• Title/Summary/Keyword: scheme

Search Result 29,238, Processing Time 0.043 seconds

Adaptive Rate Control Scheme for Streaming-based Content Sharing Service

  • Lee, Sunghee;Chung, Kwangsue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.784-799
    • /
    • 2013
  • This paper presents an adaptive rate control scheme for streaming-based content sharing service. This scheme delivers multimedia contents from a user device to another device or seamlessly redirects streaming service across heterogeneous user devices. In the proposed scheme, a streaming server adjusts video quality level according to the network and client status. Our scheme is different from other rate control schemes, because the video quality at the server is decided not only based on the available bandwidth, but also based on the device characteristics and bandwidth requirement at the access network. We also propose a bandwidth estimation method to achieve more equitable bandwidth allocations among streaming flows competing for the same narrow link with different Round Trip Times (RTTs). Through the simulation, we prove that our scheme improves the network stability and the quality of streaming service by appropriately adjusting the quality of the video stream. The simulation results also demonstrate the ability of the proposed scheme in ensuring RTT-fairness while remaining throughput efficient.

WELL-BALANCED ROE-TYPE NUMERICAL SCHEME FOR A MODEL OF TWO-PHASE COMPRESSIBLE FLOWS

  • Thanh, Mai Duc
    • Journal of the Korean Mathematical Society
    • /
    • v.51 no.1
    • /
    • pp.163-187
    • /
    • 2014
  • We present a multi-stage Roe-type numerical scheme for a model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage in the construction of the scheme computes the volume fraction at every time step. The second stage deals with the nonconservative terms in the governing equations which produces states on both side of the contact wave at each node. In the third stage, a Roe matrix for the two-phase is used to apply on the states obtained from the second stage. This scheme is shown to capture stationary waves and preserves the positivity of the volume fractions. Finally, we present numerical tests which all indicate that the proposed scheme can give very good approximations to the exact solution.

Improvement of Mobile U-health Service System Using Feces and Urine Sensing U-Care Scheme

  • Min, Byung-Won
    • International Journal of Contents
    • /
    • v.12 no.4
    • /
    • pp.17-22
    • /
    • 2016
  • This paper presents a novel method to design and implement mobile u-health system by defining the essential elements of mobile healthcare services. We choose common service elements for the proposed u-healthcare scheme and design the service platform. Especially we focus on automatic feces or urine sensing u-care scheme to prove the effectiveness of our platform. We construct the system with sensing part with a manikin and a diaper, wireless communication part with feces or urine sensing data, and coordinator system based on the u-health platform defined in this paper. Experimental results show that our scheme is useful in the area of u-care service for the handicapped, the elderly, and patients who can hardly move by themselves. In addition the designed scheme offers a realized u-care scheme with the purpose of advanced developing tools for application or service developers.

An Approximate Evidence Combination Scheme for Increased Efficiency (효율성 제고를 위한 근사적 증거병합 방법)

  • Lee, Gyesung
    • The KIPS Transactions:PartB
    • /
    • v.9B no.1
    • /
    • pp.17-22
    • /
    • 2002
  • A major impediment in using the Dempster-chafer evidence combination scheme is its computational complexity, which in general is exponential since DS scheme allows any subsets over the frame of discernment as focal elements. To avoid this problem, we propose a method called approximate evidence combination scheme. This scheme is applied to a few sample applications and the experiment results are compared with those of VBS. The results show that the approximation scheme achieves a great amount of computational speedup and produces belief values within the range of deviation that the expert allows.

Design of Identification Metadata for UCI (UCI를 위한 식별 메타데이터 설계)

  • Park, Sungbum;Lee, Sangwon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.97-99
    • /
    • 2013
  • Although UCI Identification metadata is not represented in the UCI syntax, it means a set of elements that enable users to easily and quickly identify. Against this backdrop, we research on how to design identification metadata for UCI. First of all, we check ISO/IEC 11179 and compare this with UCI properties. And then we defines nine components (such as UCI, Identifier, Title, Type, Mode, Format, Contributor, ContributorEntitiy, and ContributorRole) as elements of the identification metadata and establish encoding scheme with several parts (such as List of Encoding Scheme, Encoding Scheme of Identifier, Encoding Scheme of Type, Encoding Scheme of Mode, Encoding Scheme of Format, and Encoding Scheme of ContributorRole).

  • PDF

Flow Evaluations of Centrifugal Pump Impeller Using Commercial Code (상용코드를 이용한 원심펌프 임펠러 유동평가)

  • Shim, Chang-Yeul;Hong, Soon-Sam;Kang, Shin-Hyoung
    • 유체기계공업학회:학술대회논문집
    • /
    • 2000.12a
    • /
    • pp.285-292
    • /
    • 2000
  • Numerical calculation is applied to centrifugal pump at design condition by using commercial code STAR-CD and Tascflow, and these results are compared with experimental data at impeller outlet. Numerical analysis is also performed by changing turbulence model and discretization scheme at design condition using Tascflow. Turbulence model and discretization scheme used to Tascflow are k-$\epsilon$, k-$\omega$ turbulence model and upwind, modified linear profile scheme. W;th the same turbulence model and discretization scheme, two results of STAR-CD and Tascflow are very similar. But there is significant difference in numerical results near hub and shroud of impeller with different kinds of turbulent model and discretization scheme at design condition. And with k- $\omega$ turbulence model and modified linear profile scheme, it is showed that numerical results are very similar to experimental results of impeller outlet

  • PDF

An Improved Smart Card-based User Authentication Scheme with Session Key Agreement for Telecare Medicine Information System

  • Yang, Hyungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.35-43
    • /
    • 2017
  • In 2013, Lee-Lie proposed secure smart card based authentication scheme of Zhu's authentication for TMIS which is secure against the various attacks and efficient password change. In this paper, we discuss the security of Lee-Lie's smart card-based authentication scheme, and we have shown that Lee-Lie's authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to overcome these security problems of Lee-Lie's authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved smart card based user authentication scheme for TMIS is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack, the session key generation attack and provides mutual authentication between the user and the telecare system.

High Level Object Oriented Real-Time Simulation Programming and Time-triggered Message-triggered Object(TMO) Scheme

  • Jeong, Chan-Joo;Na, Sang-Donh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.856-862
    • /
    • 2002
  • The object-oriented(00) distributed real-time(RT) programming movement started in1990's and is growing rapidly at this turn of the century. Distributed real-time simulation is a field in its infancy but it is bounded to receive steadily growing recognition for its importance and wide applicability. The scheme is called the distributed time-triggered simulation scheme which is conceptually simple and easy to use but widely applicable. A new generation object oriented(00) RT programming scheme is called the time-triggered message triggered object(TMO)programming scheme and it is used to make specific illustrations of the issues. The TMO structuring scheme is a general-style components structuring scheme and supports design of all types of component including hard real time objects and non real time objects within one general structure.

Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme

  • Li, Jiguo;Huang, Xinyi;Mu, Yi;Wu, Wei
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.10-17
    • /
    • 2008
  • In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificateless public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme.

Network Coding Scheme using Orthogonality for Two-Way Relay Channel (양방향 중계 채널에서의 직교성을 이용한 네트워크 부호화 기법)

  • Ok, Jun-Ho;Lim, Jin-Soo;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.170-174
    • /
    • 2011
  • We introduce the network coding which cooperative communication for two-way relay channel. We propose a new network coding scheme using orthogonality for cooperative communication system. The proposed network coding scheme via orthogonal mapping shows better BER performance because proposed scheme weakens error propagation which is disadvantage of DF scheme. And proposed scheme maintains same throughput compared to conventional scheme.