• 제목/요약/키워드: Internet Based Laboratory

검색결과 491건 처리시간 0.025초

A Prediction-based Energy-conserving Approximate Storage and Query Processing Schema in Object-Tracking Sensor Networks

  • Xie, Yi;Xiao, Weidong;Tang, Daquan;Tang, Jiuyang;Tang, Guoming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권5호
    • /
    • pp.909-937
    • /
    • 2011
  • Energy efficiency is one of the most critical issues in the design of wireless sensor networks. In object-tracking sensor networks, the data storage and query processing should be energy-conserving by decreasing the message complexity. In this paper, a Prediction-based Energy-conserving Approximate StoragE schema (P-EASE) is proposed, which can reduce the query error of EASE by changing its approximate area and adopting predicting model without increasing the cost. In addition, focusing on reducing the unnecessary querying messages, P-EASE enables an optimal query algorithm to taking into consideration to query the proper storage node, i.e., the nearer storage node of the centric storage node and local storage node. The theoretical analysis illuminates the correctness and efficiency of the P-EASE. Simulation experiments are conducted under semi-random walk and random waypoint mobility. Compared to EASE, P-EASE performs better at the query error, message complexity, total energy consumption and hotspot energy consumption. Results have shown that P-EASE is more energy-conserving and has higher location precision than EASE.

Resource Allocation for Relay-Aided Cooperative Systems Based on Multi-Objective Optimization

  • Wu, Runze;Zhu, Jiajia;Hu, Hailin;He, Yanhua;Tang, Liangrui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권5호
    • /
    • pp.2177-2193
    • /
    • 2018
  • This paper studies resource allocation schemes for the relay-aided cooperative system consisting of multiple source-destination pairs and decode-forward (DF) relays. Specially, relaying selection, multisubcarrier pairing and assignment, and power allocation are investigated jointly. We consider a combinatorial optimization problem on quality of experience (QoE) and energy consumption based on relay-aided cooperative system. For providing better QoE and lower energy consumption we formulate a multi-objective optimization problem to maximize the total mean opinion score (MOS) value and minimize the total power consumption. To this end, we employ the nondominated sorting genetic algorithm version II (NSGA-II) and obtain sets of Pareto optimal solutions. Specially, two formulas are devised for the optimal solutions of the multi-objective optimization problems with and without a service priority constraint. Moreover, simulation results show that the proposed schemes are superior to the existing ones.

Wavelength Division Multiplexing-Passive Optical Network Based FTTH Field Trial Test

  • Kim, Geun-Young;Kim, Jin-Hee
    • Journal of the Optical Society of Korea
    • /
    • 제11권3호
    • /
    • pp.101-107
    • /
    • 2007
  • In this paper, we have presented the results of Wavelength Division Multiplexing-Passive Optical Network (WDM-PON) based fiber-to-the-home (FTTH) field trial test which was held in the city of Gwangju. We have implemented an injection locked Fabry-Perot Laser Diode (FP-LD) based WDM-PON system and reliably delivered Internet Protocol TV (IP-TV), networked Personal Video Recorder (N-PVR), High-Definition Video on Demand (HD-VoD), Education on Demand (EoD) and Internet service as FTTH service through the system during the field trial test. We have also verified that the WDM-PON system worked well to provide quality of service (QoS) guaranteed 100Mbps bandwidth per subscriber. Furthermore, we have presented network designing issues in Outside Plant (OSP) and Customer Premises Network (CPN) that should be overcome to efficiently deploy FTTH service. Finally, based on the field trial test results, we proposed FTTH service deployment strategies.

CLASSIFICATION OF SPACES IN TERMS OF BOTH A DIGITIZATION AND A MARCUS WYSE TOPOLOGICAL STRUCTURE

  • Han, Sang-Eon;Chun, Woo-Jik
    • 호남수학학술지
    • /
    • 제33권4호
    • /
    • pp.575-589
    • /
    • 2011
  • In order to examine the possibility of some topological structures into the fields of network science, telecommunications related to the future internet and a digitization, the paper studies the Marcus Wyse topological structure. Further, this paper develops the notions of lattice based Marcus Wyse continuity and lattice based Marcus Wyse homeomorphism which can be used for studying spaces $X{\subset}R^2$ in the Marcus Wyse topological approach. By using these two notions, we can study and classify lattice based simple closed Marcus Wyse curves.

Distributed Collision-Resolvable Medium Access Control for Wireless LANs with Interference Cancellation Support

  • Shen, Hu;Lv, Shaohe;Wang, Xiaodong;Zhou, Xingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권8호
    • /
    • pp.2691-2707
    • /
    • 2014
  • Medium access control is critical in wireless networks for efficient spectrum utilization. In this paper, we introduce a novel collision resolution method based on the technique of known interference cancellation, and propose a new MAC protocol named as CR-MAC, in which AP tries to decode all the collided data packets by combining partial retransmissions and known interference cancellation. As the collided transmissions are fully utilized, less retransmission is required, especially in a crowded network. The NS-2simulation and MATLAB numerical results show that, under various network settings, CR-MAC performs much better than the IEEE 802.11 DCF in terms of the aggregation throughput and the expected packet delay.

Efficient Signature Schemes from R-LWE

  • Wang, Ting;Yu, Jianping;Zhang, Peng;Zhang, Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3911-3924
    • /
    • 2016
  • Compared to the classical cryptography, lattice-based cryptography is more secure, flexible and simple, and it is believed to be secure against quantum computers. In this paper, an efficient signature scheme is proposed from the ring learning with errors (R-LWE), which avoids sampling from discrete Gaussians and has the characteristics of the much simpler description etc. Then, the scheme is implemented in C/C++ and makes a comparison with the RSA signature scheme in detail. Additionally, a linearly homomorphic signature scheme without trapdoor is proposed from the R-LWE assumption. The security of the above two schemes are reducible to the worst-case hardness of shortest vectors on ideal lattices. The security analyses indicate the proposed schemes are unforgeable under chosen message attack model, and the efficiency analyses also show that the above schemes are much more efficient than other correlative signature schemes.

Internet content transcoding framework for heterogeneous client devices

  • Kim, Jae-Hong;Jang, Min-Su;Sohn, Joo-Chan;Baik, Jong-Myeong;Lee, Sang-Jo
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2001년도 International Conference CALS/EC KOREA
    • /
    • pp.379-391
    • /
    • 2001
  • In this paper, we presented function catalogs that Internet content transcoding system for heterogeneous client devices must offer, and, we proposed content transcoding framework architecture that is good in extensibility. This transcoding framework can accommodate each transcoder in efficient way using device capability and user preference information based on W3C's CC/PP and Wap forum's UAProf specification. This architecture offers advantages that can add developed transcoder dynamically in Plug-In form later.

  • PDF

A Genetic Approach for Joint Link Scheduling and Power Control in SIC-enable Wireless Networks

  • Wang, Xiaodong;Shen, Hu;Lv, Shaohe;Zhou, Xingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1679-1691
    • /
    • 2016
  • Successive interference cancellation (SIC) is an effective means of multi-packet reception to combat interference at the physical layer. We investigate the joint optimization issue of channel access and power control for capacity maximization in SIC-enabled wireless networks. We propose a new interference model to characterize the sequential detection nature of SIC. Afterward, we formulize the joint optimization problem, prove it to be a nondeterministic polynomial-time-hard problem, and propose a novel approximation approach based on the genetic algorithm (GA). Finally, we discuss the design and parameter setting of the GA approach and validate its performance through extensive simulations.

Chinese-clinical-record Named Entity Recognition using IDCNN-BiLSTM-Highway Network

  • Tinglong Tang;Yunqiao Guo;Qixin Li;Mate Zhou;Wei Huang;Yirong Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1759-1772
    • /
    • 2023
  • Chinese named entity recognition (NER) is a challenging work that seeks to find, recognize and classify various types of information elements in unstructured text. Due to the Chinese text has no natural boundary like the spaces in the English text, Chinese named entity identification is much more difficult. At present, most deep learning based NER models are developed using a bidirectional long short-term memory network (BiLSTM), yet the performance still has some space to improve. To further improve their performance in Chinese NER tasks, we propose a new NER model, IDCNN-BiLSTM-Highway, which is a combination of the BiLSTM, the iterated dilated convolutional neural network (IDCNN) and the highway network. In our model, IDCNN is used to achieve multiscale context aggregation from a long sequence of words. Highway network is used to effectively connect different layers of networks, allowing information to pass through network layers smoothly without attenuation. Finally, the global optimum tag result is obtained by introducing conditional random field (CRF). The experimental results show that compared with other popular deep learning-based NER models, our model shows superior performance on two Chinese NER data sets: Resume and Yidu-S4k, The F1-scores are 94.98 and 77.59, respectively.

An OpenFlow User-Switch Remapping Approach for DDoS Defense

  • Wei, Qiang;Wu, Zehui;Ren, Kalei;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4529-4548
    • /
    • 2016
  • DDoS attacks have had a devastating effect on the Internet, which can cause millions of dollars of damage within hours or even minutes. In this paper we propose a practical dynamic defense approach that overcomes the shortage of static defense mechanisms. Our approach employs a group of SDN-based proxy switches to relay data flow between users and servers. By substituting backup proxy switches for attacked ones and reassigning suspect users onto the new proxy switches, innocent users are isolated and saved from malicious attackers through a sequence of remapping process. In order to improve the speed of attacker segregation, we have designed and implemented an efficient greedy algorithm which has been demonstrated to have little influence on legitimate traffic. Simulations, which were then performed with the open source controller Ryu, show that our approach is effective in alleviating DDoS attacks and quarantining the attackers by numerable remapping process. The simulations also demonstrate that our dynamic defense imposes little effect on legitimate users, and the overhead introduced by remapping procedure is acceptable.