• 제목/요약/키워드: Call Quality

Search Result 381, Processing Time 0.021 seconds

Development of the IP-PBX with VPN function for voice security (VPN 기능을 가진 음성 보안용 IP-PBX 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.63-69
    • /
    • 2010
  • Today, Internet Telephony Services based on VoIP are gaining tremendous popularity for general user. Therefore a various demands of the user keep up increase, the most important requirements of these is voice security about telephony system. It is needed to ensure secret of voice call in a special situation. Due to the fact that many users can connect to the internet at the same time, VoIP can always be in a defenseless state by hackers. Therefore, in this paper, we have developed VPN IP-PBX for the voice security and measured conversation quality by adopting VPN IPsec based on SIP and using tunnel method in transmitting voice data to prevent eavesdrop of voice data. This VPN IP-PBX that is connected Soft-phone provide various optional services.

Design and Implementation of effective ECC Encryption Algorithm for Voice Data (음성 데이터 보안을 위한 효율적인 ECC 암호 알고리즘 설계 및 구현)

  • Kim, Hyun-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2374-2380
    • /
    • 2011
  • Many people is preferred to mVoIP which offers call telephone-quality and convenient UI as well as free of charge. On the other hand, security of mVoIP is becoming an issue as it using Internet network may have danger about wiretapping. Although traditionally encryption algorithm of symmetric key for security of voice data has been used, ECC algorithm of public key type has been preferring for encryption because it is stronger in part the strength of encryption than others. However, the existing way is restricted by lots of operations in poor mobile environment. Thus this paper proposes the efficiency of resource consumption way by reducing cryptographic operations.

Improvement and Performance Evaluation of the Traffic Channel Management of the Radio Network Controller in IMT-2000 Network (IMT-2000 망에서 제어국의 트래픽 채널 관리 방식의 개선 및 성능 평가)

  • Ryu, Byung-Han;Ahn, Jee-Hwan;Baek, Jang-Hyun
    • IE interfaces
    • /
    • v.16 no.3
    • /
    • pp.311-321
    • /
    • 2003
  • We propose the improved channel assignment and management methods for an efficient use of traffic channel resource for supporting 12.2 Kbps, 64 Kbps, and 384 Kbps traffic with the different quality of service(QoS) in the radio network controller(RNC) in asynchronous IMT-2000 system. We consider two types of traffic channel block assignments for utilizing the traffic channel efficiently; the Completely Shared(CS) channel assignment and the Partially Dedicated and Partially Shared(PDPS) channel assignment. The former is that all traffic channel blocks are completely shared with all traffic types. The latter is that some traffic channel block is independently assigned to each traffic type and the other blocks are completely shared with some traffic type. We also propose the traffic channel management method which consists of the block and task management step, for efficiently assigning, releasing, and managing the channel resource. Finally, we evaluate the performance through various numerical examples when applying our proposed channel block assignment and resource management methods.

Fire Safety Administration Way of Tradition Buddhist Temple Cultural Heritage (전통사찰 문화재의 화재안전 관리방안에 관한 고찰)

  • Shin, Min-Seob;Kong, Ha-Sung
    • Journal of Conservation Science
    • /
    • v.23
    • /
    • pp.119-124
    • /
    • 2008
  • Have difficult controversial point to suppress fire effectively by geographical special quality that fire is transmitted and is during the mountain with the fast speed if our country's tradition Buddhist temple makes of most wood and most of construction structure of country importance tradition Buddhist temple are ignited once because combustibility is high as wood. By fire safety supervision improvement way of tradition Buddhist temple cultural heritage in this treatise law and systematic side, Side that is construction room robbers, disaster and prevention of disasters basis system construction and stream tube engine combination check, training courtesy call activity reinforcement present.

  • PDF

Development of the Basic Life Support App Including Chest Compression Feedback (흉부압박 피드백 기능이 포함된 기본소생술 앱 개발)

  • Song, Yeongtak;Kim, Minwoo;Kim, Jinsung;Oh, Jaehoon;Chee, Youngjoon
    • Journal of Biomedical Engineering Research
    • /
    • v.35 no.6
    • /
    • pp.219-226
    • /
    • 2014
  • This study is to develop a basic life support (BLS) app using the android based smartphone and to evaluate the function of the app. Suggested app contains chest compression feedback function, the map of automated external defibrillator (AED), direct emergency call and the basic knowledge of BLS. Using the accelerometer of the smartphone, we implemented a real-time algorithm that estimates the chest compression depth and rate for high quality cardiopulmonary resuscitation (CPR). The accuracy of algorithm was evaluated by manikin experiment. We made contents which were easy to learn the BLS for the layperson and implemented a function that provides the AED location information based on the user's current location. From the manikin experiment, the chest compression depth and rate were no significant differences between the manikin data and the app's feedback data (p > 0.05). Developed BLS app was uploaded on Google Play Store and it was free to download. We expected that this app is useful to learn the BLS for the layperson.

A Flow-based Detection Method for VoIP Anomaly Traffic (VoIP 이상 트래픽의 플로우 기반 탐지 방법)

  • Son, Hyeon-Gu;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.263-271
    • /
    • 2010
  • SIP/RTP-based VoIP services are being popular. Recently, however, VoIP anomaly traffic such as delay, interference and termination of call establishment, and degradation of voice quality has been reported. An attacker could intercept a packet, and obtain user and header information so as to generate an anomaly traffic, because most Korean VoIP applications do not use standard security protocols. In this paper, we propose three VoIP anomaly traffic generation methods for CANCEL;BYE DoS and RTP flooding, and a detection method through flow-based traffic measurement. From our experiments, we showed that 97% of anomaly traffic could be detected in real commercial VoIP networks in Korea.

Novel Home Network QoS Mechanism for the High-Definition IPTV Service based on Multicast Traffic (멀티캐스트기반 고화질 IPTV 서비스를 위한 홈네트워크 품질보장 기법)

  • Park, Minho;Jeong, Yeonjoon;Paik, Euihyoun;Park, Kwangroh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.1
    • /
    • pp.17-23
    • /
    • 2007
  • The home network has been revitalized due to the emergence of the high-speed broadband network and explosive increases of the home network services. Especially multicast based high-definition (HD) IPTV service is on high demand from both Internet service provider (ISP) and users. In order to provide high quality HD IPTV service without packet loss and delay, the ISP utilizes various network QoS mechanisms. Due to the misleading fact, that the home gateway is considered as an end terminal in terms of the ISP's viewpoint, the ISPs can not guarantee the end-to-end QoS within the scope of the current home network architecture. Therefore, an independent QoS guaranteed mechanism should be considered within the home network domain. As the home gateway manages both private home and public access network within the home network, we propose and implement a novel QoS mechanism for the multicast based HD IPTV service over the home gateway. In order to provide QoS guaranteed HD IPTV service, the proposed mechanism classifies the packets, manages home network bandwidth resources, and executes call admission control using the channel join message. Also, we utilize layer 2 multicast packet forwarding scheme to improve the overall performance of the home network services. Through the experiments of implementing the multicast based HD IPTV services, we will verify the efficiency of the proposed mechanism.

  • PDF

A Comparative Study of Precedence-Preserving Genetic Operators in Sequential Ordering Problems and Job Shop Scheduling Problems (서열 순서화 문제와 Job Shop 문제에 대한 선행관계유지 유전 연산자의 비교)

  • Lee, Hye-Ree;Lee, Keon-Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.5
    • /
    • pp.563-570
    • /
    • 2004
  • Genetic algorithms have been successfully applied to various optimization problems belonging to NP-hard problems. The sequential ordering problems(SOP) and the job shop scheduling problems(JSP) are well-known NP-hard problems with strong influence on industrial applications. Both problems share some common properties in that they have some imposed precedence constraints. When genetic algorithms are applied to this kind of problems, it is desirable for genetic operators to be designed to produce chromosomes satisfying the imposed precedence constraints. Several genetic operators applicable to such problems have been proposed. We call such genetic operators precedence-preserving genetic operators. This paper presents three existing precedence-preserving genetic operators: Precedence -Preserving Crossover(PPX), Precedence-preserving Order-based Crossover (POX), and Maximum Partial Order! Arbitrary Insertion (MPO/AI). In addition, it proposes two new operators named Precedence-Preserving Edge Recombination (PPER) and Multiple Selection Precedence-preserving Order-based Crossover (MSPOX) applicable to such problems. It compares the performance of these genetic operators for SOP and JSP in the perspective of their solution quality and execution time.

A proxy driving system supporting user convenience and system efficiency (사용자 편의성과 시스템 효율성을 지원하는 대리운전 시스템)

  • Koh, Jeong-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1725-1733
    • /
    • 2012
  • This paper describes the design and implementation of a 3-tiered proxy driving system utilizing smartphones. This system provides customers with a convenient request facility, and enables proxy drivers to provide a prompt service based on customer's location information. Implemented system supports two methods such as the existing phone-call and the online requesting method using smartphones. Performance analysis shows that the higher the ratio of online requests, the greater the effect of decreasing of phone jockey's workloads and the reduction of request processing time through the automation of receipt and processing. From a proxy driver company's standpoint, this system minimizes the increase of phone jockeys, and improves customer satisfaction through good service quality. This system also helps the company reduce the cost and increase the market share.

A Robust Wavelet-Based Digital Watermarking Using Statistical Characteristic of Image and Human Visual System

  • Kim, Bong-Seok;Kwon, Kee-Koo;Kwon, Seong-Geun;Park, Kyung-Nam
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1019-1022
    • /
    • 2002
  • The current paper proposes a wavelet-based digital watermarking algorithm using statistical characteristic of image and human visual system (HVS). The original image is decomposed into 4-level using a discrete wavelet transform (DWT), then the watermark is embedded into the perceptually significant coefficients (PSCs) of the image. In general, the baseband of a wavelet-decomposed image includes most of the energy of the original image, thereby having a crucial effect on the image quality. As such, to retain invisibility, the proposed algorithm does not utilize the baseband. Plus, the wavelet coefficients on the lowest level are also excluded in the watermark-embedding step, because these coefficients call be easily eliminated and modified by lossy compression and common signal processing. As such, the PSCs are selected from all subbands, except for the baseband and subbands on the lowest level. Finally, using the selected PSCs, the watermark is then embedded based on spatial masking of the wavelet coefficients so as to provide invisibility and robustness. Computer simulation results confirmed that the proposed watermarking algorithm was more invisible and robust than conventional algorithms.

  • PDF