• Title/Summary/Keyword: Network-based

Search Result 25,959, Processing Time 0.057 seconds

Quality Metric with Video Characteristics on Scalable Video Coding (영상 특성을 고려한 스케일러블 비디오 기반 품질 메트릭)

  • Yoo, Ha-Na;Kim, Cheon-Seog;Lee, Ho-Jun;Jin, Sung-Ho;Ro, Yong-Man
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.179-187
    • /
    • 2008
  • In this paper, we proposed the qualify metric based on SVC and the subjective quality. The proposed quality metric is for a general purpose. It means we can use it for any video sequences regardless of its temporal and spatial characteristics. The Quality of Service(QoS) is one of the important issues in heterogeneous environment which has diverse restrictions such as limited network bandwidth and limited display resolution. Scalable Video Coding(SVC) is the efficient video coding skill in heterogeneous environment. Because SVC can be adapted to various quality bitstreams using three scalabilities(spatial, temporal, and SNR) from one bitstream which has full scalability. To maximize the QoS in this environment, we should consider the subjective quality which is the viewer response. And also we should consider temporal and spatial characteristics of video sequence because the subjective quality is affected by temporal and spatial characteristics of video sequence. To verify the efficiency of the proposed method, we perform subjective assessments. The experimental results show that the proposed method has high correlation with subjective quality. The proposed method can be a decision tool of SVC birstream extraction.

Development of Analysis Model for R&D Environment Change in Search of the Weak Signal (Weak Signal 탐색을 위한 연구개발 환경변화 분석모델 개발)

  • Hong, Sung-Wha;Kim, You-Eil;Bae, Kuk-Jin;Park, Young-Wook;Park, Jong-Kyu
    • Journal of Korea Technology Innovation Society
    • /
    • v.12 no.1
    • /
    • pp.189-211
    • /
    • 2009
  • The importance of searching the weak signal has been increasingly recognized to cope with rapidly changing circumstances as an environmental analysis technique. This study proposed the NEST process for the searching for the weak signal. The NEST (New & Emerging Signals of Trends) is a micro environmental analysis process based on both quantitative and qualitative method. For this, the weak signal Searching Board is developed and traditional methods as global monitoring, trend analysis, brainstorming and delphi method are implemented to NEST. The NEST process is consists of three stage modules; the global monitoring stage in search of seeds information related to the environmental change, the weak signal analysis stage using the weak signal Tracking Board, and the delphi valuation stage for objectifying the final result. The NEST provides the weak signal of the promising technology which can bring new paradigm and the Up-Coming Trends which can lead new trend in the future. These outputs can be used to select promising technology from firm level to national level. The NEST system can be effectively operated as well as in small group so that small and medium innovative firms can develop and execute their own NEST process individually.

  • PDF

Revitalization Plan and Value of Social Network Service in the Business Organization (기업조직 내 소셜 미디어 서비스 활용의 가치 제고 및 활성화 방안)

  • Kim, Dong-Hyun;Seo, Hyun-Shik;Kim, Hyung-Joon;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.4
    • /
    • pp.275-286
    • /
    • 2011
  • The purpose of this study is to find the beneficial plan for business success by the advantage of social media service in the business organization. There is few research for applying social media on a variety of fields in business organization although many companies are trying to find the way for its application. Hence, this study identifies the possibility for the utilization of social media services, and it also finds the plan for their effective application. The social relationship is created by increasing communications between users of social media service. The research model is established on the basis of the hypothesis that the social relationship affects knowledge share, pursuit of ego, social participation, amusement. To maximize the impact of results, the research was conducted on the basis of the target on two groups including the business men and non-business men who use social media services. As results of the research, the business men tend to appeal their impression based on sharing knowledge with anonymous people. Also, it is necessary to make a social participation to a management participation, and to utilize the social media in the organization by including amusement to its function. This research is expected to have significant implication to companies which wants to apply social media services in the future.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

Hybrid Mobile IP Protocol for Service Session Continuity between WiBro and HSDPA (WiBro와 HSDPA 망간 서비스 연속성을 제공하기 위한 Hybrid Mobil IP 프로토콜)

  • Kim, Sung-Jin;Choi, Woo-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.223-228
    • /
    • 2008
  • Recently, various types of wireless access networks, such as WLAN, WiBro and HSDPA, etc, have been successfully deployed by commercial service providers (i.e., KT, KTF). In this situation, there are many efforts to provide high quality of services to guarantee seamless mobility between heterogeneous networks. The IP layer mobility protocols are efficient mechanisms to provide seamless mobility between IP based heterogeneous networks as well as homogeneous networks. However, to apply IP mobility protocols in real heterogeneous networks (i.e., WiBro and HSDPA), we must consider not only the basic features of techniques of wireless access networks (i.e., Data rate, Coverage, Quality of Service) but also the problem of real environment of service provider (i.e., Expanse cost to change the access network). Due to this reason, it is difficult to satisfy required conditions by using only one IP mobility protocol in real heterogeneous networks. Therefore, in this paper, we propose an efficient mobility protocol to solve the complex problems that are occurred in real heterogeneous networks. The proposed protocol, so-called, "Hybrid Mobile IP" tries to provide a synergy effect by integrating Client Mobile IPv4 (CMIPv4) and Proxy Mobile IPv4 (PMIPv4), and using the two mobility protocols selectively according to the situation of real heterogeneous networks.

  • PDF

Design and Implementation of Picture Archiving and Communication System Component using the RFID for Mobile Web Environments (모바일 웹 환경을 위한 의료영상저장전송시스템 컴포넌트의 설계 및 구현)

  • Kim Chang-Soo;Yim Jae-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1124-1131
    • /
    • 2006
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. Moreover, MIS, PACS(Picture Archiving and Communication System), OCS, EMR are also developing. Medical Information System is evolved toward integration of medical IT and situation is changing with increasing high speed in the ICT convergence. Mobile component refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to internet whenever and wherever. It is the core technology to implement automatic medical processing system. This paper provides a basic review of RFID model, PACS application component services. In addition, designed and implemented database server's component program and client program of mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented mobile PACS that performed patient data based db environments, and so reduced delay time of requisition, medical treatment, lab.

Modelling of the noise-added saturated steam table using neural networks (노이즈가 포함된 포화증기표의 신경회로망 모델링)

  • Lee, Tae-Hwan;Park, Jin-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.413-418
    • /
    • 2011
  • The thermodynamic properties of steam table are obtained by measurement or approximate calculation under appropriate assumptions. Therefore they are supposed to have basic measurement errors. And thermodynamic properties should be modeled through function approximation for using in numerical analysis. In order to make noised thermodynamic properties corresponding to measurement errors, random numbers are generated, adjusted to appropriate magnitudes and added to original thermodynamic properties. Both neural networks and quadratic spline interpolation method are introduced for function approximation of these modified thermodynamic properties in the saturated water based on pressure and temperature. In analysis spline interpolation method gives much less relative errors than neural networks at both ends of data. Excluding the both ends of data, the relative errors of neural networks is generally within ${\pm}0.2%$ and those of spline interpolation method within ${\pm}0.5$~1.5%. This means that the neural networks give smaller relative errors compared with quadratic spline interpolation method within range of use. From this fact it was confirmed that the neural networks trace the original values better than the quadratic interpolation method and neural networks are more appropriate method in modelling the saturated steam table.

Design and Implementation of Location Based Seamless Handover for IEEE 802.11s Wireless Mesh Networks (IEEE 802.11s 무선 메쉬 네트워크를 위한 위치 기반 핸드오버의 설계 및 구현)

  • Lee, Sung-Han;Yang, Seung-Chur;Kim, Jong-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2004-2010
    • /
    • 2009
  • The characteristic of the backbond for distribution service in WMNs(Wireless Mesh Networks) is that WMNs has multiple links connected to mesh points and dynamic routing protocol such as AODV to establish routing paths. When the terminal is communicating with the service through new AP, mobile nodes can resume communication by setting only the link between new AP and mobile node in the case of existing WLANs, but WMNs needs path establishment process in multihop networks. Our goal in this paper is to support the seamless communication service by eliminating path establishment delay in WMNs. We present the method that eliminates the handover latency by predicting the location of handover using GPS information and making the paths to their destination in advance. We implement mesh nodes using embedded board that contains proposed handover method and evaluate performance of handover latency. Our experiment shows that handover delay time is decreased from 2.47 to 0.05 seconds and data loss rate is decreased from 20~35% in the existing method to 0~10% level.

The Study of Information Strategy Plan to Design OASIS' Future Model (오아시스(전통의학정보포털)의 미래모형 설계를 위한 정보화전략계획 연구)

  • Yea, Sang-Jun;Kim, Chul;Kim, Jin-Hyun;Kim, Sang-Kyun;Jang, Hyun-Chul;Kim, Ik-Tae;Jang, Yun-Ji;Seong, Bo-Seok;Song, Mi-Young
    • Korean Journal of Oriental Medicine
    • /
    • v.17 no.2
    • /
    • pp.63-71
    • /
    • 2011
  • Objectives : We studied the ISP(information strategy plan) of oasis spanning 5 years. From this study we aimed at total road map to upgrade the service systematically and to carry out the related projects. If we do it as road map, oasis will be the core infra service contributing to the improvement of TKM(traditional korean medicine) research capability. Methods : We carried out 3 step ISP method composed of environmental analysis, current status analysis and future plan. We used paper, report and trend analysis document as base materials and did the survey to get opinions from users and TKM experts. We limited this study to drawing the conceptual design of oasis. Results : From environmental analysis we knew that China and USA built up the largest TM databases. We did the survey to get the activation ways of oasis. And we did the benchmarking on the advanced services through current status analysis. Finally we determined 'maximize the research value based the open TKM knowledge infra' as oasis' vision. And we designed oasis' future system which is composed of service layer, application layer and contents layer. Conclusion : First TKM related documents, research materials, researcher information and standards are merged to elevate the TKM information level. Concretely large scale TKM information infra project such as TKM information classification code development, TKM library network building and CAM research information offering are carried out at the same time.