• Title/Summary/Keyword: internet addresses

Search Result 227, Processing Time 0.025 seconds

A novel routing protocol for cognitive radio networks with cooperation process

  • Kim, Sunwoo;Pyeon, Dohoo;Jang, Ingook;Yoon, Hyunsoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3860-3875
    • /
    • 2014
  • Cognitive radio networks (CRNs) are composed of mobile users who can use multiple spectrum bands for communication. CRNs allow unlicensed users (called cognitive users) to efficiently utilize unused licensed spectrums without interfering with communications of licensed users (called primary users). The main goals of CRNs are to mitigate spectrum saturation and to improve spectrum utilization. This paper introduces state-of-the-art routing protocols for CRNs and addresses some limitations of these protocols. To resolve the limitations, we suggest a new research direction for routing protocols in CRNs. We implement our protocol to compare with the existing routing protocols for multi-hop CRNs. Our protocol shows good performance compared to the existing routing protocols in terms of network performance and PU protection.

Antitrust Case of the General Search Service -Focusing on EC's Decision about Google Case ('일반 검색 서비스'의 시장지배력 남용 판결 사례 분석 - Google에 대한 EC의 판결문을 중심으로)

  • Nam, S.J.;Lee, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.2
    • /
    • pp.64-76
    • /
    • 2018
  • This paper addresses the antitrust case of Google's general search service to find evidence and logic used for defining markets, and the proof of dominant power and its abuse in detail. This antitrust case has certain meaning because it is not easy to apply traditional approaches to a general search service, which has two-sided market characteristics. This paper finds some implications through an analysis of the antitrust case shown below. First, for market definition, the overall qualitative analysis can be used to draw conclusions without a quantitative analysis, such as a Small but Significant and Non-transitory Increasing in Price (SSNIP) analysis. Second, the multi-homing behavior seems to be one of the key factors in judging the dominant power in Internet-based services. Lastly, the fact that the value of traffic can differ based on the traffic source needs to be considered to address the competition issue of Internet-based services.

Cost Effective Image Classification Using Distributions of Multiple Features

  • Sivasankaravel, Vanitha Sivagami
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2154-2168
    • /
    • 2022
  • Our work addresses the issues associated with usage of the semantic features by Bag of Words model, which requires construction of the dictionary. Extracting the relevant features and clustering them into code book or dictionary is computationally intensive and requires large storage area. Hence we propose to use a simple distribution of multiple shape based features, which is a mixture of gradients, radius and slope angles requiring very less computational cost and storage requirements but can serve as an equivalent image representative. The experimental work conducted on PASCAL VOC 2007 dataset exhibits marginally closer performance in terms of accuracy with the Bag of Word model using Self Organizing Map for clustering and very significant computational gain.

Revising the Korean Newspaper Advertising Code of Ethics: An Empirical Investigation Leveraging Expert Interviews and Analytic Hierarchy Process (AHP) Surveys

  • Yoo, Seung-Chul;Kang, Seung-Mi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.135-148
    • /
    • 2023
  • The Code of Ethics for Newspaper Advertising in Korea, first implemented in 1976 and subsequently revised in 1976, 1996, and 2021, is a critical regulatory instrument for the country's advertising sector. However, the specialized domain of "advertising ethics," particularly the "code of advertising ethics," remains under-explored. This research addresses this scholarly gap, providing an empirical analysis of the 2021 amendment's revision trajectory. This study employs a robust methodological approach, integrating expert interviews and small-group AHP-based surveys. This approach allows for a comprehensive understanding of the revision needs, referencing existing ethical codes studies, and comparing similar ethics codes nationally and internationally. The research further investigates key challenges such as personal data protection and copyright issues in the rapidly evolving digital media landscape, while preserving the existing code's inherent value. The findings are expected to significantly contribute to the emerging field of advertising ethics in Korea, offering practical implications for future code revisions.

Game Theory-Based Scheme for Optimizing Energy and Latency in LEO Satellite-Multi-access Edge Computing

  • Ducsun Lim;Dongkyun Lim
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.7-15
    • /
    • 2024
  • 6G network technology represents the next generation of communications, supporting high-speed connectivity, ultra-low latency, and integration with cutting-edge technologies, such as the Internet of Things (IoT), virtual reality, and autonomous vehicles. These advancements promise to drive transformative changes in digital society. However, as technology progresses, the demand for efficient data transmission and energy management between smart devices and network equipment also intensifies. A significant challenge within 6G networks is the optimization of interactions between satellites and smart devices. This study addresses this issue by introducing a new game theory-based technique aimed at minimizing system-wide energy consumption and latency. The proposed technique reduces the processing load on smart devices and optimizes the offloading decision ratio to effectively utilize the resources of Low-Earth Orbit (LEO) satellites. Simulation results demonstrate that the proposed technique achieves a 30% reduction in energy consumption and a 40% improvement in latency compared to existing methods, thereby significantly enhancing performance.

An Efficient Logical Volume Manager for SAN (SAN을 위한 효율적인 논리볼륨 관리자)

  • 최영희;남상수;오재철;유재수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.5
    • /
    • pp.73-85
    • /
    • 2002
  • A new architecture coiled the Storage Area Network(SAN) was developed in response to the requirements of high availability of data, scalable growth, and system performance, In order to use SAN more efficiently, most SAN operating system support storage virtualization concepts that allow users to view physical storage devices attached to SAN as a large volume virtually. A logical volume manager plays a key role in storage virtualization. It realizes the storage virtualization by mapping logical addresses to physical addresses, In this paper, we design and implement an efficient and flexible mapping method for logical volume manager. Additionally, to aid flexible mapping, we also design and implement free space management method, The mapping method in this paper supports a snapshot that preserves a volume image at certain time and on-line reorganization to allow users to add or remove storage devices to SAN even while the system is running.

  • PDF

Performance Evaluation of RSIP Gateway in Intranet Environment (인트라넷 환경에서 RSIP 게이트웨이의 성능분석)

  • Kim, Won;Lee, Young-Taek;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.683-688
    • /
    • 2004
  • NAT is a very useful IP address translation technique that allows two connected networks using different and incompatible IP address schemes. But it is impractical to use NAT for an application which uses the encrypted IP packet, embedding IP addresses inside of data payloads, to guarantee End-to-End Security such as IPSec. In addition to rewriting the source/destination IP addresses in the packet, NAT must modify IP checksum every time, which could lead to considerable performance decrease of the overall system in the process of the address translation. RSIP is an alternative to solve these disadvantages of NAT and the address shortage problems. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable public address to a RSIP client temporarily to communicate with public net-work outside of the private network. In this paper, RSIP gateway for intranet environment is designed and its performance is evaluated. From the results of performance evaluation, we knew that RSIP is operated less sensitive to the data traffic. Also, the experiment shows that RSIP performs better than NAT when the transmission data grows larger.

Design of Registrar Server capable of 3rd party SIP Registration (3rd Party SIP Registration 기능 지원을 위한 Registrar 서버 기능 설계)

  • Hyun, Wook;Kang, Shin-Kak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.146-149
    • /
    • 2001
  • In order to provide VoIP service that using SIP on the Internet, users must register their current location to receive call from other cal]or. 13y using REGISTER method, users register his or her SIP URL address and currently contactable addresses to registrar server. The registered addresses are not only SIP URI but also mai]to, http, tel, and so on. In these procedures, we must consider authentication mechanism whether he/she has authority to handle the record or not. In this paper, we will briefly describe authentication mechanism that used in SIP and design of registrar server that support the 3rd party registration.

  • PDF

Dynamic DNS design for HIP (HIP을 적용한 동적 DNS 설계)

  • Jung-Soo Park;In-June Jo
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2004
  • In the current Internet, IP addresses does not support Mobility and Multi-homming because it depend on their topological location. To resolve these problems, IETF hip WG introduces Host Identity Protocol that separates the endpoint identifier and locator roles of IP addresses. However the DNS that was presented for the HIP had only a part of the expansion design from the existing DNS function, so it was not an absolute complete method. This paper propose how the dymanic DNS has been designed so that it support the HIP completely. We added the Host Identity Namespace and the Rendezvous Server Namespace, defined the new PRs in DNS.

  • PDF

Finding Pluto: An Analytics-Based Approach to Safety Data Ecosystems

  • Barker, Thomas T.
    • Safety and Health at Work
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • This review article addresses the role of safety professionals in the diffusion strategies for predictive analytics for safety performance. The article explores the models, definitions, roles, and relationships of safety professionals in knowledge application, access, management, and leadership in safety analytics. The article addresses challenges safety professionals face when integrating safety analytics in organizational settings in four operations areas: application, technology, management, and strategy. A review of existing conventional safety data sources (safety data, internal data, external data, and context data) is briefly summarized as a baseline. For each of these data sources, the article points out how emerging analytic data sources (such as Industry 4.0 and the Internet of Things) broaden and challenge the scope of work and operational roles throughout an organization. In doing so, the article defines four perspectives on the integration of predictive analytics into organizational safety practice: the programmatic perspective, the technological perspective, the sociocultural perspective, and knowledge-organization perspective. The article posits a four-level, organizational knowledge-skills-abilities matrix for analytics integration, indicating key organizational capacities needed for each area. The work shows the benefits of organizational alignment, clear stakeholder categorization, and the ability to predict future safety performance.