• Title/Summary/Keyword: Distributed Multimedia Systems

검색결과 153건 처리시간 0.024초

Connection Management Scheme using Mobile Agent System

  • Lim, Hee-Kyoung;Bae, Sang-Hyun;Lee, Kwang-Ok
    • 통합자연과학논문집
    • /
    • 제11권4호
    • /
    • pp.192-196
    • /
    • 2018
  • The mobile agent paradigm can be exploited in a variety of ways, ranging from low-level system administration tasks to middle ware to user-level applications. Mobile agents can be useful in building middle-ware services such as active mail systems, distributed collaboration systems, etc. An active mail message is a program that interacts with its recipient using a multimedia interface, and adapts the interaction session based on the recipient's responses. The mobile agent paradigm is well suitable to this type of application, since it can carry a sender-defined session protocol along with the multimedia message. Mobile agent communication is possible via method invocation on virtual references. Agents can make synchronous, one-way, or future-reply type invocations. Multicasting is possible, since agents can be aggregated hierarchically into groups. A simple check-pointing facility has also been implemented. Another proposed solution is to use multi agent computer systems to access, filter, evaluate, and integrate this information. We will present the overall architectural framework, our agent design commitments, and agent architecture to enable the above characteristics. Besides, the each information needed a mobile agent system such as text, graphic, image, audio and video etc, constructed a great capacity multimedia database system. However, they have problems in establishing connections over multiple subnetworks, such as no end-to-end connections, transmission delay due to ATM address resolution, no QoS protocols. We propose a new connection management scheme in the thesis to improve the connection management involved of mobile agent systems.

유연성을 갖는 분산 해쉬 테이블 기반의 피어 투 피어 인터넷 텔레포니 서비스의 구현 (Implementation of a Flexible Peer-to-Peer Internet Telephony Service Using an Underlying DHT)

  • 이주호;김재봉;정충교
    • 산업기술연구
    • /
    • 제26권B호
    • /
    • pp.199-206
    • /
    • 2006
  • Internet telephony provides voice communication services with added flexibility for multimedia extension at a lower cost compared to traditional telephone systems. We implemented an internet telephony system as an overlay network without a centralized server, using a distributed hash table (DHT). Compared to the current server-based internet telephony system, our system is fault-tolerant, scalable, and can be flexible extended to various services and advanced to integrated service. To demonstrate the high flexibility of our DHT-based internet telephony system, we made our system cooperate with web servers. Web users can check up others' online stales and establish voice communication sessions to online users at a mouse click. This technology can be applied to more complex services such as multimedia messaging or video conference service.

  • PDF

SOAP 기반의 메시지 Broker 시스템 설계 및 구현 (Designing and Implementing Message Broker System based on SOAP)

  • 김용수;주경수
    • 한국멀티미디어학회논문지
    • /
    • 제6권6호
    • /
    • pp.1071-1078
    • /
    • 2003
  • SOAP(Simple Object Access Protocol)은 분산 환경에서의 정보 교환에 사용되는 분산 컴퓨팅 프로토콜로 분산 시스템간에 메시지를 전달하는 방법, 원격 프로시저 호출/응답을 처리하는 방법을 정의하고 있다 이러한 SOAP 는 텍스트 기 반 XML을 프로토콜로 사용하고 있기 때문에 하드웨어 플렛폼, 운영체제 프로그래밍언어에 독립적으로 사용할 수 있다. 메시지 Broker 시스템은 SOAP을 이용하여 기업과 기업간의 메시지전송을 담당하게 된다. 본 논문에서 SOAP을 기반으로 한 메시지 Broker 시스템을 설계 및 구현하였다. Broker 시스템을 통한 메시지 전송으로 많은 비즈니스 파트너를 통합관리 할 수 있을 것이다.

  • PDF

Analysis of a Decentralized Mobility Management Support for u-City Wireless Network Infrastructure

  • Caytiles, Ronnie D.;Park, Byungjoo
    • 한국정보기술학회 영문논문지
    • /
    • 제10권2호
    • /
    • pp.73-81
    • /
    • 2020
  • The number of mobile devices roaming into a ubiquitous city (u-city) continues to rise as wireless systems have been widely deployed. The number of mobile devices also varies with time, and they tend to frequently change their locations. In addition, the available wireless access networks may belong to different domains, administrations, management, and internet service providers (ISPs). A fusion of overlapping heterogeneous wireless access networks (e.g., WiMax, Wi-Fi, LTE, etc.) serves the u-city in order to reach different coverage. In this context, technical challenges arise in mobility management for heterogeneous networks to realize their potential coverage and capacity benefits. This paper deals with the analysis of a decentralized mobility management support for u-City wireless network infrastructure. This scheme takes advantage of the features of the fully-distributed model of networked-based mobility management protocol to alleviate and realize the ubiquitous requirements of a u-City.

마이크로인버터를 적용한 태양광 발전시스템 노후예측판단에 관한 연구 (Study on the Obsolescence Forecasting Judgment of PV Systems adapted Micro-inverters)

  • 박찬곤
    • 한국멀티미디어학회논문지
    • /
    • 제18권7호
    • /
    • pp.864-872
    • /
    • 2015
  • The purpose of this study is to design the algorithm, Predictive Service Component - PSC, for forecasting and judging obsolescence of solar system that is implemented based on the micro-inverter. PSC proposed in this study is suitable for monitoring of distributed power generation systems. It provides a diagnosis functionality to detect failures and anomaly events. It also can determine the aging of PV systems. The conclusion of this study shows the research and development of this kind of integrated system using PSC will be needed more and varied in the near future.

The Design of Integrated Flying Vehicle Model for Engagement Analyses of Missiles

  • Ha, Sue Hyung
    • 한국멀티미디어학회논문지
    • /
    • 제22권8호
    • /
    • pp.930-939
    • /
    • 2019
  • High-Level Architecture(HLA)/Run-Time Infrastructure(RTI) are standards for distributed simulation systems and offer a technology to interconnect them and form one single simulation system. In defense domain, M&S is the only way to prove effectiveness of weapon systems except for Live Fire Testing (LFT). This paper focuses on guided missile simulations in weapon systems for engagement analyses and proposes the integrated flying vehicle model that is based on HLA/RTI. There are a lot of missiles in real world; therefore, we should develop each missile models in M&S in order to apply battlefield scenarios. To deal with the difficulties, in this paper, firstly, I classify these missiles into three models: ballastic, cruise, and surface-to-air missile models, and then I design each missile model and integrates them into a single model. This paper also offers a case study with my integrated flying vehicle model. At the conclusion, this paper presents contributions of this paper.

Multimedia Room Bridge Adapter for Seamless Interoperability between Heterogeneous Home Network Devices

  • Lee, Myung-Jin;Chung, Gi Hoon;Kang, Soon-Ju
    • 대한임베디드공학회논문지
    • /
    • 제1권2호
    • /
    • pp.43-55
    • /
    • 2006
  • A home network is a typical ubiquitous computing network that consists of various consumer devices and service environments. Home networks are requiring increasingly more complicated services, such as multimedia home theater and the monitoring and controlling of heterogeneous devices. Accordingly, a mutually connecting mechanism is needed among heterogeneous devices and services redundant. The current paper presents a Multimedia Room Bridge Adapter (MRBA) system that is designed to manage heterogeneous devices and support various services. In addition, a hardware and software prototype is implemented based on the proposed architecture.

  • PDF

트래픽 감지를 통한 최적 경로 탐색 이동 에이전트 모델 설계 및 구현 (Design and Implementation of Mobile Agent Model Supporting the Optimal Path Search through Traffic Sense)

  • 김광종;고현;김영자;이연식
    • 한국멀티미디어학회논문지
    • /
    • 제7권10호
    • /
    • pp.1421-1435
    • /
    • 2004
  • 기론 이동 에이전트 모델은 사용자로부터 다양한 작업을 부여 받았을 때, 수동적 라우팅 스케줄 지정에 따라 많은 트래픽이 발생한 시점에서 노드 간을 이주하며 작업을 처리한 후 작업 결과를 서비스하기까지 분산 노드들에 대한 순회 작업 처리 시간 비용이 증가하게 된다. 따라서 기존 이동 에이전트 시스템들은 에이전트 시스템들 간의 에이전트의 크기 증가나 상호 호환성 결여를 해결하기 위한 이주 기법이 요구된다. 이에 본 논문에서는 이동 에이전트의 노드 이주시 네트워크 트래픽 감지를 통한 최적 경로 탐색에 의해 분산된 노드들로의 호율적 작업 처리를 위한 CORBA 기반의 이동 에이전트 모델(CORBA-based Mobile Agent Model : CMAM)을 설계 및 구현한다.

  • PDF

홈 네트워크 환경에서 원격 교육을 위한 결함 복구 에이전트 (A Fault-Recovery Agent for Distance Education on Home Network Environment)

  • 고응남
    • 한국항행학회논문지
    • /
    • 제11권4호
    • /
    • pp.479-484
    • /
    • 2007
  • 본 논문은 FRA(Fault Recovery Agent)의 설계와 구축을 설명한다. FRA는 홈 네트워크 환경에서 멀티미디어 원격 교육을 위한 소프트웨어 오류를 복구하기에 적합한 에이전트이다. 분산 멀티미디어 시스템 견지에서 보면, QoS의 가장 중요한 범주는 시간성, 볼륨, 신뢰성이다. 본 논문에서는 결함 허용을 통해서 신뢰성을 향상시키는 방법에 대해서 기술한다. 본 논문은 규칙-기반 DEVS 모델링과 시뮬레이션 기법을 사용하면서 분산 멀티미디어 상에서의 오류 복구 시스템의 성능 분석을 설명한다. DEVS에서 하나의 시스템은 시간, 입력, 상태, 출력 및 함수들을 가지고 있다. 제시된 방법이 기존 방법에 비하여 오류 발생률과 작업 수행 시간에 있어서 더 효율적이다.

  • PDF

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • 제8권4호
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.