• Title/Summary/Keyword: User Network

Search Result 4,604, Processing Time 0.032 seconds

Implementation of IPv6 based Virtual Storage System for Mobile Devices and Its Application (IPv6 기반의 모바일용 가상 저장장치 드라이버 구현 및 응용)

  • Lim, Hyo-Taek;Choi, Sae-Bom;Singh, Vinay;Cha, Kyung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.1
    • /
    • pp.74-82
    • /
    • 2007
  • IPv6 is the internet protocol for next generation which can solve the problem of IPv4 protocol. Mobile IPv6 efficiently provides the mobility for mobile devices holding the properties of IPv6. iSCSI(Internet Small Computer System Interface) is a block-oriented storage access protocol that enables a user to recognize a remote storage as their own local block device through general TCP/IP networks. Since iSCSI uses a standard Ethernet switch and router for this kind of access, it can not only be applized to Ethernet technologies, but can also be used to create a storage networking system without any distance restrictions that can equally be applied to a wireless network environment. Accordingly, this paper presents an alternative approach to overcome the limited storage space of mobile devices based on the IPv6 iSCSI initiator driver which was originally designed for wired networks. Also, this paper describes about the implementation and performance analysis of mobile education service system using virtual storage devices in IPv6 wireless networks.

  • PDF

MissCW:Multiuser Interactive System for Synchronous Collaborative Writing (MissCW:다중 사용자 동기적 공동 저작 시스템)

  • Seong, Mi-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1697-1706
    • /
    • 1996
  • This paper presents the design and the implementation of a MissCW(Multi user Interactive System for Synchronous Collaborative Writing). The document model DMDA(Distributed Multimedia Document Architecture) of MissCW consists of the logical structure, presentation style object, and mark object. The windows. The collaborative editor of this system proposes a structure oriented editing mechanism to combine distrbuted objects into one document. The middleware SOM(Shared Object Manager) maintains shared objects consistently and helps application programs use objects efficiently. The infrastructure of this system is a hybrid structure of replicated and centralized architectures, that is to maintain shared objects consistently inside of SOM and to reduce the overhead of network traffic. The central part is a virtual node which corresponds to the Object Controller of SOMwith the SOT(Shared Objet Table).

  • PDF

The analysis of the impact of the wireless channel quality on the quality of experience (QoE) through statistical analysis (통계적 분석을 통한 무선 채널 품질이 사용자 체감 품질에 미치는 영향 분석)

  • Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.491-498
    • /
    • 2014
  • As internet services are being provided through a wireless access, the importance of quality of experience (QoE) is stressed that is defined as the quality that indicates user's actual feeling when a service is provided. Unlike quality of service (QoS) that can be expressed as a numerical value, it is difficult to represent QoE in an objective way. If an internet service is serviced over a wireless channel, its QoE can be affected by a number of factors such as fading, mobility and so on. This paper, therefore, attempts to specify the relationship between QoE and QoS by conducting practical measurements for the voice service through 3G high speed packet access (HSPA) access network. Analysing the measured results, it has been shown that received signal strength indicator (RSSI) has a great influence on mean opinion score (MOS) through transmission delay.

Hot Topic Prediction Scheme Using Modified TF-IDF in Social Network Environments (소셜 네트워크 환경에서 변형된 TF-IDF를 이용한 핫 토픽 예측 기법)

  • Noh, Yeonwoo;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.4
    • /
    • pp.217-225
    • /
    • 2017
  • Recently, the interest in predicting hot topics has grown significantly as it has become more important to find and analyze meaningful information from a large amount of data flowing in social networking services. Existing hot topic detection schemes do not consider a temporal property, so they are not suitable to predict hot topics that are rapidly issued in a changing society. This paper proposes a hot topic prediction scheme that uses a modified TF-IDF in social networking environments. The modified TF-IDF extracts a candidate set of keywords that are momentarily issued. The proposed scheme then calculates the hot topic prediction scores by assigning weights considering user influence and professionality to extract the candidate keywords. The superiority of the proposed scheme is shown by comparing it to an existing detection scheme. In addition, to show whether or not it predicts hot topics correctly, we evaluate its quality with Korean news articles from Naver.

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.

A Study on Health Check Solution using Indoor Air Purifier (실내 내장형 공기순환기를 이용한 헬스 체크 솔루션에 관한 연구)

  • Yang, Hee-Tak;Oh, Ji-Su;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.3 no.1
    • /
    • pp.25-31
    • /
    • 2017
  • In the future a future type new city and the latest apartment will be built, and the IoT technology will be constructed and combined in large numbers indoors of ordinary households. An air cleaner that makes people in it comfortable is built in, and the suction port that sucks in the air of the air purifier and the discharge port that discharges it are set up around the room and come out. However, this is impossible to adjust because there is only a central switch on / off. Also, consuming a lot of electricity so that many electricity charges are caused by huge electricity consumption will eventually be a waste of resources. This would like to be adjusted and driven through the fine dust detection device to the room built-in air purifier and that has provided a solution to save electricity. In addition, since it exists in and around the room, you can grasp the position of the person and connect to the home network to enhance the convenience. Also, through analysis of the air, we provide a health-check solution that checks the user's health and adjusts it appropriately.

A Method to utilize Inner and Outer SNS Method for Analyzing Preferences (선호도 분석을 위한 내·외부 SNS 활용기법)

  • Park, Sung-Hoon;Kim, Jindeog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2871-2877
    • /
    • 2015
  • Shopping patterns are changing with the emergence of SNS. Recently, it is also interested in providing the information based on the users' needs. Generally, the provided information is obtained from the history of users' simple browsing. Best selling hot item list is also provided in order to reflect the preferences of public users. However, the provided information is irrelevant to an individual preference. In this paper, we propose a method to utilize inner and outer SNS for analyzing public preferences about goods which are interested by individual users. The inner analyzing module collects and analyzes the preferences of community members about two goods designated by individual users. The outer analyzing module supports to analyze public preferences by using the tweeter SNS. The results of implementation show that it is possible to recommend goods based on the individual users' preferences unlike the existing shopping mall.

MLP Design Method Optimized for Hidden Neurons on FPGA (FPGA 상에서 은닉층 뉴런에 최적화된 MLP의 설계 방법)

  • Kyoung Dong-Wuk;Jung Kee-Chul
    • The KIPS Transactions:PartB
    • /
    • v.13B no.4 s.107
    • /
    • pp.429-438
    • /
    • 2006
  • Neural Networks(NNs) are applied for solving a wide variety of nonlinear problems in several areas, such as image processing, pattern recognition etc. Although NN can be simulated by using software, many potential NN applications required real-time processing. Thus they need to be implemented as hardware. The hardware implementation of multi-layer perceptrons(MLPs) in several kind of NNs usually uses a fixed-point arithmetic due to a simple logic operation and a shorter processing time compared to the floating-point arithmetic. However, the fixed-point arithmetic-based MLP has a drawback which is not able to apply the MLP software that use floating-point arithmetic. We propose a design method for MLPs which has the floating-point arithmetic-based fully-pipelining architecture. It has a processing speed that is proportional to the number of the hidden nodes. The number of input and output nodes of MLPs are generally constrained by given problems, but the number of hidden nodes can be optimized by user experiences. Thus our design method is using optimized number of hidden nodes in order to improve the processing speed, especially in field of a repeated processing such as image processing, pattern recognition, etc.

Comparison of the Average Latency Time of Overlay Multicast for Internet Broadcasting Service (인터넷방송 서비스를 위한 오버레이 멀티캐스트 기법의 평균 대기시간 비교)

  • Cho, Hye-Ran;Song, Bok-Sob;Kim, Jeong-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.58-65
    • /
    • 2008
  • The overlay multicast that has been recently presented as an alternative for the IP multicast has been getting much attention by the advancement of network techniques to enforce routing in application-levels. In this paper, we verified the efficiency of Internet broadcasting through comparing latency time of TBCP with mOBCP that have distributed Tree-first based spanning-tree structures in overlay multicast techniques. We also propose effective tree structures that minimize latency time and provide competent service by choosing optimum parent nodes early in the base of these two methods over the same time slot in multi-user connection. The results of our comparison showed that average latency time in mOBCP techniques declined by 36% from those of TBCP technique.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.