• Title/Summary/Keyword: Download

Search Result 447, Processing Time 0.026 seconds

Performance Evaluation of Finite Field Arithmetic Implementations in Network Coding (네트워크 코딩에서의 유한필드 연산의 구현과 성능 영향 평가)

  • Lee, Chul-Woo;Park, Joon-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.193-201
    • /
    • 2008
  • Using Network Coding in P2P systems yields great benefits, e.g., reduced download delay. The core notion of Network Coding is to allow encoding and decoding at intermediate nodes, which are prohibited in the traditional networking. However, improper implementation of Network Coding may reduce the overall performance of P2P systems. Network Coding cannot work with general arithmetic operations, since its arithmetic is over a Finite Field and the use of an efficient Finite Field arithmetic algorithm is the key to the performance of Network Coding. Also there are other important performance parameters in Network Coding such as Field size. In this paper we study how those factors influence the performance of Network Coding based systems. A set of experiments shows that overall performance of Network Coding can vary 2-5 times by those factors and we argue that when developing a network system using Network Coding those performance parameters must be carefully chosen.

  • PDF

A Study on Derivation of Technical Elements for Joint Use of Copyright Rights Group Data by ISNI Korea Consortium (ISNI Korea 컨소시엄의 저작권 권리 단체 데이터 공동 활용을 위한 기술요소 도출 연구)

  • Park, Jin Ho;Kwak, Seung Jin;Lee, Seungmin;Oh, Sang Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.1
    • /
    • pp.379-392
    • /
    • 2020
  • The purpose of this study is to present technical elements to improve the data utilization of the ISNI Korea Consortium, which is operated by the National Library of Korea, which is responsible for the registration of Korean names. The ISNI Korea Consortium aims to register various creation-related information in addition to bibliographic-related individual and organization name information. To this end, this study examines the ISNI Korea consortium, which is a data provider's consultative body, among other things, the metadata status of copyright organizations and the linked data specification of ISNI. As a result, data acquisition, refining, storage, identifier management, consortium metadata management, five in total, and RDF data management (repository) in terms of linked data, RDF data issuance, RDF data retrieval, RDF data inquiry, RDF data Eight technical elements, including download, ontology inquiry, standard term inquiry and mapping information management, were derived.

Popularity-Based Pushing Scheme for Supporting Content Provider Mobility in Content-Centric Networking (콘텐츠 중심 네트워크에서 정보제공자의 이동성 지원을 위한 인기도 기반 푸싱 기법)

  • Woo, Taehee;Park, Heungsoon;Kwon, Taewook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.78-87
    • /
    • 2015
  • Content-Centric Networking(CCN) is a new networking paradigm to search for the routing information needed to find a data from the content name, unlike conventional IP networks. In CCN, the mobility management, one of the CCN challenges, is consists of consumer mobility and content provider mobility. Among both, in the case of the content provider mobility, it requires too much overhead and time to update routing information on the corresponding routers. In this paper, we propose Popularity-based Pushing CCN(PoPCoN) which considers the content popularity to support effective mobility of content provider in CCN. Our proposed algorithm shortens content download time for the consumer and reduces the network overhead during mobility as compared to the existing approaches.

Femto-Caching File Placement Technique for Overlapped Helper Coverage Without User Location Information (사용자 위치정보를 사용하지 않는 헬퍼 간 중첩 커버리지 영역을 위한 펨토-캐싱 파일 분배 기술)

  • Shim, Jae-Nam;Min, Byoung-Yoon;Kim, Dong Ku
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.682-689
    • /
    • 2014
  • Due to explosive growth of mobile data traffic, many kind of techniques based on small cell is proposed as solution for phenomenon. However, those techniques essentially demands increase of backhaul capacity and causes performance degradation if not satisfied. Based on that, the approach applying the storage capacity in place of backhaul capacity, which is known as femto-caching, is proposed to reduce data downloading delay of users in system. In this paper, we expanded previous research by proposing file placement strategy with distribution of user position, which is more practical scenario. Simulation results verify that our proposed scheme has better performance gains mainly because when coverage of helpers are overlapped, users get more opportunity to connect various helpers which enables users to download a variety kind of files from helpers, not base station.

Biometric Template Security for Personal Information Protection (개인정보 보호를 위한 바이오인식 템플릿 보안)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.437-444
    • /
    • 2008
  • This paper deals with the biometric template protection in the biometric system which has been widely used for personal authentication. First, we consider the structure of the biometric system and the function of its sub-systems and define the biometric template and identification(ID) information. And then, we describe the biometric template attack points of a biometric system and attack examples and provide their countermeasures. From this, we classify the vulnerability which can be protected by encryption and hashing techniques. For more detail investigation of these at real operating situations, we analyze them and suggest several protection methods for the typical application scheme of biometric systems such as local model, download model, attached model, and center model. Finally, we also handle the privacy problem which is most controversy issue related to the biometric systems and suggest some guidances of safeguarding procedures on establishing privacy sympathy biometric systems.

Design of Web Retrieval Component for Marine Leisure Information Database (해양레저정보 데이터베이스 구축을 위한 웹 탐색 컴포넌트 설계)

  • Choi, Hong-Seok;Jung, Sung-Hun;Ahn, Seong-Hwan;Yim, Jae-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.142-145
    • /
    • 2005
  • According as marine leisure industry has developed and the demand of leisure culture has increased rapidly, a desire about service which supply marine safety and connect marine information is enlarging. We wish to develop contents of download form that supply geographic information of Electronic Navigational Chart(ENC) in the marine that is digitalized to carrying along terminal of WIPI base and various informations for marine leisure. For this, DB that offer ENC and additional information should be constructed. Also, we need server(CPS; Contents provider Server) that offer required contents. In this paper, we design web retrieval component which store request information to database. When consumer required necessary information through personal mobile device, CPS can inform that. So, we wish to develop web retrieval agent component that parse informations in various World Wide Webs, and store to database.

  • PDF

A Study on VoIP Security Risk Analysis and Countermeasure (VoIP 보안 위협 분석 및 대책 연구)

  • Kim, Hyun-Chul;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.277-280
    • /
    • 2011
  • VoIP is a technology of voice communication, using the existing internet network which sends and receives voice packets. VoIP has an advantage that VoIP is cheaper than an existing telephony, and the tech is vitalized lately. But recently you can download Volp Application in the Market that have a vulnerability(Anyone Can Upload). This weakness is wrongfully used that People are downloaded by encouraging about malignant code is planted. Signal intercepts indicates from this case. and paralysis by DDoS Attack, bypass are charged for hacking. Judging from, security threat of VolP analysis and take countermeasures. In the thesis we analyze the VoIP security caused on 'Soft Phone' and 'Smart Phone', and figure out security policies and delineate those policies on the paper.

  • PDF

Web-Cached Multicast Technique for on-Demand Video Distribution (주문형 비디오 분배를 위한 웹-캐슁 멀티캐스트 전송 기법)

  • Kim, Back-Hyun;Hwang, Tae-June;Kim, Ik-Soo
    • The KIPS Transactions:PartB
    • /
    • v.12B no.7 s.103
    • /
    • pp.775-782
    • /
    • 2005
  • In this paper, we propose multicast technique in order to reduce the required network bandwidth by n times, by merging the adjacent multicasts depending on the number of HENs (Head-End-Nodes) n that request the same video. Allowing new clients to immediately join an existing multicast through patching improves the efficiency of the multicast and offers services without any initial latency. A client might have to download data through two channels simultaneously, one for multicast and the other for patching. The more the frequency of requesting the video is, the higher the probability of caching it among HENs increases. Therefore, the requests for the cached video data can be served by HENs. Multicast from server is generated when the playback time exceeds the amount of cached video data. Since the interval of multicast can be dynamically expanded according to the popularity of videos, it can be reduced the server's workload and the network bandwidth. We perform simulations to compare its performance with that of conventional multicast. From simulation results, we confirm that the Proposed multicast technique offers substantially better performance.

Component Design of Marine Leisure Information Retrieval Agent (해양레저정보 탐색 에이전트의 컴포넌트 설계)

  • Choi Hong-Seok;Jung Sung-Hun;Yim Jae-Hong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.221-224
    • /
    • 2005
  • According as marine leisure industry has developed and the demand of leisure culture has increased rapidly, a desire about service which supply marine safety and connect marine information is enlarging. We wish tc develop contents of download form that supply geographic information of Electronic Navigational Chart(ENC) in the marine that is digitalized to carrying along terminal of WIPI base and various informations for marine leisure. For this, DB that offer ENC and additional information should be constructed. Also, we need server (CPS; Contents provider Server) that offer required contents. In this paper, we design web retrieval component which store request information to database. When consumer required necessary information through personal mobile device, CPS can inform that. So, we wish to develop web retrieval agent component that parse informations in various World Wide Webs, and store to database.

  • PDF

Optimization of image data for Mobile Game Gontents (모바일게임 콘텐츠 개발을 위한 이미지 데이터 최적화)

  • Lee, Hwan-joong;Kim, young-bong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.38-42
    • /
    • 2008
  • In the 2000s, the PC package game market has withered, but the internet based on-line game, the wireless internet based mobile game and high-powered console game market have been main stream. Among those markets, mobile game market has rapidly increased because it has 'mobility' that overcomes the limitation of time and area. But, unlike other platforms, mobile game user have to pay the higher price for download mobile game contents through the wireless internet and mobile game developer have to overcome the limitation of storage memory capacity.of mobile phone. Chiefly, the image data consume the storage capacity of mobile game contents, this paper present a technology to optimize image data for mobile game contents through analyzing type of compression method and image formats.

  • PDF