• Title/Summary/Keyword: Broadband Network

Search Result 692, Processing Time 0.024 seconds

A Study on Effectively Building Public Safety Network for Provision of Narrowband and Broadband PPDR Services (협대역 및 광대역 PPDR 서비스 제공을 위한 재난통신망의 효율적인 구축 방안 연구)

  • Park, Seong-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.8
    • /
    • pp.860-872
    • /
    • 2013
  • In this paper, reasonable and effective building strategies of PPDR network is presented through investigating and analysing current policies for PPDR network of Korea and foreign countries. The research result shows that it is necessary PPDR network is designed and implemented considering currently transient status in aspects of PPDR-related technical roadmaps and existing PPDR networks. Also, in the transient period of more than 5 years, mobile broadband- based private PPDR network should be builded and it should be complemented by some commercial networks such as TRS or other mobile broadband networks.

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

  • Choi, Seong-Gon;Kang, Hyun-Joo;Choi, Jun-Kyun
    • ETRI Journal
    • /
    • v.25 no.5
    • /
    • pp.369-378
    • /
    • 2003
  • Using the general switch management protocol on a multi-protocol label switching network, we present an efficient method for handling handovers. The proposed method directly changes an established path into a new path for supporting a handover. Our investigation reveals the effects of the proposed scheme and demonstrates that this method significantly reduces signaling costs and delays.

  • PDF

Visual communications Over Broadband Packet Network (광대역 패킷 망에서의 영상통신)

  • 이상훈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.14 no.5
    • /
    • pp.521-530
    • /
    • 1989
  • Broadband ATM(Asynchronous Transfer Mode) networking techniques based on lightwave technology and high speed integrated circuits appear to be the choice of transport technology for broadband ISDN. Among other problems, the issue of video transport over broadband packet(ATM) networks still requries further investigation. In this paper, the problems of transporting video signals over a broaband packet network are investigated together with possible solutions. In particular, clock recovery packet loss compensation and transport technique based on hierarchical video coding scheme are described in detail. This would allow efficient bandwidth sharing and minimum degradation in video quality.

  • PDF

Analysis of Contributions to Broadband Universal Service of Platform Operator (플랫폼 사업자의 보편적 서비스 기여금 분담 효과 분석)

  • Jung, Choong-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.153-161
    • /
    • 2022
  • This paper analyzes the economic effects when platform provider including CP contributes to broadband universal service and uses broadband bandwidth providing high quality network service. In this model, the contribution rate of broadband universal service is determined by ISP and platform provider sets its price of contents. The main results are as follows. First, the traffic usages is less than social optimum when the market of contents is monopoly. The sum of contribution fee and network usage rate must be less than marginal cost of network operation to get social optimum traffic. Second, the rate set by ISP is equal to social optimum when the market of contents is competitive. Third, when platform provider does not charge contents provided, ISP sets social optimum prices and the network usage rate for contents user is decreasing as advertisement revenue becomes larger. These results suggest that the platform provider should contribute to universal service funding to encourage the network investment of ISP.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

Work chain-based inverse kinematics of robot to imitate human motion with Kinect

  • Zhang, Ming;Chen, Jianxin;Wei, Xin;Zhang, Dezhou
    • ETRI Journal
    • /
    • v.40 no.4
    • /
    • pp.511-521
    • /
    • 2018
  • The ability to realize human-motion imitation using robots is closely related to developments in the field of artificial intelligence. However, it is not easy to imitate human motions entirely owing to the physical differences between the human body and robots. In this paper, we propose a work chain-based inverse kinematics to enable a robot to imitate the human motion of upper limbs in real time. Two work chains are built on each arm to ensure that there is motion similarity, such as the end effector trajectory and the joint-angle configuration. In addition, a two-phase filter is used to remove the interference and noise, together with a self-collision avoidance scheme to maintain the stability of the robot during the imitation. Experimental results verify the effectiveness of our solution on the humanoid robot Nao-H25 in terms of accuracy and real-time performance.

Optimization of Energy Consumption in the Mobile Cloud Systems

  • Su, Pan;Shengping, Wang;Weiwei, Zhou;Shengmei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4044-4062
    • /
    • 2016
  • We investigate the optimization of energy consumption in Mobile Cloud environment in this paper. In order to optimize the energy consumed by the CPUs in mobile devices, we put forward using the asymptotic time complexity (ATC) method to distinguish the computational complexities of the applications when they are executed in mobile devices. We propose a multi-scale scheme to quantize the channel gain and provide an improved dynamic transmission scheduling algorithm when offloading the applications to the cloud center, which has been proved to be helpful for reducing the mobile devices energy consumption. We give the energy estimation methods in both mobile execution model and cloud execution model. The numerical results suggest that energy consumed by the mobile devices can be remarkably saved with our proposed multi-scale scheme. Moreover, the results can be used as a guideline for the mobile devices to choose whether executing the application locally or offloading it to the cloud center.

A Relay Selection and Power Allocation Scheme for Cooperative Wireless Sensor Networks

  • Qian, Mujun;Liu, Chen;Fu, Youhua;Zhu, Weiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1390-1405
    • /
    • 2014
  • This paper investigates optimal relay selection and power allocation under an aggregate power constraint for cooperative wireless sensor networks assisted by amplify-and-forward relay nodes. By considering both transmission power and circuit power consumptions, the received signal-to-noise ratio (SNR) at the destination node is calculated, based on which, a relay selection and power allocation scheme is developed. The core idea is to adaptively adjust the selected relays and their transmission power to maximize the received SNR according to the channel state information. The proposed scheme is derived by recasting the optimization problem into a three-layered problem-determining the number of relays to be activated, selecting the active relays, and performing power allocation among the selected relays. Monte Carlo simulation results demonstrate that the proposed scheme provides a higher received SNR and a lower bit error rate as compared to the average power allocation scheme.

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

Scheduling Algorithms for QoS Provision in Broadband Convergence Network (광대역통합 네트워크에서의 스케쥴링 기법)

  • Jang, Hee-Seon;Cho, Ki-Sung;Shin, Hyun-Chul;Lee, Jang-Hee
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.39-47
    • /
    • 2007
  • The scheduling algorithms to provide quality of service (QoS) in broadband convergence network (BcN) are compared and analysed. The main QoS management methods such as traffic classification, traffic processing in the input queue and weighted queueing are first analysed, and then the major scheduling algorithms of round robin, priority and weighted round robin under recently considering for BcN to supply real time multimedia communications are analysed. The simulation results by NS-2 show that the scheduling algorithm with proper weights for each traffic class outperforms the priority algorithm.

  • PDF