• Title/Summary/Keyword: Stream Network Analysis

Search Result 170, Processing Time 0.023 seconds

An analysis on the network performance for VoD services using multicast (멀티캐스트를 이용한 VoD 서비스망의 성능 분석)

  • 백남균;정수환;민병준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6A
    • /
    • pp.918-926
    • /
    • 2000
  • A huge storage and broad bandwidth are required to provide subscribers with VoD services. Hence, there is a huge amount of cost in establishing networks for VoD services. To determine how to reduce the cost, a number of studies involving such as distributed server systems, multicasting, program caching, stream sharing, are currently in progress. In this paper, a request criterion for multicast service and the ratio of required bandwidth for unicast to multicast are generated. The effect of multicast service on network bandwidth, server bandwidth, and buffer size was analyzed and validated through computer simulation. The results of this study could be applied to efficient designing networks for VoD services.

  • PDF

Automated Detection Technique for Suspected Copyright Infringement Sites

  • Jeong, Hae Seon;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4889-4908
    • /
    • 2020
  • With the advances in Information Technology (IT), users can download or stream copyrighted works, such as videos, music, and webtoons, at their convenience. Thus, the frequency of use of copyrighted works has increased. Consequently, the number of unauthorized copies and sharing of copyrighted works has also increased. Monitoring is being conducted on sites suspected of conducting copyright infringement activities to reduce copyright holders' damage due to unauthorized sharing of copyrighted works. However, suspected copyright infringement sites respond by changing their domains or blocking access requests. Although research has been conducted for improving the effectiveness of suspected copyright infringement site detection by defining suspected copyright infringement sites' response techniques as a lifecycle step, there is a paucity of studies on automation techniques for lifecycle detection. This has reduced the accuracy of lifecycle step detection on suspected copyright infringement sites, which change domains and lifecycle steps in a short period of time. Thus, in this paper, an automated detection technique for suspected copyright infringement sites is proposed for efficient detection and response to suspected copyright infringement sites. Using our proposed technique, the response to each lifecycle step can be effectively conducted by automatically detecting the lifecycle step.

A Study of LMDS System Structure and Link Budget Analysis Against Output Power Variation of HUB Station In KOREA Environment (국내환경 LMDS 시스템의 구조와 기지국 출력 변화에 따른 링크버짓 분석)

  • Youm, Jee-Woon;Choi, Kwang-Joo;Oh, Sung-Hwan
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.6
    • /
    • pp.1-12
    • /
    • 1999
  • This paper illustrates and analyzes system structure, link budget and cell coverage to accommodate Korea environment about LMDS systems that are expected to play an important role as the future wireless infrastructure of the information superhighway. In the mean time, many parameters used for the analysis apply to the allocated frequency bandwidth (Up-stream : 24.25GHz-24.75GHz, Down-stream : 25.5GHz-27.5GHz) of Ministry of Information and Communication. The modem and channel coding must be developed to accommodate specifications of DAVIC protocol. The materials about atmospheric phenomena refer to apply specifications of ITU-R. This paper will be need to disign the network structure and system configuration of LMDS system.

  • PDF

Protection of MPEG-2 Multicast Streaming in an IP Set-Top Box Environment

  • Hwang, Seong-Oun;Kim, Jeong-Hyon;Nam, Do-Won;Yoon, Ki-Song
    • ETRI Journal
    • /
    • v.27 no.5
    • /
    • pp.595-607
    • /
    • 2005
  • The widespread use of the Internet has led to the problem of intellectual property and copyright infringement. Digital rights management (DRM) technologies have been developed to protect digital content items. Digital content can be classified into static content (for example, text or media files) and dynamic content (for example, VOD or multicast streams). This paper deals with the protection of a multicast stream on set-top boxes connected to an IP network. In this paper, we examine the following design and architectural issues to be considered when applying DRM functions to multicast streaming service environments: transparent streaming service and large-scale user environments. To address the transparency issue, we introduce a 'selective encryption scheme'. To address the second issue, a 'key packet insertion scheme' and 'hierarchical key management scheme' are introduced. Based on the above design and architecture, we developed a prototype of a multicasting DRM system. The analysis of our implementation shows that it supports transparent and scalable DRM multicasting service in a large-scale user environment.

  • PDF

Debiasing Technique for Numerical Weather Prediction using Artificial Neural Network

  • Kang, Boo-Sik;Ko, Ick-Hwan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.51-56
    • /
    • 2006
  • Biases embedded in numerical weather precipitation forecasts by the RDAPS model was determined, quantified and corrected. The ultimate objective is to eventually enhance the reliability of reservoir operation by Korean Water Resources Corporation (KOWACO), which is based on precipitation-driven forecasts of stream flow. Statistical post-processing, so called MOS (Model Output Statistics) was applied to RDAPS to improve their performance. The Artificial Neural Nwetwork (ANN) model was applied for 4 cases of 'Probability of Precipitation (PoP) for wet and dry season' and 'Quantitative Precipitation Forecasts (QPF) for wet and dry season'. The reduction on the large systematic bias was especially remarkable. The performance of both networks may be improved by retraining, probably every month. In addition, it is expected that performance of the networks will improve once atmospheric profile data are incorporated in the analysis. The key to the optimal performance of ANN is to have a large data set relevant to the predictand variable. The more complex the process to be modeled by the ANN, the larger the data set needs to be.

  • PDF

Delay Analysis for Dynamic Multiplexing Scheme in Connection-oriented Wireless Cellular Networks

  • Park, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.74-77
    • /
    • 1998
  • We consider connection-oriented wireless cellular networks. These networks employ dedicated radio channels for the transmission of signaling information. A forward signaling channel is a common signaling channel assigned to carry the multiplexed stream of paging and channel allocation(virtual circuit allocation) packets from a base station to mobile stations. The delay levels experienced by paging and channel allocation packets have serious effect on the utilization level of the limited radio channel capacity. While a slotted mode operation is used to reduce the power consumption level at mobile stations, it may induce an increase in packet delay levels. In this paper, we thus consider a multiplexing scheme for paging and channel allocation packets under which slots are dynamically allocated for the paging packet transmission. For this dynamic scheme, we develop an analytical method for deriving the delay characteristics exhibited by paging and channel allocation packets, and investigate the effect of network parameters on the delay level by using this method.

  • PDF

Improvement of Upload Traffic through Negotiation in UCC Broadcasting System (P2P 기반의 UCC 방송에서 협상을 통한 업로드 트래픽의 개선)

  • Kim, Ji Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.171-179
    • /
    • 2014
  • Among the P2P based multimedia streaming architecture, multiple chain architecture has advantage in adapting to dynamically changing network topology simply and rapidly, so this architecture is used for UCC broadcasting system. In UCC broadcasting system, general peer involved in DSLAM becomes UCC server rather than broadcasting system that transfers data from ISP servers. Therefore UCC data generated from UCC server peers is transmitted to peers through DSLAM, and this transmission uses uplink bandwidth of DSLAM. In this paper, I propose an efficient management method of DSLAM uplink bandwidths through negotiating tracker and UCC server peer or head peers of DSLAM. I propose the method that tracker restricts a bitrate of uplink stream of UCC servers when used uplink bandwidth of DSLAM exceeds a certain point of maximum uplink bandwidths. I will show the improved performance of proposed scheme rather than general method with respect to the uplink bandwidth of DSLAM by numerical analysis and simulation.

Examining Interaction Patterns in Online Discussion through Multiple Lenses

  • HAN, Seungyeon
    • Educational Technology International
    • /
    • v.15 no.2
    • /
    • pp.117-141
    • /
    • 2014
  • This qualitative study investigated different interaction patterns in an online discussion. The data was collected from asynchronous discussion occurred in a graduate course. The data analysis methods include inductive analysis and mapping strategy. The results of the study suggest three layers of interaction: response sequences, interaction amongst participants, and concept map of messages. The visualization of response sequences enabled the researcher to discover complex and dynamic interaction patterns amongst participants. The many-to-many communication feature of online discussion does not always enable direct one-on-one interaction between two participants. Rather, one message contributed to multiple threads in the stream of conversation. In terms of interaction amongst participants, the interaction amongst participants, as indicated in the data, the messages also bind each participant and consequently a group(s) of participants together. It appears that the contribution of one message may not only enable a response to one participant, but also connect many participants to each other. The concept map of messages proposes that response sequences and interaction amongst participants can also be viewed between concepts within messages in the discussion. On the surface, the messages posted by individuals are linked by the system in a linear fashion as they are posted. However, the interaction extends to collaborative conversation amongst participants. Ultimately, a conceptual network of interrelated ideas including multiple perspectives is built in asynchronous discussion.

The Flood Water Stage Prediction based on Neural Networks Method in Stream Gauge Station (하천수위표지점에서 신경망기법을 이용한 홍수위의 예측)

  • Kim, Seong-Won;Salas, Jose-D.
    • Journal of Korea Water Resources Association
    • /
    • v.33 no.2
    • /
    • pp.247-262
    • /
    • 2000
  • In this paper, the WSANN(Water Stage Analysis with Neural Network) model was presented so as to predict flood water stage at Jindong which has been the major stream gauging station in Nakdong river basin. The WSANN model used the improved backpropagation training algorithm which was complemented by the momentum method, improvement of initial condition and adaptive-learning rate and the data which were used for this study were classified into training and testing data sets. An empirical equation was derived to determine optimal hidden layer node between the hidden layer node and threshold iteration number. And, the calibration of the WSANN model was performed by the four training data sets. As a result of calibration, the WSANN22 and WSANN32 model were selected for the optimal models which would be used for model verification. The model verification was carried out so as to evaluate model fitness with the two-untrained testing data sets. And, flood water stages were reasonably predicted through the results of statistical analysis. As results of this study, further research activities are needed for the construction of a real-time warning of the impending flood and for the control of flood water stage with neural network method in river basin. basin.

  • PDF

Establishing the Managerial Boundary of the Baekdu-daegan: An Approach by Watershed Expanding Process (백두대간 관리범위 설정에 관한 연구: 유역확장방식에 의한 접근)

  • Kwon, Taeho;Choi, Song-Hyun;Yoo, Ki-Joon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.4
    • /
    • pp.106-118
    • /
    • 2002
  • In recent years, synthetic and systematic management with conservation-oriented strategy for Baekdu-daegan, which is the greatest chine as well as the major ecological axis of the Korean Peninsula, is being required to cope adequately with the various kinds of developmental urge. For this, spatially definite zoning for the managerial area on Baekdu-daegan has to be completed first. This study is to take into consideration the traditional concepts of stream and watershed as well as the actual disturbance on Daegan area, and to propose the process for reasonably establishing the managerial boundary adjacent to the Ridges. The case site with topographically diverse characteristics was selected, and the analyses on watershed, road network and land use were carried out using the digital maps and Landsat TM images. Based on these analyses results, the managerial boundaries as alternatives from the Ridges were produced by watershed expansion process, and used for tracing the changes of road occupancy rate and the areal ratio of various land use types to the relevant watersheds to search out the adequate managerial boundary. The results show that watershed expansion process could be effective tool for establishing the managerial boundary, and the fourth expanded watershed would be included for the adequate managerial boundary of the case site.

  • PDF