• Title/Summary/Keyword: users control

Search Result 2,394, Processing Time 0.027 seconds

A Study on the Suggestion of a Lighting Control System Applying General Illumination and Technology of User and Location Awareness (전반조명 기반 사용자 및 위치인식기술 적용 조명제어 시스템 제안 연구)

  • Park, Juil;Lee, Haengwoo;Seo, Janghoo;Kim, Yongseong
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.27 no.10
    • /
    • pp.527-536
    • /
    • 2015
  • Studies for the reduction of lighting energy have been done using technologies such as user and location awareness. However, the focus of current research on location-based lighting control has been on energy reduction, which can lead to other issues including an imbalance in indoor illumination. This study proposes a lighting control system applying general illumination and technology for user and location awareness. The proposed lighting control system reduced lighting energy by 72.1%, 66.5% and 62.3% for 1, 2 and 3 users, respectively, compared to the On/Off lighting control system. This lighting control system causes an increase in lighting energy of 35.8% and 10.9% for 1 and 2 users compared to the lighting control system with user and location awareness, while a reduction of 9.4% was seen for 3 users. This means that the proposed system provides more effective energy reduction for a room with multiple occupants as it is based on the general lighting control scheme. The lighting control system applying general illumination and technology of user and location awareness improved the uniformity factor by 32.0%, 39.4% and 33.4% for 1, 2 and 3 users, respectively.

Power Control for Cognitive Radio Networks: Monotonic Optimization Approach

  • Nguyen, Tran Quang;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.344-347
    • /
    • 2011
  • In this paper, we propose the power control problem for cognitive radio networks (CRNs) that maximizes the total utility of the secondary users (SUs). We use the interference temperature constraints to protect the primary users (PUs). The utility functions of SUs can be any increasing functions. We formulate the power control problem as monotonic optimization that can be solved in centralization to achieve the global optimum.

The Effect of Perceived Information Control on the Knowledge Sharing Intention of the Social Network Service Users (인지된 정보 통제가 소셜 네트워크 이용자의 정보 제공 의도에 미치는 영향)

  • Lee, Un-Kon;Kim, Kyong Kyu;Song, Ho Hyeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.107-127
    • /
    • 2013
  • The evolution of IT facilitated the communication and knowledge sharing between the social network service (SNS) users. When the more information about SNS users had been posted in SNS site, SNS users had sometimes exposed in the risk of privacy invasion. To remedy this problem, we had introduced the information control mechanisms from the prior studies in data management to the SNS area and empirically validated the effect of these mechanisms in this research. Three information control mechanisms had been elected as access control, reference control and diffusion control. We had conducted a survey to the Facebook users which is the most famous SNS site. 459 data had been gathered and analyzed by PLS algorism. As the results, reference control and diffusion control has significantly increased the trust on SNS providers and decrease the privacy concern. This change could significantly affect on the satisfaction with the SNS site and knowledge sharing intention of SNS users. This study could introduce the new perspective about privacy protection issues in SNS area. Also, the information control mechanisms suggested in this study could contribute to make more robust privacy protection mechanisms in SNS site in practice.

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

The VLR Overflow Control Scheme considering Mobility of Mobile Users in Wireless Mobile Networks

  • Oh, Sun-Jin
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.4
    • /
    • pp.601-609
    • /
    • 2003
  • In wireless mobile networks, the service area is partitioned into several registration areas (RAs). Every RA is associated with a mobility database called Visitor Location Register (VLR). The VLR is used to achieve the location management of the mobile terminals. When a mobile terminal enters a new RA, the VLR stores the current location information of the mobile terminal before serving any mobile services. At that time, if the VLR is full, the registration procedure fails, and the system can not deliver services to the mobile user under the existing cellular technology To resolve this problem, we propose a VLR overflow control scheme considering mobility of mobile users to accomodate incoming users during VLR overflow. The performance of the proposed scheme is evaluated by an analytic model in terms of costs for the location search and the location update, and compared with those of the overflow control scheme proposed by Lin[1].

  • PDF

Dynamic Access Control for Personalized Environment in Ubiquitous Computing

  • Kim, Yuna;Shin, IlShik;Hong, Sung Je;Kim, Jong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.4
    • /
    • pp.233-241
    • /
    • 2007
  • In an ubiquitous environment, for controlling user access according to environment of users, a number of access control models enforcing dynamic environment of users have been proposed. However, they do not support personalized environments of each user and have a run-time overhead of searching active roles. In this paper, we propose a new model, PE-RBAC, that extends the RBAC architecture by addition of a personalized environment component as a constraint to accommodate dynamic and mobile users. In this model, a dynamic role activation is presented by using a new role-to-environment structure instead of the conventional role hierarchy, which makes it efficient to find the active roles according to a user's personalized environment.

  • PDF

Power Control of Femto Base Station for Protecting Macrocell Users (매크로셀 사용자 보호를 위한 펨토셀 기지국의 전송전력 제어)

  • Jeong, Dong Geun;Kim, Yu Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.10
    • /
    • pp.865-873
    • /
    • 2013
  • In the cellular networks adopting femtocells, the macrocell users can suffer from severe interference by the femtocells. In this paper, we propose a distributed transmission power control scheme for femtocells to protect macrocell users. With the proposed scheme, when a macrocell user experiences outage due to severe interference, it informs the interfering femtocell base station (BS) of the outage occurrence, via the macrocell BS. Then, the femtocell BS reduces the transmission power to protect the macrocell user. The proposed scheme does not require too much control information among the macrocell BS, the macrocell users, and the femtocell BS. Moreover, the computational complexity in femtocell BS is very low. By using simulation, we show that the performance of the proposed scheme is good enough to use in practice, in spite of its simplicity.

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi;Salman A. AlQahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.178-188
    • /
    • 2024
  • In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

  • Sadikin, Rifki;Park, Young Ho;Park, Kil Houm
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.