• Title/Summary/Keyword: Service Quality of Network

Search Result 1,741, Processing Time 0.027 seconds

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

호스피스 전달체계 모형

  • Choe, Hwa-Suk
    • Korean Journal of Hospice Care
    • /
    • v.1 no.1
    • /
    • pp.46-69
    • /
    • 2001
  • Hospice Care is the best way to care for terminally ill patients and their family members. However most of them can not receive the appropriate hospice service because the Korean health delivery system is mainly be focussed on acutly ill patients. This study was carried out to clarify the situation of hospice in Korea and to develop a hospice care delivery system model which is appropriate in the Korean context. The theoretical framework of this study that hospice care delivery system is composed of hospice resources with personnel, facilities, etc., government and non-government hospice organization, hospice finances, hospice management and hospice delivery, was taken from the Health Delivery System of WHO(1984). Data was obtained through data analysis of litreature, interview, questionairs, visiting and Delphi Technique, from October 1998 to April 1999 involving 56 hospices, 1 hospice research center, 3 non-government hospice organizations, 20 experts who have had hospice experience for more than 3 years(mean is 9 years and 5 months) and officials or members of 3 non-government hospice organizations. There are 61 hospices in Korea. Even though hospice personnel have tried to study and to provide qualified hospice serices, there is nor any formal hospice linkage or network in Korea. This is the result of this survey made to clarify the situation of Korean hospice. Results of the study by Delphi Technique were as follows: 1.Hospice Resources: Key hospice personnel were found to be hospice coordinator, doctor, nurse, clergy, social worker, volunteers. Necessary qualifications for all personnel was that they conditions were resulted as have good health, receive hospice education and have communication skills. Education for hospice personnel is divided into (i)basic training and (ii)special education, e.g. palliative medicine course for hospice specialist or palliative care course in master degree for hospice nurse specialist. Hospice facilities could be developed by adding a living room, a space for family members, a prayer room, a church, an interview room, a kitchen, a dining room, a bath facility, a hall for music, art or work therapy, volunteers' room, garden, etc. to hospital facilities. 2.Hospice Organization: Whilst there are three non-government hospice organizations active at present, in the near future an hospice officer in the Health&Welfare Ministry plus a government Hospice body are necessary. However a non-government council to further integrate hospice development is also strongly recommended. 3.Hospice Finances: A New insurance standards, I.e. the charge for hospice care services, public information and tax reduction for donations were found suggested as methods to rise the hospice budget. 4.Hospice Management: Two divisions of hospice management/care were considered to be necessary in future. The role of the hospice officer in the Health & Welfare Ministry would be quality control of hospice teams and facilities involved/associated with hospice insurance standards. New non-government integrating councils role supporting the development of hospice care, not insurance covered. 5.Hospice delivery: Linkage&networking between hospice facilities and first, second, third level medical institutions are needed in order to provide varied and continous hospice care. Hospice Acts need to be established within the limits of medical law with regards to standards for professional staff members, educational programs, etc. The results of this study could be utilizes towards the development to two hospice care delivery system models, A and B. Model A is based on the hospital, especially the hospice unit, because in this setting is more easily available the new medical insurance for hospice care. Therefore a hospice team is organized in the hospital and may operate in the hospice unit and in the home hospice care service. After Model A is set up and operating, Model B will be the next stage, in which medical insurance cover will be extended to home hospice care service. This model(B) is also based on the hospital, but the focus of the hospital hospice unit will be moved to home hospice care which is connected by local physicians, national public health centers, community parties as like churches or volunteer groups. Model B will contribute to the care of terminally ill patients and their family members and also assist hospital administrators in cost-effectiveness.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

GIS-based Market Analysis and Sales Management System : The Case of a Telecommunication Company (시장분석 및 영업관리 역량 강화를 위한 통신사의 GIS 적용 사례)

  • Chang, Nam-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.61-75
    • /
    • 2011
  • A Geographic Information System(GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the later 1990s and earlier 2000s it was limitedly used in government sectors such as public utility management, urban planning, landscape architecture, and environmental contamination control. However, a growing number of open-source packages running on a range of operating systems enabled many private enterprises to explore the concept of viewing GIS-based sales and customer data over their own computer monitors. K telecommunication company has dominated the Korean telecommunication market by providing diverse services, such as high-speed internet, PSTN(Public Switched Telephone Network), VOLP (Voice Over Internet Protocol), and IPTV(Internet Protocol Television). Even though the telecommunication market in Korea is huge, the competition between major services providers is growing more fierce than ever before. Service providers struggled to acquire as many new customers as possible, attempted to cross sell more products to their regular customers, and made more efforts on retaining the best customers by offering unprecedented benefits. Most service providers including K telecommunication company tried to adopt the concept of customer relationship management(CRM), and analyze customer's demographic and transactional data statistically in order to understand their customer's behavior. However, managing customer information has still remained at the basic level, and the quality and the quantity of customer data were not enough not only to understand the customers but also to design a strategy for marketing and sales. For example, the currently used 3,074 legal regional divisions, which are originally defined by the government, were too broad to calculate sub-regional customer's service subscription and cancellation ratio. Additional external data such as house size, house price, and household demographics are also needed to measure sales potential. Furthermore, making tables and reports were time consuming and they were insufficient to make a clear judgment about the market situation. In 2009, this company needed a dramatic shift in the way marketing and sales activities, and finally developed a dedicated GIS_based market analysis and sales management system. This system made huge improvement in the efficiency with which the company was able to manage and organize all customer and sales related information, and access to those information easily and visually. After the GIS information system was developed, and applied to marketing and sales activities at the corporate level, the company was reported to increase sales and market share substantially. This was due to the fact that by analyzing past market and sales initiatives, creating sales potential, and targeting key markets, the system could make suggestions and enable the company to focus its resources on the demographics most likely to respond to the promotion. This paper reviews subjective and unclear marketing and sales activities that K telecommunication company operated, and introduces the whole process of developing the GIS information system. The process consists of the following 5 modules : (1) Customer profile cleansing and standardization, (2) Internal/External DB enrichment, (3) Segmentation of 3,074 legal regions into 46,590 sub_regions called blocks, (4) GIS data mart design, and (5) GIS system construction. The objective of this case study is to emphasize the need of GIS system and how it works in the private enterprises by reviewing the development process of the K company's market analysis and sales management system. We hope that this paper suggest valuable guideline to companies that consider introducing or constructing a GIS information system.

Trends of Study and Classification of Reference on Occupational Health Management in Korea after Liberation (해방 이후 우리나라 산업보건관리에 관한 문헌분류 및 연구동향)

  • Ha, Eun-Hee;Park, Hye-Sook;Kim, Young-Bok;Song, Hyun-Jong
    • Journal of Preventive Medicine and Public Health
    • /
    • v.28 no.4 s.51
    • /
    • pp.809-844
    • /
    • 1995
  • The purposes of this study are to define the scope of occupational health management and to classify occupational management by review of related journals from 1945 to 1994 in Korea. The steps of this study were as follows: (1) Search of secondary reference; (2) Collection and review of primary reference; (3) Survey; and (4) Analysis and discussion. The results were as follows ; 1. Most of the respondents majored in occupational health(71.6%), and were working in university (68.3%), males and over the age 40. Seventy percent of the respondents agreed with the idea that classification of occupational health management is necessary, and 10% disagreed. 2. After integration of the idea of respondents, we reclassified the scope of occupational health management. It was defined 3 parts, that is , occupational health system, occupational health service and others (such as assessment, epidemiology, cost-effectiveness analysis and so on). 3. The number of journals on occupational health management was 510. It was sightly increased from 1986 and abruptly increased after 1991. The kinds of journals related to occupational health management were The Korean Journal of Occupational Medicine(18.2%), Several Kinds of Medical Colloge Journal(17.0%), The Korean Journal Occupational Health(15.1%), The Korean Journal of Preventive Medicine(15.1%) and others(34.6%). As for the contents, the number of journals on occupational health management systems was 33(6.5%) and occupational health services 477(93.5%). Of the journals on occupational health management systems, the number of journals on the occupational health resource system was 15(45.5%), occupational finance system 8(24.2%), occupational health management system 6(18.2%), occupational organization 3(9.1%) and occupational health delivery system 1 (3.0%). Of the journals on occupational health services, the number of journals on disease management was 269(57.2%), health management 116(24.7%), working environmental management 85(18.1%). As for the subjects, the number of journals on general workers was 185(71.1%), followed by women worker, white coiler workers and so on. 4. Respondents made occupational health service(such as health management, working environmental management and health education) the first priority of occupational health management. Tied for the second are quality analysis(such as education, training and job contents of occupational health manager) and occupational health systems(such as the recommendation of systems of occupational and general disease and occupational health organization). 5. Thirty seven respondents suggested 48 ideas about the future research of occupational health management. The results were as follows: (1) Study of occupational health service 40.5%; (2) Study of organization system 27.1%; (3) Study of occupational health system (e.g. information network) 8.3%; (4) Study of working condition 6.2%; and (5) Study of occupational health service analysis 4.2%.

  • PDF

Development of Video Work Manual for Rock-Drill Data In Fire Service (소방에서의 도상훈련 기초자료 영상화작업 매뉴얼 개발)

  • Cho, Jae-Kwan;Park, Hee-Jin;Hwang, Inn;Kwon, Hayrran
    • The Korean Journal of Emergency Medical Services
    • /
    • v.6 no.1
    • /
    • pp.103-128
    • /
    • 2002
  • As a result of trying the various manufacturing methods considering the reality of manpower and equipments with this manual, the following standardized procedures and contents can be suggested. (1) Since tools presenting Rock-Drill data must formalize the order of explanation although explainers are different, it will be valid that it is configured by existing power point method rather than by web document type. Composition of contents are selected on the basis of defence card and survey and then 8 items including initial screen, peripheral conditions, mobilization route, general conditions, use and structure by floor, department of vehicle consideration in activities and end screen are included. (2) Making methods and cautions of data included and used in power point are as follows ; - It was most effective that objects of fire fighting and location of neighboring fire fighting water were expressed by electronic map and drawing of inner building was made by scanning it after paining general architecture drawing(plan by each floor) rather than using drawing tools of EXCEL program or CAD drawing. And it was helpful to simplify contents of architecture drawing to wall, stairs and gate in understanding them. - Photographing of video data should be taken to show available fire fighting facilities in fire, use of planned space and the whole inner structure of each floor from the inside of fire fighting buildings and to display play time between 10 sec. and 1 min, for obstacles to distance from adjacent buildings or passage of special vehicles and fire fighting water from the outside of the building. - File format of video data taken in this way is most suitable to use wmv(window media video) or asf(advanced streaming format) type in consideration of time required for export, screen quality, file capacity and play type in Rock-Drill through network. - Still screen(photo) is more effective to express the department of fire fighting vehicles or other equipments than using video. (3) In configuration work of power point, hyper link was used most and configured to see any part at any situation like web document and then uniformity of presentation order of power point was complemented. (4) In case of sales facilities with the area of $35.557m^2$, the time of 22 hours and 30 minutes for five days was taken with five persons. Therefore, when eight-hour works a day were calculated, the whole process of video work for Rock-Drill can be finished with three day works.

  • PDF

A Study on the Purchase Factor with Goods Type in the B to C EC (B to C EC에서의 제품유형별 구매요인)

  • Baek, Tak-Seon;Choi, Heung-Seob
    • International Commerce and Information Review
    • /
    • v.1 no.2
    • /
    • pp.145-165
    • /
    • 1999
  • With the rapid spreading of the internet that is based on the development of the information network system, the paradigms of "internet round" and "cyber" are given much weight in the notion of "market." Especially, the cyber shopping for the individuals is developing rapidly creating the new life style, and also in the domestic economy the cases of building and running the cyber shopping malls are increasing. The purpose of this study is to analyse the customers' shopping styles that can be shown when the customers purchase physical goods or digital goods at the B to C EC and find the way to activate the shopping malls by controlling the factors which influence the trade. The result of the study is as follows: First, to analyse the acting style of the customers at the B to C EC, it is searched whether there is any relationship between the purchasing goods, which are divided into physical goods and digital goods. There was a cross analysis between the first factor of the five factors of the purchase decision or delay at the B to C EC and the goods type. The result of the analysis is that the purchase decision factor is different according as what type of goods is purchased. On the other hand, the purchase delay factor has no relation with the goods type. Second, the fact that the cyber shopping activities are quite different according to sexuality, age, academic background, or occupation suggests that these factors are very important to the strategy for the market-specification of the B to C EC marketing construction. The result shown in this study is sure to give great help to figure out the improvement strategies and the market-specialization strategies to accelerate the B to C EC marketing. On the side of the strategies for the improvement of the goods services, more attention should be given to the functional side for the improvement of the reliability of the goods service such as capacity, technique, and quality. And the activities of the customers are so different according to the vital statistics that the way to cope with the changeability properly should be considered.

  • PDF

A Case Study on Parents Peer Counselor's for the Disabled Experiences in Field Counseling (장애인부모 동료상담사의 현장상담 활동경험에 관한 질적 사례연구)

  • Choi, Ha-Na;Jeong, Jong-Hwa;Kim, Eun-Jae
    • 재활복지
    • /
    • v.22 no.2
    • /
    • pp.127-159
    • /
    • 2018
  • The purpose of this study is to provide the useful reference to establish the system improvement plan that activates the counseling service quality for the disabled parents peer counselors. The qualitative case study method of Yin (2009) has been used to understand and reflect to the system for the experience of field counseling of the peer counselors for the disabled parents. 10 parents peer counselors for the disabled were proportionately sampled and interviewed about their experiences through a FGI and two individual interviews. The result of the study derived from total 87 abstract concepts and 17 categories and personal motivations for participating and changes from the experience are as follows: the effects of counseling are "mutual sympathy toward the same disability," "Identity transformation from nobody to somebody who gives hope," and "another social insurance and social safety network that parents disability make." The barrier facts for the parents peer counseling activation are: "problem of securing the position of the counseling site" and difficulty in finding the client due to lack of awareness and publicity. "The study suggests four programs to upgrade the parents peer counseling: (1) To secure the position of the counseling site, (2) To reestablish the status as a professional counselor. (3) The need of pokicy supplement and support from the government, (4) The expectancy of creating jobs through the conversion of full-time workers.

Performance Analysis of the Amplify-and-Forward Scheme under Interference Constraint and Physical Layer Security (물리 계층 보안과 간섭 제약 환경에서 증폭 후 전송 기법의 성능 분석)

  • Pham, Ngoc Son;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.179-187
    • /
    • 2014
  • The underlay protocol is a cognitive radio method in which secondary or cognitive users use the same frequency without affecting the quality of service (QoS) for the primary users. In addition, because of the broadcast characteristics of the wireless environment, some nodes, which are called eavesdropper nodes, want to illegally receive information that is intended for other communication links. Hence, Physical Layer Security is applied considering the achievable secrecy rate (ASR) to prevent this from happening. In this paper, a performance analysis of the amplify-and-forward scheme under an interference constraint and Physical Layer Security is investigated in the cooperative communication mode. In this model, the relays use an amplify-and- forward method to help transmit signals from a source to a destination. The best relay is chosen using an opportunistic relay selection method, which is based on the end-to-end ASR. The system performance is evaluated in terms of the outage probability of the ASR. The lower and upper bounds of this probability, based on the global statistical channel state information (CSI), are derived in closed form. Our simulation results show that the system performance improves when the distances from the relays to the eavesdropper are larger than the distances from the relays to the destination, and the cognitive network is far enough from the primary user.

A Minimum Energy Consuming Mobile Device Relay Scheme for Reliable QoS Support

  • Chung, Jong-Moon;Kim, Chang Hyun;Lee, Daeyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.618-633
    • /
    • 2014
  • Relay technology is becoming more important for mobile communications and wireless internet of things (IoT) networking because of the extended access network coverage range and reliable quality of service (QoS) it can provide at low power consumption levels. Existing mobile multihop relay (MMR) technology uses fixed-point stationary relay stations (RSs) and a divided time-frame (or frequency-band) to support the relay operation. This approach has limitations when a local fixed-point stationary RS does not exist. In addition, since the time-frame (or frequency-band) channel resources are pre-divided for the relay operation, there is no way to achieve high channel utilization using intelligent opportunistic techniques. In this paper, a different approach is considered, where the use of mobile/IoT devices as RSs is considered. In applications that use mobile/IoT devices as relay systems, due to the very limited battery energy of a mobile/IoT device and unequal channel conditions to and from the RS, both minimum energy consumption and QoS support must be considered simultaneously in the selection and configuration of RSs. Therefore, in this paper, a mobile RS is selected and configured with the objective of minimizing power consumption while satisfying end-to-end data rate and bit error rate (BER) requirements. For the RS, both downlink (DL) to the destination system (DS) (i.e., IoT device or user equipment (UE)) and uplink (UL) to the base station (BS) need to be adaptively configured (using adaptive modulation and power control) to minimize power consumption while satisfying the end-to-end QoS constraints. This paper proposes a minimum transmission power consuming RS selection and configuration (MPRSC) scheme, where the RS uses cognitive radio (CR) sub-channels when communicating with the DS, and therefore the scheme is named MPRSC-CR. The proposed MPRSC-CR scheme is activated when a DS moves out of the BS's QoS supportive coverage range. In this case, data transmissions between the RS and BS use the assigned primary channel that the DS had been using, and data transmissions between the RS and DS use CR sub-channels. The simulation results demonstrate that the proposed MPRSC-CR scheme extends the coverage range of the BS and minimizes the power consumption of the RS through optimal selection and configuration of a RS.