• 제목/요약/키워드: Access source

검색결과 471건 처리시간 0.028초

Facilitating Data Source Movement with Time-Division Access in Content-Centric Networking

  • Priyono, Olivica;Kong, In-Yeup;Hwang, Won-Joo
    • 한국멀티미디어학회논문지
    • /
    • 제17권4호
    • /
    • pp.433-440
    • /
    • 2014
  • Wireless communication offers the flexibility to the node movement at the spatial dimension more than the wire communication not only in IP architecture but also in Content-Centric Networking. Although it gives such advantage, the intra-domain movement of a node especially the data source node affects the communication to the access point node which in the end affects the acceptance ratio of the client node that requests the data packets from the data source node. In this paper, we use time-division access method to maintain the acceptance ratio of the client node as the effect of the intra-domain data source node movement in Content-Centric Networking. The simulation result shows that the acceptance ratio of the client node can be maintained using the time-division access method as long as the interval access time is less than the coherence time.

Achievable Rate Analysis for Opportunistic Non-orthogonal Multiple Access-Based Cooperative Relaying Systems

  • Lee, In-Ho;Lee, Howon
    • Journal of Information Processing Systems
    • /
    • 제13권3호
    • /
    • pp.630-642
    • /
    • 2017
  • In this paper, we propose the opportunistic non-orthogonal multiple access (NOMA)-based cooperative relaying system (CRS) with channel state information (CSI) available at the source, where CSI for the source-to-destination and source-to-relay links is used for opportunistic transmission. Using the CSI, for opportunistic transmission, the source instantaneously chooses between the direct transmission and the cooperative NOMA transmission. We provide an asymptotic expression for the average achievable rate of the opportunistic NOMA-based CRS under Rayleigh fading channels. We verify the asymptotic analysis through Monte Carlo simulations, and compare the average achievable rates of the opportunistic NOMA-based CRS and the conventional one for various channel powers and power allocation coefficients used for NOMA.

청소년 건강관련 공개자료 접근 및 활용에 관한 고찰 (Access to and Utilization of the Open Source Data-related to Adolescent Health)

  • 이재은;성정혜;이원재;문인옥
    • 한국학교ㆍ지역보건교육학회지
    • /
    • 제11권1호
    • /
    • pp.67-78
    • /
    • 2010
  • Background & Objectives: Current trend is that funding agencies require investigators to share their data with others. However, there is limited guidance how to access and utilize the shared data. We sought to determine what common data sharing practices in U.S.A. are, what data-related to adolescent health are freely available, and how we deal with the large dataset adopting the complex study design. Methods: The study included only research data-related to adolescent health which was collected in USA and unlimitedly accessible through the internet. Only the raw data, not aggregated, was considered for the study. Major keywords for web search were "adolescent", "children", "health", and "school". Results: Current approaches for public health data sharing lacked of common standards and varied largely due to the data's complex nature, large size, local expertise and internal procedures. Some common data sharing practices are unlimited access, formal screened access, restricted access, and informal exclusive access. The Inter-University Consortium for Political and Social Research and the Center for Disease Control and Prevention were the best data depository. "Data on the net" was search engine for the website providing data freely available. Six datasets related to adolescent health freely available were identified. The importance and methods of incorporating complex research design into analysis was discussed. Conclusion: There have been various attempts to standardize process for open access and open data using the information technology concept. However, it may not be easy for researchers to adapt themselves to this high technology. Therefore, guidance provided by this study may help researchers enhance the accessibility to and the utilization of the open source data.

  • PDF

유니온 파일시스템에 대한 보안 위협 및 대응 방법 (Security Treats about Union File System and Responce Methodology)

  • 한성화
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 추계학술대회
    • /
    • pp.445-446
    • /
    • 2021
  • 유니온 파일 시스템은 다양한 파일과 디렉토리를 통합하여 단일 파일 시스템으로 사용할 수 있는 기술로, 통합에 사용되는 Source File/Directory를 그대로 유지할 수 있는 장점이 있어 컨테이너 플랫폼 등의 많은 어플리케이션에서 사용되고 있다. 유니온 파일 시스템을 사용할 때, 사용자는 Write-able Layer에 접근하며, 여기에는 운영체제에서 제공하는 보안 기술을 적용할 수 있다. 그러나 유니온 파일 시스템 생성에 사용되는 Source File과 Directory에는 별도의 보안 기술을 적용하기 어려운 단점이 있다. 본 연구에서는 유니온 파일 시스템 사용 시 발생될 수 있는 Source File/Directory에 대한 보안 위협을 차단하기 위한 접근통제 메커니즘을 제안하고자 한다. 접근통제 메커니즘의 실효성을 검증하기 위해 실증 구현한 후 기능 테스트를 수행한 결과, 본 연구에서 제안한 접근통제 메커니즘은 유니온 파일 시스템의 장점을 유지하면서 Source File/Directory를 보호할 수 있는 것으로 확인되었다.

  • PDF

대역 액세스 망을 연결하는 파장 공유 노드 기반 WDM 메트로 링의 MAC 프로토콜 성능 평가 (Performance Evaluation of the MAC Protocols for WDM Metro Ring with Wavelength-Shared Nodes Connecting Broadband Access Networks)

  • 소원호
    • 대한전자공학회논문지TC
    • /
    • 제43권1호
    • /
    • pp.111-120
    • /
    • 2006
  • 본 논문에서는 유무선 통합을 위한 광대역 액세스 망의 연결을 지원하는 파장 분할 다중화 (Wavelength Division Multiplexing; WDM) 메트로(metro) 망을 위한 노드 구조를 제안한다. 또한 노드 구조의 기능과 망 요구 사항을 고려한 매체 접근 제어 (Medium Access Control; MAC) 프로토콜을 제안하고 성능을 비교, 평가한다. 광통신 백본 망과 액세스 망사이의 병목현상을 해결하기 위하여 WDM 서브 캐리어 다중화 기술, 광소자 기술 등을 살펴보고 고비용 자원에 해당하는 파장 채널의 공유를 위한 액세스 노드 구조를 제안한다. 또한 제안된 기능 모델을 이용하여 기존 SS (Source-Stripping) MAC 프로토콜을 분석하고 슬롯 재사용성을 높이기 위한 DS+SS (Destination-Stripping and Source-Stripping)와 DS+IS(Destination-Stripping and Intermediate-Stripping) MAC 프로토콜을 제시한다. 제안된 프로토콜은 다른 파장 그룹의 목적지 노드로 슬롯이 전송되는 경우에 목적지에 따라서 슬롯의 제거를 중간 액세스 노드나 근원지 노드에서 수행한다. 따라서 전송된 슬롯의 불필요한 망 순환을 줄임으로써 슬롯 재사용성이 증가한다. 슬롯 재사용성에 의한 대역 효율성과 노드의 최대 처리율을 예측하기 위하여 수치적 분석을 수행하며 네트워크 시뮬레이션을 통하여 처리율 검증과 전송 지연, 전송 공정성 등의 다양한 성능 파라미터를 기존 프로토콜과 비교 평가한다.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권2호
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

p-Persistent MAC Protocol for WDM Ring Networks

  • 소원호;김영천
    • 한국통신학회논문지
    • /
    • 제32권9B호
    • /
    • pp.589-597
    • /
    • 2007
  • In this paper, a WDM metro ring consisting of access nodes with $FT-FR^n$ (Fixed Transmitter - n Fixed Receivers) is considered. A trade-off exists between node throughput and transmission fairness because the access nodes share wavelength channels. In order to eliminate the transmission unfairness and to increase throughput, the p-persistent medium access control (MAC) protocol is proposed: each node uses an empty optical slot to transmit a packet and make it available with the extraction of a transferred packet at the source access node, called source-stripping. The local empty slot can be used to transfer a head-of-line packet in the local buffer with probability p or it is used for the next downstream nodes with 1-p. The proposed MAC protocol provides better node throughput than the non-persistent protocol and exhibits better fairness index than the 1-persistent protocol in WDM ring networks. In addition, numerical analysis shows that the proposed MAC protocol maximizes the node throughput under uniform traffic conditions. For more detailed results, we use the network simulation under Poisson and self-similar traffic. Furthermore, unpredictable traffic constructed by the combination of the former and the latter is also considered. The reasonable probability of the p-persistent protocol for a given architecture can be determined through simulation.

Throughput and Delay Analysis of a Reliable Cooperative MAC Protocol in Ad Hoc Networks

  • Jang, Jaeshin;Kim, Sang Wu;Wie, Sunghong
    • Journal of Communications and Networks
    • /
    • 제14권5호
    • /
    • pp.524-532
    • /
    • 2012
  • In this paper, we present the performance evaluation of the reliable cooperative media access control (RCO-MAC) protocol, which has been proposed in [1] by us in order to enhance system throughput in bad wireless channel environments. The performance of this protocol is evaluated with computer simulation as well as mathematical analysis in this paper. The system throughput, two types of average delays, average channel access delay, and average system delay, which includes the queuing delay in the buffer, are used as performance metrics. In addition, two different traffic models are used for performance evaluation: The saturated traffic model for computing system throughput and average channel access delay, and the exponential data generation model for calculating average system delay. The numerical results show that the RCO-MAC protocol proposed by us provides over 20% more system throughput than the relay distributed coordination function (rDCF) scheme. The numerical results show that the RCO-MAC protocol provides a slightly higher average channel access delay over a greater number of source nodes than the rDCF. This is because a greater number of source nodes provide more opportunities for cooperative request to send (CRTS) frame collisions and because the value of the related retransmission timer is greater in the RCO-MAC protocol than in the rDCF protocol. The numerical results also confirm that the RCO-MAC protocol provides better average system delay over the whole gamut of the number of source nodes than the rDCF protocol.

The COAPI Cats: The Current State of Open Access Repository Movement and Policy Documentations

  • Roy, Bijan K.;Biswas, Subal C.;Mukhopadhyay, Parthasarathi
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제6권1호
    • /
    • pp.69-84
    • /
    • 2016
  • The paper investigates open access (OA) self archiving policies of different Open Access Repositories (OARs) of COAPI (Coalition of Open Access Policy Institutions) founder members as reported in June 2011 (i.e. a total of 22 members against a total of 46 COPAI members as reported by Open Biomed (http://openbiomed.info/2011/08/coapi-cats/). The paper consulted three databases (OpenDOAR, ROAR and ROARMAP) in order to evaluate twenty-two (22) COAPI-members OARs self archiving policy documentations and highlights of some progress on issues so far. After analyzing policy documentations, key findings have been highlighted and common practices have been suggested in line with global recommendations and best practice guidelines at national and international levels for strengthening national research systems. The paper has implications for administrators, funding agencies, policy makers and professional librarians in devising institute specific self archiving policies for their own organization.

소프트웨어 소스코드의 저작권 관리를 위한 보안 컨테이너 크립텍스 모델 (Security Container CRYPTEX Model for Copyright Management of Software Source Code)

  • 차병래
    • 한국항행학회논문지
    • /
    • 제12권5호
    • /
    • pp.451-463
    • /
    • 2008
  • 정보화시대의 직접적으로 중요한 인프라의 조립라인에 해당하는 소프트웨어의 소스코드에 대한 관리 밑 보안측면은 아직도 초보단계에 머물러있으며, 소프트웨어의 소스코드를 보호하기 위한 지원 기술과 프레임워크는 너무나도 빈약한 상태이다. 현실세계의 문서 보안 장치를 사이버 상의 문서 보안 장치로 크립텍스라는 보안 모듈을 제안한다. 본 연구에서 제안하는 크립텍스는 인증되지 않는 주체로부터 객체인 소프트웨어의 소스코드를 안전하게 보호 및 접근제어를 지원하기 위한 제반 기술들의 집합을 통칭하는 모델이다. 크립텍스를 이용하여 단지 수동적인 문서 상태의 소프트웨어 소스코드에 대해서 능동적이며 접근제어 및 보안이 가능하며 이동 및 위임기능을 부여할 수 있는 비즈니스 모델을 제안한다.

  • PDF