RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • SCIESCOPUSKCI등재

        Dietary Phytoncide Supplementation Improved Growth Performance and Meat Quality of Finishing Pigs

        Li, Han Lin,Zhao, Pin Yao,Lei, Yan,Hossain, Md Manik,Kang, Jungsun,Kim, In Ho Asian Australasian Association of Animal Productio 2016 Animal Bioscience Vol.29 No.9

        We conducted this 10-wk experiment to evaluate the effects of dietary phytoncide, Korean pine extract as phytogenic feed additive (PFA), on growth performance, blood characteristics, and meat quality in finishing pigs. A total of 160 pigs ([Landrace${\times}$Yorkshire]${\times}$Duroc, body weight (BW) = $58.2{\pm}1.0kg$) were randomly allocated into 1 of 4 treatments according to their BW and sex, 10 replicate pens per treatment with 4 pigs per pen were used (2 barrows and 2 gilts). Dietary treatments were: CON, control diet; PT2, CON+0.02% PFA; PT4, CON+0.04% PFA; PT6, CON+0.06% PFA. Overall, average daily gain (ADG) was higher in PT4 (p<0.05) than in PT6, average daily feed intake (ADFI) was lower in PT6 than in CON (p<0.05). Besides ADFI decreased linearly (p<0.05) with the increased level of phytoncide and gain:feed ratio in PT4 treatment was higher (p<0.05) than CON treatment. During 5 to 10 weeks and overall, quadratic (p<0.05) effect was observed in ADG among the treatments. At the end of this experiment, pigs fed with PT4 diet had a greater (p<0.05) red blood cell concentration compared to the pigs fed CON diet. Water holding capacity increased linearly (p<0.05) with the increased level of phytoncide supplementation. Moreover, firmness, redness, yellowness, and drip loss at day 3 decreased linearly (p<0.05) with the increase in the level of phytoncide supplementation. In conclusion, inclusion of phytoncide could enhance growth performance without any adverse effects on meat quality in finishing pigs.

      • KCI등재

        Distortion Minimization for Relay Assisted Wireless Multicast

        Zhi Chen,Pin-Han Ho,Limei Peng 한국통신학회 2018 Journal of communications and networks Vol.20 No.1

        The paper studies the scenario of wireless multicast witha single transmitter and a relay that deliver scalable source symbolsto the receivers in a decode-and-forward (DF) fashion. Withthe end-to-end mean square error distortion (EED) as performancemetric, we firstly derive the EED expression for the L-resolutionscalable source symbol for any receiver. An optimization problemin minimizing the weighted EED is then formulated for finding thepower allocations for all resolution layers at the transmitter andthe relay. Due to nonlinearity of the formulations, we solve the formulatedoptimization problems using a generalized programmingalgorithm for obtaining good sub-optimal solutions. Case studiesare conducted to verify the proposed formulations and solution approaches. The results demonstrate the advantages of the proposedstrategies in the relay-assisted wireless networks for scalable sourcemulticast.

      • KCI등재후보

        Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks

        ( Hong Wen ),( Pin-han Ho ) 한국인터넷정보학회 2011 KSII Transactions on Internet and Information Syst Vol.5 No.2

        In this paper, we introduce a novel Public Key Infrastructure (PKI) based message authentication scheme that takes advantage of temporal and spatial uniqueness in physical layer channel responses for each transmission pair in vehicular communication networks. The proposed scheme aims at achieving fast authentication and minimizing the packet transmission overhead without compromising the security requirements, in which most messages can be authenticated through an extreme fast physical-layer authentication mechanism. We will demonstrate that the proposed secure authentication scheme can achieve very short message delay and reduced communication overhead through extensive analysis and simulation.

      • SCIESCOPUS

        Cognitive-Empowered Femtocells: An Intelligent Paradigm for Femtocell Networks

        Wang, Xiaoyu,Ho, Pin-Han,Wong, Alexander,Peng, Limei WILEY INTERSCIENCE 2018 WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Vol.2018 No.-

        <P>Deploying femtocells has been taken as an effective solution for removing coverage holes and improving wireless service performance in 3G-beyond wireless networks such as WiMAX and Long Term Evolution (LTE). This article investigates a novel framework of dynamic spectrum management for femtocell networks, called cognitive-empowered femtocells (CEF), aiming at mitigating both cross-tier and intratier interferences with minimum modifications required on the corresponding macrocell network. With the proposed framework, each CEF base station (BS) and the femtocell users can utilize spatiotemporally available radio resources for the access traffic. We conclude that the proposed CEF framework can effectively complement the existing femtocell design and serve as a value-added feature to the state-of-the-art femtocell technologies, while achieving high scalability and interoperability by minimizing the required modifications on the macrocell protocol design.</P>

      • SCIESCOPUSKCI등재

        Dynamic Survivable Routing for Shared Segment Protection

        Tapolcai, Janos,Ho, Pin-Han The Korea Institute of Information and Commucation 2007 Journal of communications and networks Vol.9 No.2

        This paper provides a thorough study on shared segment protection (SSP) for mesh communication networks in the complete routing information scenario, where the integer linear program (ILP) in [1] is extended such that the following two constraints are well addressed: (a) The restoration time constraint for each connection request, and (b) the switching/merging capacity constraint at each node. A novel approach, called SSP algorithm, is developed to reduce the extremely high computation complexity in solving the ILP formulation. Basically, our approach is to derive a good approximation on the parameters in the ILP by referring to the result of solving the corresponding shared path protection (SPP) problem. Thus, the design space can be significantly reduced by eliminating some edges in the graphs. We will show in the simulation that with our approach, the optimality can be achieved in most of the cases. To verify the proposed formulation and investigate the performance impairment in terms of average cost and success rate by the additional two constraints, extensive simulation work has been conducted on three network topologies, in which SPP and shared link protection (SLP) are implemented for comparison. We will demonstrate that the proposed SSP algorithm can effectively and efficiently solve the survivable routing problem with constraints on restoration time and switching/merging capability of each node. The comparison among the three protection types further verifies that SSP can yield significant advantages over SPP and SLP without taking much computation time.

      • KCI등재

        5G NR mmWave Indoor Coverage with Massive Antenna System

        Syed Hassan Raza Naqvi,Pin Han Ho,Limei Peng 한국통신학회 2021 Journal of communications and networks Vol.23 No.1

        In this paper, we introduce a novel mmWave access architecture,called mmWave over cable (mmWoC), for achieving effectiveindoor coverage, which is characterized by using an analogmodulated relay link to transport the outdoor mmWave signalsto the indoors. To enable an effective mapping of radio signals onthe cable sub-carriers, we introduce non-configurable air-to-cable(NC-A2C) scheduler that is characterized by its low control complexityand hardware requirement. We will discuss the merits ofthe proposed mmWoC access architecture and the NC-A2C scheduler,which are further validated via extensive simulations.

      • KCI등재

        Build-in Wiretap Channel I with Feedback and LDPC Codes

        Hong Wen,Guang Gong,Pin-Han Ho 한국통신학회 2009 Journal of communications and networks Vol.11 No.6

        A wiretap channel I is one of the channel models that was proved to achieve unconditional security. However, it has been an open problem in realizing such a channel model in a practical network environment. The paper is committed to solve the open problem by introducing a novel approach for building wiretap channel I in which the eavesdropper sees a binary symmetric channel (BSC) with error probability p while themain channel is error free. By taking advantage of the feedback and low density parity check (LDPC) codes, our scheme adds randomness to the feedback signals from the destination for keeping an eavesdropper ignorant; on the other hand, redundancy is added and encoded by the LDPC codes such that a legitimate receiver can correctly receive and decode the signals. With the proposed approach, unconditionallysecure communication can be achieved through interactive communications, in which the legitimate partner can realize the secret information transmission without a pre-shared secret key even if the eavesdropper has better channel from the beginning.

      • SCIESCOPUSKCI등재

        Build-in Wiretap Channel I with Feedback and LDPC Codes

        Wen, Hong,Gong, Guang,Ho, Pin-Han The Korea Institute of Information and Commucation 2009 Journal of communications and networks Vol.11 No.6

        A wiretap channel I is one of the channel models that was proved to achieve unconditional security. However, it has been an open problem in realizing such a channel model in a practical network environment. The paper is committed to solve the open problem by introducing a novel approach for building wiretap channel I in which the eavesdropper sees a binary symmetric channel (BSC) with error probability p while themain channel is error free. By taking advantage of the feedback and low density parity check (LDPC) codes, our scheme adds randomness to the feedback signals from the destination for keeping an eavesdropper ignorant; on the other hand, redundancy is added and encoded by the LDPC codes such that a legitimate receiver can correctly receive and decode the signals. With the proposed approach, unconditionallysecure communication can be achieved through interactive communications, in which the legitimate partner can realize the secret information transmission without a pre-shared secret key even if the eavesdropper has better channel from the beginning.

      • Toward integrated Cloud–Fog networks for efficient IoT provisioning: Key challenges and solutions

        Peng, Limei,Dhaini, Ahmad R.,Ho, Pin-Han Elsevier 2018 Future generation computer systems Vol.88 No.-

        <P><B>Abstract</B></P> <P>Fog computing has been proposed as one of the promising technologies for the construction of a scalable network infrastructure in the user’s vicinity, with the purpose of serving the tremendous amount of daily generated latency-sensitive Internet-of-Things (IoT) data. In provisioning the emerging IoT data in addition to the legacy Cloud services, the Cloud and Fog form a natural continuum of one another and the integration of these two key technologies would offer a promising infrastructure full with IoT resources for IoT data provisioning.</P> <P>In this article, we present iCloudFog, a reconfigurable architecture that enables an agile integration of Fog and Cloud networks. iCloudFog allows to construct different Fog types (i.e., wireless, wired, or hybrid) to fit the different characteristics of IoT devices and data, and Fog nodes. Due to its nature, iCloudFog presents several unique key research challenges that have not yet been addressed in existing literatures, such as network dimensioning and configuration, resource management/QoS, security/privacy, and positioning/localization. We discuss these challenges and suggest promising approaches to resolve them. Effective design and implementation of solutions based on the suggested approaches would allow iCloudFog to play a salient role towards the successful provisioning of future IoT applications and services.</P> <P><B>Highlights</B></P> <P> <UL> <LI> We first provide a literature review of the work related to the integration of Cloud–Fog networks. </LI> <LI> We then present iCloudFog, a scalable and agile integrated Cloud–Fog architecture that provisions Fog and IoT networks dynamically based on the Cloud and IoT nodes’ availability and capability, and network requirements. </LI> <LI> We identify the key challenges that emerge in the process of constructing the iCloudFog framework, such as network dimensioning, security and IoT job scheduling, and indoor localization, and suggest viable approaches to address these challenges. </LI> </UL> </P>

      • KCI등재

        A Novel Front-hauling Architecture under Centralized Radio Access Network (C-RAN)

        Haoran Mei,Mai Hassan,Limei Peng,Pin Han Ho 한국통신학회 2022 Journal of communications and networks Vol.24 No.3

        Residential power line is considered a cost-effectivecommunication media for building a digital indoor distributednetwork thanks to its ubiquity in the indoor environment. This paper investigates a front-hauling system under the splitcentralized radio access network (C-RAN) architecture, aimingto examine the feasibility of implementing common public radiointerface (CPRI) over power line communication (PLC) channels. Particularly, we introduce a novel device called CPRI-PLCgateway (CPG) that provides a virtual CPRI link over the PLCchannel to ensure high reliability and efficiency in delivering theCPRI hyper-frames (HFs) between the data unit (DU) and radiounit (RU). We examine the proposed CPRI over PLC system viaextensive simulations in terms of the achievable throughput andreliability.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼