• Title/Summary/Keyword: Multiple Chain Architecture

Search Result 23, Processing Time 0.03 seconds

A Design of Peer-to-Peer Based IPTV System using Multiple Chain Architecture (다중 체인구조를 이용한 Peer-to-Peer 기반 IPTV 시스템 설계)

  • Kim, Ji-Hoon;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.74-82
    • /
    • 2008
  • In this paper, we propose a P2P based IPTV system using a multiple chain architecture. Proposed system is robust to the peer churn. As opposed to the internet the IPTV network managed by a single ISP has fewer bandwidth constraints and end-to-end connectivity. So, we emphasize preferentially robustness of a P2P network in IPTV environment. A single chain structure which was proposed previously emphasizes simplicity, however there exists considerable delay time at the end part of peers as the number of peers increasing. As a solution to the problem, we propose the scheme which seperates the chain into several levels and again divides each level into spans to diminish a delay time. Though the chain is separated into level and span, basic structure of proposed scheme is still a chain structure. So the scheme simplifies the recovery procedure caused by join or departure of peers. We will show the improved performance of proposed scheme rather than single chain structure with respect to the delay time and reliability.

Improvement of Upload Traffic through Negotiation in UCC Broadcasting System (P2P 기반의 UCC 방송에서 협상을 통한 업로드 트래픽의 개선)

  • Kim, Ji Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.171-179
    • /
    • 2014
  • Among the P2P based multimedia streaming architecture, multiple chain architecture has advantage in adapting to dynamically changing network topology simply and rapidly, so this architecture is used for UCC broadcasting system. In UCC broadcasting system, general peer involved in DSLAM becomes UCC server rather than broadcasting system that transfers data from ISP servers. Therefore UCC data generated from UCC server peers is transmitted to peers through DSLAM, and this transmission uses uplink bandwidth of DSLAM. In this paper, I propose an efficient management method of DSLAM uplink bandwidths through negotiating tracker and UCC server peer or head peers of DSLAM. I propose the method that tracker restricts a bitrate of uplink stream of UCC servers when used uplink bandwidth of DSLAM exceeds a certain point of maximum uplink bandwidths. I will show the improved performance of proposed scheme rather than general method with respect to the uplink bandwidth of DSLAM by numerical analysis and simulation.

Test Methodology for Multiple Clocks in Systems (시스템 내에 존재하는 다중 클럭을 제어하는 테스트 기법에 관한 연구)

  • Lee, Il-Jang;Kim, In-Soo;Min, Hyoung-Bok
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1840-1841
    • /
    • 2007
  • To the Boundary Scan, this architecture in Scan testing of design under the control of boundary scan is used in boundary scan design to support the internal scan chain. The internal scan chain has single scan-in port and single scan-out port that multiple scan chain cannot be used. Internal scan design has multiple scan chains, those chains must be stitched to form a scan chain as this paper. We propose an efficient Boundary Scan test structure for multiple clock testing in design.

  • PDF

Boundary Scan Test Methodology for Multiple Clock Domains (다중 시스템 클럭 도메인을 고려한 경계 주사 테스트 기법에 관한 연구)

  • Jung, Sung-Won;Kim, In-Soo;Min, Hyoung-Bok
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.1850-1851
    • /
    • 2007
  • To the Boundary Scan, this architecture in Scan testing of design under the control of boundary scan is used in boundary scan design to support the internal scan chain. The internal scan chain has single scan-in port and single scan-out port that multiple scan chain cannot be used. Internal scan design has multiple scan chains, those chains must be stitched to form a scan chain as this paper. We propose an efficient Boundary Scan test structure for multiple clock testing in design.

  • PDF

Design of UCC Broadcasting System in P2P Based IPTV Environments (P2P 기반의 IPTV 환경에서 UCC 방송을 위한 시스템 설계)

  • Kim, Ji Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.37-47
    • /
    • 2010
  • In this paper, we propose an UCC broadcasting system in P2P based IPTV environments. Proposed system applies P2P based multiple chain architecture. UCC broadcasting system transfers data from not ISP server but UCC server peer that is included in DSLAM to joined peers. Therefore an algorithm to manage join and departure of peers have to modified. In this paper we propose an algorithm that does not increase an uplink bandwidth of DSLAM that include UCC server when peer joins to the UCC channel. We will show the improved performance of proposed scheme rather than general method with respect to the uplink bandwidth of DSLAM that include UCC server.

Reverse Transcription Polymerase Chain Reaction-based System for Simultaneous Detection of Multiple Lily-infecting Viruses

  • Kwon, Ji Yeon;Ryu, Ki Hyun;Choi, Sun Hee
    • The Plant Pathology Journal
    • /
    • v.29 no.3
    • /
    • pp.338-343
    • /
    • 2013
  • A detection system based on a multiplex reverse transcription (RT) polymerase chain reaction (PCR) was developed to simultaneously identify multiple viruses in the lily plant. The most common viruses infecting lily plants are the cucumber mosaic virus (CMV), lily mottle virus (LMoV), lily symptomless virus (LSV). Leaf samples were collected at lily-cultivation facilities located in the Kangwon province of Korea and used to evaluate the detection system. Simplex and multiplex RT-PCR were performed using virus-specific primers to detect single- or mixed viral infections in lily plants. Our results demonstrate the selective detection of 3 different viruses (CMV, LMoV and LSV) by using specific primers as well as the potential of simultaneously detecting 2 or 3 different viruses in lily plants with mixed infections. Three sets of primers for each target virus, and one set of internal control primers were used to evaluate the detection system for efficiency, reliability, and reproducibility.

Critical Assessment of Programme-Based Conflict Resolution Model Applied to Multiple Stakeholders Within The Context of Industrialized Building Production and Life Cycle Supply Chain System

  • Tanaka, Koji
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.551-562
    • /
    • 2022
  • The building production system has been analysed by the dichotomy "employer-contractor" relationship, which failed to take into account of the role and function of multiple stakeholders within the life-cycle supply chain. This is further observed in the current conflict resolution model, which, in my argument, struggles to contribute to industrialize the building production and achieve better efficiency and effectiveness as expected. The purpose of this paper is to critically assess the issues of current programme-based conflict resolution model, and discuss alternative models how they can be modelled and applied to the construction projects. The conclusions of findings are; First, the current model is framed around the contracts and dispute resolutions based on the legal concept of "claimant and respondent" where one party(s) advances a claim once and the other(s) objects, as such it fails to reflect the nature of construction projects where multiple stakeholders are involved concurrently and for a long period of life-cycle of buildings. Second, an alternative is "Six-stakeholders model" which represents the multiple stakeholders and clarifies the flow of obligation-liability-monetary relationships among participants for a long period of life-cycle of buildings. Further, with reference to both historical and recent cases, a reflection and insight into pros and cons of programming method is added, especially as to why this method is considered to have become a mandate of the modern construction management, and how academics and practitioners should deal with it more cautiously and prudently.

  • PDF

An Intelligent Agent Based Supply Chain Operation Architecture under Adaptive Relationship between Multiple Suppliers and Customers (다수 수요자-공급자간 적응적 협력관계하의 지능형 에이전트 기반 공급망운영 구조)

  • 윤한성
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.1
    • /
    • pp.109-123
    • /
    • 2003
  • The relationship between suppliers and customers is treated importantly not only in the traditional business-to-business (BtoB) commerce but also in today's Internet environments. On the one hand, most of Internet-based BtoB commerce services like customer-centric e-procurement, supplier-centric e-sales or intermediary-centric e-marketplace focus mainly on the selection of partners according to bidding, auction, etc. This point may result in the problem of overlooking the relationships between suppliers and customers. To overcome this problem in this paper, an intelligent agents-based supply chain operation architecture is proposed and appraised considering the relationship and its adaptation.

  • PDF

Out-Of-Plane Bending Stiffnesses in Offshore Mooring Chain Links Based on Conventional and Advanced Numerical Simulation Techniques (기존/개선 수치 해석 기법을 이용한 계류 체인 링크의 면외 굽힘 강성)

  • Choung, Joonmo;Lee, Jae-bin;Kim, Young Hun
    • Journal of Ocean Engineering and Technology
    • /
    • v.32 no.5
    • /
    • pp.297-309
    • /
    • 2018
  • After an accident involving mooring link failures in an offloading buoy, verification of the fatigue safety in terms of the out-of-plane bending (OPB) and in-plane bending (IPB) moments has become a key engineering item in the design of various floating offshore units. The mooring links for an 8 MW floating offshore wind turbine were selected for this study. To identify the OPB stiffness (OPB moment versus interlink angle), a numerical simulation model, called the 3-link model, is usually composed of three successive chain links closest to the fairlead or chain hawse. This paper introduces two numerical simulation techniques for the 3-link analyses. The conventional and advanced approaches are both based on the prescribed rotation approach (PRA) and direct tension approach (DTA). Comparisons of the nominal stress distributions, OPB stiffnesses, hotspot stress curves, and stress concentration curves are presented. The multiple link analyses used to identify the tension angle versus interlink angle require the OPB stiffness data from the 3-link analyses. A convergence study was conducted to determine the minimum number of links for a multi-link analysis. It was proven that 10 links were sufficient for the multi-link analysis. The tension angle versus interlink angle relations are presented based on multi-link analyses with 10 links. It was found that the subsequent results varied significantly according to the 3-link analysis techniques.

A Built-In Self-Test Architecture using Self-Scan Chains (자체 스캔 체인을 이용한 Built-In Self-Test 구조에 관한 연구)

  • Han, Jin-Uk;Min, Hyeong-Bok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.3
    • /
    • pp.85-97
    • /
    • 2002
  • STUMPS has been widely used for built-in self-test of scan design with multiple scan chains. In the STUMPS architecture, there is very high correlation between the bit sequences in the adjacent scan chains. This correlation causes circuits lower the fault coverage. In order to solve this problem, an extra combinational circuit block(phase shifter) is placed between the LFSR and the inputs of STUMPS architecture despite the hardware overhead increase. This paper introduces an efficient test pattern generation technique and built-in self-test architecture for sequential circuits with multiple scan chains. The proposed test pattern generator is not used the input of LFSR and phase shifter, hence hardware overhead can be reduced and sufficiently high fault coverage is obtained. Only several XOR gates in each scan chain are required to modify the circuit for the scan BIST, so that the design is very simple.