• Title/Summary/Keyword: Dropping Method

Search Result 224, Processing Time 0.022 seconds

Fuzzy Neural Networks-Based Call Admission Control Using Possibility Distribution of Handoff Calls Dropping Rate for Wireless Networks (핸드오프 호 손실율 가능성 분포에 의한 무선망의 퍼지 신경망 호 수락제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.901-906
    • /
    • 2009
  • This paper proposes a call admission control(CAC) method for wireless networks, which is based on the upper bound of a possibility distribution of handoff calls dropping rates. The possibility distribution is estimated in a fuzzy inference and a learning algorithm in neural network. The learning algorithm is considered for tuning the membership functions(then parts)of fuzzy rules for the inference. The fuzzy inference method is based on a weighted average of fuzzy sets. The proposed method can avoid estimating excessively large handoff calls dropping rates, and makes possibile self-compensation in real time for the case where the estimated values are smaller than real values. So this method makes secure CAC, thereby guaranteeing the allowed CDR. From simulation studies we show that the estimation performance for the upper bound of call dropping rate is good, and then handoff call dropping rates in CAC are able to be sustained below user's desired value.

  • PDF

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping

  • Shin, Dong-Kyoo;Shin, Dong-Il;Shin, Jae-Wan;Kim, Soo-Han;Kim, Seung-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.925-938
    • /
    • 2010
  • Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by filtering, load distribution, frame dropping, and other methods. Among these methods, one of the most effective is frame dropping, which reduces specified video frames for bandwidth diminution. In frame dropping, B-frames are dropped and then I- and P-frames are dropped, based on the dependency among the frames. This paper proposes a scheme for protecting copyrights by encryption, when frame dropping is applied to reduce the bandwidth of media based on the MPEG-4 file format. We designed two kinds of frame dropping: the first stores and then sends the dropped files and the other drops frames in real time when transmitting. We designed three kinds of encryption methods using the DES algorithm to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I-, P-VOP. Based on these three methods, we implemented a digital rights management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption, and the quality of the video sequences to select an optimal method, and found that there was no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in the encryption and decryption of frames was obtained when we applied the macro block and motion vector encryption in I-, P-VOP.

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping (대역폭 감소를 적용한 MPEG-4 미디어 전송시의 암호화 기법 연구)

  • Shin, Dong-Kyoo;Shin, Dong-Il;Park, Se-Young
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.575-584
    • /
    • 2008
  • According to the network condition, the communication network overload could be occurred when media transmitting. Many researches are being carried out to lessen the network overload, such as the filtering, load distributing, frame dropping and many other methods. Among these methods, one of effective method is frame dropping that reduces specified video frames for bandwidth diminution. B frames are dropped and then I, P frames are dropped according to dependency among the frames in frame dropping. This paper proposes a scheme for protecting copyrights by encryption, when we apply frame dropping to reduce bandwidth of media following MPEG-4 file format. We designed two kinds of frame dropping: first one stores and then sends the dropped files and the other drops frames in real-time when transmitting. We designed three kinds of encryption methods in which DES algorithm is used to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I, P-VOP. Based on these three methods, we implemented a digital right management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption and quality of video sequences to select an optimal method, and there is no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in encryption and decryption of frames was obtained when we apply the macro block and motion vector encryption in I, P-VOP.

Adaptive Call Admission Control Based on Resource Prediction by Neural Network in Mobile Wireless Environments (모바일 무선환경에서 신경망 자원예측에 의한 적응 호 수락제어)

  • Lee, Jin-Yi
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.2
    • /
    • pp.208-213
    • /
    • 2009
  • This paper presents an adaptive call admission control(CAC) algorithm based on a target handoff call dropping probability in mobile wireless environments. This method uses a neural network for predicting and reserving the bandwidth demands for handoff calls and new calls. The amount of bandwidth to be reserved is adaptively adjusted by a target value of handoff call dropping probability(CDP). That is, if the handoff CDP exceeds the a target CDP value, the bandwidth to be reserved should be increased to reduce the handoff dropping probability below a target value. The proposed method is intended to prevent from increasing handoff call dropping probability when bandwidth to be reserved is not enough for handoff calls due to an uncertain prediction. Our simulations compare the handoff CDP in proposed CAC with that of an existing CAC. Results show that the proposed method sustains handoff call dropping probability below our target value.

  • PDF

Design of Roller-Type Metering Device for Precision Planting (정밀 파종용 롤러식 배종장치의 설계)

  • 류일훈;김경욱
    • Journal of Biosystems Engineering
    • /
    • v.22 no.4
    • /
    • pp.401-410
    • /
    • 1997
  • Scattering of seeds is one of the problems in the hill- dropping planters with a roller-type metering device. For crops like rice, corns and beans, the hill-dropping is own better for a high yield than the drill planting. The roller type metering device has been used for the drill planters and has many advantages. However, it has a problem of scattering of seeds when they are placed on rows. In this study a method was developed to design the roller type metering device fir the precision hill-droppings. Design parameters were derived to configure completely the geometries of the roller and brush. The method was applied to the design of the metering device of the rice seeding machines. The field test showed that the metering device designed by the method made a better performance of seed placement than that made by the precvious one. The method also can be applied to the design of metering devices for the precise hill-droppings of other crops.

  • PDF

A Study on Analysis of Microring Channel Dropping Filter by using FDTD (유한차분 시간영역(FDTD) 알고리듬을 이용한 마이크로링 채널 Dropping 필터 해석에 관한 연구)

  • Kim, Kwon-Hoe;Chung, Young-Chul
    • Proceedings of the KIEE Conference
    • /
    • 2000.11c
    • /
    • pp.600-602
    • /
    • 2000
  • In this paper, channel dropping filters made of microring structure are analyzed by using a finite difference time domain(FDTD) method with Berenger's perfectly matched layer(PML) absorbing boundary condition.

  • PDF

A Novel Technique to Detect Malicious Packet Dropping Attacks in Wireless Sensor Networks

  • Terence, J. Sebastian;Purushothaman, Geethanjali
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.203-216
    • /
    • 2019
  • The nature of wireless transmission has made wireless sensor networks defenseless against various attacks. This paper presents warning message counter method (WMC) to detect blackhole attack, grayhole attack and sinkhole attack in wireless sensor networks. The objective of these attackers are, to draw the nearby network traffic by false routing information and disrupt the network operation through dropping all the received packets (blackhole attack), selectively dropping the received packets (grayhole and sinkhole attack) and modifying the content of the packet (sinkhole attack). We have also attempted light weighted symmetric key cryptography to find data modification by the sinkhole node. Simulation results shows that, WMC detects sinkhole attack, blackhole attack and grayhole attack with less false positive 8% and less false negative 6%.

A Structural Analysis by Finite Element Method under the Dropping Condition of Standardized IP-2 Metal Container for Decommissioning Radwaste Transportation (해체폐기물운반을 위한 IP-2형 금속용기의 낙하시 유한요소해석)

  • Choi, Kyu-Sup;Park, Jea-Ho;Park, Ji-Ho
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.14 no.6
    • /
    • pp.35-40
    • /
    • 2015
  • An IP-2 type container is used for the transport of low-level radioactive materials. An IP-2 type metal container was modeled and analyzed for the dropping conditions in normal transport conditions required by NSSC Notice 2014-50, "Regulations on the packaging and transport of radioactive materials." Structural analyses were performed by finite element method, and the acceptability was reviewed by comparing the results with technical standards and maximum allowable stresses of each material. Structural members of the container were modeled as 3D solid elements, and the possible dropping directions were considered in these analyses. Results show that maximum stresses, maximum deformed gaps in the cover, and maximum estimated thickness reduction in structural members were well below the allowable limits; thus, the structural integrity of the container was confirmed.

Preparation of Nanocrystalline TiO2 Coated Coal Fly Ash by Dropping Method of Coating Agent and Photocatalytic Characterization (페복제 적하법에 의한 나노 결정 TiO2 피복 석탄회의 제조와 광촉매 특성)

  • Yu, Yeon-Tae;Choe, Yeong-Yun;Kim, Byeong-Gyu
    • Korean Journal of Materials Research
    • /
    • v.12 no.5
    • /
    • pp.334-340
    • /
    • 2002
  • $TiO_2$-coated fly ash was synthesized by dropping method of coating agent in order to get $TiO_2$ coating layer with high photocatalytic activity on the surface of coal fly ash. The properties of the $TiO_2$ coating layer such as morphology, crystal structure, crystal size and photocatalytic activity were compared with those of the $TiO_2$-coated fly ash prepared by the traditional method of precipitation. $TiCl_4$ aqueous solution was used as a titanium stock solution and $NH_4HCO_3$ was used as a precipitant. The $TiO_2$ coating layer obtained by dropping method of coating agent was more uniform than that coated by precipitation. However, the crystal of $TiO_2$ coated by dropping method of coating agent was easy to grow by heat treatment because of the small primary particle size and bulky morphology, and its photocatalytic activity was consequently lower than that of the $TiO_2$ coated by precipitation. The $TiO_2$ coating layer obtained by both methods had a crystal structure of anatase, and the temperature of phase transformation into rutile was 90$0^{\circ}C$. The minimum crystal size of $TiO_2$ for the highest photocatalytic activity was found to be about 10nm.