• Title/Summary/Keyword: service state

Search Result 2,258, Processing Time 0.025 seconds

Two-Stage Base Station Sleeping Scheme for Green Cellular Networks

  • Yang, Juwo;Zhang, Xing;Wang, Wenbo
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.600-609
    • /
    • 2016
  • In this paper, we propose a two-stage base station (BS) sleeping scheme to save energy consumption in cellular networks. The BS sleeping mode is divided into a light sleeping stage and a deep sleeping stage according to whether there is a user in the BS's coverage. In the light sleeping stage, a BS will retain its coverage and frequently switch between the on state and the doze state according to the service characteristics. While in the deep sleeping stage analysis, the BS will shut down its coverage, and neighbor BSs will patch the coverage hole. Several closed-form formulas are derived to demonstrate the power consumption in each sleeping stage and the stage switching conditions are discussed to minimize the average power consumption. The average traffic delay caused by BS sleeping and the average deep sleeping rate under a given traffic load have also been studied. In addition, it is shown that BS sleeping is not always possible because of the limited quality of service (QoS) requirements. Simulation results show that the proposed scheme can effectively reduce the average BS power consumption, at the cost of some extra traffic delay. In summary, our proposed framework provides an essential understanding of the design of future green networks that aim to take full advantage of different stages of BS sleeping to obtain the best energy efficiency.

Performance analysis of Variable Rate Multi-carrier CDMA under an underwater acoustic channel (수중 음향 채널에서 가변 전송율 다중 반송파 CDMA의 성능 분석)

  • Kang, Hee-Hoon;Han, Wan-Ok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.1
    • /
    • pp.33-38
    • /
    • 2012
  • As underwater channel is very complex and time-varying, don't supports good-quality for communication service. In this paper, a multi-carrier CDMA(MC-CDMA) system for the reliability and robust service in the underwater acoustic channel is proposed and analyzed for its performance. Applied variable rate algorithm to the proposed system gets a channel state information from relationship between SINR and user data-rate. Using channel state information make spectrum usage more efficient and overall system performance improved. In this paper, the performance of proposed system analyzed by simulation. And Pseudo-Random spread codes used in the system are discussed.

Effects of the User's Perceived Threat to Freedom and Personalization on Intention to Use Recommendation Services (자유 위협과 개인화에 대한 사용자의 지각이 상품 추천 서비스 수용에 미치는 영향)

  • Lee, Gyu-Dong;Kim, Jong-Uk;Lee, Won-Jun
    • Asia pacific journal of information systems
    • /
    • v.17 no.1
    • /
    • pp.123-145
    • /
    • 2007
  • There are flourishing studies in the acceptance or usage of information systems literature. Most of them have taken the pro - acceptance view. Undesirably, information technologies often provoke users' reactance or resistance. This paper explores one of the negative reactions -psychological reactance. The present paper studies the effects of the users' perception of threatened freedom and personalization degree on intention to use recommendation services. High personalization can be a major motivation for users to accept recommendation systems. However recommendation services are a two-edged sword, which not only provides users the efficiency of decision making but also poses threats to free choice. When people consider that their freedom is reduced or threatened by others, they experience the motivational state to restore the freedom. This motivational state must be considered in understanding usage of information systems, especially personalized services which are designed for persuasion or compliance. This paper empirically investigates the effect of personalization and the psychological reactance on the intention to use information systems in the personalized recommendation context. Users' perception of personalization increases the usefulness of recommendation service while their perception of threat to freedom reduces the intention to use personalized recommendation service. Findings and implications are discussed.

A Privacy-preserving Data Aggregation Scheme with Efficient Batch Verification in Smart Grid

  • Zhang, Yueyu;Chen, Jie;Zhou, Hua;Dang, Lanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.617-636
    • /
    • 2021
  • This paper presents a privacy-preserving data aggregation scheme deals with the multidimensional data. It is essential that the multidimensional data is rarely mentioned in all researches on smart grid. We use the Paillier Cryptosystem and blinding factor technique to encrypt the multidimensional data as a whole and take advantage of the homomorphic property of the Paillier Cryptosystem to achieve data aggregation. Signature and efficient batch verification have also been applied into our scheme for data integrity and quick verification. And the efficient batch verification only requires 2 pairing operations. Our scheme also supports fault tolerance which means that even some smart meters don't work, our scheme can still work well. In addition, we give two extensions of our scheme. One is that our scheme can be used to compute a fixed user's time-of-use electricity bill. The other is that our scheme is able to effectively and quickly deal with the dynamic user situation. In security analysis, we prove the detailed unforgeability and security of batch verification, and briefly introduce other security features. Performance analysis shows that our scheme has lower computational complexity and communication overhead than existing schemes.

FuzzyGuard: A DDoS attack prevention extension in software-defined wireless sensor networks

  • Huang, Meigen;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3671-3689
    • /
    • 2019
  • Software defined networking brings unique security risks such as control plane saturation attack while enhancing the performance of wireless sensor networks. The attack is a new type of distributed denial of service (DDoS) attack, which is easy to launch. However, it is difficult to detect and hard to defend. In response to this, the attack threat model is discussed firstly, and then a DDoS attack prevention extension, called FuzzyGuard, is proposed. In FuzzyGuard, a control network with both the protection of data flow and the convergence of attack flow is constructed in the data plane by using the idea of independent routing control flow. Then, the attack detection is implemented by fuzzy inference method to output the current security state of the network. Different probabilistic suppression modes are adopted subsequently to deal with the attack flow to cost-effectively reduce the impact of the attack on the network. The prototype is implemented on SDN-WISE and the simulation experiment is carried out. The evaluation results show that FuzzyGuard could effectively protect the normal forwarding of data flow in the attacked state and has a good defensive effect on the control plane saturation attack with lower resource requirements.

An Ensemble Cascading Extremely Randomized Trees Framework for Short-Term Traffic Flow Prediction

  • Zhang, Fan;Bai, Jing;Li, Xiaoyu;Pei, Changxing;Havyarimana, Vincent
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1975-1988
    • /
    • 2019
  • Short-term traffic flow prediction plays an important role in intelligent transportation systems (ITS) in areas such as transportation management, traffic control and guidance. For short-term traffic flow regression predictions, the main challenge stems from the non-stationary property of traffic flow data. In this paper, we design an ensemble cascading prediction framework based on extremely randomized trees (extra-trees) using a boosting technique called EET to predict the short-term traffic flow under non-stationary environments. Extra-trees is a tree-based ensemble method. It essentially consists of strongly randomizing both the attribute and cut-point choices while splitting a tree node. This mechanism reduces the variance of the model and is, therefore, more suitable for traffic flow regression prediction in non-stationary environments. Moreover, the extra-trees algorithm uses boosting ensemble technique averaging to improve the predictive accuracy and control overfitting. To the best of our knowledge, this is the first time that extra-trees have been used as fundamental building blocks in boosting committee machines. The proposed approach involves predicting 5 min in advance using real-time traffic flow data in the context of inherently considering temporal and spatial correlations. Experiments demonstrate that the proposed method achieves higher accuracy and lower variance and computational complexity when compared to the existing methods.

Lattice-based Threshold Ring Signature with Message Block Sharing

  • CHEN, Jiangshan;HU, Yupu;GAO, Wen;Liang, Hongmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1003-1019
    • /
    • 2019
  • Threshold ring signature scheme enables any t entities from N ring members to spontaneously generate a publicly verifiable t-out-of-N signature anonymously. The verifier is convinced that the signature is indeed generated by at least t users from the claimed group, but he cannot tell them apart. Threshold ring signatures are significant for ad-hoc groups such as mobile ad-hoc networks. Based on the lattice-based ring signature proposed by Melchor et al. at AFRICRYPT'13, this work presents a lattice-based threshold ring signature scheme, employing the technique of message block sharing proposed by Choi and Kim. Besides, in order to avoid the system parameter setup problems, we proposed a message processing technique called "pad-then-permute", to pre-process the message before blocking the message, thus making the threshold ring signature scheme more flexible. Our threshold ring signature scheme has several advantages: inherits the quantum immunity from the lattice structure; has considerably short signature and almost no signature size increase with the threshold value; provable to be correct, efficient, indistinguishable source hiding, and unforgeable.

A Study of Holism based Service Experience Analysis System

  • Kim, Sung-Su;Lee, Eun-Jong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.49-61
    • /
    • 2012
  • Objective: The aim of this study is to offer a holism based Service Experience Analysis System(HSEAS) for service design. Background: Customer experience has been focused in a lot of service area. But it is difficult to understand the customer's needs and their experiences because it's so complex and uncertain. Thus it needs holistic approach that means it's difficult to explain general character merely through the understanding of small parts that composes an object and it must be analyzed within the overall context. Method: Accordingly, the thesis paper proposes the Service Experience Analysis System that satisfies the four following needs. (1) Need of solid Experience Framework in which the special quality of the service experience is considered, (2) need of support for the semantic cohesion between different kinds of data, (3) need of support for the management and search of vast data, and (4) need of building the knowledge base system for collaborative research. Results: HSEAS combines the short information in the customers' words and behaviors or situations and circumstances and provides a place of analysis where the context of the general experience can be read and allows concrete understanding of the actual state and factor of the problem as a Combined Data Analysis Tool. Conclusion: HSEAS becomes the center of information management, analysis and connection and it provides a free collaboration place where physical condition has no relations to as a knowledge base system based on network. Application: It is expected that length and width will be added to the analysis and assistance for effectively accumulating information will be provided in the area of diverse service.

Motivators and Demotivators of Chat Reference Service (채팅을 통한 정보봉사 서비스의 이용자 동기화 및 비동기화 요인)

  • Lee, Seong-Sin
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.2
    • /
    • pp.115-125
    • /
    • 2008
  • The Purpose of this study was to discover the factors which motivate academic library users to use chat reference service and which demotivate academic library users to use chat reference service. To achieve the study purposes, this study conducted interview with the selected participants (Information Studies graduate students at Florida State University(FSU)) through email in April and May 2007. This study found that 1) convenience, 2) anonymity, and 3) inexpensiveness of the service served as incentives(motivators) for chat reference service consumers to use the service. On the other hand, chat reference service consumers mentioned the following factors as obstacles (demotivators) for using the service: 1) waiting time, 2) accessibility, 3) interface design, and 4) difficulties with expressing themselves in a virtual space.

The Study on Senior Citizens and Korean Medicine University Students' Satisfaction about Medical Service and Senior Citizens' Perception of Medical Welfare Service (의료봉사에 대한 노인과 한의대생의 만족도 및 노인의 의료복지서비스에 대한 인식 조사)

  • Ahn, Jae-hak;Chae, Woo-jung;Cho, Su-kyung;Cho, Chung-sik
    • Journal of Haehwa Medicine
    • /
    • v.24 no.1
    • /
    • pp.1-14
    • /
    • 2015
  • Objectives : The purpose of this study is to examine senior citizens' perception of medical welfare service in Daejeon, and to investigate the level of Korean Medicine University students' satisfaction about medical services that they have done. Methods : We visited Daejeon city hall and Dae jeon Seo-gu community health center, and interviewed them. After that we select two population and did two different surveys. First, to investigate the current state of medical services and medical welfare in Daejeon, we select neglected class senior citizens who were serviced at social welfare center. Second, we select Daejeon Korean Medicine University student to investigate the level of satisfaction about medical services and pre-education. In first population, we random select 25 of 34 senior citizen who visits mere social welfare center. In second population, we random select 78 of 115 Korean Medicine University student who belongs to medical welfare club. Results : We found some advantages and problems in medical services. A lot of senior citizen who were serviced at social welfare center showed high level of satisfaction about medical service. But there were few citizens who knows about health & medical welfare. And most Korean Medicine University student who services medical service to neglected class senior citizens showed high level of satisfaction. Conclusion : We concluded that medical welfare for senior citizen needs more publicizing. Because result of our survey, many senior citizens showed not only low level of recognition in medical welfare service, also showed low utilization rate in public health center. And most Korean Medicine University students were satisfied with themselves about medical service that they have done, it seemed medical service gives beneficial influence to not only senior citizen but also Korean Medicine University student.

  • PDF