• Title/Summary/Keyword: 하도 buffering

Search Result 96, Processing Time 0.026 seconds

The Study of the Performance Improvement of UDP Packet Loss affected by TCP Flows (TCP Flows의 영향하에서 UDP 패킷손실을 줄이는 방법에 관한 연구)

  • 조기영;문호림;김서균;남지승
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.1061-1064
    • /
    • 1999
  • UDP has likely been used for real-time applications, such as video and audio. UDP supplies minimized transmission delay by omitting the connection setup process, flow control, and retransmission In general, more than 80 percent of the WAN resources are occupied by Transmission Control Protocol(TCP) traffic as opposed to UDP's simplicity, TCP adopts a unique flow control in this paper, I report new methods to minimize a udp packet loss considering TCP flow control on the real-time application the better performance of real time application can be obtained when they reduce a packet size and FIFO buffer scheduling method competing with TCP bandwidth for the bandwidth and buffering.

  • PDF

Implementation of real-time FD-OCT system based on asynchronous triple buffering and parallel processing using GPU (GPU 병렬처리와 비동기 트리플 버퍼를 적용한 실시간 FD-OCT 시스템 구현)

  • Jeon, Jun-Young;Kim, Young-Bong
    • Annual Conference of KIPS
    • /
    • 2014.04a
    • /
    • pp.858-860
    • /
    • 2014
  • 최근 영상처리 기법과 하드웨어의 발달로 의학 분야에서는 질병의 진단에 다양한 영상 시스템을 활용하고 있다. 특히 OCT 기술은 인체조직의 고해상도 이미지 획득과 혈류속도 측정을 동시에 할 수 있어 의료분야에 다양하게 적용이 가능하여 많은 관심을 받고 있다. 이에 더욱더 선명한 OCT 영상을 획득하기 위해 다양한 알고리즘과 필터를 사용함에 따라 빠른 프로세스 처리가 요구되고 있는 실정이다. 본 논문에서는 듀얼 코어 이상급의 CPU 를 탑재한 시스템에서 데이터 처리 모듈과 렌더링 모듈을 트리플 버퍼를 통해 비동기식으로 멀티스레드화 하였고, GPU 기반의 병렬처리를 통한 데이터 처리를 하여 속도를 향상시켰다. 이에 광학 카메라 촬영 시 선명한 실시간 OCT 영상을 확인할 수 있었다.

MBA Algorithm for VOD Service with VCR Functions (VCR 기능을 갖춘 VOD 서비스를 위한 MBA 알고리듬)

  • Kim, Back-Hyun;Kim, Dong-Su;Kim, Ik-Su
    • Annual Conference of KIPS
    • /
    • 2000.04a
    • /
    • pp.303-308
    • /
    • 2000
  • VOD(Video-On-Demand) 시스템에서 제한 없는 VCR 서비스는 클라이언트들의 개별 서비스 요청에 대하여 유일한 비디오 스트림을 할당함으로서 제공될 수 있다. 이 방식은 서버 부하의 증가와 부족한 네트워크 자원의 고갈 등과 같은 중대한 문제점을 갖고 있으나 클라이언트의 셋톱박스에 버퍼를 구현함으로서 매우 제한된 VCR 기능을 제공하게 된다. 본 논문에서는 대화형 VOD 시스템에서 제한 없는 VCR 기능을 제공할 수 있는 새로운 MBA(Multicast Buffering Algorithm) 알고리듬을 제안한다. MBA 알고리듬 하에서 VCR 서비스는 버퍼가 동적으로 확장되어 비디오 데이터를 저장하기 때문에 사용자에게 제한 없이 제공되어진다. 또한 MBA 알고리듬은 버퍼의 사용 효율을 증대시키는 방법을 제공하며 모든 클라이언트들의 서비스 요청을 지연 없이 즉시 처리하므로 사용자들에게 진정한 대화형 VOD 서비스를 제공하게 된다. 본 논문에서는 MBA 알고리듬을 이용하여 지연 없는 VCR 기능을 갖춘 VOD 서비스를 구현하였으며 시뮬레이션 결과는 MBA 알고리듬이 다른 버퍼링 방식과 비교하여 매우 우수한 성능을 갖고 있음을 보여주고 있다.

  • PDF

Real-Time Monitoring and Buffering Strategy of Moving Object Databases on Cluster-based Distributed Computing Architecture (클러스터 기반 분산 컴퓨팅 구조에서의 이동 객체 데이타베이스의 실시간 모니터링과 버퍼링 기법)

  • Kim, Sang-Woo;Jeon, Se-Gil;Park, Seung-Yong;Lee, Chung-Woo;Hwang, Jae-Il;Nah, Yun-Mook
    • Journal of Korea Spatial Information System Society
    • /
    • v.8 no.2 s.17
    • /
    • pp.75-89
    • /
    • 2006
  • LBS (Location-Based Service) systems have become a serious subject for research and development since recent rapid advances in wireless communication technologies and position measurement technologies such as global positioning system. The architecture named the GALIS (Gracefully Aging Location Information System) has been suggested which is a cluster-based distributed computing system architecture to overcome performance losses and to efficiently handle a large volume of data, at least millions. The GALIS consists of SLDS and LLDS. The SLDS manages current location information of moving objects and the LLDS manages past location information of moving objects. In this thesis, we implement a monitoring technique for the GALIS prototype, to allow dynamic load balancing among multiple computing nodes by keeping track of the load of each node in real-time during the location data management and spatio-temporal query processing. We also propose a buffering technique which efficiently manages the query results having overlapped query regions to improve query processing performance of the GALIS. The proposed scheme reduces query processing time by eliminating unnecessary query execution on the overlapped regions with the previous queries.

  • PDF

The Time Prediction for Escape from Flood Using GIS - The Case of Chun-chon City - (GIS분석을 통한 홍수시의 대피예보를 위한 시간 예측 - 춘천시를 중심으로 -)

  • 양인태;김욱남;김재철;박재국
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.19 no.3
    • /
    • pp.211-217
    • /
    • 2001
  • Chun-chon city is the area that is estimated to be damaged by breaking of Dam by a flood among several natural disaster. If so, what is the way that minimize the damage\ulcorner There are many ones but it may be best that we take shelter from it before the breaking of Dam. Then when must we do\ulcorner By what instrument can we minimize the damage of people. And how do we compute the time\ulcorner In this study, using buffering, overlap and network, GIS ability based on ARC/INFO. I chose six routesto take shelter outside of Chun-chon city, calculated the traffic volume of each ones, and estimated the time for decentralization of risks.

  • PDF

Analysis of Isolation System for Impulsive Force Device with Recoil Mechanism (반동방식 충격기구의 완충시스템 해석)

  • Kim, HyoJun;Ryu, BongJo
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.15 no.3 s.96
    • /
    • pp.272-279
    • /
    • 2005
  • In this study the optimal isolation system for the prototype HIFD(high impulsive force device) is investigated. For this purpose, firstly, the dynamic behavior of a human body and a transmitted force under specific operation conditions are analyzed through a series of experimental works using the devised test setup. In order to design the optimal dynamic absorbing system, the parameter optimization process is performed using the simplified isolation system model based on the experimental results of linear impulse and transmitted force. Finally, under the parameters satisfying the constraints of the buffering displacement and the transmitted force, the performance of the designed isolation system for the prototype HIFD is evaluated by experiment.

Spatial Crime Analysis using GIS (GIS를 이용한 범죄의 공간적 특성)

  • Jeon, Jae-Han;Yang, Hyo-Jin;Kwon, Jay-Hyoun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.15 no.1 s.39
    • /
    • pp.3-7
    • /
    • 2007
  • To deal with the modern intellectual criminal acts, various efforts have been tried. Especially, it is not difficult to watch the recent activities to analyze the criminal characteristics spatially using computing and GIS technology. In this study, the spatial features and patterns of crime are investigated. Based on the real criminal record in Seoul Korea, the crime is reconstituted with four major categories such as assault, larceny, robbery, and rape. Then the variables are derived based on the theory of criminology. The kernal density analysis is performed to investigate the criminal distribution, and the correlation between the main criminal causes and the criminal outbreak is examined by buffering analysis. In addition, the land price and land usages are correlated with social-economic factors of criminal patterns to produce the final crime map.

  • PDF

Input-buffered Packet Switch with a Burst Head Addressable FIFO input buffering mechanism (버스트 헤더 주소 방식의 FIFO 입력 버퍼링 메카니즘을 사용하는 입력 버퍼 패킷 스위치)

  • 이현태;손장우;전상현;김승천;이재용;이상배
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.1
    • /
    • pp.117-124
    • /
    • 1998
  • As window sized increases, the throughput input-buffered packet switch with a window scheme improves on random traffic condition. However, the improvement diminishes quickly under bursty traffic. In this paper, we propose Burst Head Addressable FIFO mechanism and memory structure having search capability in unit of burst header to compensate the sensitiveness of the windowed scheme to bursty traffic. The performance of a input-buffered switch using the proposed Burst Header Addressable FIFO input buffer was analyzed using computer simulations. The maximum throughput of the conventional FIFO scheme approaches an asymptotic value 0.5 as mean burst length increases. The maximum throughput of the proposed scheme is greater than that of the conventional scheme for any mean burst length and window size.

  • PDF

A Study on the Improvement Plan and Issue of Network Neutrality Regulations (망 중립성 규제의 쟁점과 개선방안에 관한 연구)

  • Jin, Ho-Un;Shin, Jin-Sik;Choi, Seong-Jhin
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.2
    • /
    • pp.71-78
    • /
    • 2017
  • A network neutrality is the concept that ISP assures users non-discrimination, interconnection, accessibility for ensuring users without control or interference of equal services in the network. But today a network traffic is growing rapidly in sensitive buffering services as P2P service diffusion and mass video stream service. To manage this problem, ISP violates a net neutrality by control, change and interfere with service. And then the debate about net neutrality is happening. Therefore in this paper, we compare and analyze net neutrality principles, concepts, and legislative policy in the native and foreign. Based on this, we suggested the issues and improvement plan of net neutrality guard line.

A Study on the Security Processor Design based on Pseudo-Random Number in Web Streaming Environment

  • Lee, Seon-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.73-79
    • /
    • 2020
  • Nowadays, with the rapid spread of streaming services in the internet world, security vulnerabilities are also increasing rapidly. For streaming security, this paper proposes a PN(pseudo-random noise) distributed structure-based security processor for web streaming contents(SP-WSC). The proposed SP-WSC is basically a PN distributed code algorithm designed for web streaming characteristics, so it can secure various multimedia contents. The proposed SP-WSC is independent of the security vulnerability of the web server. Therefore, SP-WSC can work regardless of the vulnerability of the web server. That is, the SP-WSC protects the multimedia contents by increasing the defense against external unauthorized signals. Incidentally it also suggests way to reduce buffering due to traffic overload.