The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper covers the subject on energy saving technology through the demonstration site. For developing and industrializing this technology, the four public buildings in the Sejong city's First-town were selected as the demonstration site: the office of community center, the postal office, the police station and the fire station. In the four buildings, Building Automation Systems (BASs) had been...
Optimized Link State Routing Protocol (OLSR) is a well-known proactive routing protocol for mobile ad hoc networks. OLSR reduces the number of control messages by using MPRs to forward topology control messages as compared with typical proactive protocols. Since OLSR does not consider the node mobility and signal strength condition for the MPR (MultiPoint Relays) selection, OLSR cannot work well in...
The Discontinuous Reception (DRX) operation is proposed in long term evolution (LTE) network to achieve efficient power management. It is hard to determine the DRX parameters for optimal power utilization especially when the channel condition and quality of services are taken into consideration. Most studies dealt with this issue by dynamically adjusting DRX parameters. However, it is a heavy burden...
Coordinated Multi-Point (CoMP) is considered as one of the most important technique in 3GPP LTE/LTE-Advanced. In CoMP, several base stations can be grouped together to form the cooperating set, where the cooperating set is used to improve the system throughput as well as the throughput of cell edge users. Most of the studies discuss static cooperating set, i.e., the size of the cooperating set is...
Mobile Cloud Computing (MCC) is aimed at integrating mobile devices with cloud computing. Recently, along with the increase of resources in mobile devices, researchers have begun to take into consideration resource sharing among mobile devices themselves. How to establish an architecture of resource sharing is one of the most important issues need to be solved to achieve this goal. This paper presents...
Software-Defined Networking (SDN) is a new potential approach that can separate and provide abstract elements to build computer networks. Internet Protocol version 6 (IPv6) is a mature, proven and deployed globally technology, and also the future of the internet infrastructure. It can identify, localize and route traffic across the Internet. In this paper, we combine the existing IPv6 protocol and...
The present paper introduces an intelligent infrastructure for social networking services using a messaging network. The proposed messaging network can provide content/topic-based routing and filtering. The proposed scheme provides a network-centric approach to ensure flexible information aggregation and message mediation for social networking services.
Attackers are increasingly relying on non-executable files to launch their attacks. Anti-virus solutions can detect a high percentage of malicious files but usually cannot reach and maintain a 100% detection rate. We propose a file-level IDS that relies on automated dynamic analysis system (sandbox) to detect malicious PDF files. We achieved a 99.2% detection rate, where the rates of both the false...
With the rapid development of the Internet in recent years, there has been a growing emphasis on importance of application traffic identification for efficient network management. Although various identification methods have been proposed, it is difficult to apply them to real networks due to several problems. To overcome the limitations of existing methods, we proposed the header signatures, i.e...
This paper proposes and evaluates performance of an on-demand packet capture process in multi-core architectures. The multi-core on-demand process presented in this paper can handle higher packet throughput and is sufficiently flexible to support even complex per-packet processing logic.
While the liberalization and globalization of telecommunication market has already become a worldwide trend, a cut-throat competition is inevitable. To provide reliable and high quality telecommunication services to meet all manner of customer demands promptly is not only very important indeed but also must rely on effective heterogeneous resource integration foundation. However, due to the resource...
This paper studies the impact of connection admission control (CAC) on the congestion management practices and the revenue of a monopoly access point (AP). The AP provides congestion-indication signals that suggest users to choose their access probabilities in response to network loading conditions. A Stackelberg leader-follower game is then formulated to analyze the interaction between the AP and...
Recently, there are increasing efforts to define new protocols and architectures for data-centric networking that do not rely on the addresses of the individual network nodes. In that case, queries are usually disseminated by flooding throughout the network until the node with the requested content is found. However, flooding always imposes an additional burden on the network since many unnecessary...
According to the development of network infrastructure, merging wire or wireless communication technologies into various devices, and the widespread use of mobile devices, various and new services are required. There are many researches about the intelligent home environment or the development of residential space. However, they still have several issues to be resolved. In a situation of interconnecting...
Network virtualization has garnered great attention as a promising way to reform the current Internet. Multiple virtual networks (VNs) can be embedded onto the same substrate network through network virtualization. Recently the survivability of the VNs in the event of substrate failures has been attracting a broad attention. A good way to provide survivability is to use a hybrid strategy, which proactively...
IP/MPLS service providers rely on transport networks to provide bandwidth on demand with the lowest possible provisioning time. However, due to the static nature of transport networks and the differences in the communication languages and switching systems, the IP/MPLS and transport network management systems are isolated from each other. To address this issue, a mediator called “ONE Adapter” has...
In this paper we present an autonomous load balancing algorithm for downlink LTE network, the ripple form reference signal received power based load balancing algorithm (RF-RSRPBLBA), which mainly requires the reference signal received power (RSRP) and cell load information. In RF-RSRPBLBA, overloaded cells distribute their surplus load in a greedy manner. As a general character of greedy algorithm,...
With the growing of cloud services, a brand new business model was created in digital world. Customers can use cloud services just through the Internet no matter who provides the transport or access networks, and it makes Communication Service Provides(CSPs) face the possibility of losing all revenue except from connectivity services. Under this atmosphere, TeleManagement Forum (TMF) proposed the...
Although a sensor network collects a huge amount of data not all data are required to be measured. Therefore, in sensor networks, accumulating all measured data through networks is not necessarily efficient. To solve this problem, we previously developed a multi-overlay sensor network consisting of a hierarchical multiple unstructured P2P overlay network on the sensor network. Our network acquired...
Web applications are exposed to various threats and attacks, and therefore numerous tools are developed for detecting web application vulnerabilities. Many studies have focused on evaluating vulnerability scanners. An efficient evaluation approach for detection tools is essential and can be extremely helpful to the users. In this paper, we propose a cost-effective approach to evaluating vulnerability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.