• Title/Summary/Keyword: IP Media

Search Result 363, Processing Time 0.03 seconds

An Optimal Implementation of Object Tracking Algorithm for DaVinci Processor-based Smart Camera (다빈치 프로세서 기반 스마트 카메라에서의 객체 추적 알고리즘의 최적 구현)

  • Lee, Byung-Eun;Nguyen, Thanh Binh;Chung, Sun-Tae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.17-22
    • /
    • 2009
  • DaVinci processors are popular media processors for implementing embedded multimedia applications. They support dual core architecture: ARM9 core for video I/O handling as well as system management and peripheral handling, and DSP C64+ core for effective digital signal processing. In this paper, we propose our efforts for optimal implementation of object tracking algorithm in DaVinci-based smart camera which is being designed and implemented by our laboratory. The smart camera in this paper is supposed to support object detection, object tracking, object classification and detection of intrusion into surveillance regions and sending the detection event to remote clients using IP protocol. Object tracking algorithm is computationally expensive since it needs to process several procedures such as foreground mask extraction, foreground mask correction, connected component labeling, blob region calculation, object prediction, and etc. which require large amount of computation times. Thus, if it is not implemented optimally in Davinci-based processors, one cannot expect real-time performance of the smart camera.

  • PDF

An Empirical Study on Security Management Model for Small IT Service Business (소규모 IT 서비스 기업 비즈니스 특성을 고려한 보안 관리모델 실증연구)

  • Kim, Yanghoon;Na, Youngsub;Chang, Hangbae
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.131-141
    • /
    • 2012
  • Depending on the sophistication of IT, it is increasing more and more information leaks and breaches. Accordingly the majority of companies have expand investment protection for the information. However, companies still have been exposed the vulnerability of information leakage. Especially, small IT service businesses than large corporations relatively have some limitations in the points of resources and manpower business activities. For studies on information security for small IT service companies so far, however, there have been insufficient studies considering small business scales and business characteristics of IT services. In this study, we made to design an information security management model for establishing security measures of small IT service companies which are classified SI/SM, DB, IR and IP industry that depending on how the value creation of the business. In detail, we performed an empirical analysis for small IT service business to consider business characteristics and we proposed security implementation strategies based on the analysis results.

  • PDF

Switched Digital Video for the Efficient Utilization of Bandwidth In Cable Systems (케이블방송의 효율적 주파수 활용을 위한 SDV 전송 기술)

  • Choi, Jin-Chul;Lee, Chae-Woo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.2
    • /
    • pp.305-318
    • /
    • 2011
  • Since switched digital video (SDV) provides specific programs only to the subscribers who request the programs, SDV has attracted considerable interest of MSOs for bandwidth efficiency. In North America, MSOs service over 2.3 million households with the SDV for cable networks. In Korea, since demand of HD program, high-speed Internet, VoD, and VoIP is noticeably rising, the SDV is considered as the alternative for bandwidth saving and efficient managing. In this paper, the characteristics, operating structure, and bandwidth saving of the SDV are discussed and technical requirements for the SDV are also introduced. The channel switching performance and stability of the SDV are analyzed through the test-bed.

A New Hardware Architecture of High-Speed Motion Estimator for H.264 Video CODEC (H.264 비디오 코덱을 위한 고속 움직임 예측기의 하드웨어 구조)

  • Lim, Jeong-Hun;Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.16 no.2
    • /
    • pp.293-304
    • /
    • 2011
  • In this paper, we proposed a new hardware architecture for motion estimation (ME) which is the most time-consuming unit among H.264 algorithms and designed to the type of intellectual property (IP). The proposed ME hardware consists of buffer, processing unit (PU) array, SAD (sum of absolute difference) selector, and motion vector (MVgenerator). PU array is composed of 16 PUs and each PU consists of 16 processing elements (PUs). The main characteristics of the proposed hardware are that current and reference frames are re-used to reduce the number of access to the external memory and that there is no clock loss during SAD operation. The implemented ME hardware occupies 3% hardware resources of StatixIII EP3SE80F1152C2 which is a FPGA of Altera Inc. and can operate at up to 446.43MHz. Therefore it can process up to 50 frames of 1080p in a second.

Perfomance Evaluation of efficent handover Latency Using MIH Services in MIPv4 (MIH를 이용한 효율적인 MIPv4망의 구성에 관한 연구)

  • Kim, Ki-Yong;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.75-78
    • /
    • 2007
  • Mobile IP provides hand-held devices with mobility which allows the user to do work over the network. However, handover time due transfer between access routers causes network delays and data loss. L2Trigger Handover expects this handover to take place, and executes L3 handover before L2 handover takes place, thereby reducing overall handover latency, although it still is an issue since handover latency between AR is not completely eliminated in L2 trigger handover. In this paper took into consideration where MIH is used in MIPv4 and using MIH Table when handover is about to occur in MN(Mobile Node), thereby pre-fetching data needed by Handover. In this way, when the handover is estimated, it improves the init time that L2trigger had. Furthermore we can find that we can execute the handover with shorten init time in smaller and narrow overlap length

  • PDF

Traffic Anomaly Identification Using Multi-Class Support Vector Machine (다중 클래스 SVM을 이용한 트래픽의 이상패턴 검출)

  • Park, Young-Jae;Kim, Gye-Young;Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1942-1950
    • /
    • 2013
  • This paper suggests a new method of detecting attacks of network traffic by visualizing original traffic data and applying multi-class SVM (support vector machine). The proposed method first generates 2D images from IP and ports of transmitters and receivers, and extracts linear patterns and high intensity values from the images, representing traffic attacks. It then obtains variance of ports of transmitters and receivers and extracts the number of clusters and entropy features using ISODATA algorithm. Finally, it determines through multi-class SVM if the traffic data contain DDoS, DoS, Internet worm, or port scans. Experimental results show that the suggested multi-class SVM-based algorithm can more effectively detect network traffic attacks.

Design and Performance Analysis of Exclusive-OR Based FEC Coding System for Error Resilient SVC Video Transmission (오류 강인 SVC 비디오 전송을 위한 Exclusive-OR 기반의 FEC 부호화 시스템 설계 및 성능 분석)

  • Lee, Hong-Rae;Jung, Tae-Jun;Shim, Sang-Woo;Kim, Jin-Soo;Seo, Kwang-Deok
    • Journal of Broadcast Engineering
    • /
    • v.18 no.6
    • /
    • pp.872-883
    • /
    • 2013
  • In this paper, we design and analyze performance of Exclusive-OR based FEC (Forward error correction) system to deploy SVC video transmission service over packet-loss prone IP network. In the designed system, we adopt standard compliant Exclusive-OR based FEC scheme and apply it to be appropriate to the hierarchical layer structure of SVC video. To verify the performance of the designed Exclusive-OR based FEC system for SVC video transmission, we employ NIST-NET based transport simulator. By the SVC video transmission using the NIST-NET based simulator, we confirm the error resilient transmission performance of the designed Exclusive-OR based FEC system.

A Study on Performance of Content Store Replacement Algorithms over Vehicular CCN (VCCN에서 Content Store 교체 알고리즘의 성능에 관한 연구)

  • Choi, Jong-In;Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.495-500
    • /
    • 2020
  • VANET (Vehicular Ad Hoc Network), an example of an ad hoc vehicular networks, becomes one of the popular research areas together with the self-driving cars and the connected cars. In terms of the VANET implementation, the traditional TCP/IP protocol stack could be applied to VANET. Recently, CCN (Content Centric Networking) shows better possibility to apply to VANET, called VCCN (VANET over CCN). CCN maintains several data tables including CS (Content Store) which keeps track of the currently requested content segments. When the CS becomes full and new content should be stored in CS, a replacement algorithm is needed. This paper compares and contrasts four replacement algorithms. In addition, it analyzes the transmission characteristics in diverse network conditions. According to the simulation results, LRU replacement algorithm shows better performances than the remaining three algorithms. In addition, even the size of CS is small, the network maintains a reasonable transmission performance. As the CS size becomes larger, the transmission rate increases proportionally. The transmission performance decreases when the network is crowded as well as the number of transmission hops becomes large.

A Mechanism to Provide Telepresence Service Information to Heterogeneous Services (이종 서비스에 텔레프레즌스 서비스 정보 제공 방법)

  • Lee, Yunjin;Kim, Younghan;Choi, Sunwan
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.122-129
    • /
    • 2015
  • This paper proposes a method for providing the information about multimedia streams for telepresence services to heterogeneous services such as IMS (IP Multimedia Subsystem) and RTCWeb (Real-Time Communication in WEB-browsers). First of all, we design an interworking gateway for each service and suggest a procedure for providing the information about multimedia streams, which is defined by CLUE, a working group for standardization, to the heterogeneous services. We also apply the method of the actual CLUE information exchange and implement it in our experiment environment. Finally, we show that the proposed method can exchange more information than previous methods even though the media session re-establishment time is similar to legacy systems in terms of performance analysis. With the proposed method, the heterogeneous services can collect a variety of information about the telepresence service and use it according to user preference. In this way it provides rich multimedia streaming services for many areas.

Analysis of Preference by Mobile Game Character Type -Focused on Dragon Village, Cookie Run, Ani Pang- (모바일 게임캐릭터 유형별 선호도 분석 -드래곤 빌리지, 쿠키런, 애니팡을 중심으로-)

  • Chi, Se-Eun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.337-342
    • /
    • 2019
  • This study is a study on the factors of preference for mobile game characters whose intellectual property rights (IP) influence is great. There have been many cases in which user-side research has been conducted on the character's preference factors. However, it is largely macro-divided. Detailed analytical studies are needed because details are overlooked. By classifying the elements of the character, the five-point scale of the recorder also obtains the data through the survey. Detailed factors were analyzed according to the results. Prior studies and results were compared and factors consistent with prior studies were analyzed. Because this study analyzed detailed factors, unlike previous studies of macro view. It is expected to help develop characters in the future.