• Title/Summary/Keyword: Communications

Search Result 30,899, Processing Time 0.055 seconds

A Kernel-level RTP for Efficient Support of Multimedia Service on Embedded Systems (내장형 시스템의 원활한 멀티미디어 서비스 지원을 위한 커널 수준의 RTP)

  • Sun Dong Guk;Kim Tae Woong;Kim Sung Jo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.6
    • /
    • pp.460-471
    • /
    • 2004
  • Since the RTP is suitable for real-time data transmission in multimedia services like VoD, AoD, and VoIP, it has been adopted as a real-time transport protocol by RTSP, H.323, and SIP. Even though the RTP protocol stack for embedded systems has been in great need for efficient support of multimedia services, such a stack has not been developed yet. In this paper, we explain embeddedRTP which supports the RTP protocol stack at the kernel level so that it is suitable for embedded systems. Since embeddedRTP is designed to reside in the UBP module, existing applications which rely ell TCP/IP services can proceed the same as before, while applications which rely on the RTP protocol stack can request HTP services through embeddedRTp API. EmbeddedRTP stores transmitted RTP packets into per session packet buffer, using the packet's port number and multimedia session information. Communications between applications and embeddedRTP is performed through system calls and signal mechanisms. Additionally, embeddedRTP API makes it possible to develop applications more conveniently. Our performance test shows that packet-processing speed of embeddedRTP is about 7.5 times faster than that oi VCL RTP for multimedia streaming services on PDA in spite that its object code size is reduced about by 58% with respect to UCL RTP's.

Access Control of XML Documents Including Update Operators (갱신 연산을 고려한 XML문서의 접근제어)

  • Lim Chung-Hwan;Park Seog
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.567-584
    • /
    • 2004
  • As XML becomes popular as the way of presenting information on the web, how to secure XML data becomes an important issue. So far study on XML security has focused on security of data communications by using digital sign or encryption technology. But, it now requires not just to communicate secure XML data on communication but also to manage query process to access XML data since XML data becomes more complicated and bigger. We can manage XML data queries by access control technique. Right now current XML data access control only deals with read operation. This approach has no option to process update XML queries. In this paper, we present XML access control model and technique that can support both read and update operations. In this paper, we will propose the operation for XML document update. Also, We will define action type as a new concept to manage authorization information and process update queries. It results in both minimizing access control steps and reducing memory cost. In addition, we can filter queries that have no access rights at the XML data, which it can reduce unnecessary tasks for processing unauthorized query. As a result of the performance evaluation, we show our access control model is proved to be better than other access control model in update query. But it has a little overhead to decide action type in select query.

Implementation of Analysis System for H.323 Traffic (H.323 트래픽 분석 시스템의 개발)

  • Lee Sun-Hun;Chung Kwang-Sue
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.471-480
    • /
    • 2006
  • Recently, multimedia communication services, such as video conferencing and voice over IP, have been rapidly spread. H.323 is an international standard that specifies the components, protocols and procedures that provide multimedia communication services of real-time audio, video, and data communications over packet networks, including IP based networks. H.323 is applied to many commercial services because it supports various network environments and has a good performance. But communication services based on H.323 may have some problem because of current network trouble or mis-implementation of H.323. The understanding of this problem is a critical issue because it improves the quality of service and is easy to service maintenance. In this paper, we implement the analysis system for H.323 protocol wihch includes H.245, H.225.0, RTP, RTCP, and so on. Tills system is able to capture, parse, and present the H.323 protocol in real-time. Through the operation test and performance evaluation, we prove that our system is a useful to analyze and understand the problems for communication services based on H.323.

Revitalization Plan and Value of Social Network Service in the Business Organization (기업조직 내 소셜 미디어 서비스 활용의 가치 제고 및 활성화 방안)

  • Kim, Dong-Hyun;Seo, Hyun-Shik;Kim, Hyung-Joon;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.275-286
    • /
    • 2011
  • The purpose of this study is to find the beneficial plan for business success by the advantage of social media service in the business organization. There is few research for applying social media on a variety of fields in business organization although many companies are trying to find the way for its application. Hence, this study identifies the possibility for the utilization of social media services, and it also finds the plan for their effective application. The social relationship is created by increasing communications between users of social media service. The research model is established on the basis of the hypothesis that the social relationship affects knowledge share, pursuit of ego, social participation, amusement. To maximize the impact of results, the research was conducted on the basis of the target on two groups including the business men and non-business men who use social media services. As results of the research, the business men tend to appeal their impression based on sharing knowledge with anonymous people. Also, it is necessary to make a social participation to a management participation, and to utilize the social media in the organization by including amusement to its function. This research is expected to have significant implication to companies which wants to apply social media services in the future.

Novel Radix-26 DF IFFT Processor with Low Computational Complexity (연산복잡도가 적은 radix-26 FFT 프로세서)

  • Cho, Kyung-Ju
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.35-41
    • /
    • 2020
  • Fast Fourier transform (FFT) processors have been widely used in various application such as communications, image, and biomedical signal processing. Especially, high-performance and low-power FFT processing is indispensable in OFDM-based communication systems. This paper presents a novel radix-26 FFT algorithm with low computational complexity and high hardware efficiency. Applying a 7-dimensional index mapping, the twiddle factor is decomposed and then radix-26 FFT algorithm is derived. The proposed algorithm has a simple twiddle factor sequence and a small number of complex multiplications, which can reduce the memory size for storing the twiddle factor. When the coefficient of twiddle factor is small, complex constant multipliers can be used efficiently instead of complex multipliers. Complex constant multipliers can be designed more efficiently using canonic signed digit (CSD) and common subexpression elimination (CSE) algorithm. An efficient complex constant multiplier design method for the twiddle factor multiplication used in the proposed radix-26 algorithm is proposed applying CSD and CSE algorithm. To evaluate performance of the previous and the proposed methods, 256-point single-path delay feedback (SDF) FFT is designed and synthesized into FPGA. The proposed algorithm uses about 10% less hardware than the previous algorithm.

The Viral Effect of Online Social Network on New Products Promotion: Investigating Information Diffusion on Twitter (신제품 프로모션에 대한 온라인 소셜네트워크의 구전효과 분석 : 트위터의 정보전달과정을 중심으로)

  • Kim, Hyung-Jin;Son, In-Soo;Lee, Dong-Won
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.107-130
    • /
    • 2012
  • In Twitter, a user can post a message below 140 characters on his/her account, and can also repost a message of other users who the user follows. The message posted by the user in turn can be seen and reposted by other users who follow the user, which is called Re-tweet (RT). While some messages spread widely, other messages have relatively less or no RT. What factors cause these quantity variances of RT originated from original messages? How can the messages become influential in online social networks? As an effort to answer the above questions, we focused on information vividness, message characteristics, and originator characteristics. In perspective of managerial implication, we expect that the findings of this paper will provide corporations with helpful insight on the Word-of-Mouth (WOM) effect for efficient and effective advertisements and communications when they send a message of new products or services through Social Network Services. In perspective of academic implication, we identify the effect of contents of a message on WOM, which has been dealt with by few social network researches.

Cooperative Spectrum Sensing for Cognitive Radio Technology Considering Heterogeneous Primary User (이종 일차 시스템을 고려한 인지 라디오 기술에서의 협력 대역 센싱 방안)

  • Lee, Woongsup;Jung, Bang-Chul;Ban, Taewon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1546-1553
    • /
    • 2015
  • In cognitive radio technology, the overall capacity of communications systems can be improved without allocating additional bands by allowing secondary system to utilize the band when a primary system who has right to use the band does not utilize it. Therefore, spectrum sensing to determine the existence of primary system is utmost important in the cognitive radio technology. In this work, we consider a novel cooperative spectrum sensing in cognitive cellular systems. Especially, we consider the case in which heterogeneous primary systems coexist, i.e., heterogenous transmission power and sensing requirement of primary system, such that only portion of users in cognitive cellular systems are able to detect the primary system. In this case, we propose new cooperative spectrum sensing with multiple sensing stages to properly detect the existence of primary systems in this kind of situations. Moreover, we analyze the performance of conventional cooperative spectrum sensing schemes such as OR-rule, AND-rule and MAJORITY-rule under the existence of heterogeneous primary systems. Finally, we investigate the performance of the proposed scheme through computer based simulations and show that the existence of primary systems can be determined accurately by using our proposed scheme.

Analysis of Huawei's PCT Patent Applications (화웨이의 PCT 특허 출원 동향분석)

  • Kim, Marco JinHwan;Han, Yoo-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2507-2517
    • /
    • 2015
  • In this research, we aim to analyze the trend of Huawei's PCT patent applications. As a result of analyzing Huawei's PCT patents by dividing temporal spans into three periods - the early 2000s, the late 2000s, and the early 2010s -, the following characteristics have been observed. First, the number of PCT patent applications has conspicuously increased from the early 2000s to the late 2000s and this trend has continued during the early 2010s. Second, in terms of a core technological field, whereas Huawei focused on the development of technologies in the 'H04L: transmission of digital information' sector during the early/late 2000s, it changed this field to the 'H04W: wireless communication networks' sector during the early 2010s. Lastly, in the case of the patent maps, it was found that while general communications technologies, as expressed with such keywords as 'user' and 'network,' were actively developed during the early/late 2000s, mobile phone-related technologies grasped this leading position, as shown with the keywords including 'user equipment,' 'base station,' and 'MME,' during the early 2010s. It was also noticeable that Huawei filed LTE-related patent applications more actively than Apple and Samsung Electronics, which implies that it will presumably pioneer the global market more aggressively than its competitors in the future.

Android-based mobile broadcast EPG study (안드로이드 기반의 모바일 방송 EPG 연구)

  • Bang, Jin-Suk;Chae, Jeong-Sik;Jin, Du-Seok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.609-611
    • /
    • 2010
  • IPTV(Internet Protocol Television)is the point in commercial and broadcast content from the numerous channels that are growing exponentially, Many people with mobile devices anywhere, anytime you want to use IPTV, demand will increase. Numerous channels for collecting information about EPG (Electronic Program Guide) service, IP (Internet Protoco) communications using a fast search of content for broadcast EPG is time to take advantage of the service. Using the current wired network, the Android-based IPTV services to take advantage of the EPG in the mobile environment to provide an environment being studied, and Country of the European digital broadcast standard DVB-MHP standard is followed by subsequent research and development of the EPG service is required. In this study, using the existing wired network, IPTV EPG service information of the channel in a mobile environment user-friendly as possible by providing channels for EPG service information to users quickly and easily search for content to provide an environment and Android-based mobile IPTV environment to take advantage of the EPG service channels of broadcast channels with in the EPG service for users to gather information retrieval system is proposed.

  • PDF

A Study on u-CCTV Fire Prevention System Development of System and Fire Judgement (u-CCTV 화재 감시 시스템 개발을 위한 시스템 및 화재 판별 기술 연구)

  • Kim, Young-Hyuk;Lim, Il-Kwon;Li, Qigui;Park, So-A;Kim, Myung-Jin;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.463-466
    • /
    • 2010
  • In this paper, CCTV based fire surveillance system should aim to development. Advantages and Disadvantages analyzed of Existing sensor-based fire surveillance system and video-based fire surveillance system. To national support U-City, U-Home, U-Campus, etc, spread the ubiquitous environment appropriate to fire surveillance system model and a fire judgement technology. For this study, Microsoft LifeCam VX-1000 using through the capturing images and analyzed for apple and tomato, Finally we used H.264. The client uses the Linux OS with ARM9 S3C2440 board was manufactured, the client's role is passed to the server to processed capturing image. Client and the server is basically a 1:1 video communications. So to multiple receive to video multicast support will be a specification. Is fire surveillance system designed for multiple video communication. Video data from the RGB format to YUV format and transfer and fire detection for Y value. Y value is know movement data. The red color of the fire is determined to detect and calculate the value of Y at the fire continues to detect the movement of flame.

  • PDF