• Title/Summary/Keyword: Service scenarios

Search Result 529, Processing Time 0.024 seconds

Authentication using AAA for the Mobility Support of Mobile IPv6 Nodes in VPN Environments (VPN 환경에서 Mobile IPv6 노드의 이동성 제공을 위한 AAA 기반의 인증)

  • Kim Mi-Young;Mun Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.218-230
    • /
    • 2006
  • The enterprise service network is composed of internet, intranet and DMZ. The design rationale of Mobile IP is providing of seamless mobility transparency without regarding to the type of network topology and services. However, Mobile IP specification does not include the mobility support in case of using VPN environment and define the access scenarios to get into the VPN intranet without disturbing existing security policy. In this paper, we propose an authentication method using AAA infrastructure and keying material exchange to enable an user in internet to be able to access the intranet through the VPN gateway. Finally, performance analysis for the proposed scheme is provided.

Performance Comparison Between Routing Protocols Based on the Correlation Analysis of Performance Metrics for AODV Routing Protocol (AODV 라우팅 프로토콜의 성능 매트릭들 간의 상관관계 분석에 기반한 라우팅 프로토콜들 간의 성능 비교)

  • Lee, Yun-Kyung;Kim, Ju-Gyun
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.349-367
    • /
    • 2013
  • In MANET, the AODV routing protocol with on-demand method has a problem in large control packet overhead. In order to improve this, we first need a comprehensive analysis of correlation between performance metrics and factors affecting the performance of AODV. Selected parameters based on this analysis make it enable to be a more accurate and fair performance analysis, as well as to reduce the time and effort when constructing a scenario for performance analysis. In this paper, various scenarios are configured to apply AODV by varying the values of factors affecting the performance with network simulator QualNet 5.0, and then the results are analysed using performance metrics proposed by IETF MANET working group. This paper also founds a correlation between performance metrics and factors affecting the performance for AODV routing protocol, choosing the values of factors that represent many of the most maximum and minimum values of each performance metrics, and proposes optimal simulation parameters for a more accurate performance evaluation of routing protocols with minimal scenario in experiments. Next, performance comparison of AODV, DSR and DYMO routing protocols based on the proposed simulation parameters is shown which provides a comparative analysis on the performance of on-demand routing protocols. Results of this paper could be very useful for the researcher or service provider who wants to find nice simulation environment or select a proper routing protocol.

A Privacy-aware Graph-based Access Control System for the Healthcare Domain

  • Tian, Yuan;Song, Biao;Hassan, M.Mehedi.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2708-2730
    • /
    • 2012
  • The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing approaches, we found that there is an urgent need for a flexible, privacy-aware system that is able to meet the privacy preservation needs at both the role levels and the personal levels. We proposed a conceptual system that considered these two requirements: a graph-based, access control model to safeguard patient privacy. We present a case study of the healthcare field in this paper. While our model was tested in the field of healthcare, it is generic and can be adapted to use in other fields. The proof-of-concept demos were also provided with the aim of valuating the efficacy of our system. In the end, based on the hospital scenarios, we present the experimental results to demonstrate the performance of our system, and we also compared those results to existing privacy-aware systems. As a result, we ensured a high quality of medical care service by preserving patient privacy.

A new Network Coordinator Node Design Selecting the Optimum Wireless Technology for Wireless Body Area Networks

  • Calhan, Ali;Atmaca, Sedat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1077-1093
    • /
    • 2013
  • This paper proposes a new network coordinator node design to select the most suitable wireless technology for WBANs by using fuzzy logic. Its goal is to select a wireless communication technology available considering the user/application requirements and network conditions. A WBAN is composed of a set of sensors placed in, on, or around human body, which monitors the human body functions and the surrounding environment. In an effort to send sensor readings from human body to medical center or a station, a WBAN needs to stay connected to a local or a wide area network by using various wireless communication technologies. Nowadays, several wireless networking technologies may be utilized in WLANs and/or WANs each of which is capable of sending WBAN sensor readings to the desired destination. Therefore, choosing the best serving wireless communications technology has critical importance to provide quality of service support and cost efficient connections for WBAN users. In this work, we have developed, modeled, and simulated some networking scenarios utilizing our fuzzy logic-based NCN by using OPNET and MATLAB. Besides, we have compared our proposed fuzzy logic based algorithm with widely used RSSI-based AP selection algorithm. The results obtained from the simulations show that the proposed approach provides appropriate outcomes for both the WBAN users and the overall network.

Reexamination of Patient's Cost-sharing System for Oriental Medical Services in the Korean National Health Insurance (한방의료의 건강보험 적정 본인부담률 추계)

  • Kim, Jin-Hyun;Yoo, Wang-Keun;Seo, Dong-Min
    • Health Policy and Management
    • /
    • v.17 no.1
    • /
    • pp.1-27
    • /
    • 2007
  • This study is designed to estimate an appropriate level of patient's cost-sharing for oriental medical services in the Korean National Health Insurance. The findings of this study can be summarized as follows: 1) The current co-payment system for oriental medical services does not reflect its cost structure in clinical practice due to inconsistency of cost-sharing plan in the NHI. 2) Both oriental medical institutions and their patients, as a result, are at a relative disadvantage in financial burden, compared with other services. 3) The substantial proportion of patients' cost-sharing depends on the amount of co-payment and the range of medical cost that a flat rate is applied to. 4) The extension of the range doesn't make any substantial decrease in patient's cost-sharing. 5) The fixed amount of co-payment is more sensitive than a range to total variations of patient's cost-sharing. Based on the above, the budget impacts of a new co-payment system were estimated for each co-insurance rate, according to given scenarios. The results range from -59 billion Won (-8.5%) to 16 billion Won(2.3%).

Active Contours Level Set Based Still Human Body Segmentation from Depth Images For Video-based Activity Recognition

  • Siddiqi, Muhammad Hameed;Khan, Adil Mehmood;Lee, Seok-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2839-2852
    • /
    • 2013
  • Context-awareness is an essential part of ubiquitous computing, and over the past decade video based activity recognition (VAR) has emerged as an important component to identify user's context for automatic service delivery in context-aware applications. The accuracy of VAR significantly depends on the performance of the employed human body segmentation algorithm. Previous human body segmentation algorithms often engage modeling of the human body that normally requires bulky amount of training data and cannot competently handle changes over time. Recently, active contours have emerged as a successful segmentation technique in still images. In this paper, an active contour model with the integration of Chan Vese (CV) energy and Bhattacharya distance functions are adapted for automatic human body segmentation using depth cameras for VAR. The proposed technique not only outperforms existing segmentation methods in normal scenarios but it is also more robust to noise. Moreover, it is unsupervised, i.e., no prior human body model is needed. The performance of the proposed segmentation technique is compared against conventional CV Active Contour (AC) model using a depth-camera and obtained much better performance over it.

The Effect of Flood Discharge due to Dam Breach on Downstream Channel (댐붕괴시 홍수가 하천하류에 미치는 영향)

  • Ahn, Sang-Jin;Lee, Jun-Geun;Yeon, In-Sung;You, Hyung-Gyu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1666-1670
    • /
    • 2006
  • The purpose of this study is to analyze how a downstream channel is affected in case of hypothetical dam failure. The object of it is Hwacheon dam basin within the basin of North Han river. This study has analyzed the influence on Pyeonghwa(Peace) dam and Hwacheon dam supposing that the Imnam dam in North Korea on the upper stream of North Han river is failed hypothetically at the MFWL(maximum flood water level) by a deluge of rain. The model applied at the main study is NWS(National Weather Service) FLDWAV(Flood Wave Routing Model). Dam breach characteristics data are analyzed by making nine hypothetical scenarios on the basis of other studies on the shape and size of dam breach, time of failure and so on. Expected peak discharge through the breach is verified to have the propriety in comparison with empirical function which is developed on the basis of the case of dam breach in the foreign countries and it is observed that peak discharge is more increasing, as the time of breach gets shorter and the breach width gets bigger. As a result of main study, even though the Imnam dam is hypothetically failed down, there has no influence on the Hwacheon dam of the downstream as the extended Pyeonghwa dam on the downstream controls the volume of discharge properly.

  • PDF

Evaluation of 2+1 Roads Application to Improve Rural Two-lane Highway in Korea (국내 2+1차로 도로 도입에 따른 교통운영 및 경제적 비용 측면의 기대효과 분석)

  • Chae, Chan Dle;Lee, Dong Min;Cho, Han Seon
    • International Journal of Highway Engineering
    • /
    • v.15 no.3
    • /
    • pp.85-92
    • /
    • 2013
  • PURPOSES: The purpose of this paper is to estimate expected effects on traffic operational and economic aspects of 2+1 roads application in Korea. METHODS : Micro simulation study using VISSIM 5.0 was used to analyze the operation efficiency of 2+1 roads compared to two-lane highways and four-lane highways. Some scenarios for various traffic volumes were set up in order to analyze the effect of 2+1 roads under various traffic situations. Also imaginary road networks were set up for each type of roads. The MOEs to measure the operation efficiency were selected with average travel speed and delay. For analyzing economic effect of 2+1 roads, construction cost of a specific imaginary 2+1 road was compared to construction cost of a four-lane highway with same conditions. RESULTS: The results of study show that a 2+1 road is more effective with 19 percents higher average travel speed and 39 percents lower average delay than a two-lane highway. In the economic analysis, construction costs to construct a 2+1 road are saved as approximately 26.4~40.7 percents when compared to construction of four-lane highway. CONCLUSIONS: It can be concluded that 2+1 roads can improve the traffic operational level of service for two-lane highways and 2+1 roads can be applied as an effective design alternative for higher-volume two-lane highways in Korea.

A Comprehensive Analysis of the End-to-End Delay for Wireless Multimedia Sensor Networks

  • Abbas, Nasim;Yu, Fengqi
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.6
    • /
    • pp.2456-2467
    • /
    • 2018
  • Wireless multimedia sensor networks (WMSNs) require real-time quality-of-service (QoS) guarantees to be provided by the network. The end-to-end delay is very critical metric for QoS guarantees in WMSNs. In WMSNs, due to the transmission errors incurred over wireless channels, it is difficult to obtain reliable delivery of data in conjunction with low end-to-end delay. In order to improve the end-to-end delay performance, the system has to drop few packets during network congestion. In this article, our proposal is based on optimization of end-to end delay for WMSNs. We optimize end-to-end delay constraint by assuming that each packet is allowed fixed number of retransmissions. To optimize the end-to-end delay, first, we compute the performance measures of the system, such as end-to-end delay and reliability for different network topologies (e.g., linear topology, tree topology) and against different choices of system parameters (e.g., data rate, number of nodes, number of retransmissions). Second, we study the impact of the end-to-end delay and packet delivery ratio on indoor and outdoor environments in WMSNs. All scenarios are simulated with multiple run-times by using network simulator-2 (NS-2) and results are evaluated and discussed.

CTaG: An Innovative Approach for Optimizing Recovery Time in Cloud Environment

  • Hung, Pham Phuoc;Aazam, Mohammad;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1282-1301
    • /
    • 2015
  • Traditional infrastructure has been superseded by cloud computing, due to its cost-effective and ubiquitous computing model. Cloud computing not only brings multitude of opportunities, but it also bears some challenges. One of the key challenges it faces is recovery of computing nodes, when an Information Technology (IT) failure occurs. Since cloud computing mainly depends upon its nodes, physical servers, that makes it very crucial to recover a failed node in time and seamlessly, so that the customer gets an expected level of service. Work has already been done in this regard, but it has still proved to be trivial. In this study, we present a Cost-Time aware Genetic scheduling algorithm, referred to as CTaG, not only to globally optimize the performance of the cloud system, but also perform recovery of failed nodes efficiently. While modeling our work, we have particularly taken into account the factors of network bandwidth and customer's monetary cost. We have implemented our algorithm and justify it through extensive simulations and comparison with similar existing studies. The results show performance gain of our work over the others, in some particular scenarios.