• Title/Summary/Keyword: Pattern of Internet Utilization

Search Result 29, Processing Time 0.024 seconds

Sensitivity Analysis on the Performance of Multimedia Stream Server using Simulation (시뮬레이선을 통한 멀티미디어 스트림 서버의 성능 민감도 분석)

  • Park, Jin-Won;Park, Chong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.2
    • /
    • pp.23-29
    • /
    • 2006
  • This paper studies the Internet stream server which serves multimedia stream services such as VoD and MoD. The Internet multimedia stream server is developed to provide 50 users with continuous multimedia stream contents simultaneously. This paper focuses on introducing design concepts, operation details and on evaluating system performance and doing sensitivity analysis with respect to the change of the system components. The performance evaluation is performed using simulation in order to identify the system component that mostly affects the system performance. The sensitivity analysis shows the service delay rates of the multimedia stream server depending on the user's service request pattern. Also, the analysis is made on the utilization rates of the core system components such as the PCI bus and the Ethernet card, and on the system performance change by adding more system components.

  • PDF

Modeling and Analysis of Load-Balancing Based on Base-Station CoMP with Guaranteed QoS

  • Feng, Lei;Li, WenJing;Yin, Mengjun;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.2982-3003
    • /
    • 2014
  • With the explosive deployment of the wireless communications technology, the increased QoS requirement has sparked keen interest in network planning and optimization. As the major players in wireless network optimization, the BS's resource utilization and mobile user's QoS can be improved a lot by the load-balancing technology. In this paper, we propose a load-balancing strategy that uses Coordinated Multiple Points (CoMP) technology among the Base Stations (BS) to effectively extend network coverage and increase edge users signal quality. To use universally, different patterns of load-balancing based on CoMP are modeled and discussed. We define two QoS metrics to be guaranteed during CoMP load balancing: call blocking rate and efficient throughput. The closed-form expressions for these two QoS metrics are derived. The load-balancing capacity and QoS performances with different CoMP patterns are evaluated and analyzed in low-dense and high-dense traffic system. The numerical results present the reasonable CoMP load balancing pattern choice with guaranteed QoS in each system.

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.

A Design and Implementation of Tetris Came System according to Score Calculation Method per Level (단계별 점수산출방식에 따른 테트리스 게임 시스템 설계 및 구현)

  • Lim Jong-Hyuk;Jeong Hwa-Young
    • Journal of Internet Computing and Services
    • /
    • v.6 no.2
    • /
    • pp.85-97
    • /
    • 2005
  • At th first time in 1985, Tetris appeared, it became game that are loved to many users until now. Existent Tetris employed way to give score according to number of that is destroyed whenever line are destroyed, and give advantage about serial attack and so on, But, these score calculation method gave so fixed and simple pattern. In this paper, We design and implement the new tetris game System by score calculation method per level that Is different with existent method. That Is, this method is to compare present and before with number of destroyed line and give advantage in basis score, Also, It is going to permit strategic utilization of still more developed tetris than existent tetris using score calculation method per level.

  • PDF

An Effective Solution for the Multimedia Telephony Services in Evolving Networks

  • Kim, Jong-Deug;Jeon, Taehyun
    • International journal of advanced smart convergence
    • /
    • v.2 no.1
    • /
    • pp.24-26
    • /
    • 2013
  • In the process of a mobile network evolution to the All-IP, it is inevitable to experience a transient period embracing both circuit and packet based data traffics. At the stage of those hybrid networks, it is important to build them in an efficient manner in terms of resource utilization which is closely related to the overall system operation cost. Especially, the multimedia telephony is one of the essential services in the advanced packet based mobile networks. In this paper an effective method of system operation is proposed for building up the multimedia telephony service while the legacy network co-exists. The proposed solution is based on the careful investigation of the usage pattern of the multimedia services in the evolving networks. This method is also expected to be a useful guideline for the network resource planning.

Design of Rectangular Planar Monopole Antenna with a Double Sleeve (이중 슬리브를 갖는 직사각형 평면 모노폴 안테나 설계)

  • Kang, Sang-Won;Chang, Tae-Soon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.215-220
    • /
    • 2016
  • In this paper, a wideband antenna accomplished by adding a double sleeve of a rectangular planar monopole structure is proposed. In order to impedance matching of proposed antenna, the antenna performance was improved by adding two gap sleeves and outer sleeve for double sleeve structure. HFSS simulator of ANSYS corp. was used in order to confirm the antenna parameter characteristic. According to the simulation results, the VSWR was less than 2 for the range of 2.5GHz~10.5GHz. The frequency bandwidth is 8GHz. The frequency range of the actual fabricated antenna was 2.92GHz~10.32GHz, the frequency bandwidth is 7.4GHz. The measured radiation pattern frequency is 3GHz, 6GHz and 9GHz. The results are similar with dipole antenna pattern in all frequency. The antenna size is $40{\times}40mm^2$. The utilization possibility of the ultra-wideband planar monopole antenna could be confirmed according to compare and analyze the simulation and measurement data.

A Study on Comparison Methods of the Web Design Style Pattern and User′s Mental Model (웹 디자인의 스타일 유형과 사용자 심상 모델과의 비교 방법 연구)

  • 천가경;최인환
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.189-198
    • /
    • 2004
  • The specific web site style is the major appliance which can transmit the characteristics of the site in the fastest and the most accurate ways. The realization of the web site style related to the characteristics of the system which the web site represents typically is the very important design element, for the effective construction of the web site. The study of the methods investigation to contrive the reasonable style pattern systems is dedicated on these backgrounds, as one of the methods for the effective planning of the web design. For this purpose, the study has investigated the web design style through the internet and the books. Also, the study has analyzed the style pattern of the web site domestic and overseas. Based on the results of the study, the inquiry of the web design style pattern and the user's mental model has been prepared, surveyed and analyzed accordingly. This study has indicated one of the methods which can be utilized widely in the process of the style determination of general web site design. The efficiency of the study will be valued in the utilization of similar methods of style determination stage in various design areas.

  • PDF

Architectural Approach Identification and Evaluation of Message System Using Design Pattern (설계 패턴을 활용한 라시지 시스템의 소프트웨어 아키텍처 접근법 식별 및 평가)

  • Koh, Hyon-Hee;Kung, Sang-Hwan;Park, Tae-Nyon
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.9-20
    • /
    • 2005
  • To design a software system in success, architectural approaches which are in basis of architectural design, must be primarily selected. What to chose among various architecture styles as specific as architectural approaches, varies along with the system status of what kind of functional or non-functional quality requirements should satisfy. In this study, we propose the evaluation model for making a selection of architectural approaches, and select an architectural approach for message system actively using in diversified internet utilization and enterprise application integration, In other words, if there may be possibly existed several architectural approaches, we present the most suitable method of architectural approach out of them through an evaluation of analyzing the system requirements satisfaction level. In addition, when it performs specific design and implementation utilizing design patterns based on thread, developers would be able to link up the architecture design directly.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A Comparison Study on Data Caching Policies of CCN (콘텐츠 중심 네트워킹의 데이터 캐시 정책 비교 연구)

  • Kim, Dae-Youb
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.327-334
    • /
    • 2017
  • For enhancing network efficiency, various applications/services like CDN and P2P try to utilize content which have previously been cached somewhere. Content-centric networking (CCN) also utilizes data caching functionality. However, dislike CDN/P2P, CCN implements such a function on network nodes. Then, any intermediated nodes can directly respond to request messages for cached data. Hence, it is essential which content is cached as well as which nodes cache transmitted content. Basically, CCN propose for every nodes on the path from the content publisher of transmitted object to a requester to cache the object. However, such an approach is inefficient considering the utilization of cached objects as well as the storage overhead of each node. Hence, various caching mechanisms are proposed to enhance the storage efficiency of a node. In this paper, we analyze the performance of such mechanisms and compare the characteristics of such mechanisms. Also, we analyze content utilization patterns and apply such pattern to caching mechanisms to analyze the practicalism of the caching mechanisms.