• Title/Summary/Keyword: Hybrid Service

Search Result 577, Processing Time 0.033 seconds

Priority Collision Resolution Algorithm on HFC Networks (우선 순위를 고려한 HFC 망의 충돌 해소 알고리즘)

  • 김변곤;박준성;정경택;전병실
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1252-1260
    • /
    • 1999
  • The HFC network has a architecture of a star topology in fiber optic trunks, and tree and branch topology is used in the part of coaxial cable. It is well known that the HFC upstream channel is noisy. Ingress, common mode distortion and impulse noise exist in the upstream channel. In order to provide Quality of Service(QoS) to users with real-time data such as voice, video and interactive services, the evolving IEEE 802.14 standard for HFC networks must include an effective priority scheme. The scheme separates and resolves collisions between stations in a priority order. It is important to simulate protocols under a practical environment. The proposed algorithm in this paper is simulated with the assumption that the collision detector made certain mistake due to noises. Simulation results show that the proposed algorithm is more efficient than existing tree-based algorithm under practical environment.

  • PDF

A reach of the domestic production broadcasting equipment actual condition of usage investigation and trend through the broadcasting system tree analysis (방송시스템 트리분석을 통한 국산 방송장비 활용실태 조사와 동향 연구)

  • Seo, In-Ho;Choi, Seong-Jin;Park, Seung-Kyu
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.87-94
    • /
    • 2017
  • The broadcast service environment is changed to the complicated equipment configuration of the server and network-based for the advanced technology application and various service providings. The broadcasting market is growing rapidly by the development of broadcasting environment. But as to the domestic production broadcasting equipment industry, the satisfaction of request of the consumer and market competitive power is showing the limit due to the development of the single focused on goods and sale. This research gathered the opinion of the broadcasting technology experts and investigated the reality of usage of the domestic device in the broadcasting system. And according to the investigation result we discovers the hybrid system model that synergy can come out in which the domestic device more than 2 combines out and there is the purpose.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

Status and Trends of Mobile Services Via Smartphone in University Libraries (대학도서관의 스마트폰 기반 모바일 서비스 현황 분석 연구)

  • Kim, Sungjin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.4
    • /
    • pp.71-91
    • /
    • 2012
  • As the smartphone market has expanded and university students in their twenties account for the largest portion of the market, university libraries need to provide mobile library services to keep up with students' growing demand in mobile services. The purpose of this study is to analyze the status and trends of mobile services in Korean university libraries. This study investigated mobile services of 434 university libraries in Korea and 114 ones which are members of ARL during the months of September and November in 2012. As a result, this study found that university libraries in Korea were offering 55 mobile Web and 29 mobile application services with 11.2 and 10.7 contents respectively. In addition, on the basis of the identified current problems, this study suggested further steps for developing and improving mobile services in Korean university libraries.

A Design and Development of Secure-Coding Check System Based on E-Government Standard Framework for Convergence E-Government Service (융복합 전자정부 서비스를 위한 전자정부 표준프레임워크 기반 시큐어코딩 점검 시스템 설계 및 개발)

  • Kim, Hyungjoo;Kang, Jungho;Kim, Kyounghun;Lee, Jaeseung;Jun, Moonseog
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.201-208
    • /
    • 2015
  • Recently computer, smart phone, medical devices, etc has become used in a variety of environments as the application fields of IT products have become diversification. Attack case of abuse of software security vulnerabilities is on the increase as the application fields of software have become diversification. Accordingly, secure coding program is of a varied but history management, updating, API module to be vulnerable to attack. Thus, this paper proposed a materialization of CMS linked system to enable check the vulnerability of the source code to content unit for secure software development, configuration management system that interwork on the transmission module. Implemented an efficient coding system secure way that departmentalized by the function of the program and by analyzing and applying secure coding standards.

Application of Performance Indicators for Digital Library Services Focusing on the Analysis of ISO/DIS 11620 : 2007 (디지털도서관 서비스의 성과지표 측정 및 적용 - ISO/DIS l1620 : 2007을 중심으로 -)

  • Choi, Jae-Hwang;Kwak, Seung-Jin;Kim, Jeong-Taek
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.3
    • /
    • pp.81-102
    • /
    • 2007
  • The purpose of this study is to examine the ISO/DIS 11620 : 2007(library performance indicators) in terms of structures, objectives, and BSC, and to apply the selected performance indicators to the digital library services for the case of 'B' University in Korea. Standardization of library statistics and of qualify or performance measures for libraries is carried on within ISO in the frame of the TC46/SC8/WG4. While the first edition of ISO 11620 grouped the indicators as to service areas, the ISO/DIS 11620:2007 uses the structure of the balanced scorecard(BSC). For the study, 44 performance indicators are grouped into traditional, hybrid. and digital libraries according to the characteristics of them. Ten selected Performance indicators, which are classified into digital libraries, are verified for the applicability.

A Survey on Admission Control Mechanisms for providing QoS in the IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜에서 QoS 제공을 위한 허가 제어 연구)

  • Lee, Kye-Sang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.535-538
    • /
    • 2005
  • Wireless LANs based on the IEEE 802.11 standard are widely spread for use nowadays. Traffic which are conveyed over the WLANs change rapidly from normal data such a Email and Web pages, to multimedia data of high resolution video and voice. To meet QoS (Quality of Service) required by these multimedia traffic, the IEEE 802 committee recently has developed a new standard, IEEE 802.11e. IEEe 802.11.e contains two MAC mechanisms for providing QoS: EDCA(Enhanced Distributed Channel Access) and HCCA (HCF Controlled Channel Access). Using these standardized MAC mechanisms as a building platform, various admission control mechanisms can be combined to offer QoS gurantees for multimedia traffic. This paper surveys these research efforts.

  • PDF

Characteristics of the Real-Time Operation For COMS Normal Operation (천리안위성 정상 운영의 실시간 운영 특성)

  • Cho, Young-Min;Park, Cheol-Min;Kim, Bang-Yeop;Lee, Sang-Cherl
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.2
    • /
    • pp.80-87
    • /
    • 2013
  • Communication Ocean Meteorological Satellite (COMS) has the hybrid mission of meteorological observation, ocean monitoring, and telecommunication service. The COMS is located at $128.2{\circ}$ east longitude on the geostationary orbit and currently under normal operation service since April 2011. In order to perform the three missions, the COMS has 3 separate payloads, the meteorological imager (MI), the Geostationary Ocean Color Imager (GOCI), and the Ka-band communication payload. The satellite controls for the three mission operations and the satellite maintenance are done by the real-time operation which is the activity to communicate directly with the satellite through command and telemetry. In this paper the real-time operation for COMS is discussed in terms of the ground station configuration and the characteristics of daily, weekly, monthly, seasonal, and yearly operation activities. The successful real-time operation is also confirmed with the one year operation results for 2011 which includes both the latter part of the In-Orbit-Test (IOT) and the first year normal operation of the COMS.

A Study on Adaptive Interference Canceller of Wireless Repeater for Wideband Code Division Multiple Access System (WCDMA시스템 무선 중계기의 적응간섭제거기에 관한 연구)

  • Han, Yong-Sik;Yang, Woon-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1321-1327
    • /
    • 2009
  • In this paper, as the mobile communication service is widely used and the demand for wireless repeaters is rapidly increasing because of the easiness of extending service areas. But a wireless repeater has a problem the oscillation due to feedback signal. We proposed a new hybrid interference canceller using the adaptive filter with CMA(Constant Modulus Algorithm)-Grouped LMS(Least Mean Square) algorithm in the adaptive interference canceller. The proposed interference canceller has better channel adaptive performance and a lower MSE(Mean Square Error) than conventional structure because it uses the cancellation method of Grouped LMS algorithm. The proposed detector uses the LMS algorithms with two different step size to reduce mean square error and to obtain fast convergence. This structure reduces the number of iterations for the same MSE performance and hardware complexity compared to conventional nonlinear interference canceller.

A Survey of System Architectures, Privacy Preservation, and Main Research Challenges on Location-Based Services

  • Tefera, Mulugeta K.;Yang, Xiaolong;Sun, Qifu Tyler
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3199-3218
    • /
    • 2019
  • Location-based services (LBSs) have become popular in recent years due to the ever-increasing usage of smart mobile devices and mobile applications through networks. Although LBS application provides great benefits to mobile users, it also raises a sever privacy concern of users due to the untrusted service providers. In the lack of privacy enhancing mechanisms, most applications of the LBS may discourage the user's acceptance of location services in general, and endanger the user's privacy in particular. Therefore, it is a great interest to discuss on the recent privacy-preserving mechanisms in LBSs. Many existing location-privacy protection-mechanisms (LPPMs) make great efforts to increase the attacker's uncertainty on the user's actual whereabouts by generating a multiple of fake-locations together with user's actual positions. In this survey, we present a study and analysis of existing LPPMs and the state-of-art privacy measures in service quality aware LBS applications. We first study the general architecture of privacy qualification system for LBSs by surveying the existing framework and outlining its main feature components. We then give an overview of the basic privacy requirements to be considered in the design and evaluation of LPPMs. Furthermore, we discuss the classification and countermeasure solutions of existing LPPMs for mitigating the current LBS privacy protection challenges. These classifications include anonymization, obfuscation, and an encryption-based technique, as well as the combination of them is called a hybrid mechanism. Finally, we discuss several open issues and research challenges based on the latest progresses for on-going LBS and location privacy research.