• Title/Summary/Keyword: Mobile AI

Search Result 209, Processing Time 0.024 seconds

An Efficient Broadcast Technique for Vehicular Networks

  • Ho, Ai Hua;Ho, Yao H.;Hua, Kien A.;Villafane, Roy;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.221-240
    • /
    • 2011
  • Vehicular networks are a promising application of mobile ad hoc networks. In this paper, we introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a cell can communicate with any node within a two cell distance. Each mobile node is equipped with a GPS (Global Positioning System) unit and a map of the cells. The cell map has information about the cells including their identifier and the coordinates of the upper-right and lower-left corner of each cell. CB-S has the following desirable property. Broadcast of a message is performed by rebroadcasting the message from every other cell in the terrain. This characteristic allows CB-S to achieve an efficient performance. Our simulation results indicate that messages always reach all nodes in the wireless network. This perfect coverage is achieved with minimal overhead. That is, CB-S uses a low number of nodes to disseminate the data packets as quickly as probabilistically possible. This efficiency gives it the advantage of low delay. To show these benefits, we give simulations results to compare CB-S with four other broadcast techniques. In practice, CB-S can be used for information dissemination, or to reduce the high cost of destination discovery in routing protocols. By also specify the radius of affected zone, CB-S is also more efficient when broadcast to a subset of the nodes is desirable.

Analysis on the Current Status of the Fourth Industrial Revolution-Oriented Curriculum of the Computer and Software-Related Majors Based on the Standard Classification (표준분류에 기준한 컴퓨터 및 소프트웨어 관련 전공의 제4차 산업혁명중심 교육과정 운영 현황 분석)

  • Choi, Jin-Il;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.587-592
    • /
    • 2020
  • This paper analyzed the curriculum of computer and software-related majors educating the core IT-related skills needed for the 4th Industrial Revolution. The analysis was conducted on 158 majors classified as applied software, computer science and computer engineering according to the standard classification of university education units by the Standard Classification Committee of the Korean Council of University Education. The current status of introduction of curricular divided into the fields of Internet of Things(IoT) & mobile, cloud & big data, artificial intelligence(AI), and information security was analyzed among the contents of education in the relevant departments. According to the analysis, an average of 81.6% of the majors for each group of curricular organized related subjects into the curriculum. The Curriculum Response Index for the 4th industrial revolution(CRI4th) by major, calculated by weighting track operations by education sector, averaged 27.5 point out of 100 point. And the IoT & mobile sector had the highest score of 42.3 points.

A Study on Improvement of Call Admission Control using Wireless Access Point Sharing (무선 AP 공유를 통한 호 제어 방안 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.91-96
    • /
    • 2018
  • Recently, as artificial intelligence technology becomes popular, demand for wireless traffic is rapidly increasing. In order to provide services in response to the increase in demand for wireless traffic, telecommunication companies are generalizing the installation of public APs. In order to provide convenience of using wireless APs between communication companies, it is necessary to share the use of APs in public places to efficiently use wireless resources in a public place, to pre-authenticate between wireless APs in a mobile communication service, So as to increase the convenience of the user. In this paper, we propose to share APs in public places through handoff between APs and pre-authentication between carriers in mobile communication services. The simulation results show that the handoff latency is improved by 35.1% and the bandwidth used by the AP selected by the pre-authentication method can utilize more bandwidth than the method of automatically selecting the AP.

A mobile P2P a farming support system implementation which uses JXTA (JXTA를 이용한 모바일 P2P 영농 지원 시스템 구현)

  • Bae, Il-Ho;Cho, Ai-Ri;Min, Hae-Ran;Lee, Gwang;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.579-582
    • /
    • 2004
  • File share system in client/server method requires server of High performance and capacity and this server is very expensive and management is complex and is been influenced much to flatform. Also, extension of correct memory or hard drive etc. causes a lot of expenses to server. While, may minimise human who happen by buying high-capacity server by dispersing file public ownership way unuse expensive server in client/serve. way who put up files in PC(client) to a sewer and manage files and make use of only client computers because public ownership of data and government official in P2P(peer to peer) environment, waste of material resources. Many people are interested to P2P by such reason, researches that use P2P to connection field to be Moba that have Gakgwangbatgo current are gone vigorously.

  • PDF

Mileage-based Asymmetric Multi-core Scheduling for Mobile Devices (모바일 디바이스를 위한 마일리지 기반 비대칭 멀티코어 스케줄링)

  • Lee, Se Won;Lee, Byoung-Hoon;Lim, Sung-Hwa
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.26 no.5
    • /
    • pp.11-19
    • /
    • 2021
  • In this paper, we proposed an asymmetric multi-core processor scheduling scheme which is based on the mileage of each core. We considered a big-LITTLE multi-core processor structure, which consists of low power consuming LITTLE cores with general performance and high power consuming big cores with high performance. If a task needs to be processed, the processor decides a core type (big or LITTLE) to handle the task, and then investigate the core with the shortest mileage among unoccupied cores. Then assigns the task to the core. We developed a mileage-based balancing algorithm for asymmetric multi-core assignment and showed that the proposed scheduling scheme is more cost-effective compared to the traditional scheme from a management perspective. Simulation is also conducted for the purpose of performance evaluation of our proposed algorithm.

Clasification of Cyber Attack Group using Scikit Learn and Cyber Treat Datasets (싸이킷런과 사이버위협 데이터셋을 이용한 사이버 공격 그룹의 분류)

  • Kim, Kyungshin;Lee, Hojun;Kim, Sunghee;Kim, Byungik;Na, Wonshik;Kim, Donguk;Lee, Jeongwhan
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.165-171
    • /
    • 2018
  • The most threatening attack that has become a hot topic of recent IT security is APT Attack.. So far, there is no way to respond to APT attacks except by using artificial intelligence techniques. Here, we have implemented a machine learning algorithm for analyzing cyber threat data using machine learning method, using a data set that collects cyber attack cases using Scikit Learn, a big data machine learning framework. The result showed an attack classification accuracy close to 70%. This result can be developed into the algorithm of the security control system in the future.

Study on Video Content Delivery Scheme for Mobile Vehicles (이동 차량을 위한 동영상 콘텐츠 전송 기법에 관한 연구)

  • Kim, Tae-Kook
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.41-45
    • /
    • 2021
  • This paper proposes a video content delivery scheme for vehicles. Today, we spend a lot of time commuting to work in vehicles such as trains and cars. In addition, the number of users who enjoy video content such as YouTube and Netflix in order to appease the boredom in the vehicle is increasing rapidly. Video content requires a larger amount of data usage than text-based content. Hence, the user's mobile communication data usage increases rapidly along with the cost. The proposed video content delivery scheme downloads a lot of video content in advance when the vehicle is in a free Wi-Fi area. In this way, it is possible to play video content in a vehicle at a low cost. It is expected that the proposed scheme can be applied to the Internet of Things(IoT) for moving objects.

Analysis of unfairness of artificial intelligence-based speaker identification technology (인공지능 기반 화자 식별 기술의 불공정성 분석)

  • Shin Na Yeon;Lee Jin Min;No Hyeon;Lee Il Gu
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.27-33
    • /
    • 2023
  • Digitalization due to COVID-19 has rapidly developed artificial intelligence-based voice recognition technology. However, this technology causes unfair social problems, such as race and gender discrimination if datasets are biased against some groups, and degrades the reliability and security of artificial intelligence services. In this work, we compare and analyze accuracy-based unfairness in biased data environments using VGGNet (Visual Geometry Group Network), ResNet (Residual Neural Network), and MobileNet, which are representative CNN (Convolutional Neural Network) models of artificial intelligence. Experimental results show that ResNet34 showed the highest accuracy for women and men at 91% and 89.9%in Top1-accuracy, while ResNet18 showed the slightest accuracy difference between genders at 1.8%. The difference in accuracy between genders by model causes differences in service quality and unfair results between men and women when using the service.

Issues and Implications of Disputes related to Network Usage Fees (망이용대가 관련 분쟁의 쟁점과 함의)

  • Chang-Hee Rho;Joonho Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.123-131
    • /
    • 2024
  • The dispute between SK and Netflix, which has been going on for more than three years, ended in the direction of dropping the lawsuit and establishing a cooperative relationship between the two companies. However, as Internet traffic usage is likely to increase further in the future due to digital transformation and activation of generated AI, conflicts between domestic mobile carriers and global CP operators over network usage fees can arise at any time. In this study, the issues of the dispute related to network usage fees that occurred between SK and Netflix were examined, and different implications were drawn for each issue. The cost and scope of network usage considerations are an issue that must be determined entirely by negotiations between operators. However, if a dispute occurs between operators, user damage such as speed delays may occur, so it is necessary to prepare a policy alternative. As the domestic media industry has grown cooperatively with global CPs, it is considered important to form a reciprocal relationship between domestic mobile telecommunication operators and global CP operators regarding network usage fees in the future.

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime