• Title/Summary/Keyword: access structure

Search Result 1,312, Processing Time 0.025 seconds

Design and Performance evaluation of Fuzzy-based Framed Random Access Controller ($F^2RAC$) for the Integration of Voice ad Data over Wireless Medium Access Control Protocol (프레임 구조를 갖는 무선 매체접속제어 프로토콜 상에서 퍼지 기반의 음성/데이터 통합 임의접속제어기 설계 및 성능 분석)

  • 홍승은;최원석;김응배;강충구;임묘택
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.189-192
    • /
    • 2000
  • This paper proposes a fuzzy-based random access controller with a superimposed frame structure (F$^2$RAC) fur voice/data-integrated wireless networks. F$^2$RAC adopts mini-slot technique for reducing contention cost, and these mini-slots of which number may dynamically vary from one frame to the next as a function of the traffic load are further partitioned into two regions for access requests coming from voice and data traffic with their respective QoS requirements. And F$^2$RAC is designed to properly determine the access regions and permission probabilities for enhancing the data packet delay while ensuring the voice packet dropping probability constraint. It mainly consists of the estimator with Pseudo-Bayesian algorithm and fuzzy logic controller with Sugeno-type of fuzzy rules. Simulation results prove that F$^2$RAC can guarantee QoS requirement of voice and provide the highest throughput efficiency and the smallest data packet delay amongst the different alternatives including PRMA[1], IPRMA[2], and SIR[3].

  • PDF

BACS : An Experimental Study For Access Control System In Public Blockchain (BACS : 퍼블릭 블록체인 접근 통제 시스템에 관한 실험적 연구)

  • Han, Sejin;Lee, Sunjae;Lee, Dohyeon;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • In this paper, we propose an access control system using cryptography as a method to protect personal data in public blockchain. The proposed system is designed to encrypt data according to the access policy, store it in the blockchain, and decrypt only the person who satisfy the access policy. In order to improve performance and scalability, an encryption mechanism is implemented outside the blockchain. Therefore, data access performance could be preserved while cryptographic operations executed Furthermore it can also improve the scalability by adding new access control modules while preserving the current configuration of blockchain network. The encryption scheme is based on the attribute-based encryption (ABE). However, unlike the traditional ABE, the "retention period", is incorporated into the access structure to ensure the right to be forgotten. In addition, symmetric key cryptograpic algorithms are used for the performance of ABE. We implemented the proposed system in a public blockchain and conducted the performance evaluation.

Design of Radio Interface Protocols for Broadband CDMA Wireless Local Loop and Access Channel Performance Analysis (광대역 CDMA WLL 무선 프로토콜 설계 및 액세스채널의 성능분석)

  • 김영태;박기식;조정호;김광현;이태훈
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.1
    • /
    • pp.47-58
    • /
    • 1999
  • In this paper, we design the radio interface protocols of wideband Wireless Local Loop(WLL) that uses wideband Code Division Multiple Access(CDMA), and propose the random access procedures on access channel and analyze the performance of the channel. The structure of radio interface protocols are designed by three modular parts to meet the requirements of IMT-2000 : radio resource controlling part that depends on the radio resources, connection controlling part that is independent of the radio resources, and application part that supports the interface between different parts and user terminals. In addition, we propose the random access procedures on access channel and analyze the performance of the channel. We assume that both near-far effect and shadow fading can be compensated by open loop power control. We observe that the number of access probes(delay) depend on the initial mobile transmission power and power increment, and the poor estimation of initial mobile transmission power might increase the average number of access probes.

  • PDF

An OFDMA-Based Next-Generation Wireless Downlink System Design with Hybrid Multiple Access and Frequency Grouping Techniques

  • Lee Won-Ick;Lee Byeong Gi;Lee Kwang Bok;Bahk Saewoong
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.115-125
    • /
    • 2005
  • This paper discusses how to effectively design a next-generation wireless communication system that can possibly provide very high data-rate transmissions and versatile quality services. In order to accommodate the sophisticated user requirements and diversified user environments of the next-generation systems, it should be designed to take an efficient and flexible structure for multiple access and resource allocation. In addition, the design should be optimized for cost-effective usage of resources and for efficient operation in a multi-cell environment. As orthogonal frequency division multiple access (OFDMA) has turned out in recent researches to be one of the most promising multiple access techniques that can possibly meet all those requirements through efficient radio spectrum utilization, we take OFDMA as the basic framework in the next-generation wireless communications system design. So, in this paper, we focus on introducing an OFDMA-based downlink system design that employs the techniques of hybrid multiple access (HMA) and frequency group (FG) in conjunction with intra-frequency group averaging (IFGA). The HMA technique combines various multiple access schemes on the basis of OFDMA system, adopting the multiple access scheme that best fits to the given user condition in terms of mobility, service, and environment. The FG concept and IFGA technique help to reduce the feedback overhead of OFDMA system and the other-cell interference (OCI) problem by grouping the sub-carriers based on coherence band-widths and by harmonizing the channel condition and OCI of the grouped sub-carriers.

A Study on Movements to Establish RDA and Its Contents Structure (RDA의 제정동향 및 내용구조에 관한 연구)

  • Park, Jin-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.1
    • /
    • pp.317-338
    • /
    • 2009
  • The Joint Steering Committee has been preparing for RDA that can be a new rule with revising AACR completely aimed at 2009. RDA can be used not only in traditional library catalogue, but in web-based environment as well. Furthermore it follows up the standard of international contents for the purpose of providing the bibliographic description and the access point of all media. This study investigates the establishing background, the features and the contents structure of RDA including famous scholars' comments.

  • PDF

A Study on Intelligent Edge Computing Network Technology for Road Danger Context Aware and Notification

  • Oh, Am-Suk
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.3
    • /
    • pp.183-187
    • /
    • 2020
  • The general Wi-Fi network connection structure is that a number of IoT (Internet of Things) sensor nodes are directly connected to one AP (Access Point) node. In this structure, the range of the network that can be established within the specified specifications such as the range of signal strength (RSSI) to which the AP node can connect and the maximum connection capacity is limited. To overcome these limitations, multiple middleware bridge technologies for dynamic scalability and load balancing were studied. However, these network expansion technologies have difficulties in terms of the rules and conditions of AP nodes installed during the initial network deployment phase In this paper, an intelligent edge computing IoT device is developed for constructing an intelligent autonomous cluster edge computing network and applying it to real-time road danger context aware and notification system through an intelligent risk situation recognition algorithm.

A REAL-TIME REMOTE SENSING AND DATA ACQUISITION SYSTEM FOR A NUCLEAR POWER PLANT

  • Kim, Ki-Ho;Hieu, Bui Van;Beak, Seung-Hyun;Choi, Seung-Hwan;Son, Tae-Ha;Kim, Jung-Kuk;Han, Seung-Chul;Jeong, Tai-Kyeong
    • Nuclear Engineering and Technology
    • /
    • v.43 no.2
    • /
    • pp.99-104
    • /
    • 2011
  • A Structure Health Monitoring (SHM) system needs a real-time remote data acquisition system to monitor the status of a structure from anywhere via Internet access. In this paper, we present a data acquisition system that monitors up to 40 Fiber Bragg Grating Sensors remotely in real-time. Using a TCP/IP protocol, users can access information gathered by the sensors from anywhere. An experiment in laboratory conditions has been done to prove the feasibility of our proposed system, which is built in special-purpose monitoring system.

A RBAC Model Considering the Characteristics of the Adhocracy Organization (애드호크러시 조직의 특성을 고려한 역할기반 모델)

  • Shim, Won-Bo;Park, Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.41-53
    • /
    • 2002
  • Role Based Access Control (RBAC), which is a method, using role as an access control, has been popular with users and it is recognized as an effective method to replace the Discretionary Access Control and the Mandatory Access Control However, the existing Role Based Access Control Models have only been limited to the bureaucracy organization in which a distinctive hierarchy system was used, incorporating a stable structure and a standardized work system. Only in some parts, some access control models have been used, which supports 'Team' concept, such as Team Based Access Control Model. However, it did not incorporate the characteristics of the adhocracy organization, which is similar to the company's task force team, whose characteristics are organic, temporary, no standardized operation procedures, and many frequent changes. In this study, we have discussed the characteristics of the adhocracy organization which is different from the existing bureaucracy organization, and we have also discussed the problems related to when the existing access control models are used as the access control model for the adhocracy organization due to its characteristics. In addition, based on the problems, we have suggested an improved role based access control model for the adhocracy organization, and have come up with the solutions when any problems occur in the access control system.

Demand Diffusion Pattern of Service with Market Structure & Technological Competition : A Case of Internet Access Service (기술경쟁과 시장구조를 고려한 서비스 수요확산패턴: 인터넷접속서비스를 중심으로)

  • Kim, Moon-Soo;Lee, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9B
    • /
    • pp.822-831
    • /
    • 2008
  • This paper examines the theoretical and empirical technology diffusion processes to understand the Korean success in the internet access service markets. In order to do this, first, we propose an integrated demand diffusion model in terms of competition of inter-and intra-technologies and market structure as represented by the number of operators in the market. Second, by using the proposed model, we analyze the dynamic diffusion processes of Korean internet access services such as Narrow-band technology including Dial modem vs. Broad-band technology including ISDN, xDSL and Cable modem. The competition of inter-and intra-technologies as well as the extent of market competition has made a positive effect on the diffusion patterns of internet access demand. And also we propose, based on the proposed model and its empirical results, several implications for diffusion strategies and policies in the future of ICT market in Korea.