• Title/Summary/Keyword: Communication Protocol

Search Result 3,985, Processing Time 0.025 seconds

Analysis on designer's cognitive thinking process in 3D animation design (3D 애니메이션 제작을 위한 디자이너의 인지적 사고과정 분석)

  • Kim, Kie-Su
    • Cartoon and Animation Studies
    • /
    • s.20
    • /
    • pp.1-14
    • /
    • 2010
  • The success of a three-dimensional blockbuster movie, AVARTA, brought an public attention on the expansion of three-dimensional computer applications, and it allows experts predict further hardware technology developments to support the such applications. Futhermore, an internet based infra structure and three-dimensional structure, third generation network community, advanced computer networks have influenced advancement in computer technology within the 3D game industry and the spread of 2D computer animation technologies. This advancement of computer technologies allow the industry to overcome a limitation of generating cultural design contexts existed within 2D network community. However, despite of the expansion of 2D and 3D computer technologies, a limitation of analysing designers' intentions on morphology of digital contents and user interface still exists. Therefore, the purpose of this study is to analyze (1) present conditions of the 3D industry and (2) protocols of designers' cognitive design processes based on their design communication, contents, and tools. Analysis was conducted based on literature reviews and case precedent analyses. For the analysis, a 2D Avarta sketch character was designed and then applied into a 3D game system. Observations how designers solve cultural problem within the structure via Avarta were conducted. Outcomes were then coded for further analysis.

  • PDF

A New Optical Access Network Structure for the convergence of Broadcast and Communication (방송통신 통합을 위한 새로운 광가입자망 구조에 관한 연구)

  • Hur Jung;Koo Bon-Jeong;Hyun Jae-Myoung;Park Youngil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.17-20
    • /
    • 2004
  • 가정 내에 방송과 총신을 통합하여 제공하기 위한 방법으로서 수동광가입자망(Passive Optical Network)이 제안되고 있다 이를 구현하기 위해 여러 방식들이 연구되고 있는데 크게는 방송과 통신에 각기 다른 파장을 이용하는 방식과, 이들을 시간 다중화 하여 한 개의 과장으로 송신하는 방식으로 나눌 수 있다. 또한 동신에 이용하는 과장의 경우 각 가입자에게 다른 파장을 적용하는 WPON 방식과 모든 가입자에게 한 개의 파장만을 이용하되 시간영역에서 다중화하고 이터넷 프로토콜을 적용하는 EPON 방식으로 구분할 수 있다. WPON의 경우 EPON에 비해 수월하게 광대역 서비스를 할 수 있는 장점이 있으나, 각 가입자 과장의 제어 및 관리가 복잡하며, 고비용을 요구한다. 반면 EPON의 경우 채널의 효율성은 극대화할 수 있으나, 동시 이용자가 많을 경우 전송 속도가 하락한다. 한편, 방송과 통신을 통합한 채널의 특성을 살펴보면 가입자 방향으로의 하향 신호의 양이 중양국 방향으로의 상향 신호의 양에 비해 훨씬 많은 비대칭 구조이다. 따라서 본 연구에서는 이러한 채널 특성에 맞도록 하향 전송에는 WPON의 구조를 이용하고, 상향 전송에는 EPON의 구조를 적용하는 새로운 구조의 광가입자망을 제안하였다. 제안된 구조에 적합한 MPCP (Multi-Point Control Protocol) 프로토콜을 제시하고, 가입자 장치의 여러 종속 신호를 다중화하고 전송할 수 있는 ONU (Optical Network Unit)의 구조를 제안하였다. 또한 이러한 구조를 갖는 W-EPON 테스트베드를 구현하고 전송 시험을 통해 제시된 구조의 적합성을 측정한 결과를 보인다.4 Textual format) 파일을 생성한다. 또한, 콘텐츠 전송 및 저장의 효율성을 위해 이진 포멧인 IPMP화된 MP4 파일을 생성할 수 있다.으로써, 에러 이미지가 가지고 있는 엔트로피에 좀 근접하게 코딩을 할 수 있게 되었다. 이 방법은 실제로 Arithmetic Coder를 이용하는 다른 압축 방법에 그리고 적용할 수 있다. 실험 결과 압축효율은 JPEG-LS보다 약 $5\%$의 압축 성능 개선이 있었으며, CALIC과는 대등한 압축률을 보이며, 부호화/복호화 속도는 CALIC보다 우수한 것으로 나타났다.우 $23.87\%$($18.00\~30.91\%$), 갑폭 $23.99\%$($17.82\~30.48\%$), 체중 $91.51\%$($58.86\~129.14\%$)이였으며 성장율은 사육 온도구간별 차는 없었다.20 km 까지의 지점들(지점 2에서 지점 6)에서 매우 높은 값을 보이며 이는 조석작용으로 해수와 담수가 강제혼합되면서 표층퇴적물이 재부유하기 때문이라고 판단된다. 영양염류는 월별로 다소의 차이는 있으나, 대체적으로 지점 1과 2에서 가장 낮고, 상류로 갈수록 점차 증가하며 지점 7 상류역이 하류역에 비해 높은 농도이다. 월별로는 7월에 규산염, 용존무기태질소 및 암모니아의 농도가 가장 높은 반면에 용존산소포화도는 가장 낮다. 그러나 지점 14 상류역에서는 5월에 측정한 용존무기태질소, 암모니아, 인산염 및 COD 값이 7월보다 다소 높거나 비슷하다. 한편 영양염류와 COD값은 대체적으로 8월에 가장 낮으나

  • PDF

A Utility-Based Hybrid Error Recovery Scheme for Multimedia Transmission over 3G Cellular Broadcast Networks (3G 방송망에서의 효율적인 멀티미디어 전송을 위한 유틸리티 기반 하이브라드 에러 복구기법)

  • Kang Kyung-Tae;Cho Yong-Jin;Cho Yong-Woo;Cho Jin-Sung;Shin Heon-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.333-342
    • /
    • 2006
  • The cdma2000 lxEV - DO mobile communication system provides broadcast and multicast services (BCMCS) to meet an increasing demand from multimedia data services. The servicing of video streams over a BCMCS network must, however, face a challenge from the unreliable and error-prone nature of the radio channel. The BCMCS network uses Reed-Solomon coding integrated with the MAC protocol for error recovery. We analyze this coding technique and show that it is not effective in the case of slowly moving mobiles. To improve the playback quality of an MPEG-4 FGS video stream, we propose the Hybrid error recovery scheme, which combines Reed-Solomon with ARQ, using slots which are saved by reducing the Reed-Solomon coding overhead. The target packets to be retransmitted are prioritized by a utility function to reduce the packet error rate in the application layer within a fixed retransmission budget. This is achieved by considering of the map of the error control block at each mobile node. The proposed Hybrid error recovery scheme also uses the characteristics of MPEG-4 FGS (fine granularity scalability) to improve the video quality even when conditions are adverse: slow-moving nodes and a high error rate in the physical channel.

Design of Multimode Block Cryptosystem for Network Security (네트워크 보안을 위한 다중모드 블록암호시스템의 설계)

  • 서영호;박성호;최성수;정용진;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1077-1087
    • /
    • 2003
  • In this paper, we proposed an architecture of a cryptosystem with various operating modes for the network security and implemented in hardware using the ASIC library. For configuring a cryptosystem, the standard block ciphers such as AES, SEED and 3DES were included. And the implemented cryptosystem can encrypt and decrypt the data in real time through the wired/wireless network with the minimum latency time (minimum 64 clocks, maximum 256 clocks). It can support CTR mode which is widely used recently as well as the conventional block cipher modes such as ECB, CBC and OFB, and operates in the multi-bit mode (64, 128, 192, and 256 bits). The implemented hardware has the expansion possibility for the other algorithms according to the network security protocol such as IPsec and the included ciphering blocks can be operated simultaneously. The self-ciphering mode and various ciphering mode can be supported by the hardware sharing and the programmable data-path. The global operation is programmed by the serial communication port and the operation is decided by the control signals decoded from the instruction by the host. The designed hardware using VHDL was synthesized with Hynix 0.25$\mu\textrm{m}$ CMOS technology and it used the about 100,000 gates. Also we could assure the stable operation in the timing simulation over 100㎒ using NC-verilog.

A Distributed address allocation scheme based on three-dimensional coordinate for efficient routing in WBAN (WBAN 환경에서 효율적인 라우팅을 위한 3차원 좌표 주소할당 기법의 적용)

  • Lee, Jun-Hyuk
    • Journal of Digital Contents Society
    • /
    • v.15 no.6
    • /
    • pp.663-673
    • /
    • 2014
  • The WBAN technology means a short distance wireless network which provides each device interactive communication by connecting devices inside and outside of body. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. Wireless body area network is usually configured in energy efficient using sensor and zigbee device due to the power limitation and the characteristics of human body. Wireless sensor network consist of sensor field and sink node. Sensor field are composed a lot of sensor node and sink node collect sensing data. Wireless sensor network has capacity of the self constitution by protocol where placed in large area without fixed position. In this paper, we proposed the efficient addressing scheme for improving the performance of routing algorithm by using ZigBee in WBAN environment. A distributed address allocation scheme used an existing algorithm that has wasted in address space. Therefore proposing x, y and z coordinate axes from divided address space of 16 bit to solve this problems. Each node was reduced not only bitwise but also multi hop using the coordinate axes while routing than Cskip algorithm. I compared the performance between the standard and the proposed mechanism through the numerical analysis. Simulation verified performance about decrease averaging multi hop count that compare proposing algorithm and another. The numerical analysis results show that proposed algorithm reduced the multi hop better than ZigBee distributed address assignment

Assessing the Real-time Positioning Accuracy of Low-cost GPS Receiver using NTRIP-based Augmentation Service (Ntrip 기반 보정서비스를 활용한 저가 GPS 수신기의 실시간 측위 정확도 평가)

  • Lee, Yong Chang
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.3
    • /
    • pp.31-39
    • /
    • 2015
  • This paper presents the static and kinematic positioning accuracy by the real-time GPS positioning modes of the low-cost GPS receivers using NTRIP-based augmentation service. For this, acquires both the raw measurements data of the field tests by LEA 6T GPS module of u-blox AG, and correction communication via NTRIP caster with RTKLIB as an open source program for GNSS solution. With computing the positions of the check points and road tracks by six kinds of GPS positioning modes which are Single, SBAS, DGPS, PPP, RTK, and TCP/IP_RTK, compared these results to the reference position of the check points. The position error average and rmse of the static test by GPS L1 RTK surveying showed $N=0.002m{\pm}0.001m$, $E=0.004m{\pm}0.001m$ in horizontal plane, and $h=-0.116m{\pm}0.003m$ in vertical, these results are very closed to the coordinates with the geodetic receiver. Especially, in case of the kinematic test with obstacles located on both sides of road, the computed track with ambiguity fixing showed very similar trajectory considerably from VRS network RTK mode. And also, evaluate and verify the performance of the TCP/IP_RTK mode developed based on TCP/IP protocol.

Development of Network Based MT Data Processing System (네트워크에 기반한 MT자료의 처리기술 개발 연구)

  • Lee Heuisoon;Kwon Byung-Doo;Chung Hojoon;Oh Seokhoon
    • Geophysics and Geophysical Exploration
    • /
    • v.3 no.2
    • /
    • pp.53-60
    • /
    • 2000
  • The server/client systems using the web protocol and distribution computing environment by network was applied to the MT data processing based on the Java technology. Using this network based system, users can get consistent and stable results because the system has standard analysing methods and has been tested from many users through the internet. Users can check the MT data processing at any time and get results during exploration to reduce the exploration time and money. The pure/enterprised Java technology provides facilities to develop the network based MT data processing system. Web based socket communication and RMI technology are tested respectively to produce the effective and practical client application. Intrinsically, the interpretation of MT data performing the inversion and data process requires heavy computational ability. Therefore we adopt the MPI parallel processing technique to fit the desire of in situ users and expect the effectiveness for the control and upgrade of programing codes.

  • PDF

IAM Architecture and Access Token Transmission Protocol in Inter-Cloud Environment (Inter-Cloud 환경에서의 IAM 구조 및 액세스 토큰 전송 프로토콜)

  • Kim, Jinouk;Park, Jungsoo;Yoon, Kwonjin;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.573-586
    • /
    • 2016
  • With the adoption of cloud computing, the number of companies that take advantage of cloud computing has increased. Additionally, various of existing service providers have moved their service onto the cloud and provided user with various cloud-based service. The management of user authentication and authorization in cloud-based service technology has become an important issue. This paper introduce a new technique for providing authentication and authorization with other inter-cloud IAM (Identity and Access Management). It is an essential and easy method for data sharing and communication between other cloud users. The proposed system uses the credentials of a user that has already joined an organization who would like to use other cloud services. When users of a cloud provider try to obtain access to the data of another cloud provider, part of credentials from IAM server will be forwarded to the cloud provider. Before the transaction, Access Agreement must be set for granting access to the resource of other Organization. a user can access the resource of other organization based on the control access configuration of the system. Using the above method, we could provide an effective and secure authentication system on the cloud.

The Transmission of Tele-Information System using BlueTooth (블루투스를 이용한 웹으로의 원격 의료정보 전송 시스템)

  • 채희영;강형원;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.130-133
    • /
    • 2002
  • As a society advances, an aging phenomenon and many diseases which did not exist in old times are happening. Especially, in case of the aged patient, because we cant know the time the condition of the patients health become worse, the study of the Tele-information system has been actively carried out by the necessity of a persistent observation. A ECG signal a kind of a vital signals has been widely used to the medical information system as an usual clinical diagnosis for the patients who possess heart diseases. BlueTooth is a close range wireless communication technology which uses a wireless frequency 2.4GHz and has a high trust and self - error correction technology according to a low power consumption quality and a high-speed frequency hopping. This makes get a high trust concerning a data transmission than an existing modem. In addition, though wireless modem is restricted by a minimal of a wireless terminal, It will be possible to coincide with the function of the portable with the low power consumption quality by using Bluetooth. And as the system on a chip of module progresses, the possibility of the small size is present According to this, Bluetooth module transmits the medical information, which is input from the outside among the operations that use the Bluetooth to the Bluetooth module that is connected the host PC. And the system that the host PC transmits the medical information from the connected Bluetooth module to the Internet has once embedded. this study let the host PC embedded in advance of the existing system and transmit the medical information by the addition of the Tcp/Ip protocol stark under all embedded environments to internet.

  • PDF

A Formal Modeling of Managed Object Behaviour with Dynamic Temporal Properties (동적 시간지원 특성을 지원하는 망관리 객체의 정형적 모델링)

  • Choi, Eun-Bok;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.166-180
    • /
    • 2000
  • Recommendations of ITU-T and ISO stipulate the managerial abstraction of static and dynamic characteristics of network elements, management functions as well as management communication protocol. The current recommendations provide the formal mechanism for the structural parts of managed objects such as managed object class and attributes. But the current description method does not provide the formal mechanism for the behavioral characteristics of managed objects in clear manner but in natural language form, the complete specification of managed objects is not fully described. Also, the behaviour of managed objects is affected by their temporal and active properties. While the temporal properties representing periodic or repetitive internals are to describe managed objects behaviour in rather strict way, it will be more powerful if more dynamic temporal properties determined by external conditions are added to managed objects. In this paper, we added dynamic features to scheduling managed objects, and described, in GDMO, scheduling managed objects that support dynamic features. We also described behaviour of managed objects in newly defined BDL that has dynamic temporal properties. This paper showed that dynamic temporal managed objects provide a systematic and formal method in agent management function model.

  • PDF