• Title/Summary/Keyword: communication cost

Search Result 3,201, Processing Time 0.031 seconds

Power-aware Ad hoc On-Demand Distance Vector Routing for prolonging network lifetime of MANETs

  • Hoang, Xuan-Tung;Ahn, So-Yeon;Lee, Young-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1317-1320
    • /
    • 2002
  • We present in this paper a new version of AODV that incorporates with "Minimizing Maximum node cost" by formulating that metric as a cost function of residual energy of nodes. An additional parameter is added to the cost function to consider the routing performance along with power-efficiency. The motivation of adding that new parameter is originated from the trace off between power-saving behaviors and routing performance.

  • PDF

Implementation of Low-cost Autonomous Car for Lane Recognition and Keeping based on Deep Neural Network model

  • Song, Mi-Hwa
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.210-218
    • /
    • 2021
  • CNN (Convolutional Neural Network), a type of deep learning algorithm, is a type of artificial neural network used to analyze visual images. In deep learning, it is classified as a deep neural network and is most commonly used for visual image analysis. Accordingly, an AI autonomous driving model was constructed through real-time image processing, and a crosswalk image of a road was used as an obstacle. In this paper, we proposed a low-cost model that can actually implement autonomous driving based on the CNN model. The most well-known deep neural network technique for autonomous driving is investigated and an end-to-end model is applied. In particular, it was shown that training and self-driving on a simulated road is possible through a practical approach to realizing lane detection and keeping.

Secure Group Communication with Dynamic Membership Change in Ad Hoc Networks

  • Kim, Hee-Youl
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1668-1683
    • /
    • 2011
  • The importance of secure communication between only legitimate group members in ad hoc networks has been growing in recent years. Due to the ad hoc nature the scalability on dynamic membership change is a major concern. However, the previous models require at least O(log n) communication cost for key update per each membership change, which imposes a heavy burden on the devices. In this paper we present a scalable model that supports communication-efficient membership change in ad hoc networks by exclusionary keys and RSA functions. The multicast cost for key update is extremely low, that is O(1) , and one-to-one communications occur mostly in neighboring devices.

Social Media Marketing Strategy

  • Nam, Jeongjung;Kang, Min Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.219-223
    • /
    • 2022
  • The Internet can deliver various information and services at the lowest cost without time and space constraints while targeting the world among all existing means of communication. Unlike traditional media such as TV, newspapers, and radio in the past, promotions through mobile environments allow target customers to use two-way low-cost, high-efficiency promotional strategies regardless of time and place. With the development of the Internet, social media has developed into a place to acquire information about favorite companies and their products. Social media greatly contributes to the production of text, photos, videos, and various networks, and has expanded global communication and communication media through the interaction and sharing of various information. In addition, through social media, users can communicate in various ways, reveal themselves, and share and exchange information such as knowledge and personal thoughts. In line with these changes, corporate marketers and sellers are striving to provide consumers with appropriate information more quickly. We aims to find out about social media marketing strategies useful for companies.

Improved Flyweight RFID Authentication Protocol

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.2
    • /
    • pp.95-105
    • /
    • 2012
  • The widespread implementation of RFID in ubiquitous computing is constrained considerably by privacy and security unreliability of the wireless communication channel. This failure to satisfy the basic, security needs of the technology has a direct impact of the limited computational capability of the tags, which are essential for the implementation of RFID. Because the universal application of RFID means the use of low cost tags, their security is limited to lightweight cryptographic primitives. Therefore, EPCGen2, which is a class of low cost tags, has the enabling properties to support their communication protocols. This means that satisfying the security needs of EPCGen2 could ensure low cost security because EPCGen2 is a class of low cost, passive tags. In that way, a solution to the hindrance of low cost tags lies in the security of EPCGen2. To this effect, many lightweight authentication protocols have been proposed to improve the privacy and security of communication protocols suitable for low cost tags. Although many EPCgen2 compliant protocols have been proposed to ensure the security of low cost tags, the optimum security has not been guaranteed because many protocols are prone to well-known attacks or fall short of acceptable computational load. This paper proposes a remedy protocol to the flyweight RFID authentication protocol proposed by Burmester and Munilla against a desynchronization attack. Based on shared pseudorandom number generator, this protocol provides mutual authentication, anonymity, session unlinkability and forward security in addition to security against a desynchronization attack. The desirable features of this protocol are efficiency and security.

  • PDF

Multimedia Contents Dissemination using Mobile Communication and Opportunistic Networks (무선 통신과 기회적 네트워크를 활용한 멀티미디어 콘텐츠 배포)

  • Kim, Seokhyun
    • Journal of Digital Contents Society
    • /
    • v.14 no.3
    • /
    • pp.357-365
    • /
    • 2013
  • The popularization of smart phones changes the usage patterns of mobile communication from voice-centric to data-centric communication. The demand for wireless data communications is rapidly increasing, and thus the need for expanding infrastructure for mobile communication is also rapidly increasing. In this paper, we propose a scheme for reducing the cost for the mobile communication infrastructure by exploiting opportunistic networks in dissemination of multimedia contents. By using this scheme, the large portion of the cost for mobile communication infrastructure could be saved, and the need of users for multimedia contents could be also fulfilled. Our scheme is evaluated using agent-based simulations. The simulation results show that about 70% of mobile communication can be replaced with the data communication through opportunistic networks.

Design and Implementation of E-Mail System for Sea (해상용 전자메일 시스템의 설계 및 구현)

  • 윤희철;임채홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.8
    • /
    • pp.1241-1250
    • /
    • 2002
  • The communication between Ship and Land have bad communication environment and high cost comparing with land situation. In case of data communication for I-mail, the primary used speed is from 4800 bps to 9600bps. even this low speed user has difficulty to use data communication because of high cost. and this kind of data communication software is all imported from foreign country. In this paper we designed and implemented this communication server and client using Inmarsat A/B/miniM/M4/GAN(F77) by benchmarking of foreign product like Netverk, Marinet, Amosmail. the focus of this product is like next 1) communication cost down 2) Link between Ship Application and Land Office Application 3) Convenient of usage in Ship 4) perfect management of message to from ship.

Smart Anti-jamming Mobile Communication for Cloud and Edge-Aided UAV Network

  • Li, Zhiwei;Lu, Yu;Wang, Zengguang;Qiao, Wenxin;Zhao, Donghao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4682-4705
    • /
    • 2020
  • The Unmanned Aerial Vehicles (UAV) networks consisting of low-cost UAVs are very vulnerable to smart jammers that can choose their jamming policies based on the ongoing communication policies accordingly. In this article, we propose a novel cloud and edge-aided mobile communication scheme for low-cost UAV network against smart jamming. The challenge of this problem is to design a communication scheme that not only meets the requirements of defending against smart jamming attack, but also can be deployed on low-cost UAV platforms. In addition, related studies neglect the problem of decision-making algorithm failure caused by intermittent ground-to-air communication. In this scheme, we use the policy network deployed on the cloud and edge servers to generate an emergency policy tables, and regularly update the generated policy table to the UAVs to solve the decision-making problem when communications are interrupted. In the operation of this communication scheme, UAVs need to offload massive computing tasks to the cloud or the edge servers. In order to prevent these computing tasks from being offloaded to a single computing resource, we deployed a lightweight game algorithm to ensure that the three types of computing resources, namely local, edge and cloud, can maximize their effectiveness. The simulation results show that our communication scheme has only a small decrease in the SINR of UAVs network in the case of momentary communication interruption, and the SINR performance of our algorithm is higher than that of the original Q-learning algorithm.

A Study for Improvement Performance on Using Exponentially Weighted Moving Average at IPv6 networks (IPv6 네트웍 환경에서 지수가중적 이동평균 기법을 이용한 성능향상에 관한 연구)

  • Oh, Ji-Hyun;Jeong, Choong-Kyo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.323-326
    • /
    • 2007
  • Mobility Anchor Points are used for the mobility management in HMIPv6 networks. Currently a mobile node selects the MAP farthest away from itself as a new MAP among available candidates when it undertakes a macro handoff. With this technique, however, the traffic tends to be concentrated at a MAP with the largest domain size and the communication cost increases due to the distance between the mobile node and the MAP. In this work, we proposed a cost effective MAP selection scheme. When leaving the current MAP domain. the mobile node calculates the optimum MAP domain size to minimize the local mobility cost at the new MAP domain considering mobile node's velocity and packet transmission rate. The mobile node then selects a MAP domain of size close to the optimum domain size calculated among the candidate MAP domains. In this way, it is possible for the mobile node to select an optimal MAP adaptively taking the network and node states into account, thus reducing the communication cost.

  • PDF