• Title/Summary/Keyword: 지연 공간

Search Result 655, Processing Time 0.024 seconds

Design and Performance Evaluation of IP VPNs based MPLS (MPLS 망 기반 IP VPN의 설계 및 성능 평가)

  • 박석천
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.148-156
    • /
    • 2000
  • This paper proposed that an MPLS-based VPN using next-generation If switches and appropriate set of traffic engineering algorithms is the best way to implement QoS-capable IP VPNs. While ATM-based solution would not rely scalable the number of connections becomes too large, MPLS-based VPNs’ efficiency could be confirmed network delay time through performance evaluation. And we evaluated the performance about the If VPN based on proposed MPLS, at the result of evaluation. We figured out that delay increased more slowly in case of VPN based on MPLS comparing with the VPN based on ATM which has rapid delay increasement. Therefore we confirm that the VPN based on MPLS has high speed of packet processing and high degree of network efficiency through the performance evaluation.

  • PDF

Dynamic Analysis of Floating Bridge Subject to Earthquake Load Considering Multi-Support Excitation (다중지점 가진 효과를 고려한 부유식 교량의 지진응답 해석)

  • 권장섭;백인열;장승필
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.8 no.2
    • /
    • pp.27-33
    • /
    • 2004
  • Dynamic response analysis is conducted for a floating bridge subjected to multiple support earthquake excitation. The floating bridge used in this study is supported by discrete floating pontoons and horizontal pretension cables supported at both ends of the bridge. The bridge is modeled with finite elements and the hydrodynamic added mass and added damping due to the surrounding fluid around pontoons are obtained using boundary elements. During the analysis the concept of retardation function is utilized to consider the frequency dependency of the hydrodynamic coefficients. Multiple support excitation is introduced at both ends of the bridge and the time history response is compared to that of a simultaneous excitation. The results show that the multiple support excitation yields larger values in some responses. for example in cable tensions. than the sumultaneous excitation.

Design of AES-Based Encryption Chip for IoT Security (IoT 보안을 위한 AES 기반의 암호화칩 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • The paper proposes the design of AES-based encryption chip for IoT security. ROM based S-Box implementation occurs a number of memory space and some delay problems for its access. In this approach, S-Box is designed by pipeline structure on composite field GF((22)2) to get faster calculation results. In addition, in order to achieve both higher throughput and less delay, shared S-Box are used in each round transformation and the key scheduling process. The proposed AES crypto-processor is described in Veilog-HDL, and Xilinx ISE 14.7 tool is used for logic synthesis by using Xilinx XC6VLX75T FPGA. In order to perform the verification of the crypto-processor, the timing simulator(ModelSim 10.3) is also used.

Realtime Media Streaming Technique Based on Adaptive Weight in Hybrid CDN/P2P Architecture

  • Lee, Jun Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.1-7
    • /
    • 2021
  • In this paper, optimized media data retrieval and transmission based on the Hybrid CDN/P2P architecture and selective storage through user's prediction of requestability enable seamless data transfer to users and reduction of unnecessary traffic. We also propose a new media management method to minimize the possibility of transmission delay and packet loss so that media can be utilized in real time. To this end, we construct each media into logical segments, continuously compute weights for each segment, and determine whether to store segment data based on the calculated weights. We also designate scattered computing nodes on the network as local groups by distance and ensure that storage space is efficiently shared and utilized within those groups. Experiments conducted to verify the efficiency of the proposed technique have shown that the proposed method yields a relatively good performance evaluation compared to the existing methods, which can enable both initial latency reduction and seamless transmission.

Blind Noise Separation Method of Convolutive Mixed Signals (컨볼루션 혼합신호의 암묵 잡음분리방법)

  • Lee, Haeng-Woo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.3
    • /
    • pp.409-416
    • /
    • 2022
  • This paper relates to the blind noise separation method of time-delayed convolutive mixed signals. Since the mixed model of acoustic signals in a closed space is multi-channel, a convolutive blind signal separation method is applied and time-delayed data samples of the two microphone input signals is used. For signal separation, the mixing coefficient is calculated using an inverse model rather than directly calculating the separation coefficient, and the coefficient update is performed by repeated calculations based on secondary statistical properties to estimate the speech signal. Many simulations were performed to verify the performance of the proposed blind signal separation. As a result of the simulation, noise separation using this method operates safely regardless of convolutive mixing, and PESQ is improved by 0.3 points compared to the general adaptive FIR filter structure.

Analysis of Latency and Computation Cost for AES-based Whitebox Cryptography Technique (AES 기반 화이트박스 암호 기법의 지연 시간과 연산량 분석)

  • Lee, Jin-min;Kim, So-yeon;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.115-117
    • /
    • 2022
  • Whitebox encryption technique is a method of preventing exposure of encryption keys by mixing encryption key information with a software-based encryption algorithm. Whitebox encryption technique is attracting attention as a technology that replaces conventional hardware-based security encryption techniques by making it difficult to infer confidential data and keys by accessing memory with unauthorized reverse engineering analysis. However, in the encryption and decryption process, a large lookup table is used to hide computational results and encryption keys, resulting in a problem of slow encryption and increased memory size. In particular, it is difficult to apply whitebox cryptography to low-cost, low-power, and light-weight Internet of Things products due to limited memory space and battery capacity. In addition, in a network environment that requires real-time service support, the response delay time increases due to the encryption/decryption speed of the whitebox encryption, resulting in deterioration of communication efficiency. Therefore, in this paper, we analyze whether the AES-based whitebox(WBC-AES) proposed by S.Chow can satisfy the speed and memory requirements based on the experimental results.

  • PDF

Analysis of Spatial Correlation and Linear Modeling of GNSS Error Components in South Korea (국내 GNSS 오차 성분별 공간 상관성 및 선형 모델링 특성 분석)

  • Sungik Kim;Yebin Lee;Yongrae Jo;Yunho Cha;Byungwoon Park;Sul Gee Park;Sang Hyun Park
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.3
    • /
    • pp.221-235
    • /
    • 2024
  • Errors included in Global Navigation Satellite System (GNSS) measurements degrade the performance of user position estimation but can be mitigated by spatial correlation properties. Augmentation systems providing correction data can be broadly categorized into State Space Representation (SSR) and Observation Space Representation (OSR) methods. The satellite-based cm-level augmentation service based on the SSR broadcasts correction data via satellite signals, unlike the traditional Real-Time Kinematic (RTK) and Network RTK methods, which use OSR. To provide a large amount of correction data via the limited bandwidth of the satellite communication, efficient message structure design considering service area, correction generation, and broadcast intervals is necessary. For systematic message design, it is necessary to analyze the influence of error components included in GNSS measurements. In this study, errors in satellite orbits, satellite clocks for GPS, Galileo, BeiDou, and QZSS satellite constellations ionospheric and tropospheric delays over one year were analyzed, and their spatial decorrelations and linear modeling characteristics were examined.

Design and Implementation of Crash Recovery Technique with Bounded Execution Time for NAND Flash File System (낸드 플래시 파일 시스템을 위한 결함 복구 시간 제한 기법의 설계 및 구현)

  • Kang, Seung-Yup;Park, Hyun-Chan;Kim, Ki-Man;Yoo, Chuck
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.6
    • /
    • pp.330-338
    • /
    • 2010
  • Flash storage devices are very popularly used in portable devices such as cell phones, PDAs and MP3 players. As technology is improved, users want much bigger and faster storage system. Paradoxically, people have to wait more and more time proportionally to the capacity of their storage devices when these are trying to be recovered after file system crash. It is serious problem because booting time of devices is dominated by crash recovery of flash file system. In this paper, we design a crash recovery mechanism, named 'Working Area(WA hereafter)' technique, which has bounded crash recovery execution time. With WA technique, write operations to flash memory are only performed in WA. Therefore, by simply scanning the latest WA. We can recover a file system crash because every change for flash memory is occured only in latest WA. We implement the WA technique based on YAFFS2 and evaluate by comparing with traditional techniques. As a result, WA technique shows that its crash recovery execution time is 25 times faster than Log-based Method when we use 1 gig a bytes NAND flash memory in worst case. This gap will be futher and futher as storage capacity grows.

THE ERUPTION GUIDANCE OF IMPACTED MAXILLARY ANTERIOR TEETH (맹출장애를 보이는 상악 전치의 맹출유도)

  • Sim, Jeung-Ho;Eum, Jong-Hyeok;Kim, Shin;Jeong, Tae-Sung
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.31 no.1
    • /
    • pp.34-40
    • /
    • 2004
  • Unerupted maxillary anterior teeth is not a common case, However it may present practitioners with management problem. The cause of impaction is considered to be multifactorial, and local cause is the most common. These impacted teeth require surgical intervention, removal, transplantation, or surgical exposure, with or without orthodontic traction to align the malpositioned tooth. The preferred option is surgical exposure and orthodontic correction. Surgical intervention and orthodontic correction should not be delayed to avoid unnecessary difficulties in aligning the tooth in the arch. Surgical exposure should be performed with the intent of providing sufficient attached gingiva rather than simply uncovering the crown, which results in only alveolar mucosal attachment. Attached gingiva is essential to secure the gingival tissues to the adjacent teeth at the dentogingival junction. Thus preventing loss of periodontal tissues as a result of the pull of the surrounding soft tissues and facial muscles. Labially impacted maxillary anterior teeth uncovered with an apically positioned flap technique have more un- esthetic sequelae than those uncovered with a closed-eruption technique. In the case of severly displaced impacted teeth, autotransplantation ensures preservation of the alveolar bone and will facilitate future placement of an osseointegrated implant once growth has ceased or if ankylosis/resorption of the transplant occurs.

  • PDF

An Energy-Balancing Technique using Spatial Autocorrelation for Wireless Sensor Networks (공간적 자기상관성을 이용한 무선 센서 네트워크 에너지 균등화 기법)

  • Jeong, Hyo-nam;Hwang, Jun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.33-39
    • /
    • 2016
  • With recent advances in sensor technology, CMOS-based semiconductor devices and networking protocol, the areas for application of wireless sensor networks greatly expanded and diversified. Such diversification of uses for wireless sensor networks creates a multitude of beneficial possibilities for several industries. In the application of wireless sensor networks for monitoring systems' data transmission process from the sensor node to the sink node, transmission through multi-hop paths have been used. Also mobile sink techniques have been applied. However, high energy costs, unbalanced energy consumption of nodes and time gaps between the measured data values and the actual value have created a need for advancement. Therefore, this thesis proposes a new model which alleviates these problems. To reduce the communication costs due to frequent data exchange, a State Prediction Model has been developed to predict the situation of the peripheral node using a geographic autocorrelation of sensor nodes constituting the wireless sensor networks. Also, a Risk Analysis Model has developed to quickly alert the monitoring system of any fatal abnormalities when they occur. Simulation results have shown, in the case of applying the State Prediction Model, errors were smaller than otherwise. When the Risk Analysis Model is applied, the data transfer latency was reduced. The results of this study are expected to be utilized in any efficient communication method for wireless sensor network monitoring systems where all nodes are able to identify their geographic location.