• Title/Summary/Keyword: User's Requirement

Search Result 278, Processing Time 0.023 seconds

A Novel Resource Allocation Algorithm in Multi-media Heterogeneous Cognitive OFDM System

  • Sun, Dawei;Zheng, Baoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.691-708
    • /
    • 2010
  • An important issue of supporting multi-users with diverse quality-of-service (QoS) requirements over wireless networks is how to optimize the systematic scheduling by intelligently utilizing the available network resource while, at the same time, to meet each communication service QoS requirement. In this work, we study the problem of a variety of communication services over multi-media heterogeneous cognitive OFDM system. We first divide the communication services into two parts. Multimedia applications such as broadband voice transmission and real-time video streaming are very delay-sensitive (DS) and need guaranteed throughput. On the other side, services like file transmission and email service are relatively delay tolerant (DT) so varying-rate transmission is acceptable. Then, we formulate the scheduling as a convex optimization problem, and propose low complexity distributed solutions by jointly considering channel assignment, bit allocation, and power allocation. Unlike prior works that do not care computational complexity. Furthermore, we propose the FAASA (Fairness Assured Adaptive Sub-carrier Allocation) algorithm for both DS and DT users, which is a dynamic sub-carrier allocation algorithm in order to maximize throughput while taking into account fairness. We provide extensive simulation results which demonstrate the effectiveness of our proposed schemes.

An Adaptive Location Detection Scheme for Energy-Efficiency of Smartphones (스마트폰 배터리 효율성을 위한 적응적 위치 탐지 기법)

  • Kim, Dohee;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.119-124
    • /
    • 2015
  • As Location-Based Services (LBSs) of smartphones increases, the power consumption of a smartphone due to Global Positioning System (GPS) is becoming increasingly serious. This paper presents a new location estimation scheme for smartphones called Adaptive Location Detection (ALD). ALD adaptively detects the location of a smartphone considering the movement pattern of a user, category of applications executed in the smartphone, and the battery level. Simulation with various real applications and scenarios show that ALD reduces 37% of energy consumption compared to GPS. Nevertheless, it satisfies the accuracy requirement of each situation.

A Study on the Considerable Factors for Development of Military Vehicles (군용차량 개발시 고려요소 개발 연구)

  • Lee, Bum-Koo;Cha, Hyun-Jong;Yang, Ho-Kyung;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.49-56
    • /
    • 2011
  • Recently, the army make plans for the development of new conceptual military vehicles. As the development of military vehicles, we need selecting of considerable factors for solution of user's additional requirements, systematic and efficient development management of military vehicles. For this study, we made up questions from 4 specialist's groups about military vehicles as manager group, operator group, maker group, researcher group. There were 22 selected factors in the result of gathering the specialists' opinions and the result of this study will useful for hereafter development of military vehicles.

The Design and Implementation of e-BCOS for e-Business Component System (e-비즈니스 컴포넌트 시스템 설계 및 구현)

  • Choi, Ha-Jung;Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.85-100
    • /
    • 2003
  • Today's computing system has expanded its application to business trade and distributed work transactions using the Internet. As the demand for more flexible, adaptable, extensible, and robust web-based enterprise, these application development has been gradually expanded based on reusable, independent, and portable components. Component Based Development (CBD) works by developing and evolving software from selected reusable software components and then assembling them within appropriate software architecture. However, it requires an increase in cost to build new components as well as the necessary effort to develop of the business requirement these components. Standardized component models are required as well from the perspective of systems in order to support rapid and exact component information transmission on the web. In this paper, we describe the e-Business Component Development with agent for rapid application development on the web that correspond to the demands of users in the business domain. We design and implement the specifications of e-business components by combining these demands. In order to improve the agent register and retrieval, we propose the intelligent search and register agents, which can conduct more precise searching and specializing for components. The system enables the locating of user's frequently used components through an agent involving register and retrieval, as well as rapid procedures for registers The e-BCOS (e-Business Component System) is the agent system for the user to register distributed components and to search for components Information. The e-BCOS increases reusability through the e-business component development of distributed components in the business domain. For the share and delivery, specification with XML is acceptable to user's variable order e-BCOS Includes the effective investment, timeliness, reliability, efficiency, and maintenance effort by with agent.

Packet Scheduling Algorithms for Throughput Fairness and Coverage Enhancement in TDD-OFDMA Downlink Network (TDD-OFDMA 하향 링크에서의 수율 공평성과 서비스 커버리지 보장을 위한 패킷 스케줄링 알고리즘 연구)

  • Ki, Young-Min;Kim, Dong-Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7A
    • /
    • pp.611-619
    • /
    • 2005
  • The present paper proposes two different packet scheduling algorithms in the IEEE 802.16e type TDD-OFDMA downlink, which are the weighted fair scheduling(WFS) and the throughput guarantee scheduling(TGS). The performance of proposed scheduling algorithms are compared to some of conventional schedulers such as round robin(RR), proportional fair(PF), fast fair throughput(FFTH), and fair throughput(FH) in terms of service coverage, effective throughput and fairness at 64 kbps and 128 kbps minimum user throughput requirements. For a relatively smaller throughput(64 kbps) requirement, the proposed algorithms provide higher improvement in the number of users per sector within 95$\%$ service coverage while satisfying the lxEV-DV fairness criterion. For a relatively larger throughput(128 kbps) requirement, the proposed algorithms provide higher coverage enhancement while maintaining the same effective aggregate throughput over PF scheduler.

The Mobile Meeting Authentication Scheme Providing Mobility and Privacy (이동성과 프라이버시를 제공하는 모바일 회의 인증 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.243-248
    • /
    • 2014
  • The demand for messenger service goes on growing rapidly with widespread use of smartphones. Generally, the smartphone messenger provides group communication functions in which users can make the group and communicate with each other. In the mobile meeting, the attendees can participate in the meeting with use of smartphone messengers wherever they are. To make the mobile meeting put to practical use, the mobility and privacy should be ensured to attendees. To satisfy the mobility requirement, the user which is not belong to the group members should not be able to participate in the meeting. To ensure the privacy requirement, the attendees should have not to repudiate the meeting results. In this study, the mobile meeting authentication scheme is proposed which provides mobility and privacy. The proposed scheme consists of meeting group creation, group key generation, group signature and verification protocols. All attendees should have to participate in the signature verification because it is based on the challenge-response type protocol. Thus, it's not possible to collude with malicious attendees to change the meeting results.

Feature-Oriented Requirements Change Management with Value Analysis (가치분석을 통한 휘처 기반의 요구사항 변경 관리)

  • Ahn, Sang-Im;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.33-47
    • /
    • 2007
  • The requirements have been changed during development progresses, since it is impossible to define all of software requirements. These requirements change leads to mistakes because the developers cannot completely understand the software's structure and behavior, or they cannot discover all parts affected by a change. Requirement changes have to be managed and assessed to ensure that they are feasible, make economic sense and contribute to the business needs of the customer organization. We propose a feature-oriented requirements change management method to manage requirements change with value analysis and feature-oriented traceability links including intermediate catalysis using features. Our approach offers two contributions to the study of requirements change: (1) We define requirements change tree to make user requirements change request generalize by feature level. (2) We provide overall process such as change request normalization, change impact analysis, solution dealing with change request, change request implementation, change request evaluation. In addition, we especially present the results of a case study which is carried out in asset management portal system in details.

  • PDF

A Study on the Quality-of-Experience in Mobile Video Adaptive Streaming under Active Bluetooth Connection (와이파이-블루투스 콤보칩 사용이 모바일 비디오 스트리밍 서비스에 미치는 영향 분석)

  • Lee, Jongho;Choi, Jaehyuk
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.46-51
    • /
    • 2020
  • With Wi-Fi and Bluetooth connectivity becoming more common in today's handheld mobile devices, single-chip multi-radio combo-modules, which integrate two or more heterogeneous wireless radios on a single chip, are becoming more and more popular. The key requirement for combo solutions is that the quality of the user experience (QoE) must not be compromised by degrading connectivity performance. Therefore, characterizing and understanding the behaviour of combo-module is of vital importance to ensure this requirement in various environments. In this paper, we investigate the impact of the use of combo-modules on the performance of mobile video streaming over a Wi-Fi network. Our study reveals that the use of combo-modules incurs considerable side effects on QoE for mobile video streaming applications when the Wi-Fi and Bluetooth operate at the same time in the 2.4GHz ISM band. We reveal that rate-based adaptive algorithms, including the most popular adaptive bitrate streaming MPEG-DASH, is more severely affected by this phenomenon than buffer-based adaptive algorithms.

정지궤도 통신해양기상위성의 기상분야 요구사항에 관하여

  • Ahn, Myung-Hwan;Kim, Kum-Lan
    • Atmosphere
    • /
    • v.12 no.4
    • /
    • pp.20-42
    • /
    • 2002
  • Based on the "Mid to Long Term Plan for Space Development", a project to launch COMeS (Communication, Oceanography, and Meteorological Satellite) into the geostationary orbit is undergoing. Accordingly, KMA (Korea Meteorological Administration) has defined the meteorological missions and prepared the user requirements to fulfill the missions. To make a realistic user requirements, we prepared a first draft based on the ideal meteorological products derivable from a geostationary platform and sent the RFI (request for information) to the sensor manufacturers. Based on the responses to the RFI and other considerations, we revised the user requirement to be a realistic plan for the 2008 launch of the satellite. This manuscript introduces the revised user requirements briefly. The major mission defined in the revised user requirement is the augmentation of the detection and prediction ability of the severe weather phenomena, especially around the Korean Peninsula. The required payload is an enhanced Imager, which includes the major observation channels of the current geostationary sounder. To derive the required meteorological products from the Imager, at least 12 channels are required with the optimum of 16 channels. The minimum 12 channels are 6 wavelength bands used for current geostationary satellite, and additional channels in two visible bands, a near infrared band, two water vapor bands and one ozone absorption band. From these enhanced channel observation, we are going to derive and utilize the information of water vapor, stability index, wind field, and analysis of special weather phenomena such as the yellow sand event in addition to the standard derived products from the current geostationary Imager data. For a better temporal coverage, the Imager is required to acquire the full disk data within 15 minutes and to have the rapid scan mode for the limited area coverage. The required thresholds of spatial resolutions are 1 km and 2 km for visible and infrared channels, respectively, while the target resolutions are 0.5 km and 1 km.

A Reservation-based QoS Routing Protocol for Mobile Ad-Hoc Networks (이동 애드혹 네트워크를 위한 예약 기반의 QoS 라우팅 프로토콜)

  • Joe, In-Whee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.805-810
    • /
    • 2005
  • According to the user requirements for continuous and real-time multimedia information, the concept of Quality of Service (QoS) has emerged as a main issue in mobile ad-hoc networks. QoS routing is to find the route that meets the QoS requirements of the users. In this paper, we propose a routing protocol that is based on AODV over TDMA, one of the typical routing protocols for mobile ad-hoc networks, by making a bandwidth reservation for QoS guarantee. While the existing schemes calculate the maximum available bandwidth for each candidate path, our scheme is to check only if the bandwidth of a given path satisfies the end-to-end QoS requirement and then to make a reservation by allocating time slots efficiently in the wireless environment. In order to evaluate the performance of the proposed QoS routing protocol, some simulations are carried out in the ad-hoc environment.