• Title/Summary/Keyword: Receiver stream analysis

Search Result 13, Processing Time 0.031 seconds

TIM: A Trapdoor Hash Function-based Authentication Mechanism for Streaming Applications

  • Seo, Seog Chung;Youn, Taek-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2922-2945
    • /
    • 2018
  • Achieving efficient authentication is a crucial issue for stream data commonly seen in content delivery, peer-to-peer, and multicast/broadcast networks. Stream authentication mechanisms need to be operated efficiently at both sender-side and receiver-side at the same time because of the properties of stream data such as real-time and delay-sensitivity. Until now, many stream authentication mechanisms have been proposed, but they are not efficient enough to be used in stream applications where the efficiency for sender and receiver sides are required simultaneously since most of them could achieve one of either sender-side and receiver-side efficiency. In this paper, we propose an efficient stream authentication mechanism, so called TIM, by integrating Trapdoor Hash Function and Merkle Hash Tree. Our construction can support efficient streaming data processing at both sender-side and receiver-side at the same time differently from previously proposed other schemes. Through theoretical and experimental analysis, we show that TIM can provide enhanced performance at both sender and receiver sides compared with existing mechanisms. Furthermore, TIM provides an important feature for streaming authentication, the resilience against transmission loss, since each data block can be verified with authentication information contained in itself.

Performance Analysis of BICM based DVB-T2 Receiver (BICM기반의 DVB-T2 수신기 성능분석)

  • Seo, Jeong-Wook;Kang, Min-Goo;Woo, Yong-Je
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1575-1580
    • /
    • 2012
  • In this paper, a DVB-T2(Digital Video Broadcasting-the 2nd Generation Terrestrial) receiver is designed under a USB-type windows environment, and the baseband frames for MPEG2-TS stream(File or Ethernet Modes) are analyzed for verifying the receiver. In addition, the performance of the BICM(Bit Interleaved Coding & Modulation) module in the receiver is analyzed in terms of PLP(Physical Layer Pipe) and L1(Layer 1) signals.

Integral TS Demultiplexer of Memory Sharing based DVB-T/T-DMB Receiver (메모리공유 기반의 DVB-T/T-DMB 통합 TS의 역다중화기)

  • Kwon, Ki-Won;Paik, Jong-Ho;Kang, Min-Goo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.17-22
    • /
    • 2010
  • In this paper, integral TS(Transport Stream) demultiplexer of a multi-modal receiver is proposed according to the multiple standards of European terrestrial digital broadcasting DVB-T(Digital Video Broadcasting Terrestrial), and mobile terrestrial digital broadcasting T-DMB(Terrestrial Digital Multimedia Broadcasting). This USB based integral receiver could recover the multi-modal broadcasting audios by memory sharing technique which was utilized to decrease the load by the control of streaming multi-modal broadcasting. As a result of performance analysis for a proposed integral TS demultiplexer, the CPU occupational efficiency of windows based integral demulitiplexing is improved compared with DVB-T, and T-DMB respectively.

Implementation of Play and Copy Control of DMB contents using Watermarking and Encryption on PMP (워터마킹과 암호화를 이용한 DMB 콘텐츠의 재생 및 복사 제어를 PMP에 구현)

  • Jeong, Yong-Jae;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.52-57
    • /
    • 2009
  • Recently, the regular service of a terrestrial digital multimedia broadcasting(T-DMB) made faster distribution of T-DMB receiver. The problem of an illegal distribution is increasing owing to a large distribution of T-DMB receiver. In this paper, we propose a watermarking and encryption method on T-DMB bit-stream for a copy and Play control to prevent an illegal distribution of T-DMB contents. We implement our proposed method on a portable multimedia player (PMP) which has T-DMB receiver. The proposed method insert the encrypted information for control of copy and play after finding padding area of program map table (PMT) and program association table (PAT) from analysis of transport stream (TS) of T-DMB. In implementation result, we can control use of contents according to information of copy and play control. The proposed method can be used to content Protection software for blocking of an illegal distribution of T-DMB contents on a mobile T-DMB receivers.

Forced Convection Modelling of a Solar Central Receiver using Nonisothermal Cylinders in Crossflow (비등온 실린더 모델을 이용한 태양로의 강제 대류에 의한 열 손실 분석)

  • Chun, Won-Gee;Jeon, Myung-Seok;Jeon, Hong-Seok;Auh, P. Chung-Moo;Boehn, Robert F.
    • Solar Energy
    • /
    • v.10 no.3
    • /
    • pp.13-18
    • /
    • 1990
  • When nonuniform thermal boundary conditions are imposed on the surface of a circular cylinder in crossflow, the heat transfer characteristics can be quite different compared to what is found for isothermal or constant heat flux boundary conditions. In the present analysis, two kinds of nonuniform boundary conditions along the circumference of the cylinder are considered in a uniform stream of air: step changes and linear profiles. Step changes in temperature can arise on the surface of an external, cylindrical, solar central receiver. As the working fluid(water) flows through the vertical tubes that ring the circumference of Solar One(a solar central receiver in Barstow, California), the solar flux on the receiver heats the water from a liquid to a superheated state. In this process, portions of the receiver panels, and thus portions of the circumference of the cylinder, function as a preheater, boiler, or superheater. Hence the surface temperature can vary significantly around the cylinder. Common engineering practice has been to use an average wall temperature with an isothermal cylinder heat transfer coefficient when estimating the convective loss in these kinds of situations.

  • PDF

An Emergency Alert Message Broadcasting System using Null-Packet on Digital TV Broadcasting

  • Kim, Yoo-Won;Park, Seung-Bo;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.12
    • /
    • pp.1767-1777
    • /
    • 2010
  • In digital TV broadcasting, such as terrestrial, cable, satellite, and IPTV, the head-end of digital TV broadcasting has a more complicated transmission structure than that of analog TV broadcasting. Furthermore, digital TV broadcasting has a feature that supports multiplex models, such as Multiple Program Transport Stream (MPTS). Therefore, the purpose of our work was to design and examine a more efficient new system of emergency alert message transmission to support the digital TV broadcasting environments. Digital TV broadcasting is the IP generation or RF transmission of 8-VSB, QAM, and QPSK modulated through a multiplexer or re-multiplexer multiplexed stream as a MPEG-2 Transport Stream after content encoding. The new system proposed in this paper transmits an emergency alert message without scrambling after replacing the PID and payload of the -packet with the message prototype in the TS stream from the multiplexer. If we need to transmit an emergency alert message under digital TV broadcasting services, then the receiver first checks the PID of each packet in the TS stream for the emergency alert message. Next, if a packet is determined to be an emergency alert message, then the set-top box displays the message on the TV screen using its function of On Screen Display, or the PC based software displays the message on the monitor screen using its function of overlay with user interface if the packet is found to be an emergency alert message. We have designed an emergency alert message protocol and a system model. By experiments and analysis of the system, we concluded that the system achieved efficiency and the ability to send and receive emergency alert messages using the system under different digital TV broadcasting service environments.

An Efficient Stream Authentication Scheme using Tree Authentication (인증 트리 기법을 이용한 효율적인 스트림 인증 기법)

  • Park, Yong-Su;Cho, Yoo-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.8
    • /
    • pp.484-492
    • /
    • 2002
  • We propose an efficient stream authentication scheme using tree authentication. To reduce the computation cost of the sender, we design the authentication tree whose height is very short. We appropriately distribute authentication information over packets so the receiver can verify data with high probability. Moreover, we provide mathematical analysis on the verification probability. For the proposed scheme and previous schemes, we measured the elapsed time for generating authentication information and the proposed scheme has equal to or slightly larger than that of GM's scheme, which has the lowest computation overhead. We performed simulations, which show that the verification probability of the proposed scheme is much higher than that of any other scheme.

ROC Analysis of Topographic Factors in Flood Vulnerable Area considering Surface Runoff Characteristics (지표 유출 특성을 고려한 홍수취약지역 지형학적 인자의 ROC 분석)

  • Lee, Jae Yeong;Kim, Ji-Sung
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.4
    • /
    • pp.327-335
    • /
    • 2020
  • The method of selecting an existing flood hazard area via a numerical model requires considerable time and effort. In this regard, this study proposes a method for selecting flood vulnerable areas through topographic analysis based on a surface runoff mechanism to reduce the time and effort required. Flood vulnerable areas based on runoff mechanisms refer to those areas that are advantageous in terms of the flow accumulation characteristics of rainfall-runoff water at the surface, and they generally include lowlands, mild slopes, and rivers. For the analysis, a digital topographic map of the target area (Seoul) was employed. In addition, in the topographic analysis, eight topographic factors were considered, namely, the elevation, slope, profile and plan curvature, topographic wetness index (TWI), stream power index, and the distances from rivers and manholes. Moreover, receiver operating characteristic analysis was conducted between the topographic factors and actual inundation trace data. The results revealed that four topographic factors, namely, elevation, slope, TWI, and distance from manholes, explained the flooded area well. Thus, when a flood vulnerable area is selected, the prioritization method for various factors as proposed in this study can simplify the topographical analytical factors that contribute to flooding.

Accuracy Analysis of Absolute Positioning by GNSS (GNSS에 의한 절대측위의 정확도 해석)

  • Lee, Yong Chang
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.6
    • /
    • pp.2601-2610
    • /
    • 2013
  • The main limiting factors of Precise Point Positioning(PPP) accuracy are errors in broadcast satellite orbits, clock errors, and the others, which are receiver-dependent errors(ionospheric, tropospheric refraction, multipath, and tides, etc.). Therefore, to facilitate high precision PPP, precise orbits/clocks corrections, the receiver-dependent errors corrections have to apply to multi frequency GNSS measurements for an ionosphere free combination and integer ambiguity resolution in real-time. Currently, there are many Analysis Centers, which offer the precise corrections stream computed in real-time using the global or regional GNSS tracking network. The goles of this research considered performances of the real-time static PPP with using RTCM corrections from NTRIP casters. For this, the corrections streams of Analysis Centers received via NTRIP does apply to GNSS data of check points individually, as well as jointly, in accordance with various session lengths. After that, have compared the PPP results from the corrections streams with each other, and with Standard Point Positioning(SPP) results.

Evaluation of the Relationship between Meteorological Drought and Agricultural Drought of Geum River Basin During 2014~2016 (금강유역 2014~2016년 기상학적 가뭄과 농업가뭄간의 상관성 평가)

  • Lee, Ji Wan;Kim, Kyoung-Ho;Kim, Sehoon;Woo, Soyoung;Kim, Seong Joon
    • Journal of Wetlands Research
    • /
    • v.21 no.spc
    • /
    • pp.80-89
    • /
    • 2019
  • The purpose of this study is to analyze the relationship between SPI (Standardized Precipitation Index) meteorological drought and RDI (Reservoir Drought Index) agricultural drought for Geum river basin. Drought Indices was calculated by collecting data of precipitation and agricultural reservoir water storage rate from 2014 to 2016. To evaluated the correlation between meteorological and agricultural drought, the Pearson correlation and the Receiver Operation Characteristic (ROC) analysis were conducted to evaluate the correlation between meteorological and agricultural droughts. The SPI-6 and RDI showed the highest relationship with Pearson coefficient 0.606 and ROC hit rates 0.722 respectively, and the spatial occurrence patterns of drought using overlapped SPI-6 and RDI, the big differences between the 2 indices were occurred in the upstream areas of Miho stream and Nonsan stream from August to October 2015. The analysis using reservoirs specifications for areas where reservoir droughts occurred was conducted, and the areas showing severe drought of RDI were the reservoir areas having relatively small value of basin magnifying power (BMP). This means that a reservoir has the reaction capability for agricultural drought mainly depending on the reservoir BMP.