• Title/Summary/Keyword: heterogeneous information network

Search Result 757, Processing Time 0.031 seconds

A Bankruptcy Game for Optimize Caching Resource Allocation in Small Cell Networks

  • Zhang, Liying;Wang, Gang;Wang, Fuxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2319-2337
    • /
    • 2019
  • In this paper, we study the distributed cooperative caching for Internet content providers in a small cell of heterogeneous network (HetNet). A general framework based on bankruptcy game model is put forth for finding the optimal caching policy. In this framework, the small cell and different content providers are modeled as bankrupt company and players, respectively. By introducing strategic decisions into the bankruptcy game, we propose a caching value assessment algorithm based on analytic hierarchy process in the framework of bankruptcy game theory to optimize the caching strategy and increase cache hit ratio. Our analysis shows that resource utilization can be improved through cooperative sharing while considering content providers' satisfaction. When the cache value is measured by multiple factors, not just popularity, the cache hit rate for user access is also increased. Simulation results show that our approach can improve the cache hit rate while ensuring the fairness of the distribution.

Towards Agile Application Integration with M2M Platforms

  • Chen, Menghan;Shen, Beijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.84-97
    • /
    • 2012
  • M2M (Machine-to-Machine) Technology makes it possible to network all kinds of terminal devices and their corresponding enterprise applications. Therefore, several M2M platforms were developed in China in order to collect information from terminal devices dispersed all over the local places through 3G wireless network. However, when enterprise applications try to integrate with M2M platforms, they should be maintained and refactored to adapt the heterogeneous features and properties of M2M platforms. Moreover, syntactical and semantic unification for information sharing among applications and devices are still unsolved because of raw data transmission and the usage of distinguished business vocabularies. In this paper, we propose and develop an M2M Middleware to support agile application integration with M2M platform. This middleware imports the event engine and XML-based syntax to handle the syntactical unification, makes use of Ontology-based semantic mapping to solve the semantic unification and adopts WebService and ETL techniques to sustain multi-pattern interactive approach, in order to agilely make applications integrated with the M2M platform. Now, the M2M Middleware has been applied in the China Telecom M2M platform. The operation results show that applications will cost less time and workload when being integrated with M2M platform.

Robust and Auditable Secure Data Access Control in Clouds

  • KARPAGADEEPA.S;VIJAYAKUMAR.P
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.95-102
    • /
    • 2024
  • In distributed computing, accessible encryption strategy over Auditable data is a hot research field. Be that as it may, most existing system on encoded look and auditable over outsourced cloud information and disregard customized seek goal. Distributed storage space get to manage is imperative for the security of given information, where information security is executed just for the encoded content. It is a smaller amount secure in light of the fact that the Intruder has been endeavored to separate the scrambled records or Information. To determine this issue we have actualize (CBC) figure piece fastening. It is tied in with adding XOR each plaintext piece to the figure content square that was already delivered. We propose a novel heterogeneous structure to evaluate the issue of single-point execution bottleneck and give a more proficient access control plot with a reviewing component. In the interim, in our plan, a CA (Central Authority) is acquainted with create mystery keys for authenticity confirmed clients. Not at all like other multi specialist get to control plots, each of the experts in our plan deals with the entire trait set independently. Keywords: Cloud storage, Access control, Auditing, CBC.

Device-to-Device Communication Power Control Technique for Ensuring Communication Security of Cellular System (셀룰러 망 통신보안을 위한 D2D 통신 송신전력 제어 기법)

  • Lee, Kisong;Hong, Jun-Pyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1100-1105
    • /
    • 2017
  • In this paper, we propose a power control technique for D2D communication in the heterogenous network consisting of cellular and D2D communication systems. Although the transmit signal of D2D communication degrades the performance of cellular system by interfering the signal reception at CU in the conventional heterogenous networks without eavesdroppers, it can be utilized as jamming signal for preventing other devices from recovering the transmitted information if there are eavesdroppers in the network. The proposed power control technique maximizes the achievable rate of D2D communication while ensuring the target security performance of cellular communication system. Through simulation results, we validate the analysis results and compare the performance with the conventional D2D communication scheme that utilizes its full transmit power for maximizing the achievable rate regardless of the performance of cellular system.

Asymmetric data storage management scheme to ensure the safety of big data in multi-cloud environments based on deep learning (딥러닝 기반의 다중 클라우드 환경에서 빅 데이터의 안전성을 보장하기 위한 비대칭 데이터 저장 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.211-216
    • /
    • 2021
  • Information from various heterogeneous devices is steadily increasing in distributed cloud environments. This is because high-speed network speeds and high-capacity multimedia data are being used. However, research is still underway on how to minimize information errors in big data sent and received by heterogeneous devices. In this paper, we propose a deep learning-based asymmetric storage management technique for minimizing bandwidth and data errors in networks generated by information sent and received in cloud environments. The proposed technique applies deep learning techniques to optimize the load balance after asymmetric hash of the big data information generated by each device. The proposed technique is characterized by allowing errors in big data collected from each device, while also ensuring the connectivity of big data by grouping big data into groups of clusters of dogs. In particular, the proposed technique minimizes information errors when storing and managing big data asymmetrically because it used a loss function that extracted similar values between big data as seeds.

A Hybrid RBF Network based on Fuzzy Dynamic Learning Rate Control (퍼지 동적 학습률 제어 기반 하이브리드 RBF 네트워크)

  • Kim, Kwang-Baek;Park, Choong-Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.33-38
    • /
    • 2014
  • The FCM based hybrid RBF network is a heterogeneous learning network model that applies FCM algorithm between input and middle layer and applies Max_Min algorithm between middle layer and output. The Max-Min neural network uses winner nodes of the middle layer as input but shows inefficient learning in performance when the input vector consists of too many patterns. To overcome this problem, we propose a dynamic learning rate control based on fuzzy logic. The proposed method first classifies accurate/inaccurate class with respect to the difference between target value and output value with threshold and then fuzzy membership function and fuzzy decision logic is designed to control the learning rate dynamically. We apply this proposed RBF network to the character recognition problem and the efficacy of the proposed method is verified in the experiment.

Performance Analysis and Evaluation of Deployment in Small Cell Networks

  • Zheng, Kan;Li, Yue;Zhang, Yingkai;Jiang, Zheng;Long, Hang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.886-900
    • /
    • 2015
  • Small cells are deployed in Heterogeneous Networks (HetNet) to improve overall performance. These access points can provide high-rate mobile services at hotspots to users. In a Small Cell Network (SCN), the good deployment of small cells can guarantee the performance of users on the basis of average and cell edge spectrum efficiency. In this paper, the performance of small cell deployment is analyzed by using system-level simulations. The positions of small cells can be adjusted according to the deployment radius and angle. Moreover, different Inter-Cell Interference Coordination (ICIC) techniques are also studied, which can be implemented either in time domain or in frequency domain. The network performances are evaluated under different ICIC techniques when the locations of Small evolved Nodes (SeNBs) vary. Simulation results show that the average throughput and cell edge throughput can be greatly improved when small cells are properly deployed with the certain deployment radius and angle. Meanwhile, how to optimally configure the parameters to achieve the potential of the deployment is discussed when applying different ICIC techniques.

Implementation of TMN-based Performance Proxy Agent for ATM Switching Systems (ATM 교환 시스템을 위한 TMN 기반의 Proxy 성능 관리대행자 구현)

  • 권봉경;김화성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.562-570
    • /
    • 2002
  • The network-wide performance management is crucial for maintaining the quality of network services, which requires the collection and monitoring the performance data at individual network nodes. Most of the public networks, however, are composed of diverse, heterogeneous network nodes that are managed by various types of proprietary management systems with a conventional operator console and embedded management functions, which makes it difficult to implement the integrated performance management systems. Even though the developments of TMN (Telecommunication Management Network) based management systems are being attempted, the little work has been done in performance management area. In this paper, we propose the performance monitoring architecture for ATM switches using the 0₃ object model and describe how to implement the TMN-based performance prosy agent for ATM switching systems. The proposed performance proxy agent provides the TMN standard performance management interfaces by translating the proprietary performance management functions, which eventually leads to network-wide integrated performance management.

Design and Simulation of a Flow Mobility Scheme Based on Proxy Mobile IPv6

  • Choi, Hyon-Young;Min, Sung-Gi;Han, Youn-Hee;Koodli, Rajeev
    • Journal of Information Processing Systems
    • /
    • v.8 no.4
    • /
    • pp.603-620
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) is a network-based mobility support protocol and it does not require Mobile Nodes (MNs) to be involved in the mobility support signaling. In the case when multiple interfaces are active in an MN simultaneously, each data flow can be dynamically allocated to and redirected between different access networks to adapt to the dynamically changing network status and to balance the workload. Such a flow redistribution control is called "flow mobility". In the existing PMIPv6-based flow mobility support, although the MN's logical interface can solve the well-known problems of flow mobility in a heterogeneous network, some missing procedures, such as an MN-derived flow handover, make PMIPv6-based flow mobility incomplete. In this paper, an enhanced flow mobility support is proposed for actualizing the flow mobility support in PMIPv6. The proposed scheme is also based on the MN's logical interface, which hides the physical interfaces from the network layer and above. As new functional modules, the flow interface manager is placed at the MN's logical interface and the flow binding manager in the Local Mobility Anchor (LMA) is paired with the MN's flow interface manager. They manage the flow bindings, and select the proper access technology to send packets. In this paper, we provide the complete flow mobility procedures which begin with the following three different triggering cases: the MN's new connection/disconnection, the LMA's decision, and the MN's request. Simulation using the ns-3 network simulator is performed to verify the proposed procedures and we show the network throughput variation caused by the network offload using the proposed procedures.

Resource Allocation in Multi-Domain Networks Based on Service Level Specifications

  • Avallone Stefano;D'Antonio Salvatore;Esposito Marcello;Romano Simon Pietro;Ventre Giorgio
    • Journal of Communications and Networks
    • /
    • v.8 no.1
    • /
    • pp.106-115
    • /
    • 2006
  • The current trend toward the utilization of the Internet as a common means for the offer of heterogeneous services imposes to address the issues related to end-to-end service assurance in the inter-domain scenario. In this paper, we first present an architecture for service management in networks based on service level specifications (SLS). The architecture is designed to be independent both of the specific network technology adopted and of the high level service semantics. Then, we focus on a specific functionality of the proposed architecture: Resource allocation in the multi-domain scenario. A distributed admission control algorithm is introduced, its complexity is evaluated and a comparison with related solutions is provided.