• Title/Summary/Keyword: Internet Termination

Search Result 37, Processing Time 0.024 seconds

Test for Resource Service by the User Web Portal and the NSI based Network Resource Service Agent (사용자 웹 포털과 NSI 기반의 네트워크 자원 서비스 에이전트에 의한 자원서비스 시험)

  • Lim, Huhnkuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.822-830
    • /
    • 2012
  • The most representative research network in Korea, KREONET has developed the NSI based NSA (Network Service Agent) technology. The developed NSA supports web service and provides services for reservation, provision, release and termination of network resource, whenever users want to utilize them. In this paper, the system blocks of the developed NSA and flows of NSI interface massage are presented firstly, Also, service test results for NSI connection reservation is given through internet communication of the web portal system to operate as the RA NSA and the NSA, Finally, it is confirmed that reservation, provision, release and termination of network resource can be established through NSI messages based on reservation information from user, between the web portal and the NSA.

Study on Fraud and SIM Box Fraud Detection Method in VoIP Networks (VoIP 네트워크 내의 Fraud와 SIM Box Fraud 검출 방법에 대한 연구)

  • Lee, Jung-won;Eom, Jong-hoon;Park, Ta-hum;Kim, Sung-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1994-2005
    • /
    • 2015
  • Voice over IP (VoIP) is a technology for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks. Instead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs in the form of IP packets over a packet-switched network which consist of several layers of computers. VoIP Service that used the various techniques has many advantages such as a voice Service, multimedia and additional service with cheap cost and so on. But the various frauds arises using VoIP because VoIP has the existing vulnerabilities at the Internet and based on complex technologies, which in turn, involve different components, protocols, and interfaces. According to research results, during in 2012, 46 % of fraud calls being made in VoIP. The revenue loss is considerable by fraud call. Among we will analyze for Toll Bypass Fraud by the SIM Box that occurs mainly on the international call, and propose the measures that can detect. Typically, proposed solutions to detect Toll Bypass fraud used DPI(Deep Packet Inspection) based on a variety of detection methods that using the Signature or statistical information, but Fraudster has used a number of countermeasures to avoid it as well. Particularly a Fraudster used countermeasure that encrypt VoIP Call Setup/Termination of SIP Signal or voice and both. This paper proposes the solution that is identifying equipment of Toll Bypass fraud using those countermeasures. Through feature of Voice traffic analysis, to detect involved equipment, and those behavior analysis to identifying SIM Box or Service Sever of VoIP Service Providers.

Characteristic of Transient Response in Nonuniform Instability with Optically Controlled Fiber (광학적으로 제어된 섬유를 가진 비균일 불안정성의 과도 응답의 특성)

  • Han, Pan-Lin;Park, Kwang-Chea
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.445-450
    • /
    • 2016
  • In this paper we study the effect of chaos in nonuniform instability with optical fiber based IoT networks. The transient response of optically controlled fiber has also described. Nonlinear optical fiber effects especially fiber scattering in networks has emerged as the essential means active optical devices. The paradigm instability in fiber Internet serves as a test for fundamental study of chaos and its suppression and exploitation in practical application in optical communication. This paper attempts to present a survey and some of our research findings on the nature of chaotic effect on Internet based optical communication. The transient response in optical fiber has been evaluated theoretically by calculating the variation of the scattering function. The lines has used under open ended termination containing optically induced region. The scattered optical waves in a fiber used in optic communications are temporally unstable above certain threshold intensity.

Fractal Depth Map Sequence Coding Algorithm with Motion-vector-field-based Motion Estimation

  • Zhu, Shiping;Zhao, Dongyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.242-259
    • /
    • 2015
  • Three-dimensional video coding is one of the main challenges restricting the widespread applications of 3D video and free viewpoint video. In this paper, a novel fractal coding algorithm with motion-vector-field-based motion estimation for depth map sequence is proposed. We firstly add pre-search restriction to rule the improper domain blocks out of the matching search process so that the number of blocks involved in the search process can be restricted to a smaller size. Some improvements for motion estimation including initial search point prediction, threshold transition condition and early termination condition are made based on the feature of fractal coding. The motion-vector-field-based adaptive hexagon search algorithm on the basis of center-biased distribution characteristics of depth motion vector is proposed to accelerate the search. Experimental results show that the proposed algorithm can reach optimum levels of quality and save the coding time. The PSNR of synthesized view is increased by 0.56 dB with 36.97% bit rate decrease on average compared with H.264 Full Search. And the depth encoding time is saved by up to 66.47%. Moreover, the proposed fractal depth map sequence codec outperforms the recent alternative codecs by improving the H.264/AVC, especially in much bitrate saving and encoding time reduction.

High Resolution ISAR Imaging Based on Improved Smoothed L0 Norm Recovery Algorithm

  • Feng, Junjie;Zhang, Gong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5103-5115
    • /
    • 2015
  • In radar imaging, a target is usually consisted of a few strong scatterers which are sparsely distributed. In this paper, an improved sparse signal recovery algorithm based on smoothed l0 (SL0) norm method is proposed to achieve high resolution ISAR imaging with limited pulse numbers. Firstly, one new smoothed function is proposed to approximate the l0 norm to measure the sparsity. Then a single loop step is used instead of two loop layers in SL0 method which increases the searching density of variable parameter to ensure the recovery accuracy without increasing computation amount, the cost function is undated in every loop for the next loop until the termination is satisfied. Finally, the new set of solution is projected into the feasible set. Simulation results show that the proposed algorithm is superior to the several popular methods both in terms of the reconstruction performance and computation time. Real data ISAR imaging obtained by the proposed algorithm is competitive to several other methods.

A Spiking Neural Network for Autonomous Search and Contour Tracking Inspired by C. elegans Chemotaxis and the Lévy Walk

  • Chen, Mohan;Feng, Dazheng;Su, Hongtao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.2846-2866
    • /
    • 2022
  • Caenorhabditis elegans exhibits sophisticated chemotaxis behavior through two parallel strategies, klinokinesis and klinotaxis, executed entirely by a small nervous circuit. It is therefore suitable for inspiring fast and energy-efficient solutions for autonomous navigation. As a random search strategy, the Lévy walk is optimal for diverse animals when foraging without external chemical cues. In this study, by combining these biological strategies for the first time, we propose a spiking neural network model for search and contour tracking of specific concentrations of environmental variables. Specifically, we first design a klinotaxis module using spiking neurons. This module works in conjunction with a klinokinesis module, allowing rapid searches for the concentration setpoint and subsequent contour tracking with small deviations. Second, we build a random exploration module. It generates a Lévy walk in the absence of concentration gradients, increasing the chance of encountering gradients. Third, considering local extrema traps, we develop a termination module combined with an escape module to initiate or terminate the escape in a timely manner. Experimental results demonstrate that the proposed model integrating these modules can switch strategies autonomously according to the information from a single sensor and control steering through output spikes, enabling the model worm to efficiently navigate across various scenarios.

A Study on the Regional Characteristics of Broadband Internet Termination by Coupling Type using Spatial Information based Clustering (공간정보기반 클러스터링을 이용한 초고속인터넷 결합유형별 해지의 지역별 특성연구)

  • Park, Janghyuk;Park, Sangun;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.45-67
    • /
    • 2017
  • According to the Internet Usage Research performed in 2016, the number of internet users and the internet usage have been increasing. Smartphone, compared to the computer, is taking a more dominant role as an internet access device. As the number of smart devices have been increasing, some views that the demand on high-speed internet will decrease; however, Despite the increase in smart devices, the high-speed Internet market is expected to slightly increase for a while due to the speedup of Giga Internet and the growth of the IoT market. As the broadband Internet market saturates, telecom operators are over-competing to win new customers, but if they know the cause of customer exit, it is expected to reduce marketing costs by more effective marketing. In this study, we analyzed the relationship between the cancellation rates of telecommunication products and the factors affecting them by combining the data of 3 cities, Anyang, Gunpo, and Uiwang owned by a telecommunication company with the regional data from KOSIS(Korean Statistical Information Service). Especially, we focused on the assumption that the neighboring areas affect the distribution of the cancellation rates by coupling type, so we conducted spatial cluster analysis on the 3 types of cancellation rates of each region using the spatial analysis tool, SatScan, and analyzed the various relationships between the cancellation rates and the regional data. In the analysis phase, we first summarized the characteristics of the clusters derived by combining spatial information and the cancellation data. Next, based on the results of the cluster analysis, Variance analysis, Correlation analysis, and regression analysis were used to analyze the relationship between the cancellation rates data and regional data. Based on the results of analysis, we proposed appropriate marketing methods according to the region. Unlike previous studies on regional characteristics analysis, In this study has academic differentiation in that it performs clustering based on spatial information so that the regions with similar cancellation types on adjacent regions. In addition, there have been few studies considering the regional characteristics in the previous study on the determinants of subscription to high-speed Internet services, In this study, we tried to analyze the relationship between the clusters and the regional characteristics data, assuming that there are different factors depending on the region. In this study, we tried to get more efficient marketing method considering the characteristics of each region in the new subscription and customer management in high-speed internet. As a result of analysis of variance, it was confirmed that there were significant differences in regional characteristics among the clusters, Correlation analysis shows that there is a stronger correlation the clusters than all region. and Regression analysis was used to analyze the relationship between the cancellation rate and the regional characteristics. As a result, we found that there is a difference in the cancellation rate depending on the regional characteristics, and it is possible to target differentiated marketing each region. As the biggest limitation of this study and it was difficult to obtain enough data to carry out the analyze. In particular, it is difficult to find the variables that represent the regional characteristics in the Dong unit. In other words, most of the data was disclosed to the city rather than the Dong unit, so it was limited to analyze it in detail. The data such as income, card usage information and telecommunications company policies or characteristics that could affect its cause are not available at that time. The most urgent part for a more sophisticated analysis is to obtain the Dong unit data for the regional characteristics. Direction of the next studies be target marketing based on the results. It is also meaningful to analyze the effect of marketing by comparing and analyzing the difference of results before and after target marketing. It is also effective to use clusters based on new subscription data as well as cancellation data.

ALTERA Embedded Gigabit Transceiver Measurement for PCI Express Protocol (ALTERA 임베디드 기가비트 트랜시버 테스트)

  • Kwon, Won-Ok;Park, Kyoung;Kwon, Hyuk-Je;Yoon, Suk-Han
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.4
    • /
    • pp.41-49
    • /
    • 2004
  • In this paper, a design and measurement method for FPGA embedded gigabit-transceiver is presented. Altera's Stratix GX device which is general purpose transceiver called GXB was used for implementing PCI Express transceiver. PCI Express is the generation high performance serial I/O bus used to interconnect peripheral devices. After GXB was set follow by PCI Express specifications, the design has been verified by timing simulation and implemented as hardware. We tested it as follow. First GXB internal digital and analog block test second GXB transmitter signal integrity test called Eye mask test, third GXB high-speed serial I/O buffer and on-chip termination test and the last GXB protocol test. This paper shows all the design and measurement procedure about FPGA embedded gigabit-transceiver.

A Study on Wireless Data Quality Measurement Method for u-Healthcare Service in HSDPA Environment (HSDPA 환경에서의 u-Healthcare 서비스를 위한 무선 데이터 품질 측정 방안 연구)

  • Yun, Sung-Yeol;Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.127-134
    • /
    • 2011
  • Recently, the wireless data communication infrastructure appearing before the footlights crosses the limit in the wire and develop into the fast speed. Particularly, the issue about the u-Healthcare service using this increases. And the investigation of the quality guarantee of the wireless data network is important for the smooth service providing. However, the quality control research about the wireless network is insufficient because the existing research performs the quality control between the termination about the wired network continually. This paper presented the mobile service quality measurement reference considering the radio environment,that is the method for satisfying the quality guarantee of the wireless data network user offered the u-Healthcare service as the research about this and user needs. For this purpose, wireless data quality measurement indicator and standard was selected. The quality measure evaluation plan was presented according to the service. And each service presented the quality index especially.

A Study on the System for the Computer Remote Control by Mobile (모바일 기반의 컴퓨터 원격제어 시스템에 관한 연구)

  • Song Eun-Jee;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.49-54
    • /
    • 2005
  • The development of various contents has been accelerated with the explosive increase of the number of internet users, the rapid expansion of wireless internet service and the pervasion of mobile terminal. Mobile service is able to offer the elastic service to anyone regardless of the place and the time. With this characteristics, this service could be extended even to the pace which the access was limited with the existing line service. The purpose of this study is to propose a system which is able to make a remote control of computer by means of mobile as an example of the production of contents for such mobile service. With this system it could be identified what kind of job a user of PC is making by mobile phone regardless of the time and place. The functions such as termination reboot, messenger, macro execution, and timer are included. The greatest advantage of the system proposed in this paper is to protect the youth, who are making an access recklessly to the harmful site, by use of mobile at my time and any place.

  • PDF