• Title/Summary/Keyword: 전송서비스

Search Result 4,908, Processing Time 0.033 seconds

Error Concealment Method Based on POCS for Multi-layered Video Coding (다계층 비디오 코딩에 적용 가능한 POCS 기반 에러 은닉 기법)

  • Yun, Byoung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.67-75
    • /
    • 2009
  • Multi-layered video coding that provides scalability across the visual content has emerged for easily adaptive service over current heterogeneous network. However, the network is still error prone environment so that video service may suffer packet loss or erroneous decoding of the video. Especially distortion caused by the burst error may propagate to several pictures until intra refreshing, which will raise a terrific degradation of picture quality. To overcome the problem at terminal independently, we propose a new error concealment algorithm for the multi-layered video coding. The proposed method uses the similarity of between layers in the multi-layered video coding and POCS (Projections Onto Convex Sets) which is a powerful error concealment tool, but heavily dependent on initial values. To find adequate initial value which can reduce iteration times as well as achieve high performance, we took consideration into both features of layered approach coding and the correlation in neighbor blocks. The simulation results show that the proposed concealment method works well.

Performance Analysis of Upper Layer Coding Method Based on DVB-S2 for Mobility (이동형 DVB-S2 기반 상위 계층 부호화 방식 성능 분석)

  • Choi, Seok-Soon;Bae, Jong-Tae;Kim, Min-Hyuk;Jung, Ji-Won;Lee, Seong-Ro;Choi, Myeong-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.10
    • /
    • pp.1075-1085
    • /
    • 2008
  • Recently, it is studied actively that DVB-S2 for mobility standard(DVB-S2M) is combined with DVB-H, DVB-T and conventional DVB-S2 standard for continuous satellite broadcasting and internet service. Especially, overcoming deep fading by tunnel is main subject. For overcoming deep fading, DVB-S2M proposed cross layer system is consist of upper layer and physical layer. Thus, this paper proposed optimal upper layer coding system fixing the physical layer coding under the simulation results by coding methods, train speed, data rate, interleaver size and IP packet size.

A Study on the Quality-of-Experience in Mobile Video Adaptive Streaming under Active Bluetooth Connection (와이파이-블루투스 콤보칩 사용이 모바일 비디오 스트리밍 서비스에 미치는 영향 분석)

  • Lee, Jongho;Choi, Jaehyuk
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.46-51
    • /
    • 2020
  • With Wi-Fi and Bluetooth connectivity becoming more common in today's handheld mobile devices, single-chip multi-radio combo-modules, which integrate two or more heterogeneous wireless radios on a single chip, are becoming more and more popular. The key requirement for combo solutions is that the quality of the user experience (QoE) must not be compromised by degrading connectivity performance. Therefore, characterizing and understanding the behaviour of combo-module is of vital importance to ensure this requirement in various environments. In this paper, we investigate the impact of the use of combo-modules on the performance of mobile video streaming over a Wi-Fi network. Our study reveals that the use of combo-modules incurs considerable side effects on QoE for mobile video streaming applications when the Wi-Fi and Bluetooth operate at the same time in the 2.4GHz ISM band. We reveal that rate-based adaptive algorithms, including the most popular adaptive bitrate streaming MPEG-DASH, is more severely affected by this phenomenon than buffer-based adaptive algorithms.

An Improved Anonymous Authentication Scheme for Remote Health Monitoring System (원격 건강정보 모니터링 시스템을 위한 개선된 익명인증 기법)

  • Park, Youngho;Noh, Si-Wan;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1551-1560
    • /
    • 2016
  • With the advancement of wearable devices and wireless body are networks, smart healthcare systems based on such technologies have been emerging to effectively monitor patient health and disease progression. In order to implement viable smart healthcare systems, the security and privacy of patient's personal health information must be considered. Yang et al. proposed a privacy-preserving authentication scheme using key-insulation technique for remote health monitoring system, however, key-insulation technique is not properly adapted to their scheme which in turn causes a security pitfall contrary to their assertions. Besides, Yang et al.'s scheme does not guarantee user anonymity against healthcare service provider. Therefore, in this paper, we discuss the security concerns for Yang et al.'s scheme and present an improved anonymous authentication scheme.

Design of Network-based AIS Reference Station System (네트워크 기반 AIS 기준국 시스템 설계)

  • Seo, Ki-Yeol;Park, Sang-Hyun;Jeong, Ho-Cheol;Cho, Deuk-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.824-830
    • /
    • 2010
  • In order to prepare for increasing performance requirement for Differential Global Navigation Satellite System (DGNSS) services of International Maritime Organization (IMO) and International Association of Lighthouse Authorities (IALA), this paper focuses on design of network-based Automatic Identification System (AIS) reference station system that can perform the functionality of Differential Global Positioning System (DGPS) reference station in an AIS base station system. AIS base station receives the differential corrections from the DGPS reference station, and it is not a method for transmitting the received differential corrections to onboard AIS units, but it is a method for generating the optimized differential corrections for onboard AIS units in AIS coverage. Therefore this paper proposes an algorithm for generating the differential corrections at AIS reference station, and performs the performance assessment of the proposed algorithm based on DGPS correction data measured from a DGPS reference station. Finally this paper discusses the test results and efficiency of the proposed system.

Load-balanced multi-agent model for moving patient management in mobile distribution environment (모바일 분산 환경에서 이동형 환자관리를 위한 부하 균형 다중 에이전트 모델)

  • Lee, Mal-Rye;Kim, Eun-Gyung;Zang, Yu-Peng;Lee, Jae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.809-816
    • /
    • 2010
  • This paper proposed about a load-balanced multi-agent model in mobile distribution environment to monitor moving patients and to deal with a situation of emergency. This model was designed to have a structure based on distribution framework by expanding a mobile system, and provides healthcare services based on real time situational information on moving patients. In order to overcome the limitation of middleware when we design system, we provided an abstract layer between applications and their base network infrastructure so that balance between QoS requests and network life can be maintained. In addition, clustering was used in cells for the efficient load distribution among multi-agents. By using Clustering FCM, we got optimal resources and had solve about transmission delay.

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

A Scheduling Algorithm for Performance Enhancement of Science Data Center Network based on OpenFlow (오픈플로우 기반의 과학실험데이터센터 네트워크의 성능 향상을 위한 스케줄링 알고리즘)

  • Kong, Jong Uk;Min, Seok Hong;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1655-1665
    • /
    • 2017
  • Recently data centers are being constructed actively by many cloud service providers, enterprises, research institutes, etc. Generally, they are built on tree topology using ECMP data forwarding scheme for load balancing. In this paper, we examine data center network topologies like tree topology and fat-tree topology, and load balancing technologies like MLAG and ECMP. Then, we propose a scheduling algorithm to efficiently transmit particular files stored on the hosts in the data center to the destination node outside the data center, where fat-tree topology and OpenFlow protocol between infrastructure layer and control layer are used. We run performance analysis by numerical method, and compare the analysis results with those of ECMP. Through the performance comparison, we show the outperformance of the proposed algorithm in terms of throughput and file transfer completion time.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

File Sharing System Between Heterogeneous System Using Mobile Server (모바일 서버를 이용한 이기종간의 파일 공유 시스템)

  • Park, Sung-hyun;Kim, A-Yong;HE, YILUN;CHU, XUN;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1041-1043
    • /
    • 2013
  • As the mobile device supply is increasing currently, the era of N mobile devices per person has opened. Types of mobile devices and OS are increasing continuously. Samsung and Intel are developing TIZEN, the OS mobilized by UBUNTU of Linux is going to be released as well as the market share of Google's Android and Apple's IOS remains above 90%. However, it is a reality that there are not specific technologies or systems which can share files between different OS. Despite of technologies such as Bluetooth and WiFi Direct, constraints are shown in device compatibility and file formats. In this paper, we have studied how to share files between OS as well as mobile devices, and to share files in a wireless LAN environment of heterogeneous variety. Future research includes the mobile phone integration server system that provides services such as introduction, management, maintenance, and repair in one-touch Mobile Server that spread and building are easy.

  • PDF