• Title/Summary/Keyword: Virtual Threshold

Search Result 69, Processing Time 0.024 seconds

(A Study on an Adaptive Multimedia Synchronization Scheme for Media Stream Transmission) (미디어 스트림 전송을 위한 적응형 멀티미디어 동기화 기법에 관한 연구)

  • 지정규
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1251-1260
    • /
    • 2002
  • Real-time application programs have synchronization constraints which need to be met between media-data. Synchronization method represents feedback method including virtual client-side buffer. This buffer is used in buffer level method. It is client-leading synchronization that is absorbing variable transmission delay time and that is synchronizing by feedback control. It is the important factor for playback rate and QoS if the buffer level is normal or not. To solve the problems, we can control the start of transmission in multimedia server by appling filtering, control and network evaluation function. Synchronization method is processing for smooth presentation without cut-off while media is playing out. When audio frame which is master media is in high threshold buffer level we decrease play out time gradually, otherwise we increase it slowly.

  • PDF

Improving TCP Performance in Multipath Packet Forwarding Networks

  • Lee, Youngseok;Park, Ilkyu;Park, Yanghee
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.148-157
    • /
    • 2002
  • This paper investigates schemes to improve TCP performance in multipath forwarding networks. In multipath routing, packets to the same destination are sent to multiple next-hops in either packet-level or flow-level forwarding mode. Effective bandwidth is increased since we can utilize unused capacity of multiple paths to the destination. In packet-level multipath forwarding networks, TCP performance may not be enhanced due to frequent out-of-order segment arrivals at the receiver because of different delays among paths. To overcome this problem, we propose simple TCP modifications. At the sender, the fast retransmission threshold is adjusted taking the number of paths into consideration. At the receiver, the delayed acknowledgment scheme is modified such that an acknowledgment for an out-of-order segment arrival is delayed in the same way for the in-order one. The number of unnecessary retransmissions and congestion window reductions is diminished, which is verified by extensive simulations. In flow-level multipath forwarding networks, hashing is used at routers to select outgoing link of a packet. Here, we show by simulations that TCP performance is increased in proportion to the number of paths regardless of delay differences.

Image Segmentation Algorithm for Fish Object Extraction (어류객체 추출을 위한 영상분할 알고리즘)

  • Ahn, Soo-Hong;Oh, Jeong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1819-1826
    • /
    • 2010
  • This paper proposes the image segmentation algorithm to extracts a fish object from a fish image for fish image retrieval. The conventional algorithm using gray level similarity causes wrong image segmentation result in the boundary area of the object and the background with similar gray level. The proposed algorithm uses the reinforced edge and the adaptive block-based threshold for the boundary area with weak contrast and the virtual object to improve the eroded or disconnected object in the boundary area without contrast. The simulation results show that the percentage of extracting the visual-fine object from the test images is under 90% in the conventional algorithm while it is 97.7% in the proposed algorithms.

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

VR Image Watermarking Method Considering Production Environments (제작 환경을 고려한 VR 영상의 워터마킹 방법)

  • Moon, Won-jun;Seo, Young-ho;Kim, Dong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.561-563
    • /
    • 2019
  • This paper proposes a watermarking method for copyright protection of images used in VR. The Embedding method is that finds the point through the SIFT feature points, inserts the watermark by using DWT and QIM on the surrounding area. The objective image to extract the embedded watermark is the projected image and its method finds the SIFT feature points and extracts watermark data from its surrounding areas after correction by using inverse process of matching and projection in the VR image production process. By comparing the NCC and BER between the extracted watermark and the inserted watermark, the watermark is determined by accumulating the watermark having a threshold value or more. This is confirmed by comparing with a conventional method.

  • PDF

Performance Improvement of an Energy Efficient Cluster Management Based on Autonomous Learning (자율학습기반의 에너지 효율적인 클러스터 관리에서의 성능 개선)

  • Cho, Sungchul;Chung, Kyusik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.11
    • /
    • pp.369-382
    • /
    • 2015
  • Energy aware server clusters aim to reduce power consumption at maximum while keeping QoS(quality of service) compared to energy non-aware server clusters. They adjust the power mode of each server in a fixed or variable time interval to activate only the minimum number of servers needed to handle current user requests. Previous studies on energy aware server cluster put efforts to reduce power consumption or heat dissipation, but they do not consider energy efficiency well. In this paper, we propose an energy efficient cluster management method to improve not only performance per watt but also QoS of the existing server power mode control method based on autonomous learning. Our proposed method is to adjust server power mode based on a hybrid approach of autonomous learning method with multi level thresholds and power consumption prediction method. Autonomous learning method with multi level thresholds is applied under normal load situation whereas power consumption prediction method is applied under abnormal load situation. The decision on whether current load is normal or abnormal depends on the ratio of the number of current user requests over the average number of user requests during recent past few minutes. Also, a dynamic shutdown method is additionally applied to shorten the time delay to make servers off. We performed experiments with a cluster of 16 servers using three different kinds of load patterns. The multi-threshold based learning method with prediction and dynamic shutdown shows the best result in terms of normalized QoS and performance per watt (valid responses). For banking load pattern, real load pattern, and virtual load pattern, the numbers of good response per watt in the proposed method increase by 1.66%, 2.9% and 3.84%, respectively, whereas QoS in the proposed method increase by 0.45%, 1.33% and 8.82%, respectively, compared to those in the existing autonomous learning method with single level threshold.

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

Obstacle Avoidance of Unmanned Surface Vehicle based on 3D Lidar for VFH Algorithm (무인수상정의 장애물 회피를 위한 3차원 라이다 기반 VFH 알고리즘 연구)

  • Weon, Ihn-Sik;Lee, Soon-Geul;Ryu, Jae-Kwan
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.3
    • /
    • pp.945-953
    • /
    • 2018
  • In this paper, we use 3-D LIDAR for obstacle detection and avoidance maneuver for autonomous unmanned operation. It is aimed to avoid obstacle avoidance in unmanned water under marine condition using only single sensor. 3D lidar uses Quanergy's M8 sensor to collect surrounding obstacle data and includes layer information and intensity information in obstacle information. The collected data is converted into a three-dimensional Cartesian coordinate system, which is then mapped to a two-dimensional coordinate system. The data including the obstacle information converted into the two-dimensional coordinate system includes noise data on the water surface. So, basically, the noise data generated regularly is defined by defining a hypothetical region of interest based on the assumption of unmanned water. The noise data generated thereafter are set to a threshold value in the histogram data calculated by the Vector Field Histogram, And the noise data is removed in proportion to the amount of noise. Using the removed data, the relative object was searched according to the unmanned averaging motion, and the density map of the data was made while keeping one cell on the virtual grid map. A polar histogram was generated for the generated obstacle map, and the avoidance direction was selected using the boundary value.

A Study on Performance Evaluation based on Packet Dropping in ATM Network . New Scheme Proposal

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • Journal of Navigation and Port Research
    • /
    • v.27 no.3
    • /
    • pp.283-288
    • /
    • 2003
  • Recently, the growth of applications and services over high-speed Internet increases, ATM networks as wide area back-bone has been a major solution. As the conventional TCP/IP suite is still the standard protocol used to support upper application on current. Internet, the issues regarding whether TCP/IP will operate efficiently on top of an ATM infrastructure and how to control its QoS still remain for studies. TCP uses a window-based protocol for flow control in the transport layer. When TCP uses the UBR service in ATM layer, the control method is only buffer management. If a cell is discarded in ATM layer, one whole packet of TCP will be lost; this fact occur the most TCP performance degradation. Several dropping strategies, such as Tail Drop, EPD, PPD, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP performance, we propose a packet dropping scheme that is based on comparison with EPD, SPD and FBA. Our proposed scheme is applied to schemes discussed in the previous technology. Our proposed scheme does not need to know each connection's mean packet size. When the buffer exceeds the given threshold, it is based on comparison between the number of dropped packet and the approved packet. Our results are reported and discussed for comparing these discarding schemes under similar conditions. Although the number of virtual channel (VC) is increased, the simulation results showed that the proposed scheme can allocate more fairly each VC than other scheme.

High Affinity Pharmacological Profiling of Dual Inhibitors Targeting RET and VEGFR2 in Inhibition of Kinase and Angiogeneis Events in Medullary Thyroid Carcinoma

  • Dunna, Nageswara Rao;Kandula, Venkatesh;Girdhar, Amandeep;Pudutha, Amareshwari;Hussain, Tajamul;Bandaru, Srinivas;Nayarisseri, Anuraj
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.16
    • /
    • pp.7089-7095
    • /
    • 2015
  • Clinical evidence shows that dual inhibition of kinases as well angiogenesis provides ideal therapeutic option in the treatment of medullary thyroid carcinoma (MTC) than inhibiting either of these with the events separately. Although treatment with dual inhibitors has shown good clinical responses in patients with MTC, it has been associated with serious side effects. Some inhibitors are active agents for both angiogenesis or kinase activity. Owing to narrow therapeutic window of established inhibitors, the present study aims to identify high affinity dual inhibitors targeting RET and VEGFR2 respectively for kinase and angiogenesis activity. Established inhibitors like Vandetanib, Cabozantinib, Motesanib, PP121, RAF265 and Sunitinib served as query parent compounds for identification of structurally similar compounds by Tanimoto-based similarity searching with a threshold of 95% against the PubChem database. All the parent inhibitors and respective similar compounds were docked against RET and VEGFR2 in order to retrieve high affinity compounds with these two proteins. AGN-PC-0CUK9P PubCID: 59320403 a compound related to PPI21 showed almost equal affinity for RET and VEGFR2 and unlike other screened compounds with no apparent bias for either of the receptors. Further, AGNPC- 0CUK9P demonstrated appreciable interaction with both RET and VEGFR2 and superior kinase activity in addition to showed optimal ADMET properties and pharmacophore features. From our in silico investigation we suggest AGN-PC-0CUK9P as a superior dual inhibitor targeting RET and VEGFR2 with high efficacy which should be proposed for pharmacodynamic and pharmacokinetic studies for improved treatment of MTC.