• 제목/요약/키워드: network-sensitive applications

검색결과 98건 처리시간 0.024초

EPON에서 실시간 트래픽의 지연성능 향상을 위한 동적 대역할당방안의 성능분석 (Performance Analysis of a Dynamic Bandwidth Allocation Scheme for improving the delay of the real time traffic in an EPON)

  • 박철근;이유태;정해;유건일;김종안
    • 한국통신학회논문지
    • /
    • 제28권11B호
    • /
    • pp.1023-1030
    • /
    • 2003
  • 본 논문에서는 서로 다른 요구조건을 갖는 응용 서비스들을 지원하는 가입자 접속망에서 서비스 고유의 서비스 품질을 효과적으로 지원하기 위한 대역 할당 방안을 다룬다. 음성 및 실시간 비디오 등의 지연에 민감한 실시간 트래픽과 데이터 및 BE(Best Effort)와 같은 비 실시간 트래픽 등 다중 응용 서비스를 지원해야 하는 EPON(Ethernet Passive Optical Network)망에서 상향 트래픽의 동적 대역 할당방안에 대하여 논하기로 한다. 구조적으로 제한된 자원 환경에서 상향 전송 대역을 효율적으로 사용하고, 실시간 트래픽의 지연성능을 향상하는 새로운 방안을 제안하고, 시뮬레이션으로 제안된 방안의 지연성능을 분석한다.

TCP-RLDM: Congestion losses과 Wireless losses 구별을 통한 수신측 기반 혼잡제어 방안 (TCP-RLDM : Receiver-oriented Congestion Control by Differentiation for Congestion and Wireless Losses)

  • 노경택;이기영
    • 한국컴퓨터정보학회논문지
    • /
    • 제7권4호
    • /
    • pp.127-132
    • /
    • 2002
  • 본 논문은 수신측이 네트워크 혼잡도를 측정 참여하여 송신측으로 하여금 네트워크 상태에 따른 윈도우 크기를 조절하는데 있다. TCP-RLDM은 기존 TCP 의 Additive Increase/Multiplicative Decrease 방법의 단점을 보완하는 데이터 수신율을 기초로 하는 측정기반 전송 전략을 채택하였다. 이는 유무선 망에서나 지연에 민감하거나 용인하는 응용들로 구성된 이질적 환경에서 동적으로 대응하기 위해 에러손상의 성질에 따른 즉, 혼잡에 의한 손실인지 전송상 일시적 손실인지에 따라서 적절히 대처함으로써 성능을 높일 수 있게 되었다. 수신측으로부터의 데이터 수신율과 에러발생 원인에 대한 정보를 이용, 송신측의 wave 전송방식과 가급적 혼잡이 발생하기 이전에 혼잡회피전략을 적용함으로써 가변적인 네트워크환경에 잘 대처하도록 하였다.

  • PDF

Large Flows Detection, Marking, and Mitigation based on sFlow Standard in SDN

  • Afaq, Muhammad;Rehman, Shafqat;Song, Wang-Cheol
    • 한국멀티미디어학회논문지
    • /
    • 제18권2호
    • /
    • pp.189-198
    • /
    • 2015
  • Despite the fact that traffic engineering techniques have been comprehensively utilized in the past to enhance the performance of communication networks, the distinctive characteristics of Software Defined Networking (SDN) demand new traffic engineering techniques for better traffic control and management. Considering the behavior of traffic, large flows normally carry out transfers of large blocks of data and are naturally packet latency insensitive. However, small flows are often latency-sensitive. Without intelligent traffic engineering, these small flows may be blocked in the same queue behind megabytes of file transfer traffic. So it is very important to identify large flows for different applications. In the scope of this paper, we present an approach to detect large flows in real-time without even a short delay. After the detection of large flows, the next problem is how to control these large flows effectively and prevent network jam. In order to address this issue, we propose an approach in which when the controller is enabled, the large flow is mitigated the moment it hits the predefined threshold value in the control application. This real-time detection, marking, and controlling of large flows will assure an optimize usage of an overall network.

A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

  • Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4643-4660
    • /
    • 2014
  • Integrity authentication of biometric data in Wireless Body Area Network (WBAN) is a critical issue because the sensitive data transmitted over broadcast wireless channels could be attacked easily. However, traditional cryptograph-based integrity authentication schemes are not suitable for WBAN as they consume much computational resource on the sensor nodes with limited memory, computational capability and power. To address this problem, a novel lightweight integrity authentication scheme based on reversible watermark is proposed for WBAN and implemented on a TinyOS-based WBAN test bed in this paper. In the proposed scheme, the data is divided into groups with a fixed size to improve grouping efficiency; the histogram shifting technique is adopted to avoid possible underflow or overflow; local maps are generated to restore the shifted data; and the watermarks are generated and embedded in a chaining way for integrity authentication. Our analytic and experimental results demonstrate that the integrity of biometric data can be reliably authenticated with low cost, and the data can be entirely recovered for healthcare applications by using our proposed scheme.

Incipient Fault Detection of Reactive Ion Etching Process

  • Hong, Sang-Jeen;Park, Jae-Hyun;Han, Seung-Soo
    • Transactions on Electrical and Electronic Materials
    • /
    • 제6권6호
    • /
    • pp.262-271
    • /
    • 2005
  • In order to achieve timely and accurate fault detection of plasma etching process, neural network based time series modeling has been applied to reactive ion etching (RIE) using two different in-situ plasma-monitoring sensors called optical emission spectroscopy (OES) and residual gas analyzer (RGA). Four different subsystems of RIE (such as RF power, chamber pressure, and two gas flows) were considered as potential sources of fault, and multiple degrees of faults were tested. OES and RGA data were simultaneously collected while the etching of benzocyclobutene (BCB) in a $SF_6/O_2$ plasma was taking place. To simulate established TSNNs as incipient fault detectors, each TSNN was trained to learn the parameters at t, t+T, ... , and t+4T. This prediction scheme could effectively compensate run-time-delay (RTD) caused by data preprocessing and computation. Satisfying results are presented in this paper, and it turned out that OES is more sensitive to RF power and RGA is to chamber pressure and gas flows. Therefore, the combination of these two sensors is recommended for better fault detection, and they show a potential to the applications of not only incipient fault detection but also incipient real-time diagnosis.

A Multi-Stage Approach to Secure Digital Image Search over Public Cloud using Speeded-Up Robust Features (SURF) Algorithm

  • AL-Omari, Ahmad H.;Otair, Mohammed A.;Alzwahreh, Bayan N.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.65-74
    • /
    • 2021
  • Digital image processing and retrieving have increasingly become very popular on the Internet and getting more attention from various multimedia fields. That results in additional privacy requirements placed on efficient image matching techniques in various applications. Hence, several searching methods have been developed when confidential images are used in image matching between pairs of security agencies, most of these search methods either limited by its cost or precision. This study proposes a secure and efficient method that preserves image privacy and confidentially between two communicating parties. To retrieve an image, feature vector is extracted from the given query image, and then the similarities with the stored database images features vector are calculated to retrieve the matched images based on an indexing scheme and matching strategy. We used a secure content-based image retrieval features detector algorithm called Speeded-Up Robust Features (SURF) algorithm over public cloud to extract the features and the Honey Encryption algorithm. The purpose of using the encrypted images database is to provide an accurate searching through encrypted documents without needing decryption. Progress in this area helps protect the privacy of sensitive data stored on the cloud. The experimental results (conducted on a well-known image-set) show that the performance of the proposed methodology achieved a noticeable enhancement level in terms of precision, recall, F-Measure, and execution time.

Content-Aware D2D Caching for Reducing Visiting Latency in Virtualized Cellular Networks

  • Sun, Guolin;Al-Ward, Hisham;Boateng, Gordon Owusu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.514-535
    • /
    • 2019
  • Information-centric networks operate under the assumption that all network components have built-in caching capabilities. Integrating the caching strategies of information centric networking (ICN) with wireless virtualization improves the gain of virtual infrastructure content caching. In this paper, we propose a framework for software-defined information centric virtualized wireless device-to-device (D2D) networks. Enabling D2D communications in virtualized ICN increases the spectral efficiency due to reuse and proximity gains while the software-defined network (SDN) as a platform also simplifies the computational overhead. In this framework, we propose a joint virtual resource and cache allocation solution for latency-sensitive applications in the next-generation cellular networks. As the formulated problem is NP-hard, we design low-complexity heuristic algorithms which are intuitive and efficient. In our proposed framework, different services can share a pool of infrastructure items. We evaluate our proposed framework and algorithm through extensive simulations. The results demonstrate significant improvements in terms of visiting latency, end user QoE, InP resource utilization and MVNO utility gain.

New Detection Cheating Method of Online-Exams during COVID-19 Pandemic

  • Jadi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.123-130
    • /
    • 2021
  • A novel approach for the detection of cheating during e-Exams is presented here using convolutional neural networks (CNN) based systems. This system will help the proctors to identify any kind of uncertain event at the time of online exams, for which most of the government's across the globe are recommending due to the Covid-19 pandemic. Most of the institutions and students across the globe are badly affected by their academic programs and it is a challenging task for universities to conduct examinations using the traditional methods. Therefore, the students are attending most of their classes using different types of third party applications that are available online. However, to conduct online exams the universities cannot rely on these service providers for a long time. Therefore, in this work, a complete setup of the software tools is provided for the students, which can be used by students at their respective laptops/personal computers with strict guidelines from the university. The proposed approach helps most of the universities in Saudi Arabia to maintain their database of different events/activities of students at the time of E-Exams. This method proved to be more accurate and CNN based detection proved to be more sensitive with an accuracy of 97% to detect any kind of uncertain activity of the students at the time of e-Exam.

Designing Interactive Walkways of Smart Cities in Saudi Arabia

  • Jadi, Amr
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.121-128
    • /
    • 2021
  • In this work, a noble walkway approach suitable for Saudi Arabia (SA) towards its aim to develop a wide range of smart cities is considered scientifically. This work intends to minimize the errors at each level by testing the events that take place in the walkway environment. similarly, the minimum requirements to develop a walkway to the additional features to be considered while designing a walkway are discussed in this paper with sensitive areas such as environmental factors, healthcare issues, patients visiting the walkways, etc. The applications of different monitoring devices such as CCTV's, global positioning systems (GPS), etc. are carefully addressed to help the proposed method for improving the monitoring activities of a variety of events that possibly cause problems to a common man. The ultimate goal of this work to ensure a safe and satisfied journey of pedestrians while they come for a walk with all suitable safety measures. The safety measures included in this work are for pollution, noise, temperature, humidity and traffic jams on the roads. To improve the accuracy and to test the proposed approach some polices are defined and will be tested for the consistency of the proposed system. The obtained accuracy of the proposed system is proved to be far better with an accuracy of 93% improvement in the results.

Palm-Size-Integrated Microwave Power Module at 1.35-GHz for an Atmospheric Pressure Plasma for biomedical applications

  • Myung, C.W.;Kwon, H.C.;Kim, H.Y.;Won, I.H.;Kang, S.K.;Lee, J.K.
    • 한국진공학회:학술대회논문집
    • /
    • 한국진공학회 2013년도 제44회 동계 정기학술대회 초록집
    • /
    • pp.498-498
    • /
    • 2013
  • Atmospheric Pressure Plasmas have pioneered a new field of plasma for biomedical application bridging plasma physics and biology. Biological and medical applications of plasmas have attracted considerable attention due to promising applications in medicine such as electro-surgery, dentistry, skin care and sterilization of heat-sensitive medical instruments [1]. Traditional approaches using electronic devices have limits in heating, high voltage shock, and high current shock for patients. It is a great demand for plasma medical industrial acceptance that the plasma generation device should be compact, inexpensive, and safe for patients. Microwave-excited micro-plasma has the highest feasibility compared with other types of plasma sources since it has the advantages of low power, low voltage, safety from high-voltage shock, electromagnetic compatibility, and long lifetime due to the low energy of striking ions [2]. Recent experiment [2] shows three-log reduction within 180-s treatment of S. mutans with a low-power palm-size microwave power module for biomedical application. Experiments using microwave plasma are discussed. This low-power palm-size microwave power module board includes a power amplifier (PA) chip, a phase locked loop (PLL) chip, and an impedance matching network. As it has been a success, more compact-size module is needed for the portability of microwave devices and for the various medical applications of microwave plasma source. For the plasma generator, a 1.35-GHz coaxial transmission line resonator (CTLR) [3] is used. The way of reducing the size and enhancing the performances of the module is examined.

  • PDF