• Title/Summary/Keyword: Digital Network

Search Result 3,852, Processing Time 0.032 seconds

Adaptive Intra Fast Algorithm of H.264 for Video Surveillance (보안 영상 시스템에 적합한 H.264의 적응적 인트라 고속 알고리즘)

  • Jang, Ki-Young;Kim, Eung-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12C
    • /
    • pp.1055-1061
    • /
    • 2008
  • H.264 is the prominent video coding standard in various applications such as real-time streaming and digital multimedia broadcasting, since it provides enhanced compression performance, error resilience tools, and network adaptation. Compression efficiency of H.264 has been improved, however, it requires more computing and memory access than traditional methods. In this paper we proposed adaptive intra fast algorithm for real-time video surveillance system reducing the encoding complexity of H264/A VC. For this aim, temporal interrelationship between macroblock in the previous and the current frame is used to decide the encoding mode of macroblock fast. As a result, though video quality was deteriorated a little, less than 0.04dB, and bit rate was somewhat increased in suggested method, however, proposed method improved encoding time significantly and, in particular, encoding time of an image with little changes of neighboring background such as surveillance video was more shortened than traditional methods.

Performance Analysis of Opportunistic Spectrum Access Protocol for Multi-Channel Cognitive Radio Networks

  • Kim, Kyung Jae;Kwak, Kyung Sup;Choi, Bong Dae
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2013
  • Cognitive radio (CR) has emerged as one of effective methods to enhance the utilization of existing radio spectrum. Main principle of CR is that secondary users (SUs) are allowed to use the spectrum unused by primary users (PUs) without interfering PU's transmissions. In this paper, PUs operate on a slot-by-slot basis and SUs try to exploit the slots unused by PUs. We propose OSA protocols in the single channel and we propose an opportunistic spectrum access (OSA) protocols in the multi-channel cognitive radio networks with one control channel and several licensed channels where a slot is divided into contention phase and transmission phase. A slot is divided into reporting phase, contention phase and transmission phase. The reporting phase plays a role of finding idle channels unused by PUs and the contention phase plays a role of selecting a SU who will send packets in the data transmission phase. One SU is selected by carrier sense multiple access / collision avoidance (CSMA/CA) with request to send / clear to send (RTS/CTS) mechanism on control channel and the SU is allowed to occupy all remaining part of all idle channels during the current slot. For mathematical analysis, first we deal with the single-channel case and we model the proposed OSA media access control (MAC) protocol by three-dimensional discrete time Markov chain (DTMC) whose one-step transition probability matrix has a special structure so as to apply the censored Markov chain method to obtain the steady state distribution.We obtain the throughput and the distribution of access delay. Next we deal with the multi-channel case and obtain the throughput and the distribution of access delay by using results of single-channel case. In numerical results, our mathematical analysis is verified by simulations and we give numerical results on throughput and access delay of the proposed MAC protocol. Finally, we find the maximum allowable number of SUs satisfying the requirements on throughput and access delay.

A Study of the Regional Industrial Ecosystem on Game Industry: Focused on Game Contents Business in Seongnam (게임 산업의 지역산업생태계 분석 연구 : 성남의 게임콘텐츠산업을 중심으로)

  • Leem, Eeksu;Woo, Tack
    • Journal of Korea Game Society
    • /
    • v.15 no.3
    • /
    • pp.107-122
    • /
    • 2015
  • The aim of this study is to suggest the strategy and policy to promote world class game industrial complex through the analysis of game contents business ecosystem in Seongnam. As a result of analysis, At present of the game contents industry in Seongnam as ecosystem is challenged in many-side as followings. 1)Lack of interaction between core game contents businesses and extended network businesses in same area. 2)Imbalanced relationships between game contents conglomerate and small and medium sized businesses. 3)Insufficient game contents optimized human resource and development program. This study provides a stepping stone for regional industrial ecosystem of game industry and new possibilities of application about regional industry analysis.

Software Design of Computerized Gas Safety Control System (컴퓨터에 의한 가스안전 제어시스템 소프트웨어 설계)

  • Kim Tae-Ok;Jou Wouseok;Park Hyunmin;Lee Hern-Chang;Chang Seo-Il
    • Journal of the Korean Institute of Gas
    • /
    • v.8 no.1 s.22
    • /
    • pp.30-36
    • /
    • 2004
  • Although the usage of gas as one of the most economical energy source is ever expanding, numerous gas accidents occur as a result of negligence in safety management. The main reason behind such accident is that the current safety control system relies heavily on the manual control mechanism. This paper designed and developed a prototype of a computerized gas safety control system that automates such critical functions as the alarm sensing and the valve control. Since the system is connected through a digital network, the control can be performed remotely. Most importantly, the accidental risk or damage can be greatly reduced since the system monitors and reacts actively to gas leakage in real time.

  • PDF

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

A Study on Encouragement Strategy of Electronic Commerce through Clothing Industry (의류산업을 통한 전자상거래 활성화 전략 방안 연구)

  • Seo, Shin-Lim;Lee, Hyun-Chang;Jin, Chan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.628-629
    • /
    • 2011
  • E-commerce is a kind of trade type between buyers and sellers rely on computer networks. Carried out according to certain standards of various business activities. e-commerce is based on modern information technology and network technology, financial electronic collection, management, information technology, business and trade information networks into one, aimed at logistics, capital flow and information flow of harmony and unity of the new trade, trade activities of the entire process, electronic, networking and digital. E-commerce has brought to the traditional ways of trading a huge impact, led to changes in economic structures, is a business revolution in the way and is recognized internationally as the 21st century is an important driver of economic development compared to current traditional companies. In this material, we first consider the current problem, analyze particular characteristics of clothing shopping mall to increase the purchasing power of customer. For these reasons, we describe the process for building the clothing site.

  • PDF

Priority Based Medium Access Control and Load Balancing Scheme for Shared Situational Awareness in Airborne Tactical Data Link (공중 전술 데이터링크에서 상황인식 공유를 위한 우선순위 기반 매체접속제어와 부하분산 기법)

  • Yang, Kyeongseok;Baek, Hoki;Park, Kyungmi;Lim, Jaesung;Park, Ji Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1210-1220
    • /
    • 2016
  • As modern warfare has changed into network centered, the ability to share situational awareness among allies become a core competency for performing operational missions. In an airborne environment, it uses a tactical data link such as Link-16 for shared situational awareness. There exist problems when it shares situational awareness over the existing data link that can not allocate slots dynamically or that can not change the number of a slot to be allocated. In addition, there was a problem that can not share this failure so that failed to improves situation awareness because of finite time slot resources. In this paper, we accommodate dynamic slot allocation and changes of slot allocation with mixed structure of TDMA (time division multiple access) and random access. We propose a technique that can be used when available slots are exhausted, and a load balancing method to prevent slot allocation delay when slot requesting or message sending is concentrated on a single subframe.

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

WebCam : A Web-based Remote Recordable Surveillance System using Index Search Algorithm (웹캠 : 새로운 인데스검색 알고리듬을 이용한 웹기반 원격 녹화 보안 시스템)

  • Lee, Myeong-Ok;Lee, Eun-Mi
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.9-16
    • /
    • 2002
  • As existing analog video surveillance systems could save and retrieve data only in a limited space within short distance, it had many constraints in developing into various application systems. However, on the back of development of the Internet and computer technologies, digital video surveillance systems can be controlled from a remote location by web browser without space limits. Moreover, data compression and management technologies with Index Search algorithm make it possible to efficiently handling, storing, and retrieving a large amount of data and further motion detection algorithm enhances a recording speed and efficiency for a practical application, that is, a practical remote recordable video surveillance system using our efficient algorithms as mentioned, called WebCam. The WebCam server system can intelligently record and save video images digitized through efficient database management, monitor and control cameras in a remote place through user authentication, and search logs.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.