• Title/Summary/Keyword: Distributed Communication Model

Search Result 435, Processing Time 0.032 seconds

Transform domain Wyner-Ziv Coding based on the frequency-adaptive channel noise modeling (주파수 적응 채널 잡음 모델링에 기반한 변환영역 Wyner-Ziv 부호화 방법)

  • Kim, Byung-Hee;Ko, Bong-Hyuck;Jeon, Byeung-Woo
    • Journal of Broadcast Engineering
    • /
    • v.14 no.2
    • /
    • pp.144-153
    • /
    • 2009
  • Recently, as the necessity of a light-weighted video encoding technique has been rising for applications such as UCC(User Created Contents) or Multiview Video, Distributed Video Coding(DVC) where a decoder, not an encoder, performs the motion estimation/compensation taking most of computational complexity has been vigorously investigated. Wyner-Ziv coding reconstructs an image by eliminating the noise on side information which is decoder-side prediction of original image using channel code. Generally the side information of Wyner-Ziv coding is generated by using frame interpolation between key frames. The channel code such as Turbo code or LDPC code which shows a performance close to the Shannon's limit is employed. The noise model of Wyner-Ziv coding for channel decoding is called Virtual Channel Noise and is generally modeled by Laplacian or Gaussian distribution. In this paper, we propose a Wyner-Ziv coding method based on the frequency-adaptive channel noise modeling in transform domain. The experimental results with various sequences prove that the proposed method makes the channel noise model more accurate compared to the conventional scheme, resulting in improvement of the rate-distortion performance by up to 0.52dB.

A Load Balancing and Security Scheme of Mobile Agents based on the mobile Trust Model (신뢰모델을 기반으로 한 이동 에이전트의 로드밸런싱과 에이전트 보호 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2337-2344
    • /
    • 2013
  • Mobile Agent is an autonomous mobility technology is being applied in various fields. In particular, mobile agents execution in the Internet environment through the safe execution of the security must be guaranteed. Also, agent to run the agent, the agent's workload should be distributed. In this paper, a trust model based on the security mechanism of the agent execution is proposed. Proposed mechanism to ensure safe execution of the agent was not considered in existing relative researches for rational agent workload distribution and load balancing to improve throughput was. The proposed trust-based security mechanisms for agents to go through security analysis proved safe execution of the agent.

Network Costing Model Alternatives for Reasonable Interconnection Charging Between Networks (합리적 접속료산정을 위한 통신망비용모형 수립방안)

  • 권수천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.5
    • /
    • pp.907-917
    • /
    • 2000
  • In this paper the network costing model alternatives for reasonable interconnection charging are suggested. The current interconnection charge regimes is based on fully distributed costing method. Basically this method doesn't consider the common carrier's efficient network cost because it reflects the actual cost of network In this paper, 1 suggest the basic structure of the network costing model fur applications of incremental costing method that considers the efficient cost based on economics-prospective. And I classify network cost with capital cost and operating cost and analysis their reasonable costing methods.

  • PDF

Factors Influencing Customers to Use Digital Banking Application in Yogyakarta, Indonesia

  • MUFARIH, Muhammad;JAYADI, Riyanto;SUGANDI, Yovin
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.897-907
    • /
    • 2020
  • The development of information technology and the demands of society on an application in an operating system, as well as increasing the specifications and sophistication of smartphones, require banks to make changes to their mobile banking applications. The transformation of the mobile banking application into a digital banking application conducted by banks has made users re-evaluate based on their preferences. This study presents the behavior of users of digital banking applications in Yogyakarta, Indonesia. The hypothesis model is based on Technology Acceptance Model (TAM) with additional factors of the social image, perceived risk and perceived trust adopted from Muñoz-Leiva et al. (2017). The methodology in this study includes data collection through questionnaires distributed online and data analysis using the Structural Equation Model. The results of this study illustrate that the perceived trust and perceived risk have a more dominant part in influencing user attitude and user intention to use digital banking. Meanwhile, social image, perceived ease-of-use and perceived usefulness are not significant in influencing user attitude and user intention to use digital banking. The implication of this research helps to determine the right communication and strategy so that more users with more benefits can utilize this digital banking application.

Identification Systems of Fake News Contents on Artificial Intelligence & Bigdata

  • KANG, Jangmook;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.122-130
    • /
    • 2021
  • This study is about an Artificial Intelligence-based fake news identification system and its methods to determine the authenticity of content distributed over the Internet. Among the news we encounter is news that an individual or organization intentionally writes something that is not true to achieve a particular purpose, so-called fake news. In this study, we intend to design a system that uses Artificial Intelligence techniques to identify fake content that exists within the news. The proposed identification model will propose a method of extracting multiple unit factors from the target content. Through this, attempts will be made to classify unit factors into different types. In addition, the design of the preprocessing process will be carried out to parse only the necessary information by analyzing the unit factor. Based on these results, we will design the part where the unit fact is analyzed using the deep learning prediction model as a predetermined unit. The model will also include a design for a database that determines the degree of fake news in the target content and stores the information in the identified unit factor through the analyzed unit factor.

Analysis of Checkpointing Model with Instantaneous Error Detection (즉각적 오류 감지가 가능한 경우의 체크포인팅 모형 분석)

  • Lee, Yutae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.170-175
    • /
    • 2022
  • Reactive failure management techniques are required to mitigate the impact of errors in high performance computing. Checkpoint is the standard recovery technique for coping with errors. An application employing checkpoints periodically saves its state, so that when an error occurs while some task is executing, the application is rolled back to its last checkpointed task and resumes execution from that task onward. In this paper, assuming the time-to-errors are independent each other and generally distributed, we analyze the checkpointing model with instantaneous error detection. The conventional assumption that two or more errors do not take place between two consecutive checkpoints is removed. Given the checkpointing time, down-time, and recovery time, we derive the reliability of the checkpointing model. When the time-to-error follows an exponential distribution, we obtain the optimal checkpointing interval to achieve the maximum reliability.

MODEL-BASED LIFE CYCLE COST AND ASSESSMENT TOOL FOR SUSTAINABLE BUILDING DESIGN DECISION

  • Iris X. Han;W. Zhou;Llewellyn C.M. Tang
    • International conference on construction engineering and project management
    • /
    • 2011.02a
    • /
    • pp.311-317
    • /
    • 2011
  • There is a growing concern in reducing greenhouse gas emissions all over the world. The U.K. has set 34% target reduction of emission before 2020 and 80% before 2050 compared to 1990 recently in Post Copenhagen Report on Climate Change. In practise, Life Cycle Cost (LCC) and Life Cycle Assessment (LCA) tools have been introduced to construction industry in order to achieve this such as. However, there is clear a disconnection between costs and environmental impacts over the life cycle of a built asset when using these two tools. Besides, the changes in Information and Communication Technologies (ICTs) lead to a change in the way information is represented, in particular, information is being fed more easily and distributed more quickly to different stakeholders by the use of tool such as the Building Information Modelling (BIM), with little consideration on incorporating LCC and LCA and their maximised usage within the BIM environment. The aim of this paper is to propose the development of a model-based LCC and LCA tool in order to provide sustainable building design decisions for clients, architects and quantity surveyors, by then an optimal investment decision can be made by studying the trade-off between costs and environmental impacts. An application framework is also proposed finally as the future work that shows how the proposed model can be incorporated into the BIM environment in practise.

  • PDF

A Study on the Linkage and integration of UCI (Universal Content Identifier) between ICN (Integrated Copyright Number) (디지털콘텐츠 식별체계 UCI (Universal Content Identifier)와 통합저작권 관리번호 ICN (Integrated Copyright Number)간의 연계와 통합에 관한 연구)

  • Kim, Yoon-Ho;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.27-33
    • /
    • 2014
  • As UCI (Universal Content Identifier) identification system becomes a national standard for content distribution, many digital contents are distributed through UCI identification system. However, problems associated with copyright infringement and copyright contracts occur due to lack of copyright information. ICN (Integrated Copyright Number), a code system developed for copyright management, includes copyright-related information for the purposes of usage settlement and accounting, illegal usage monitoring, and content filtering. ICN, however, has no information about distribution and content properties. Therefore, the linkage and integration between UCI and ICN can be a basis for the transparent and effective distribution of digital contents. In this paper, we propose a model for linking and integrating UCI and ICN, developing the efficiency in the value chain of each identified system by analyzing political factors and key technical elements between the two identification systems.

A Performance Analysis of the Virtual CellSystem for Mobile Hosts (이동 호스트를 위한 가상 셀 시스템의 성능 분석)

  • Lim, Kyung-Shik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.10
    • /
    • pp.2627-2640
    • /
    • 1998
  • In this paper, we analyze the performance of the virtual cell system[1] for the transmission of IP datagrams in mobile computer communications. A virtual cell consistsof a group of physical cells shose base stationsl are implemented b recote bridges and interconnected via high speed datagram packet switched networks. Host mobility is supported at the data link layer using the distributed hierachical location information of mobile hosts. Given mobility and communication ptems among physical cells, the problem of deploying virtual cells is equivalent to the optimization cost for the entire system where interclster communication is more expesive than intracluster communication[2]. Once an iptimal partitionof disjoint clusters is obtained, we deploy the virtual cell system according to the topology of the optimal partition such that each virtual cell correspods to a cluser. To analyze the performance of the virtual cell system, we adopt a BCMP open multipel class queueing network model. In addition to mobility and communication patterns, among physical cells, the topology of the virtual cell system is used to determine service transition probabilities of the queueing network model. With various system parameters, we conduct interesting sensitivity analyses to determine network design tradeoffs. The first application of the proposed model is to determine an adequate network bandwidth for base station networking such that the networks would not become an bottleneck. We also evaluate the network vlilization and system response time due to various types of messages. For instance, when the mobile hosts begin moving fast, the migration rate will be increased. This results of the performance analysis provide a good evidence in demonsratc the sysem effciency under different assumptions of mobility and communication patterns.

  • PDF

Variable Backoff Stage(VBS) Algorithm to Reduce Collisions in IEEE 802.11 DCF (IEEE 802.11 DCF 에서의 충돌 감소를 위한 가변 백오프 스테이지(VBS) 알고리즘)

  • Kang, Seongho;Choo, Young-yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1333-1340
    • /
    • 2015
  • IEEE 802.11 MAC(Media Access Control) defines DCF(Distributed Coordination Function) for data transmission control. BEB(Binary Exponential Backoff) algorithm of DCF has a problem that if the number of stations connected are over a certain threshold, it degrades network performance because of packet collisions caused from the minimum contention window size. To cope with this problem, we proposed a novel algorithm, named as VBS(Variable Backoff Stage) algorithm, which adjusts the rate of backoff stage increment depending on the number of stations associated with an AP(Access Point). Analytic model of proposed algorithm was derived and simulations on the BEB and the VBS algorithms have been conducted on the OFDM (Orthogonal Frequency Division Multiplexing) method. Simulation results showed that when the rate of backoff state increment was 5 and 10, the number of retransmission were reduced to 1/5 and 1/10 comparing to that of BEB, respectively. Our algorithm showed improvement of 19% and 18% in network utilization, respectively. Packet delay was reduced into 1/12.