• Title/Summary/Keyword: real-time network

Search Result 4,424, Processing Time 0.032 seconds

Real-time Zoom Tracking for DM36x-based IP Network Camera

  • Cong, Bui Duy;Seol, Tae In;Chung, Sun-Tae;Kang, HoSeok;Cho, Seongwon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.11
    • /
    • pp.1261-1271
    • /
    • 2013
  • Zoom tracking involves the automatic adjustment of the focus motor in response to the zoom motor movements for the purpose of keeping an object of interest in focus, and is typically achieved by moving the zoom and focus motors in a zoom lens module so as to follow the so-called "trace curve", which shows the in-focus motor positions versus the zoom motor positions for a specific object distance. Thus, one can simply implement zoom tracking by following the most closest trace curve after all the trace curve data are stored in memory. However, this approach is often prohibitive in practical implementation because of its large memory requirement. Many other zoom tracking methods such as GZT, AZT and etc. have been proposed to avoid large memory requirement but with a deteriorated performance. In this paper, we propose a new zoom tracking method called 'Approximate Feedback Zoom Tracking method (AFZT)' on DM36x-based IP network camera, which does not need large memory by approximating nearby trace curves, but generates better zoom tracking accuracy than GZT or AZT by utilizing focus value as feedback information. Experiments through real implementation shows the proposed zoom tracking method improves the tracking performance and works in real-time.

Software Design of Packet Analyzer based on Byte-Filtered Packet Inspection Mechanism for UW-ASN

  • Muminov, Sardorbek;Yun, Nam-Yeol;Park, Soo-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1572-1582
    • /
    • 2011
  • The rapid growth of UnderWater Acoustic Sensor Networks (UW-ASNs) has led researchers to enhance underwater MAC protocols against limitations existing in underwater environment. We propose the customized robust real-time packet inspection mechanism with addressing the problem of the search for the data packet loss and network performance quality analysis in UW-ASNs, and describe our experiences using this approach. The goal of this work is to provide a framework to assess the network real-time performance quality. We propose a customized and adaptive mechanism to detect, monitor and analyze the data packets according to the MAC protocol standards in UW-ASNs. The packet analyzing method and software we propose is easy to implement, maintain, update and enhance. We take input stream as real data packets from sniffer node in capture mode and perform fully analysis. We were interested in developing software and hardware designed tool with the same capabilities which almost all terrestrial network packet sniffers have. Experimental results confirm that the best way to achieve maximum performance requires the most adaptive algorithm. In this paper, we present and offer the proposed packet analyzer, which can be effectively used for implementing underwater MAC protocols.

Development of real-time monitoring system using wired and wireless networks ina full-scale ship

  • Paik, Bu-Geun;Cho, Seong-Rak;Park, Beom-Jin;Lee, Dong-Kon;Bae, Byung-Dueg
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.2 no.3
    • /
    • pp.132-138
    • /
    • 2010
  • In the present study, the real-time monitoring system is developed based on the wireless sensor network (WSN) and power line communication (PLC) employed in the 3,000-ton-class training ship. The WSN consists of sensor nodes, router, gateway and middleware. The PLC is composed of power lines, modems, Ethernet gateway and phase-coupler. The basic tests show that the ship has rather good environments for the wired and wireless communications. The developed real-time monitoring system is applied to recognize the thermal environments of main-engine room and one cabin in the ship. The main-engine room has lots of heat sources and needs careful monitoring to satisfy safe operation condition or detect any human errors beforehand. The monitoring is performed in two regions near the turbocharger and cascade tank, considered as heat sources. The cabin on the second deck is selected to monitor the thermal environments because it is close to the heat source of main engine. The monitoring results of the cabin show the thermal environment is varied by the human activity. The real-time monitoring for the thermal environment would be useful for the planning of the ventilation strategy based on the traces of the human activity against inconvenient thermal environments as well as the recognizing the temperature itself in each cabin.

Design of Web-Based Simulation Framework for Real-Time Infographics (실시간 인포그래픽을 위한 웹 기반의 시뮬레이션 프레임워크 설계)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.411-416
    • /
    • 2015
  • The service size of an IoT environment is determined by the various types of sensors. A gateway for relaying sensor information from various sensors is a representative middleware system, and an infographics showing the information with a graphical presentation of data and information is a client system for representing real-time information efficiently, it is necessary a similar test bed with IoT environment to develop a real-time infographics displaying a large amount of information effectively. The testing tools used in developing the existing network systems are mostly made to be suitable for functional testing and performance testing of the driven unit. In this paper, we proposed a mean which is web-based simulation framework to create a variety of information required for real-time infographics development, and evaluate the function of the system proposed by the test function of the comparison with the previous network test tool.

Restricted Multi-hop Information Lookahead Scheme for Real-Time Data Dissemination in Wireless Sensor Networks (무선 센서 망에서 실시간 데이터 전송을 위한 제한적 멀티-홉 정보 예측 기법)

  • Jung, Ju-Hyun;Oh, Seung-Min;Lee, Jeong-Cheol;Park, Ho-Sung;Yim, Yong-Bin;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7A
    • /
    • pp.706-714
    • /
    • 2010
  • In wireless sensor networks, real-time data delivery schemes typically achieve a desired delivery speed by performing one-hop lookahead. Recently, to reduce the deadline miss ratio against the desired delivery speed, a study has proposed a real-time routing protocol based on proactively performing two-hop lookahead. However, the study might cause heavy message exchange overhead and high computing complexity to carry out obtainment of two-hop neighborhood speed information in the entire sensor nodes whether data are delivered or not. Moreover, although multi-hop lookahead provides the least deadline miss ratio, due to the restriction from the overhead and the complexity, the recent study merely adopts the two-hop lookahead manner. In this paper, we propose a novel real-time routing protocol that adopts on-demand neighborhood multi-hop information obtainments only around data forwarding paths. Simulation results prove that the proposed routing protocol offers better performances with respect to deadline miss ratio, total communication costs, energy efficiency, and network lifetime.

A Study on the Real-Time Certificate Status Verification System Using VDN (VDN을 이용한 실시간 인증서 상태 검증 시스템의 관한 연구)

  • Lee, Kwang-Hyoung;Kim, Hyun-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.5
    • /
    • pp.858-865
    • /
    • 2006
  • A certificate that is issued by the certification authority can be revoked within the period of validity by various reasons such as the loss of private key, disqualification or the change in key. Therefore, the certificate status verification must precede prior to use Currently, the CRL or the OCSP methods are used in most cases. But the CRL system can't guarantee the present status of the certificate, and the OCSP generates heavy network traffic by checking or requesting certificate status in real-time using high-capacity messages. In this paper, we propose a system that requests the certificate verification by creating VDN for user identity information. Through this system, the certification authority will be able to guarantee the certificate's status in real-time, and solve the problem of the sewer and network overload by verifying and finding user identity information from VDN, Based on the results, we propose a real-time certificate status verification system which can improve the speed of the verification. We confirmed the improvement in speed by testing and comparing it with the existing methods.

  • PDF

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

전자산업의 서비스부품에 대한 국제로지스틱스 연구

  • 김태현
    • Journal of Distribution Research
    • /
    • v.1 no.2
    • /
    • pp.141-172
    • /
    • 1996
  • This study is to investigate global logistics strategies of Korean electronics companies. in terms of service parts. According to the survey, Korean electronics companies were pursuing multi-level global logistics network such as global, continental, national, regional and service center echelon for improving the efficiency of service parts global logistics. Especially there was a tendency of developing new continental distribution centers. And the companies were exploiting efficiency through inventory control by multi-level echelon, demand forecasting by the product life cycle and supply and service lead time management. But there were some insufficient factors for the efficiency of global logistics operation at the construction of worldwide real time logistics information system and pursuit of the efficiency on the whole network including subcontractors. For the future competitive advantage of the Korean electronics companies, the following are suggested: 1) the establishment of arranged logistics channel adjusting each company's global strategy, 2) the construction of worldwide real time logistics information system, 3) the reengineering of all logistics procedures such as order processing, shipping, inventory control, etc., 4) the enhancement of the ratio of the supply from the external companies and the internal manufacturing subsidiaries at each continent, 5) and the pursuit of operational internalization of external subcontractors.

  • PDF

An Online Response System for Anomaly Traffic by Incremental Mining with Genetic Optimization

  • Su, Ming-Yang;Yeh, Sheng-Cheng
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.375-381
    • /
    • 2010
  • A flooding attack, such as DoS or Worm, can be easily created or even downloaded from the Internet, thus, it is one of the main threats to servers on the Internet. This paper presents an online real-time network response system, which can determine whether a LAN is suffering from a flooding attack within a very short time unit. The detection engine of the system is based on the incremental mining of fuzzy association rules from network packets, in which membership functions of fuzzy variables are optimized by a genetic algorithm. The incremental mining approach makes the system suitable for detecting, and thus, responding to an attack in real-time. This system is evaluated by 47 flooding attacks, only one of which is missed, with no false positives occurring. The proposed online system belongs to anomaly detection, not misuse detection. Moreover, a mechanism for dynamic firewall updating is embedded in the proposed system for the function of eliminating suspicious connections when necessary.