• Title/Summary/Keyword: Home Networks

Search Result 535, Processing Time 0.026 seconds

Flow control for multimedia service in wireless networks (무선 네트워크에서 멀티미디어 서비스를 위한 흐름 제어)

  • Kim, Dong-Ho;Lee, Yong-Hee;Ahn, Se-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1411-1421
    • /
    • 2009
  • As the wireless internet grows exponentially, the recent trend has an increasing demand for wireless network and multimedia services. RTP is used to support the multimedia communication over the Internet and it supports the flexibility and adaptability over a wide range. However, RTP has a limitation that it cannot support end-to-end QoS guarantee in a wireless home network which has low throughput and high delay. In this paper, we propose the architecture of a real-time multimedia communication and design and implement the hybrid flow control in the architecture. The hybrid flow control mechanism is based on modified AIMD using metrics such as the network state information and the user properties. We implement the porposed flow control using JMF to evaluate the performance of the proposed flow control. The experimental results show that the proposed flow control has better performance than the AIMD.

A Design of a Personnel Control System Using UHF-RFID in Shipping (UHF 대역 RFID를 이용한 선박내 인원관리 시스템 설계)

  • Cha, Jin-Man;Kim, Myeung-Hwan;Sung, Kil-Young;Lee, Sang-Wook;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2119-2124
    • /
    • 2008
  • An information-oriented basis in today's society has been changing fast, and the desire for connectivity has caused an exponential growth in wireless communication and sensor network. Sensor networks using RFID, in particular, have led this trend due to the increasing exchange of data in Ubiquitous such as the home RF, access control system, U-Healthcare, and Logistics information Systems. Also, the RFID when it applies a technique, is able to raise the stability of shipping as controling the mobile course and an entrance and exit of the crews an well as previously preventing an accident from shipping. In this paper, we designed and implemented personnel control system using UHF-RFID in vessels which shows through host PC reading and writing tag.

Evaluation of functional wireless sensor node based Ad-hoc network for indoor healthcare monitoring (실내 건강모니터링을 위한 Ad-hoc기반의 기능성 무선센서노드 평가)

  • Lee, Dae-Seok;Do, Kyeong-Hoon;Lee, Hun-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.313-316
    • /
    • 2009
  • A novel approach for electrocardiogram (ECG) analysis within a functional sensor node has been developed and evaluated. The main aim is to reduce data collision, traffic over loads and power consumption in healthcare applications of wireless sensor networks (WSN). The sensor node attached on the patient's bodysurface around the heart can perform ECG analysis based on a QRS detection algorithm to detect abnormal condition of the patient. Data transfer is activated only after detected abnormality in the ECG. This system can reduce packet loss during transmission by reducing traffic overload. In addition, it saves power supply energy leading to more reliable, cheap and user-friendly operation in the WSN based ubiquitous health monitoring.

  • PDF

A Study on the Seoul Metro's Railway Business in Vietnam with the Reuse of De-commissioned Rolling Stocks for Hanoi$\sim$Ha Long Bay Line (중고전동차를 활용한 서울메트로의 베트남 하노이$\sim$하롱베이 철도사업에 관한 연구)

  • Son, Young-Jin;Chung, Su-Young;Choi, Si-Haeng;Seo, Deok-Yong;Lee, Sang-Ho;Oh, Sung-Hyo
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1933-1942
    • /
    • 2008
  • Over the years, the Social Republic of Vietnam has demonstrated its high annual growth rate over 8%. In order to secure its sustainable economic growth, its has also demonstrated its sharp concerns on building up core infrastructures by luring foreign investments on a large scale, which would underpin the nation's economic propulsion. Among others, transport infrastructures and networks centering on railway systems are obviously seen as the most urgent to be built to continue its growth. Seoul Metro recently took a significant step forward in Vietnam to launch railway business by executing its export project of 6 units of metro cars to Hanoi as on July 10, 2008. Those 6 cars are scheduled to be put on the tracks linking Yen Bian, Hanoi with Ha Long, for demonstrative running, around October, 2008, carrying tourists on that 163kms of the National Railway line serving the region. A successful running on the track will duly entail further export of additional 54 units of Seoul Metro cars to Vietnam. In this thesis, description will be noted on the reuse and economic value of the Seoul Metro's de-commissioned metro cars, reflecting on the current urban railway law at home regulating the service life of rolling stocks domestically. This thesis will also study the points at issue, and the recommendable future orientation of the Vietnam railway business project.

  • PDF

Embracing Device Characteristics for Dynamic Adaptive Video Streaming (DLNA 기기 특성을 고려한 동적 적응형 스트리밍에 대한 연구)

  • Kim, Mijung;Jin, Feng;Yoon, Ilchul;Jin, Xianshu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.574-577
    • /
    • 2014
  • Multimedia contents sharing services based on DLNA (Digital Living Network Alliance) technology such as Allshare or Smartshare in wireless home networks is widely adapted in Korea. However, the characteristics of the wireless network - frequently fluctuated bandwidth and signal strength could degrade the quality perceived by users. To minimize the impact of the challenge there are active researches in dynamic adaptive streaming. This paper proposes a dynamic adaptive streaming approach designed in a wireless network taking into account of the specifications of the user device such as resolution and processor. We modify the Kalman filter considering the characteristics of the device and demonstrate that the proposed approach determines Bit Rate using the modified filter.

  • PDF

Comparison of Power Consumption Prediction Scheme Based on Artificial Intelligence (인공지능 기반 전력량예측 기법의 비교)

  • Lee, Dong-Gu;Sun, Young-Ghyu;Kim, Soo-Hyun;Sim, Issac;Hwang, Yu-Min;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.161-167
    • /
    • 2019
  • Recently, demand forecasting techniques have been actively studied due to interest in stable power supply with surging power demand, and increase in spread of smart meters that enable real-time power measurement. In this study, we proceeded the deep learning prediction model experiments which learns actual measured power usage data of home and outputs the forecasting result. And we proceeded pre-processing with moving average method. The predicted value made by the model is evaluated with the actual measured data. Through this forecasting, it is possible to lower the power supply reserve ratio and reduce the waste of the unused power. In this paper, we conducted experiments on three types of networks: Multi Layer Perceptron (MLP), Recurrent Neural Network (RNN), and Long Short Term Memory (LSTM) and we evaluate the results of each scheme. Evaluation is conducted with following method: MSE(Mean Squared Error) method and MAE(Mean Absolute Error).

Blockchain Technology and Application

  • Lee, Sae Bom;Park, Arum;Song, Jaemin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.89-97
    • /
    • 2021
  • Blockchain is designed to collect and store the data recorded on the network in one block unit, and is connected and stored back and forth, and its form is similar to how the blocks are connected, so it is called a blockchain. Many companies are trying to popularize blockchain-based services at home and abroad, and blockchains are used in various industries. This study introduces the technical characteristics of the blockchain and deals with application services utilizing the blockchain. Introducing 5 types of blockchain architecture and core technologies and introducing blockchain application services that are used in payment services, blockchain service networks, blockchain real estate platforms, identity verification, cryptocurrency, diamond distribution path tracking, and blog information recording. do. It is expected to increase the understanding of the blockchain and provide usefulness in future blockchain research and service development.

A Secure License Sharing Scheme for Domain DRM System Against Replay Attack (재생 공격에 안전한 Domain DRM 시스템을 위한 License 공유 방식)

  • Choi, Dong-Hyun;Lee, Yun-Ho;Kang, Ho-Gab;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.97-101
    • /
    • 2007
  • The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers' point of view, they have a tendency to go against complex and confusing limitations. Moreover, consumers' rights of use of the content obtained legally were frequently harmed by arbitrary limitations. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism for withdraw process. The second is that the modules still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme presents the content from being played by modules which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and prevent replay attack.

Analysis of the Effect of The Internet Activation on Students in IoT Environment (사물인터넷 환경에서 인터넷 활성화가 학생에 미치는 영향 분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.55-62
    • /
    • 2021
  • The world is changing rapidly as the Internet spreads and various smart devices appear. High-performance PCs and high-speed communication networks are rapidly spreading in every home, and all kinds of the internet sites are emerging. In particular, the high education enthusiasm of Korean parents adds to this, and the ratio of the internet users among teenagers is exploding every day. In the case of adolescents, most of them use the Internet for online games, indicating that online games are the main cause of the internet addiction. This study was conducted using a questionnaire for male and female high school students using the Internet, and demographic and sociological characteristics were used only as basic data. In this study, as much as parents, students and teachers think, the results of the internet addiction type analysis according to academic achievement in humanities high school students are to be investigated to determine whether internet use has an effect on academic achievement.

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.