• Title/Summary/Keyword: High Speed Convergence

Search Result 709, Processing Time 0.025 seconds

Implementation of QoS-Measuring System for Voice over IP (VoIP(Voice over Internet Protocol) 품질 측정을 위한 UA(User Agent) 및 서버 기능 연구)

  • Kang, Hyun-Joong;Nam, Heung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.137-144
    • /
    • 2007
  • Advances in networking technology digital media, and codecs have made it possible for the Internet evolves into a Broadband convergence Network (BcN) and provides various services including Voice over Internet Protocol (VoIP) and IPTV over their high-speed IP networks. In order for the Internet to make a profit as traditional Public Switched Telephone Network (PSTN), it must provide high qualify VoIP services. Therefore, real time qualify measurement framework is the most important requisite to provide VoIP service. For this, IETF (Internet Engineering Task Force) defined RTCP-Extended Reports (RTCP-XR) that extend RTCP (Real-Time Transport Protocol Control Protocol). However, procedure and method tot actually VoIP qualify measurement did not recommended nothing but defined item to measure voice quality. Our objective in this paper is to describes a practical measuring framework for end-to-end QoS of switched voice packet in an IP environment. It includes concepts as well as step-by-step procedures for measuring packetized voice streams. It also proposes new formats that extend RTCP-XR's concept.

  • PDF

Implementation of an Intelligent Visual Surveillance System Based on Embedded System (임베디드 시스템 기반 지능형 영상 감시 시스템 구현)

  • Song, Jae-Min;Kim, Dong-Jin;Jung, Yong-Bae;Park, Young-Seak;Kim, Tae-Hyo
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.2
    • /
    • pp.83-90
    • /
    • 2012
  • In this paper, an intelligent visual surveillance system based on a NIOS II embedded platform is implemented. By this time, embedded based visual surveillance systems were restricted for a special purpose because of high dependence upon hardware. In order to improve the restriction, we implement a flexible embedded platform, which is available for various purpose of applications. For high speed processing of software based programming, we improved performance of the system which is integrated the SOPC type of NIOS II embedded processor and image processing algorithms by using software programming and C2H(The Altera NIOS II C-To-Hardware(C2H) Acceleration Compiler) compiler in the core of the hardware platform. Then, we constructed a server system which globally manage some devices by the NIOS II embedded processor platform, and included the control function on networks to increase efficiency for user. We tested and evaluated our system at the designated region for visual surveillance.

A study on the design optimization of the head stucture of 5-axis machining center using finite element analysis (유한요소해석을 이용한 5축 복합가공기 헤드 구조물의 최적 설계에 관한 연구)

  • Kim, Jae-Seon;Lee, Meong-Ho;Youn, Jae-Woong
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.161-168
    • /
    • 2021
  • As the demand for high speed and high precision increases in the field of machine tool, interest in stiffness and vibration of machine tool is increasing. However, it takes a lot of time to develop a detailed design of machine tool based on experience, and it is difficult to design appropriately. Recently, structural optimization using FEM are increasingly used in machine tool design. But, it is difficult to optimize in consideration of the vibration state of the structure since optimization through stress distribution of a structure is mainly used, In this paper, Static structural analysis, mode analysis, and harmonic analysis using FEM were conducted to optimize the head structure that has the most influence on machining in a 5-axis machine tool. It is proposed a topology optimization analysis method that considers both static stiffness and dynamic stiffness using objective function design.

Simulation of Membrane Sloshing Tank by Using MPS (입자법을 이용한 멤브레인 타입 슬로싱 시뮬레이션)

  • Kim, Kyung Sung
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.117-122
    • /
    • 2019
  • In the field of fluid dynamics, the sloshing effects are most common and significant problem. It is usually appeared in the tank filled with fluid which is on the main structure, thus, sloshing effects and its impact load may affect to entire system. For the sloshing effects analysis, impact loads due to tank motion is generally investigated theocratically, experimentally and numerically. The difficulty of sloshing phenomenon is non-linearity induced by large deformation at the free-surface. In this regard, it is well known issue that the repeatability on the sloshing problems is very low. In this study, moving particle semi-implicit method was employed to simulate sloshing problem and then the results were compared with corresponding experiments captured by high accuracy high speed camera. The results from numerical simulation was compared to experimental results.

Development and Performance Improvement of old Aluminum Extruder Remanufacturing Technology (노후된 알루미늄 압출기의 재제조 기술 개발 및 성능 개선)

  • Sang-Min Yoon;Hang-Chul Jung;Man-Seek Kong
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.1
    • /
    • pp.95-103
    • /
    • 2023
  • The domestic remanufacturing industry is concentrated in auto parts, so it is necessary to expand into various industries. In the domestic aluminum industry, the extrusion process accounts for more than 40% of the total, but the old and management of the extrusion equipment is not done properly. In particular, the extruder has a structure in which equipment is not replaced until major parts are damaged or worn, so there are problems such as lower process precision, productivity and production efficiency compared to new equipment, and high maintenance costs. In this study, the old extruder was remanufactured for major high-risk parts through Failure Mode and Effect Analysis(FMEA), and the process level and performance of the extruder were evaluated before and after remanufacturing. Compared to the existing extruder, the standard deviation of the remanufacture extruder was reduced by 93.5%, 57.9%, and 70.0%, respectively, in major process control items such as container temperature, billet temperature, and ram speed, keeping performance constant. In addition, it was possible to produce products with complex shapes that could not be produced before due to problems such as dimensional deviation within tolerances. In this study, remanufacturing guidelines were presented by analyzing the effect of failure modes of the old extruder, and the performance improvement of the extruder was confirmed.

Comparative Analysis of Dimensionality Reduction Techniques for Advanced Ransomware Detection with Machine Learning (기계학습 기반 랜섬웨어 공격 탐지를 위한 효과적인 특성 추출기법 비교분석)

  • Kim Han Seok;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.117-123
    • /
    • 2023
  • To detect advanced ransomware attacks with machine learning-based models, the classification model must train learning data with high-dimensional feature space. And in this case, a 'curse of dimension' phenomenon is likely to occur. Therefore, dimensionality reduction of features must be preceded in order to increase the accuracy of the learning model and improve the execution speed while avoiding the 'curse of dimension' phenomenon. In this paper, we conducted classification of ransomware by applying three machine learning models and two feature extraction techniques to two datasets with extremely different dimensions of feature space. As a result of the experiment, the feature dimensionality reduction techniques did not significantly affect the performance improvement in binary classification, and it was the same even when the dimension of featurespace was small in multi-class clasification. However, when the dataset had high-dimensional feature space, LDA(Linear Discriminant Analysis) showed quite excellent performance.

Radionuclide identification based on energy-weighted algorithm and machine learning applied to a multi-array plastic scintillator

  • Hyun Cheol Lee ;Bon Tack Koo ;Ju Young Jeon ;Bo-Wi Cheon ;Do Hyeon Yoo ;Heejun Chung;Chul Hee Min
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3907-3912
    • /
    • 2023
  • Radiation portal monitors (RPMs) installed at airports and harbors to prevent illicit trafficking of radioactive materials generally use large plastic scintillators. However, their energy resolution is poor and radionuclide identification is nearly unfeasible. In this study, to improve isotope identification, a RPM system based on a multi-array plastic scintillator and convolutional neural network (CNN) was evaluated by measuring the spectra of radioactive sources. A multi-array plastic scintillator comprising an assembly of 14 hexagonal scintillators was fabricated within an area of 50 × 100 cm2. The energy spectra of 137Cs, 60Co, 226Ra, and 4K (KCl) were measured at speeds of 10-30 km/h, respectively, and an energy-weighted algorithm was applied. For the CNN, 700 and 300 spectral images were used as training and testing images, respectively. Compared to the conventional plastic scintillator, the multi-arrayed detector showed a high collection probability of the optical photons generated inside. A Compton maximum peak was observed for four moving radiation sources, and the CNN-based classification results showed that at least 70% was discriminated. Under the speed condition, the spectral fluctuations were higher than those under dwelling condition. However, the machine learning results demonstrated that a considerably high level of nuclide discrimination was possible under source movement conditions.

Development of multi-media multi-path Optimization Network Technology Using RNN Algorithm (RNN 알고리즘을 이용한 다매체 다중경로 최적화 네트워크 기술 개발)

  • Pokki Park;Youngdong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.95-104
    • /
    • 2024
  • The performance capability of the future battlefield depends on whether the next-generation technology of the Fourth Industrial Revolution, called ABCMS (AI, Bigdata, Cloud, Mobile, Security), can be applied to secure innovative defense capabilities It is no exaggeration to say. In addition, the future military operation environment is rapidly changing into a net work-oriented war (NCW) in which all weapon systems mutually share battlefield information and operate in real-time within a single integrated information and communication network based on the network and is expanding to the scope of operation of the manned and unmanned complex combat system. In particular, communication networks responsible for high-speed and hyperconnectivity require high viability and efficiency in power operation based on multi-tier (defense mobile, satellite, M/W, wired) networks for the connection of multiple combat elements and smooth distribution of information. From this point of view, this study is different from conventional single-media, single-path transmission with fixed specifications, It is an artificial intelligence-based transmission technology using RNN (Recurrent Neural Networks) algorithm and load distribution during traffic congestion using available communication wired and wireless infrastructure multimedia simultaneously and It is the development of MMMP-Multi-Media Multi-Path adaptive network technology.

A Study on Applying Information Security Requirement for WiBro System (와이브로 시스템의 정보보호 요구분석)

  • Kim, Min-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.8
    • /
    • pp.2801-2808
    • /
    • 2010
  • The technology of WiBro, combining advantages of high speed internet and wireless internet provides the effectiveness and convenience provided by broadband and convergence. WiBro has developed due to supports of the related industries. The advancement of WiBro have created driving force for network advancement. WiBro is a niche market among high speed Internet, wireless LAN, Mobile phone, wireless internet. Through building relationship between market share and the existed telecommunication service, WiBro could improve the convenience of users. The security controls have to be built considering vulnerabilities of WiBro. Based on the study, the architecture of WiBro was suggested through reviewing the vulnerabilities and security controls in the wireless network and wire network. The appropriate security measures to be applied in the environment of WiBro. The outcomes of the study could improve the usage of WiBro.

Bandwidth Dimensioning for High-Speed Internet Access Networks (초고속인터넷 가입자망의 대역설계)

  • Lee, Tae-Joon;Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1017-1027
    • /
    • 2006
  • Recently, Internet service providers are offering triple play service which combines voice and video services with the existing high speed Internet service under the common network infrastructure of IP protocol, so that they can create more benefit from operating a single network architecture. In line with this movement in the convergence of network and services, in this work we propose a bandwidth dimensioning method for the subscriber network of the IP network at flow level. To that purpose, let us propose a series of bandwidth dimensioning methods: bandwidth for best effort service only, bandwidth dimensioning for premium services, and bandwidth dimensioning schemes for the premium Internet services as well as the best effort service which comprise the TPS. Our link dimensioning method is based on the flow level that incorporates the flow blocking probability as a measure of grade of services(GoS), and investigates the characteristics of the proposed methods via extensive numerical experiments. After that, let us carry out a simulation experiment concerning the delay and loss performance of the packet scheduling for the premium services (QoS) using the bandwidth designed by our proposed method, via which the packet level quality of service (QoS) for the proposed link dimensioning method can be observed.