• Title/Summary/Keyword: 네트워크 미디어

Search Result 3,113, Processing Time 0.028 seconds

Implementation of Integrated Player System based on Free-Viewpoint Video Service according to User Selection (사용자 선택에 따른 자유 시점 비디오 서비스 기반의 통합 플레이어 시스템 구현)

  • Yang, Ji-hee;Song, Min-ki;Park, Gooman
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.265-274
    • /
    • 2020
  • Free-viewpoint video service is a technology that allows users to watch at any angle, location and distance through interaction. In this paper, the free-viewpoint video services are defined in four viewing modes: Inward view, outward view, 3D object view and first person view. And we developed and implemented a new integrated program that plays all the suggested views. In the contents of girl band performances and basketball games, multi-view cameras suitable for each viewing mode are installed to acquire media, and data stored on the server is streamed over the network, making it available for viewing. Users can freely choose four viewing modes, space location, angle and so on, and the media data such as images and sounds are provided to them by rendering appropriately for the selected the viewpoint. Our system is expected to be a scalable free-viewpoint video service player as well as provide users with immersion and presence by combining various viewing modes.

An Adaptive Contention Windows Adjustment Scheme Based on the Access Category for OnBord-Unit in IEEE 802.11p (IEEE 802.11p에서 차량단말기간에 혼잡상황 해결을 위한 동적 충돌 윈도우 향상 기법)

  • Park, Hyun-Moon;Park, Soo-Hyun;Lee, Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.28-39
    • /
    • 2010
  • The study aims at offering a solution to the problems of transmission delay and data throughput decrease as the number of contending On-Board Units (OBU) increases by applying CSMA medium access control protocol based upon IEEE 802.11p. In a competition-based medium, contention probability becomes high as OBU increases. In order to improve the performance of this medium access layer, the author proposes EDCA which a adaptive adjustment of the Contention Windows (CW) considering traffic density and data type. EDCA applies fixed values of Minimum Contention Window (CWmin) and Maximum Contention Window (CWmax) for each of four kinds of Access Categories (AC) for channel-specific service differentiation. EDCA does not guarantee the channel-specific features and network state whereas it guarantees inter-AC differentiation by classifying into traffic features. Thus it is not possible to actively respond to a contention caused by network congestion occurring in a short moment in channel. As a solution, CWminAS(CWmin Adaptation Scheme) and ACATICT(Adaptive Contention window Adjustment Technique based on Individual Class Traffic) are proposed as active CW control techniques. In previous researches, the contention probabilities for each value of AC were not examined or a single channel based AC value was considered. And the channel-specific demands of IEEE 802.11p and the corresponding contention probabilities were not reflected in the studies. The study considers the collision number of a previous service section and the current network congestion proposes a dynamic control technique ACCW(Adaptive Control of Contention windows in considering the WAVE situation) for CW of the next channel.

A Design of Handoff-aware DiffServ Scheduler in TDD/CDMA Networks (TDD/CDMA망에서 핸드오프를 지원하는 DiffServ 스케줄러 설계)

  • Zang, Seog-Ku;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.493-502
    • /
    • 2007
  • In this paper, we propose a handoff-aware DiffServ scheduler which intends to guarantee various QoS requirements of multimedia services for mobile nodes in TDD/CDMA based wireless networks. TDD is widely used duplexing mechanism in wireless communications. Unlike FDD, TDD allows a node to symmetrically communicate with a base station by using a single frequency band, resulting in high utilization of wireless resources. DiffServ is regarded as a relatively simple QoS support mechanism and thus it is easy to be extended. This is because DiffServ is not a per-flow based mechanisms and it does not require any signaling protocol. However, previously proposed DiffServ schedulers for wired networks can not be deployed directly into wireless networks since they do not consider properties of wireless networks. As a solution to the problem, DSS(DiffServ Supporting Scheduler) was proposed. DSS uses uplink channel, which is originally used for a node to require a base station to transmit packets, to support QoS efficiently. However, QoS does not consider handoff so that it can not support QoS for moving nodes from one cell to the other cell. Therefor. the proposed handoff support QoS mechanism is necessary for TCC/CDMA networks. The proposed scheme allows a mobile node to achieve seamless service without QoS degradation even for the handoff duration.

A Study on Reliable Multicast Transmission using Recovery Cluster (복구 클러스터를 이용한 신뢰성 있는 멀티캐스트 전송에 관한 연구)

  • Gu, Myeong-Mo;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.1-6
    • /
    • 2019
  • Multicast is an efficient method for real-time transmission in many multimedia applications. It is important to recover lost packets and to manage multicast groups according to the network status in order to improve the reliability of multicast transmissions. In this paper, we propose a method that can efficiently recover lost packets in a large multicast group. In the proposed method, we create a recovery cluster (RC) using a multicast domain (MD) for recovery of lost packets. In the conventional methods, clusters send a request message for lost packets to the senders in order to recover the packets lost from many multicast applications. This increases packet delay time and overhead because of the feedback messages and retransmitted packets. In the proposed method, we improve these problems using the RC, which consists of many MDs (which have overlay multicast senders), and many cluster heads (CHs). We divide the message into blocks, and divide each block into many segments for packet recovery using the CHs. When packet loss occurs, all CHs share the segment information and recover the lost segments at the same time. Simulation results show that the proposed method could improve the packet recovery ratio by about 50% compared to the conventional methods.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Design of EPG Information Player System using DCT based Blind Watermark (DCT기반의 블라인드 워터마크를 이용한 EPG 정보 재생기 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.1-10
    • /
    • 2011
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents has also been widely spreading with recently starting IPTV. Generally, PC player can display digital contents obtained through middleware like a settop box and can only bring the informations about contents like CODEC, bitrate etc. useful for only experts. But general users want to know more optional informations like content's subject, description etc. So unlike previous PC player, we proposed a player system that can get inserted informations, namely EPG(Electronic Program Guide), without database after bringing contents to PC through settop box. In addition, we also proposed DCT(Discrete Cosine Transform) based blind watermark generating method to insert EPG informations. We can extract watermark without original image and insert robust watermark in proportion to coefficients in frequency domain. And we analyzed and parsed PSI data from MPEG-TS. So we could insert wanted information using watermark from EPG. And we composed UI by extracting EPG information from watermark interted contents. Finally we modularized whole system into the watermark insert/extract application and directshow filter based player. So we tried to design this system so that the general developer can do in a way that is easier and faster.

Investigation of Topic Trends in Computer and Information Science by Text Mining Techniques: From the Perspective of Conferences in DBLP (텍스트 마이닝 기법을 이용한 컴퓨터공학 및 정보학 분야 연구동향 조사: DBLP의 학술회의 데이터를 중심으로)

  • Kim, Su Yeon;Song, Sung Jeon;Song, Min
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.1
    • /
    • pp.135-152
    • /
    • 2015
  • The goal of this paper is to explore the field of Computer and Information Science with the aid of text mining techniques by mining Computer and Information Science related conference data available in DBLP (Digital Bibliography & Library Project). Although studies based on bibliometric analysis are most prevalent in investigating dynamics of a research field, we attempt to understand dynamics of the field by utilizing Latent Dirichlet Allocation (LDA)-based multinomial topic modeling. For this study, we collect 236,170 documents from 353 conferences related to Computer and Information Science in DBLP. We aim to include conferences in the field of Computer and Information Science as broad as possible. We analyze topic modeling results along with datasets collected over the period of 2000 to 2011 including top authors per topic and top conferences per topic. We identify the following four different patterns in topic trends in the field of computer and information science during this period: growing (network related topics), shrinking (AI and data mining related topics), continuing (web, text mining information retrieval and database related topics), and fluctuating pattern (HCI, information system and multimedia system related topics).

Design on Protection and Authentication System of IPTV Contents using OTP (OTP를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.129-137
    • /
    • 2009
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents protection and authentication system tends to draw more attentions. So we need a system that can protect contents and allow only authenticated person to use right service by controling user authority and using content encryption. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But the weak point of this system are in high costs, complexity and using HW. For resolving these problems, in this paper, we proposed IPTV contents protection and authentication system using OTP. When we transmit the content encrypted by OTP key using contents delivery technology, we operate XOR with contents using another settop-box's OTP key which was transmitted from distribution server. And contents are reconstructed and transmitted to the settop-box, In the end, downloaded content are encrypted by OTP key and are superior in content protection when contents redistribution. Since OTP use double-authentication elements in encryption process, this method is excellent in content protection. And it is very effective in cost aspect because it could be implemented by SW program. Another benefit is that we can shorten the development time period. In this paper, we propose and find its possibility as a new content protection and authentication method suitable for IPTV services.

A Study on the Usefulness of Spot Animation Character of Television Stations (방송사 Spot animation 캐릭터의 유용성에 관한 연구)

  • Youm, Dong-Cheol
    • Cartoon and Animation Studies
    • /
    • s.17
    • /
    • pp.53-67
    • /
    • 2009
  • According to the changes of current regulation of media, the broadcasting environment has been loosened by market power, and came into competitive era for broadcasting industry with new technology of combined broadcasting and communication. To resolve these issues, the broadcasting provides are trying process of new channel brand identity to introduce their channels. The purpose of the research is to analyze Spot animation that has fast access to viewers among channel brand identity factors, review expandability and usage of Spot animation character to plan, manage character that can improve awareness and loyalty. Therefore it will study creation background and production, activities of each character representing KBS and MBC, compare the structure, color, material, expression of Spot animation character and summarize properties. To conclusion, three characters of KBS and MBC failed to apply structured and professional plan and management, only expressed image that each channel pursue on Station ID Spot animation and had issues of not deeply sighting expandability and usefulness as a character. The important factor to improve channel brand value of broadcasting provider is to have differentiated identity, and the core of it is to make image-responsible Station ID to be effective. Therefore, Spot animation and character of Station ID is a very important factor so there must be professional research and structural management from the early planning and production for character that represents the providers.

  • PDF

A Study on the Successful Strategy for DAB : Focused on DAB Strategy in UK (DAB 성공전략에 관한 연구 - 영국 DAB전략을 중심으로 -)

  • Bae, Hong-Kyun
    • Korean Business Review
    • /
    • v.18 no.2
    • /
    • pp.133-149
    • /
    • 2005
  • DAB is meeting with mixed success. Denmark is performing similarly to the UK thanks to the innovation of the public broadcaster but where DAB is not so strong, the problem can usually be pointed at the lack of enabling regulation. The UK's example, whilst not appropriate everywhere, has valuable lessons including licensing incentives for existing analogue commercial broadcasters and a market-building obligation on the national multiplex licensee. Despite the obvious success of DAB, it would be an omission to leave some of the continued criticisms unanswered, whether of its slow start or the underlying technology. True, there was much over-optimism in the mid-1990s, coupled with unrealistic promises and expectations of receiver pricing and consumer take-up. Governments across Europe have legislated for DAB digital radio in a variety of ways but few as successfully as the UK. It is essential that both public and private broadcasters are encouraged equally to participate in digital radio. The UK is fortunate because, for the last 10 years, there has been a progressive government policy towards digital broadcasting. The 1996 Broadcasting Act set out a full licensing regime for both digital television and digital radio. The 1996 UK legislation contained a number of key elements which have been cornerstones of its success. DAB digital radio began test broadcasting around ten years ago but it has not been a universal consumer success across Europe. In the UK, however, digital radio receivers are one of the fastest-selling consumer electronics products and sales have overtaken those of analogue radios. Why has the UK succeeded with DAB digital radio when other European countries have yet to see their markets take off? This article explains what steps the UK took to make DAB digital radio a success.

  • PDF