The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things promises tremendous benefits in our everyday life where healthcare is one of the application areas in which IoT has also paved its way for the development of human assistance technologies. With smart sensing and remote monitoring, peoples' health conditions can be assessed more effectively but to provide IoT services such as depressive disorder assistance still, there are many...
Most of IoT applications include large number of distributed sensors which are interesting in specific geographical area. A large number of IoT entities have multiple relations and dynamic connections with each other. And there are many group communication requirements. Flexible multicast mechanism will be essential in such environments but it is difficult to satisfy verious requirements by means...
In the 5G era, radio IP capacity is expected to reach 20 Gbit/s per sector, and ultra-large content traffic will travel across the faster wireless/wireline access network and packet core network. Also massive and mission-critical IoT is the main differentiator of 5G services. These types of real-time and large-bandwidth consuming services require radio latency of less than 1ms, and end-to-end latency...
Distributed Denial of Service (DDoS) attack has been bringing serious security concerns on banks, finance incorporation, public institutions, and data centers. Also, the emerging wave of Internet of Things (IoT) raises new concerns on the smart devices. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) have provided a new paradigm for network security. In this paper, we...
Recently, as the damage of air pollution due to fine dusts, etc. has been continuously increased, there is a growing need for a low-cost air quality monitoring system to observe air pollution information at public facilities or homes. In this paper, we propose an IoT (Internet of Things)-based atmospheric environment monitoring system which can effectively observe air pollution information without...
Making the data plane of a SDN flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable for Software Defined IoT (SD-IoT) networking. The network device having programmable data plane provides an ability to add new packet and data processing procedures dynamically to the IoT applications. Previously proposed solutions for adding programmability to the...
In Korea, out of the total number of car accidents between vehicles and pedestrians in 2015, the percentage of illegal crossing accidents is 40%. Unsignalized pedestrian crossing accidents is 38.8% of all accidents. Previously risk areas were determined by the occurrence and situation of accidents. This research proposes a collection of drone videos of general vehicle-pedestrian crossing behaviors...
In order to reduce operational expenditure (OPEX), network function virtualization infrastructure (NFVI) should be distributed over multiple geographical locations and managed by a centralized and unified management and orchestration system (MANO). In addition, the NFV platform is required to archive a high level of availability and scalability for virtual network functions (VNFs) across multi-site...
Recently, Single-Cell Point-to-Multipoint (SC-PTM) has been studied in 3GPP as an agile broadcast/multicast mechanism. Due to cell-level support of the multicast service, SC-PTM can adjust the service area dynamically and its scheduling is quite agile. In the conventional SC-PTM, however, a single multicast transmission is set for the worst user and provided for all the users regardless of their channel...
This research is focusing on causality between activities of ICT firms and technological changes as convergences with a research question about how ICT firms should do for technological convergence, as well as factors that enable accelerating that technological convergence from their perspective. Therefore, this study sees ICT convergence as a technological change from the interaction between ICT...
Abundance of connected devices generate numerous data. Increased computing power of each device would enable themselves to train and generate device knowledge from collected data. In this paper, we propose a novel approach to transfer device knowledge between interoperable devices through structured data. This approach helps devices to use device knowledge from other device as input data. Reusing...
In this work, we propose a full-duplex relay (FDR) network for secure communication in the presence of an eavesdropper. We consider both the destination and the amplify-and-forward relay has a full-duplex capability for a higher rate and/or a stronger secrecy performance. In particular, the destination transmits a cooperative jamming signal while receiving the relayed signal. To get analytic understanding,...
A new detection algorithm for direct sequence spread spectrum (DSSS) signals using peak-to-average power ratio (PAPR) is proposed. The received signals are divided into several blocks. Then we calculate peak-to-average power ratio of each block and we use the average of peak-to-average power ratios as test statistics. The advantage of the proposed algorithm is no need to estimate noise variance. Additionally,...
MQTT is widely used as a flexible communication middleware for general IoT services. MQTT has publish/subscribe communication model and a broker-based architecture which may occur serious problems such as unpredictable transmission delay time and packet loss due to unknown changes of communication nodes and various traffic in a large-scale IoT environments. In this paper, we propose a communication...
In this paper, we introduce novel techniques to improve the performance of representative Authentication Encryption (AE) functions namely Galois/Counter Mode of operation (GCM) on modern high-end IoT platforms (ARM–NEON), which support SIMD and cryptography instruction set. The GCM requires efficient counter mode of encryption and binary field multiplication. The 128-bit binary field multiplication...
This paper considers a frequency-division-duplexing (FDD) massive multiple-input multiple-output (MIMO) system that operates with two-stage beamforming based on user grouping. In this system, we propose a first stage beamformer and a user grouping method for the two-stage beamforming. The proposed first stage beamformer maximizes an approximate sum rate calculated from the second-order statistic of...
Many challenges for efficiently supporting MTC (Machine-Type Communications) in LTE network have been investigated. In particular, access control schemes have been investigated to protect the system from excessive connectivity of MTC devices. Nonetheless, as the number of devices with data to send increases, it is inevitable that the energy consumed by the preamble collision and retransmission increases...
This work considers the downlink of a cloud radio access network (C-RAN) in which a baseband processing unit (BBU) sends independent messages to multiple user equipments (UEs) by controlling a set of remote radio heads (RRHs) which are connected to the BBU via finite-capacity fronthaul links. In standard C-RAN systems, it is prescribed that the fronthaul links are used in a soft-transfer mode whereby...
Flexible force sensor for rapid prototyping is designed and suggested with a suitable process for molding. A physical mixing of both CNT and PDMS shows lower percolation limit which shows proper electrical and mechanical properties. For 1% of CNT/PDMS composite, the mechanical and electrical properties were investigated up to 120kg and kilo-Ohm range of sensor resistance. By comparing with commercial...
In this paper, we attempt to manage GC overhead at the operating system level. In our approach, first, we use a machine learning technique to devise a GC detecting mechanism at the operating system level, and second, we show that by making use of this mechanism performance variance normally observed on SSDs can be reduced. We develop a GC-detector that detects garbage collection of SSDs and request...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.