• Title/Summary/Keyword: high-speed Internet

Search Result 832, Processing Time 0.031 seconds

On Unicast Routing Algorithm Based on Estimated Path for Delay Constrained Least Cost (경로 추정 기반의 지연시간을 고려한 저비용 유니캐스트 라우팅 알고리즘)

  • Kim, Moon-Seong;Bang, Young-Cheol;Choo, Hyun-Seung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.25-31
    • /
    • 2007
  • The development of efficient Quality of Service (QoS) routing algorithms in high speed networks is very difficult since divergent services require various quality conditions, If the QoS parameter we concern is to measure the delay on that link, then the routing algorithm obtains the Least Delay (LD) path, Meanwhile, if the parameter is to measure of the link cast, then it calculates the Least Cost (LC) path. The Delay Constrained Least Cast (DCLC) path problem of the mixed issues on LD and LC has been shown to be NP-hard. The path cost of LD path is relatively mere expensive than that of LC path, and the path delay of LC path is relatively higher than that of LD path in DCLC problem. In this paper. we propose the algorithm based on estimated path for the DCLC problem and investigate its performance, It employs a new parameter which is probabilistic combination of cost and delay, We have performed empirical evaluation that compares our proposed algorithm with the DCUR in various network situations.

  • PDF

A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment (안전한 유비쿼터스 환경을 위한 확장성 있는 블루투스 네트워크에 관한 연구)

  • Baek, Jang-Mi;Seo, Dae-Hee
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.159-170
    • /
    • 2008
  • The ubiquitous network revolution is beginning with the onset of digital convergence, whereby computers, horne appliances, and communications and broadcast media are being unified into digital media with the founding of the information super high speed. This technical advancement is creating a new culture and a new space and accelerating society's transition to the new and unique social paradigm of a 'ubiquitous society'. In particular, studies on ubiquitous communications are well underway. Lately, the focus has been on the Bluetooth technology due to its applicability in various environments. Applying Bluetooth connectivity to new environments such as ubiquitous or sensor networks requires finding new ways of using it. Thus, the scalable Bluetooth piconet scheme with independent slave device is proposed. It follows from work by Sea et al. But extended scatternet is not considered is Kiisc05 paper. Therefore, we propose secure bridge connection scheme for scalable Bluetooth scatternet.

  • PDF

Review of Channel Quality Indicator Estimation Schemes for Multi-User MIMO in 3GPP LTE/LTE-A Systems

  • Abdulhasan, Muntadher Qasim;Salman, Mustafa Ismael;Ng, Chee Kyun;Noordin, Nor Kamariah;Hashim, Shaiful Jahari;Hashim, Fazirulhisham
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1848-1868
    • /
    • 2014
  • Multiple-in multiple-out (MIMO) in long-term evolution (LTE) is an essential factor in achieving high speed data rates and spectral efficiency. The unexpected growth in data rate demand has pushed researchers to extend the benefits of multi-user MIMO. The multi-user MIMO system can take full advantage of channel conditions by employing efficient adjustment techniques for scheduling, and by assigning different modulation and coding rates. However, one of the critical issues affecting this feature is the appropriate estimation of channel quality indicator (CQI) to manage the allocated resources to users. Therefore, an accurate CQI estimation scheme is required for the multi-user MIMO transmission to obtain significant improvements on spectral efficiency. This paper presents overviews of multi-user MIMO in LTE/LTE-advanced systems. The link adaptation, scheduling process, and different factors that affect the reliability of CQI measurements are discussed. State-of-the-art schemes for the post-processing CQI estimation, and the comparisons of various CQI estimation schemes to support multi-user MIMO are also addressed.

Development of Optical Video Device for HD-SDI Video Signal Transmission (HD-SDI 비디오 신호 전송을 위한 광 비디오 전송 장치 개발)

  • Lee, Dong-Real
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.245-250
    • /
    • 2015
  • We have developed an optical video transmission device for HD-SDI signal transmission. The optical transmitter/receiver unit operates at DC 5 volt and small enough to be attaced near surveillance camera. They have internal voltage regulating circuits to supply 3.3V to other circuits inside the unit. The optical transmitter is composed of cable driver, laser diode driver, and laser diode. The optical receiver is composed of photodiode, limiting amp, and cable equalizer. The wavelength of the trasmitter was 1.3 um, and optical power was -5dBm, and the speed was 1.485Gbps. The receiver sensitivity was -23 dBm. We confirmed that the optical device can transmit HD-SDI video through 30 km optical fiber without any interruption.

Super-Pixels Generation based on Fuzzy Similarity (퍼지 유사성 기반 슈퍼-픽셀 생성)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.147-157
    • /
    • 2017
  • In recent years, Super-pixels have become very popular for use in computer vision applications. Super-pixel algorithm transforms pixels into perceptually feasible regions to reduce stiff features of grid pixel. In particular, super-pixels are useful to depth estimation, skeleton works, body labeling, and feature localization, etc. But, it is not easy to generate a good super-pixel partition for doing these tasks. Especially, super-pixels do not satisfy more meaningful features in view of the gestalt aspects such as non-sum, continuation, closure, perceptual constancy. In this paper, we suggest an advanced algorithm which combines simple linear iterative clustering with fuzzy clustering concepts. Simple linear iterative clustering technique has high adherence to image boundaries, speed, memory efficient than conventional methods. But, it does not suggest good compact and regular property to the super-pixel shapes in context of gestalt aspects. Fuzzy similarity measures provide a reasonable graph in view of bounded size and few neighbors. Thus, more compact and regular pixels are obtained, and can extract locally relevant features. Simulation shows that fuzzy similarity based super-pixel building represents natural features as the manner in which humans decompose images.

Performance Analysis of NM-MMA Adaptive Equalization Algorithm in Nonconstant Modulus Signal (Nonconstant Modulus 신호에서 NM-MMA 적응 등화 알고리즘의 성능 해석)

  • Lim, Seung Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.113-118
    • /
    • 2017
  • This paper propose the NM-MMA (Novel Mixed-MMA) that is possible to improving the convergence speed of current MMA algorithm and reducing the high MSE of SE-MMA algorithm, and its equalization performance were analyzed. The cost function of the NM-MMA configured as the sum of appropriate weights of gradient vector of current MMA and SE-MMA, and then it used for the updating the tap coefficient of equalizer. The computer simulation was performed applying the same environment in the channel, step size and signal to noise ratio, and the same performance index in equalizer output signal constellation, residual isi, MSE, SER was used. As a result of computer simulation, the proposed NM-MMA has fast convergence time than MMA, and less in MSE and SER performance compared to SE-MMA.

Response and Threat of Home Network System in Ubiquitous Environment (유비쿼터스 환경에서의 홈네트워크 시스템 침해 위협 및 대응 방안)

  • Oh, Dae-Gyun;Jeong, Jin-Young
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.27-32
    • /
    • 2005
  • Recently The social interest regarding is coming to be high about Home Network accordong to intelligence anger of diffusions and the family home appliance machineries and tools of the superhigh speed Internet In the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases in the ubiquitous computing socioty, only neither the threat of the private life which is caused by in cyber attack will be able to increase according to the computer environment dependence degree of the individual increases Beacaues of Home network is starting point to go ubiquitous computing enviorment, The Increase of Cyber attack through Internet will raise its head with the obstacle to disrupt the activation of the groove network. So there is a possibility of saying that the counter-measure preparation is urgent, In the various environment like this, It means the threat which present time than is complicated will exist. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment. So it will analyze the Home network system environment of present time and observe the Security threat and attack type in the ubiquitous computing enviorment.

  • PDF

A Study on Heuristic Approaches for Routing and Wavelength Assignment in WDM All-Optical Networks (WDM 전광망에서 라우팅과 파장할당을 위한 휴리스틱 방법에 대한 연구)

  • Kim, Ki-Won;Chung, Young-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.8
    • /
    • pp.19-29
    • /
    • 2001
  • The recent explosion in the Internet applications, Internet. host number and the traffic in the IP backbone network is posing new challenges for transport network. This requires a high-speed IP backbone network that has a substantially higher bandwidth than the one offered by current networks, which prompts the development of all-optical network. To obtain optical network utilization gains, we need a software which establishs logical topology to make possible the efficient use or physical topology, and control the optical network in combination with the IP layer routing protocols. Finally, the logical topology is required higher efficient than physical topology. For this an efficient algorithm for the routing and wavelength assignment(RWA) in the WDM all-optical network is necessary. In this paper, two kinds of heuristic algorithms to establish logical topology for WDM networks and arc applied to the design of logical topology of domestic backbone network. These algorithms are found to work quite well and they arc compared with each other in terms of blocking rate, etc.

  • PDF

Randomness Based Fuzzing Test Case Evaluation for Vulnerability Analysis of Industrial Control System (산업제어시스템 취약성 분석을 위한 무작위성 기반 퍼징 테스트 케이스 평가 기법)

  • Kim, SungJin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.179-186
    • /
    • 2018
  • The number of devices connect to the internet is rapidly increasing with the advent of the IoT(Internet of Things). The IoT has improved the convenience of life. However, it makes security issues such as privacy violations. Therefore cybersecurity is the most important issue to be discussed nowadays. Especially, various protocols are used for same purpose due to rapidly increase of IoT market. To deal with this security threat noble vulnerability analysis is needed. In this paper, we contribute to the IoT security by proposing a new randomness-based test case evaluation methodology using variance and entropy. The test case evaluation method proposed in this paper can evaluate the test cases at a high speed regardless of the test set size, unlike the traditional technique.

The Design and Implementation of EDI document processing system based on XML (XML 기반의 EDI 문서 처리 시스템 설계 및 구현)

  • Im, Dae-Myung;Cheong, Sang-Ho;Ryu, Jee-Woong;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.734-736
    • /
    • 2010
  • Now, Using high-speed Internet network for information processing and exchange of information on the research and development is active. To do this, Electronic document standards for more efficient and accurate operations shall be conducted. Accordingly, Standards bodies from around the world proposed various standards, and Typically The EDI is standardized system for exchanging data between companies. EDI is one form of e-commerce. And, through the transactions between companies to standardize data and documents. And using a computer network between the parties directly for sending and receiving. But, Companies and other businesses to deliver the document as defined, so data are fixed and formalized at the time of the extension causes problems and structured data search and processing is impossible. In this paper, While using structure and expanding Internet-standard language the XML for EDI document processing system was designed and implemented.

  • PDF