is a lack of consideration for sustainability in all 4 categories; urban and network, natural environment, community, and user. In terms of community, sustainability has rarely been applied to all four hospitals. The site selection and terrain of the site were essential to sustainability. Implications: Establishing a master plan considering future expansion is critical. Also more attempt to show regional characteristics is needed. It is necessary to design a comprehensive outdoor space that considers sustainability and also healing environment. Level difference in the site can be used as a design element.

The design and implementation of user interface based on contents rating service for blocking harmful Internet information (유해 인터넷 정보 차단을 위한 내용 등급 서비스 기반 사용자 인터페이스 설계 및 구현)

  • 이재선;전용희;장정숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.957-964
    • /
    • 2003
  • The circulation of unwholesome information such as obscene and violent information is gradually increasing based on the rapid expansion of information communications infrastructure. Those kinds of information are harmful to the adolescents and even cause social problems so that active countermeasure is requited. In order to cope with the spread of unwholesome information, appropriate regulating methods are absolutely in need by establishing or revising information communications-related laws. In this paper, we had analyzed domestic and foreign programs with existing harmful information blocking method, and then designed and implemented a selective blocking program based on Platform for Internet Contents Selection(PICS) by using selective blocking technology based on Internet contents rating system. We also proposed a compromised rating system blocking method that consists of selective filtering function by age and the popular blocking list. The proposed system has advantages in that there would be no increase in network load resulting from blocking list update and inquiry, it is possible to perform active selective filtering considering user's age, and it may introduce self-imposed rating.

Fast Self-Similar Network Traffic Generation Based on FGN and Daubechies Wavelets (FGN과 Daubechies Wavelets을 이용한 빠른 Self-Similar 네트워크 Traffic의 생성)

  • Jeong, Hae-Duck;Lee, Jong-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.621-632
    • /
    • 2004
  • Recent measurement studies of real teletraffic data in modern telecommunication networks have shown that self-similar (or fractal) processes may provide better models of teletraffic in modern telecommunication networks than Poisson processes. If this is not taken into account, it can lead to inaccurate conclusions about performance of telecommunication networks. Thus, an important requirement for conducting simulation studies of telecommunication networks is the ability to generate long synthetic stochastic self-similar sequences. A new generator of pseu-do-random self-similar sequences, based on the fractional Gaussian nois and a wavelet transform, is proposed and analysed in this paper. Specifically, this generator uses Daubechies wavelets. The motivation behind this selection of wavelets is that Daubechies wavelets lead to more accurate results by better matching the self-similar structure of long range dependent processes, than other types of wavelets. The statistical accuracy and time required to produce sequences of a given (long) length are experimentally studied. This generator shows a high level of accuracy of the output data (in the sense of the Hurst parameter) and is fast. Its theoretical algorithmic complexity is 0(n).

A Study on Motivation and Utilization of SNS for High School Students in Korea

  • Moon, Jae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.271-276
    • /
    • 2019
  • The purpose of this study is to examine how social motivation, functional motivation, playful motivation, and psychological motivation affect SNS user satisfaction in order to find out what factors are important to Korean high school students in using SNS. As a result, playful motives, functional motives, and psychological motives except social motives have an effect on SNS user satisfaction, and this satisfaction has a positive effect on students' value formation. These results suggest that the reason why Korean high school students use SNS is that they need it and enjoy it, that is, they use SNS from a personal point of view, and are not related to social phenomena. However, social motives were found to have a positive effect on functional and playful motives. In other words, various social phenomena, which are social motives, provide an opportunity and theme for the use of SNS, and functional motives have positive effects on playful and psychological motives. In other words, the various functions provided by SNS have a positive effect on the selection and use of SNS.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.