• Title/Summary/Keyword: User's path

Search Result 301, Processing Time 0.026 seconds

Mobility-Aware Service Migration (MASM) Algorithms for Multi-Access Edge Computing (멀티 액세스 엣지 컴퓨팅을 위한 Mobility-Aware Service Migration (MASM) 알고리즘)

  • Hamzah, Haziq;Le, Duc-Tai;Kim, Moonseong;Choo, Hyunseung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.1-8
    • /
    • 2020
  • In order to reach Ultra-Reliable Low-Latency communication, one of 5G aims, Multi-access Edge Computing paradigm was born. The idea of this paradigm is to bring cloud computing technologies closer to the network edge. User services are hosted in multiple Edge Clouds, deployed at the edge of the network distributedly, to reduce the service latency. For mobile users, migrating their services to the most proper Edge Clouds for maintaining a Quality of Service is a non-convex problem. The service migration problem becomes more complex in high mobility scenarios. The goal of the study is to observe how user mobility affects the selection of Edge Cloud during a fixed mobility path. Mobility-Aware Service Migration (MASM) is proposed to optimize service migration based on two main parameters: routing cost and service migration cost, during a high mobility scenario. The performance of the proposed algorithm is compared with an existing greedy algorithm.

An Interactive Monitoring Application for Secure Experiments of Guidance System for Person with Visual Impairment (시각장애인 보행지원 시스템의 안전한 실험을 위한 대화식 모니터링 어플리케이션)

  • Lee, Jin-Hee;Lee, Eun-Seok;Shin, Byeong-Seok
    • Journal of the HCI Society of Korea
    • /
    • v.8 no.2
    • /
    • pp.1-8
    • /
    • 2013
  • In previous study, we developed a guidance system outdoors for person with visual impairment to be able to walk safely to the destination. The volunteers are exposed to dangerous situations since they are performed to the experiments in the outdoors. In order to solve the problem, we propose an interactive application that monitors the volunteer wearing guidance system and warns remotely the volunteer about dangerous situations. The application is used to remote wireless communication with guidance system through Bluetooth module that is built in a laptop computer, without additional device. Therefore, we can monitor in real time user's location and guided contents to user, and it is possible to check a path to the destination and POI (Point of Interest) coordinate values. As using a proposed monitoring application, it is possible to perform safe experiment with the rapid situation awareness and fast detection of dangerous.

  • PDF

Capacity and Secrecy Rate Analysis of a Frequency-Domain Equal-Gain-Combining TR Scheme for Distributed Antenna Systems in Multi-User Multi-Path Fading Channels (다중 사용자 다중 경로 페이딩 채널에서 분산 안테나 시스템을 위한 주파수 영역 Equal-Gain-Combining TR 기법의 Capacity와 Secrecy Rate 분석)

  • Kim, Myoung-Seok;Lee, Chungyong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.10
    • /
    • pp.47-53
    • /
    • 2012
  • Time-reversal (TR) precoding focuses the energy of the effective channel in time and improves receive performance of a single tap receiver. Frequency-domain equal-gain-combining (FD-EGC) TR scheme, which works in linear block precoding fashion, has better temporal focusing performance than the traditional TR. Also, the FD-EGC improves receive performance of minimum mean square error receiver with distributed antenna systems (DAS). The detailed receive performance of the FD-EGC was analyzed in our previous work. In this paper, we focused on capacity analysis of the FD-EGC in DAS. We derived a scaling law which shows how the use of multiple antenna can increase the capacity of the FD-EGC precoding compared with that of no precoding. In addition, we analyze the secrecy rate of the FD-EGC which shows how high-rate messages can be transmitted towards an intended user without being decoded by the other users from the view point of information theoretic security.

Holographic Forensic Mark based on DWT-SVD for Tracing of the Multilevel Distribution (다단계 유통 추적을 위한 DWT-SVD 기반의 홀로그래피 포렌식마크)

  • Li, De;Kim, Jong-Weon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.155-160
    • /
    • 2010
  • In this paper, we proposed a forensic mark algorithm which can embed the distributor's information at each distribution step to trace the illegal distribution path. For this purpose, the algorithm has to have the high capacity payload for embedding the copyright and user information at each step, and the embedded information at a step should not interfere with the information at other step. The proposed algorithm can trace the multilevel distribution because the forensic mark is generated by digital hologram and embedded in the DWT-SVD domain. For the high capacity embedding, the off-axis hologram is generated from the forensic mark and the hologram is embedded in the HL, LH, HH bands of the DWT to reduce the signal interference. The SVD which is applied the holographic signal enhanced the detection performance and the safety of the forensic mark algorithm. As the test results, this algorithm was able to embed 128bits information for the copyright and user information at each step. In this paper, we can embed total 384bits information for 3 steps and the algorithm is also robust to the JPEG compression.

Applications to Recommend Moving Route by Schedule Using the Route Search System of Map API (지도 API의 경로 탐색 시스템을 활용한 일정 별 동선 추천 애플리케이션)

  • Ji-Woo Kim;Jung-Yi Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.1-6
    • /
    • 2023
  • The purpose of this study is to research and develop so that users who are gradually progressing in the popularization of smartphones and the calculation of agricultural quality can use more active and flexible applications than existing application fields. People use event management applications to remember what they need to do, and maps applications to get to their appointments on time. You will need to build a glue-delivered application that leverages the Maps API to be able to recommend the glove's path for events so that the user can use the application temporarily. By comparing and analyzing currently used calendar, map, and schedule applications, several Open Maps APIs were compared to supplement the weaknesses and develop applications that converge the strengths. The results of application development by applying the optimal algorithm for recommending traffic routes according to time and place for the schedule registered by the user are described.

An Efficient Admission Control and Resource Allocation Methods in DiffServ Networks (인터넷 차별화 서비스 네트워크에서의 효율적인 호 수락 제어 및 자원 이용 방안에 관한 연구)

  • 조병일;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.698-712
    • /
    • 2004
  • DiffServ network architecture does not define a call admission control procedure explicitly. In this paper, a new DiffServ QoS control mechanism is suggested which, after the call admission control, can execute packet process according to the class while, at the same time, executing on the flow based call admission control in the DiffServ network. Routers on the path from the source to the destination estimate the aggregated class traffic of the existing flows and the new incoming flow and then, perform a call admission control in accordance with the type of classes efficiently based on the required bandwidth per each class that can meet the user's QoS requirements. In order to facilitate the packet process according to the class after the flow based call admission control, a mechanism is suggested that can adjust the network resources to classes dynamically. The performance analysis on this mechanism is carried out through a simulation.

  • PDF

Effect of Interactivity on Cognitive-affective-behavioral User Responses: Focusing on Korean and Chinese Mobile Users (상호작용성이 사용자의 인지-정의-행위적 반응에 미치는 영향: 한국과 중국 모바일 사용자를 중심으로)

  • Um, Myoung-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.6
    • /
    • pp.135-150
    • /
    • 2016
  • This study aims to investigate how perceived interactivity between the mobile messenger application and its user gives rise to user's enjoyment and continuous usage intention. Perceived interactivity was assumed to be formed by the combination of control, share, and responsiveness in light of the previous studies. The relations between perceived interactivity, enjoyment, and usage intention are hypothesized on the basis of the pleasure-arousal-dominance emotional state model, the theory of reasoned action, and the theory of planned behavior. Survey data were collected from 481 mobile messenger users in Korea and China. In order to test hypotheses, structural equation modeling analyses were conducted. As a result, perceived interactivity concerning connectedness and responsiveness not only positively affected enjoyment, but also had a significant effect on usage intention. However, while control positively influenced usage intention, it was not significantly related to enjoyment. In addition, there was a positive relation between enjoyment and usage intention. Incidentally, multi-group analysis was conducted to explore the differences between Korean and Chinese users. The findings would provide managerial implications for mobile messenger corporations on causal effects of perceived interactivity and the differences of the path coefficients between in Korea and China.

A Study on the Intelligent Online Judging System Using User-Based Collaborative Filtering

  • Hyun Woo Kim;Hye Jin Yun;Kwihoon Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.273-285
    • /
    • 2024
  • With the active utilization of Online Judge (OJ) systems in the field of education, various studies utilizing learner data have emerged. This research proposes a problem recommendation based on a user-based collaborative filtering approach with learner data to support learners in their problem selection. Assistance in learners' problem selection within the OJ system is crucial for enhancing the effectiveness of education as it impacts the learning path. To achieve this, this system identifies learners with similar problem-solving tendencies and utilizes their problem-solving history. The proposed technique has been implemented on an OJ site in the fields of algorithms and programming, operated by the Chungbuk Education Research and Information Institute. The technique's service utility and usability were assessed through expert reviews using the Delphi technique. Additionally, it was piloted with site users, and an analysis of the ratio of correctness revealed approximately a 16% higher submission rate for recommended problems compared to the overall submissions. A survey targeting users who used the recommended problems yielded a 78% response rate, with the majority indicating that the feature was helpful. However, low selection rates of recommended problems and low response rates within the subset of users who used recommended problems highlight the need for future research focusing on improving accessibility, enhancing user feedback collection, and diversifying learner data analysis.

Permission Inheritance Expression with Role Hierarchy of RBAC (역할기반 접근통제에서 역할 계층에 따른 접근권한 상속의 표현)

  • Lee, Sang-Ha;Jo, In-Jun;Cheon, Eun-Hong;Kim, Dong-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2125-2134
    • /
    • 2000
  • RBAC(Role Based Access Control) has the advantage that reflects the real world because it presents a basic access control model based on user's role in organizations or governments. But in RBAC model, the privileges of the senior roles in these hierarchies are inherited from those of the junior roles, so RBAC model has the privileges problem that he senior are given more privileges than they need. That is, it tends to infringe the Principle of Least Privilege. On the other hand, if we give some excessive constraints on the RBAC model without scrupulous care, it may be meaningless property of role hierarchies. Furthermore, such complicated constraints make it more difficult to mange resources and roles in huge enterprise environments. The purpose of this paper is to solve the problems of role hierarchies such as inefficient role managements and abuse of privileges by using newly presented the backward tag pointer path expression in the inheritance of privileges.

  • PDF

Social-relation Aware Routing Protocol in Mobile Ad hoc Networks (이동 애드 혹 네트워크를 위한 사회적 관계 인식 라우팅 프로토콜)

  • An, Ji-Sun;Ko, Yang-Woo;Lee, Dong-Man
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.798-802
    • /
    • 2008
  • In this paper, we consider mobile ad hoc network routing protocols with respect to content sharing applications. We show that by utilizing social relations among participants, our routing protocols can improve its performance and efficiency of caching. Moreover, in certain situation which we can anticipate pattern of user's content consumption, our scheme can help such applications be more efficient in terms of access time and network overhead. Using NS2 simulator, we compare our scheme to DSDV and routing protocol using shortest path algorithm.