• Title/Summary/Keyword: Wireless video

Search Result 545, Processing Time 0.023 seconds

SePH: Seamless Proxy-based Handoff Scheme in IP-based Heterogeneous Mobile Networks (이기종의 모바일 IP 네트워크에서 끊김없는 프록시 기반의 핸드오프 기법)

  • Lee, Seung-Hyun;Shin, Dong-Ryeol;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.71-82
    • /
    • 2012
  • In Next Generation Wireless Networks (NGWN), lots of information, such as voice and video data, will be used in All-IP networks. It is important note that seamless service for users and handoff between heterogeneous networks must be taken into account in such environments. Therefore, in this paper, we propose a SePH(Seamless Proxy based Handoff) using PMIPv6-based proxy model which is enable to improve the performance of handoff in NGWN. The SePH can efficiently support seamless and IP-based mobility by reducing the search process. The performance results show that our proposed scheme outperforms in terms of QoS (Quality of Service) such as throughput, handoff latency, packet loss, and signaling overhead comparing to the existing schemes.

Design and Implementation of High-Resolution Image Transmission Interface for Mobile Device (모바일 환경을 위한 맞춤형 서비스 유비쿼터스 영상전송 시스템의 설계)

  • Lee, Sang-Wook;Ahn, Yong-Beom;Kim, Eung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.791-799
    • /
    • 2008
  • An image recognition for surrounding conditions is very important in image transmission. In recently rears, as the information infrastructure is more general, the user-centered demands in which they want to identify by object's states image using wire or wireless environment have increased. However, existing mobile solution could be hard to expect high quality mage, because limitation of software processing according as network based on mobile terminal which has low band width supports software codec. To solve this weak point, this paper describes on hardware codec design based on MPEG-4 which is international video compression standard. Implemented system contains the embedded CPU for optimized design and it works high quality service as transmission speed and resolution in mobile circumstance.

A Study on the Internet Broadcasting Image Processing based on Offloading Technique on the Mobile Environments (모바일 환경에서 오프로딩 기술 기반 인터넷 방송 영상 처리에 관한 연구)

  • Kang, Hong-gue
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.63-68
    • /
    • 2018
  • Offloading is a method of communicating, processing, and receiving results from some of the applications performed on local computers to overcome the limitations of computing resources and computational speed.Recently, it has been applied in mobile games, multimedia data, 360-degree video processing, and image processing for Internet broadcasting to speed up processing and reduce battery consumption in the mobile computing sector. This paper implements a viewer that enables users to convert various flat-panel images and view contents in a wireless Internet environment and presents actual results of an experiment so that users can easily understand the images. The 360 degree spherical image is successfully converted to a plane image with Double Panorama, Quad, Single Rectangle, 360 Overview + 3 Rectangle depending on the image acquisition position of the 360 degree camera through the interface. During the experiment, more than 100 360 degree spherical images were successfully converted into plane images through the interface below.

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.

Development of Offshore Construction ROV System applying Pneumatic Gripper (공압 gripper를 적용한 해양 건설 ROV 시스템 개발)

  • Park, Jihyun;Hwang, Yoseop
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1697-1705
    • /
    • 2022
  • The safety of marine construction workers and marine pollution problems are occurring due to large-scale offshore construction. In particular, underwater construction work in the sea has a higher risk than other work, so it is necessary to apply an unmanned alternative system that considers the safety of the workers. In this paper, the ROV system for offshore construction has been developed for underwater unmanned work. A monitoring system was developed for position control through the control of underwater propellants, pneumatic gripper, and monitoring of underwater work. As a result of the performance evaluation, the underwater movement speed of the ROV was evaluated to be 0.89 m/s, and it was confirmed that the maximum load of the pneumatic gripper was 80 kg. In addition, the network bandwidth required for underwater ROV control and underwater video streaming was evaluated to be more than 300Mbps, wired communication at 92.7 ~ 95.0Mbit/s at 205m, and wireless communication at 78.3 ~ 84.8Mbit/s.

A OTT content data analysis technique on a PC environment (PC 환경에서의 OTT 콘텐츠 데이터 분석 방법)

  • Chanwoo Lee;Junyoung Heo
    • Smart Media Journal
    • /
    • v.13 no.2
    • /
    • pp.62-67
    • /
    • 2024
  • Due to technological advancements in viewing devices and the COVID-19 pandemic, a lot of OTT-only content is being produced and distributed as people shift from traditional movie theater viewing and broadcasters' fixed TV viewing to free-form OTT viewing using wired and wireless internet. As a result, the ability to leverage data from OTT audiences has become critical to the competitiveness of the industry. However, third parties other than OTT content providers are facing difficulties in acquiring OTT viewer data. In this paper, as a way to overcome the shortcomings of existing viewer data acquisition, we propose a method to extract audio and video data by developing an OTT viewing data acquisition agent using Web APIs by adopting a web browser environment that does not affect the performance of OS and viewing devices, so that third-party companies that need viewing data can utilize it.

A Study of Performance Analysis on Effective Multiple Buffering and Packetizing Method of Multimedia Data for User-Demand Oriented RTSP Based Transmissions Between the PoC Box and a Terminal (PoC Box 단말의 RTSP 운용을 위한 사용자 요구 중심의 효율적인 다중 수신 버퍼링 기법 및 패킷화 방법에 대한 성능 분석에 관한 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.54-75
    • /
    • 2011
  • PoC(Push-to-talk Over Cellular) is an integrated technology of group voice calls, video calls and internet based multimedia services. If a PoC user can not participate in the PoC session for various reasons such as an emergency situation, lack of battery capacity, then the user can use the PoC Box which has a similar functionality to the MM Box in the MMS(Multimedia Messaging Service). The RTSP(Real-Time Streaming Protocol) method is recommended to be used when there is a transmission session between the PoC box and a terminal. Since the existing VOD service uses a wired network, the packet size of RTSP-based VOD service is huge, however, the PoC service has wireless communication environments which have general characteristics to be used in RTSP method. Packet loss in a wired communication environments is relatively less than that in wireless communication environment, therefore, a buffering latency occurs in PoC service due to a play-out delay which means an asynchronous play of audio & video contents. Those problems make a user to be difficult to find the information they want when the media contents are played-out. In this paper, the following techniques and methods were proposed and their performance and superiority were verified through testing: cross-over dual reception buffering technique, advance partition multi-reception buffering technique, and on-demand multi-reception buffering technique, which are designed for effective picking up of information in media content being transmitted in short amount of time using RTSP when a user searches for media, as well as for reduction in playback delay; and same-priority packetization transmission method and priority-based packetization transmission method, which are media data packetization methods for transmission. From the simulation of functional evaluation, we could find that the proposed multiple receiving buffering and packetizing methods are superior, with respect to the media retrieval inclination, to the existing single receiving buffering method by 6-9 points from the viewpoint of effectiveness and excellence. Among them, especially, on-demand multiple receiving buffering technology with same-priority packetization transmission method is able to manage the media search inclination promptly to the requests of users by showing superiority of 3-24 points above compared to other combination methods. In addition, users could find the information they want much quickly since large amount of informations are received in a focused media retrieval period within a short time.

A Mismatch-Insensitive 12b 60MS/s 0.18um CMOS Flash-SAR ADC (소자 부정합에 덜 민감한 12비트 60MS/s 0.18um CMOS Flash-SAR ADC)

  • Byun, Jae-Hyeok;Kim, Won-Kang;Park, Jun-Sang;Lee, Seung-Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.17-26
    • /
    • 2016
  • This work proposes a 12b 60MS/s 0.18um CMOS Flash-SAR ADC for various systems such as wireless communications and portable video processing systems. The proposed Flash-SAR ADC alleviates the weakness of a conventional SAR ADC that the operation speed proportionally increases with a resolution by deciding upper 4bits first with a high-speed flash ADC before deciding lower 9bits with a low-power SAR ADC. The proposed ADC removes a sampling-time mismatch by using the C-R DAC in the SAR ADC as the combined sampling network instead of a T/H circuit which restricts a high speed operation. An interpolation technique implemented in the flash ADC halves the required number of pre-amplifiers, while a switched-bias power reduction scheme minimizes the power consumption of the flash ADC during the SAR operation. The TSPC based D-flip flop in the SAR logic for high-speed operation reduces the propagation delay by 55% and the required number of transistors by half compared to the conventional static D-flip flop. The prototype ADC in a 0.18um CMOS demonstrates a measured DNL and INL within 1.33LSB and 1.90LSB, with a maximum SNDR and SFDR of 58.27dB and 69.29dB at 60MS/s, respectively. The ADC occupies an active die area of $0.54mm^2$ and consumes 5.4mW at a 1.8V supply.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

A Network-adaptive Context Extraction Method for JPEG2000 Using Tree-Structure of Coefficients from DWT (DWT 계수의 트리구조를 이용한 네트워크-적응적 JPEG2000 컨텍스트 추출방법)

  • Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9C
    • /
    • pp.939-948
    • /
    • 2005
  • In EBCOT, the context extraction process takes excessive calculation time and this paper proposed a method to reduce this calculation time. That is, if a coefficient is less than a pre-defined threshold value the coefficient and its descendents skip the context extraction process. There is a trade-off relationship between the calculation time and the image quality or the amount of output data such that as this threshold value increases, the calculation time and the amount of output data decreases, but the image degradation increases. Therefore, by deciding this threshold value according to the network environments or conditions, it is possible to establish a network-adaptive context extraction method. The experimental results showed that the range of the threshold values for acceptable image quality(better than 30dB) is from 0 to 4. The experimental results showed that in this range the Resulting reduction rate in calculation time was from $3\%\;to\;64\%$ in average, the reduction rate in output data was from $32\%$ to $73\%$ in average, which means that large reduction in calculation time and output data can be obtained with a cost of an acceptable image quality degradation. Therefore, the proposed method is expected to be used efficiently in the application area such as the real-time image/video data communication in wireless environments, etc.