• Title/Summary/Keyword: Remote User

Search Result 996, Processing Time 0.03 seconds

Adaptive Strip Compression for Panorama Video Streaming (파노라마 동영상 스트리밍을 위한 적응적 스트립 압축 기법)

  • Kim Bo Youn;Jang Kyung Ho;Koo Sang Ok;Jung Soon Ki
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.137-146
    • /
    • 2006
  • Traditional live video streaming systems support the limited field of view (FOV) of image to the remote users. A server system based on the pan/tilt camera provides a user with wide view by changing the view direction of the camera mechanically. But, when many clients try to access to the server, this system can not offer their own view to every user simultaneously, and moreover it has the delay by camera motion. In order to offer wide views to several users, we propose new streaming system using the panorama image that has wide view. Our system is a kind of implementation of software pan/tilt camera. The server acquires panorama video and sends a part of the video to clients. Then, each client can control their own view. We need the effective way to reduce the average transmission data size and server burden to the compression because generally the full size of panorama video is too big to be served by the real-time streaming. To solve this problem, we propose an strip-based video compression and adaptive transmission of the compressed multiple strip videos. Experimental results show that our system can be adapted quickly to the change of view and the number of clients. Furthermore, proposed method effectively reduce the transmission data.

Batching delivery for VCR-like functions in video-on-demand service system (주문형 비디오 서비스 시스템에서 VCR 기능을 위한 Batching 전송)

  • 박호균;유황빈
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2852-2859
    • /
    • 1997
  • Video-On-Demand system provides electronic video rental services from remote video servers on a broadband communication networks. Most of proposed VOD systems are typically designed for one-to-one conncetion between a user and video server. Therefore, video server stream services to customers individually by allocating a dedicated transmission channel and a set of video server resources for each customer. However, it is inefficiency and wxpensive way when server support multiple users who access the same video stream with a dedicated video channel. Therefore, to achieve cost-effectiveness, batching have studied method that uses multicast communication to simultaneously service all users requesting the same video with a single video with a single video stream. However, the application of the multicast communication by batching detract from the VCR-like function and on-demand nature of the system. In this paepr, we propose a scheme that can support an interactive VCR for all user requesting the same video stream with batching. To reduce a server I/O and network bandwidth requirement, dynamic buffer is allocated to access node which has variable playout poit. Consequently, it makes possible interactive VCR operation as if customer uses true VOD system. Also, this scheme can just deliver a multicast stream without delay after an initial request or VCR action occurred. The policy can guarantee acceptable services to number of users at minimum cost.

  • PDF

A Remote SNMP Connection Request Mechanism for NATed Devices using UDP Hole Punching and Heuristic Hole Binding Time Search (UDP 홀 펀칭과 경험적 홀 유지시간 탐색을 이용한 NAT 환경단말의 SNMP 원격 접속요청 메커니즘)

  • Park, Choon-Gul;Kim, Seong-Il;Jeong, Ki-Tae;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.367-373
    • /
    • 2008
  • Recently, the NAT middlebox widely deployed in the home network environment prohibits DM operations from reaching user devices behind NAT. In this article, we focus on NAT issues to manage home network devices. Particularly, we discuss standardization efforts, and present our proposal to deploy DM services for VoIP and IPTV devices under NAT. By slightly changing behaviors of Simple Network Management Protocol (SNMP) Manager and Agent, and defining additional Management Objects (MOs) to gather NAT binding information, we could solve the NAT traversal problem under symmetric NAT. Moreover, we propose an enhanced method to search the UDP hole binding time of the NAT box. We applied our method to randomly selected 22 VoIP devices out of 194 NATed hosts in the real broadband network and have achieved 99% of the success ratio for exchanging SNMP request messages and 26% of enhancement for searching the UDP hole binding time.

Design and Implementation of Red Tide Monitoring System using Wireless Sensor Network (무선 센서 네트워크를 이용한 적조 모니터링 시스템의 설계 및 구현)

  • Heo, Min;Yim, Jae-Hong;Kim, Byoung-Chan
    • Journal of Navigation and Port Research
    • /
    • v.31 no.3 s.119
    • /
    • pp.263-269
    • /
    • 2007
  • The outbreaks of red tide were sporadic in the South Sea until 1994, but have become frequent and widespread in whole coastal waters of the South Sea and East Sea since 1995 For monitoring of red tide, many kinds of techniques such as remote sensing, GIS and fuzzy model system have been developed and applied. The purpose of this paper is to develop red tide monitoring system for collection of red tide data and biological-oceanography parameters using wireless sensor network. The wireless sensor network has been noticed as a core technology in order to realize ubiquitous computing. In this paper, we design red tide database using wireless sensor network and suggest red tide monitoring software and web-service for user and biological-oceanographer.

Design and Implementation of Internet GIS based on ObjectWeb (ObjectWeb을 기반으로 한 Internet GIS의 설계 및 구현)

  • Kang, Myoung-Soo;Choy, Yoon-Chul;Koh, Kyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.441-447
    • /
    • 2000
  • In this paper, we design and implement an Internet GIS based on ObjectWeb, which makes to use various distributed services and object paradigm. We use CORBA, which is the standard of distributed object middleware and supports interoperability and reusability regardless of the execution environment and the implementation language of a distributed code, so that it easily extends established systems in networking environment and accesses distributed heterogeneous spatial data. Our method distributes parts of user interactive tasks to clients to reduce and to improve the system performance while existing approaches concentrate all workloads on a server. We implement a travel information system on the developed IGIS. Users receive services from remote servers employing a Java client system running on a web browser.

  • PDF

A Real-Time Intrusion Detection based on Monitoring in Network Security (네트워크 보안에서 모니터링 기반 실시간 침입 탐지)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.9-15
    • /
    • 2013
  • Recently, Intrusion detection system is an important technology in computer network system because of has seen a dramatic increase in the number of attacks. The most of intrusion detection methods do not detect intrusion on real-time because difficult to analyze an auditing data for intrusions. A network intrusion detection system is used to monitors the activities of individual users, groups, remote hosts and entire systems, and detects suspected security violations, by both insider and outsiders, as they occur. It is learns user's behavior patterns over time and detects behavior that deviates from these patterns. In this paper has rule-based component that can be used to encode information about known system vulnerabilities and intrusion scenarios. Integrating the two approaches makes Intrusion Detection System a comprehensive system for detecting intrusions as well as misuse by authorized users or Anomaly users (unauthorized users) using RFM analysis methodology and monitoring collect data from sensor Intrusion Detection System(IDS).

Design and Implementation of Healthcare System Based on Non-Contact Biosignal Measurement (비접촉 생체신호 측정 기반 헬스케어 시스템 설계 및 구현)

  • Hong, Seong-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.185-190
    • /
    • 2020
  • The rapid aging is increasing as the shortage of medical facilities and the resulting of decline in the quality of public health. In order to ease the burden of rising medical expenses, advanced medical institutions are expanding their remote medical care to lower the cost of services. U-healthcare detects the changes in physical and chemical phenomena occurring in the human body and converts them into electrical signals that can be processed and feeds back to the results through analytical and visualization processes to select only the desired information from the measured signals. The service is provided through a process of providing an alarm to a user. However, traditional biometric methods of attaching sensors directly to the body can be annoying and rejected in daily life. Therefore, there is a need for a method of continuously measuring biometric information without causing inconvenience to daily life. In this paper, we propose an IR-UWB-based non-contact and non-responsive respiratory measurement system that can continuously monitor biological information without any inconveniences to daily life.

A System Development for Remotely Controlling Windows and Doors in Mobile Environment (모바일 환경에서의 원격 창호 관제시스템 개발)

  • Cho, Yong-Hyun;Ryu, Sung-Won;Ahn, Kyung-Gyu
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.4
    • /
    • pp.334-341
    • /
    • 2015
  • This paper develops a new system for remotely monitoring and controlling the windows and doors in mobile environment. We design and implement the opening and shutting unit, the gateway, and the control server system, respectively. The opening and shutting unit consists of the driver using DC motor and the motion controller which monitors the state and transfers the control information. The gateway supports TCP/IP and CDMA protocol, which is the interface of wire and wireless communication for transferring the current state and control information. The control server consists of the program to store and process the control information, the middleware to support the processing of various state message, and DB for monitoring the state and remotely controlling the system. Especially, an application software and the Web-based user interface have also been developed to support the mobile environment. The operation performances, environment influences, driving persistences, and operation failure ratio, which are based on PC and smart-phone, have been tested in 2 authorized agencies. The test results show that the developed system has a superior performance.

Design and Implementation of Optimal Smart Home Security Monitoring System (최적의 스마트 홈 시큐리티 모니터링 시스템 설계 및 구현)

  • Lee, Hyoung-Ro;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.197-202
    • /
    • 2016
  • In this paper, we propose optimal smart home security monitoring system. Proposeed optimal smart home security system using the three types of ultrasonic sensors were tested to obtain reliable data. and Using Raspberry Pi3, the smart home security system was implemented. In addition, It was verified through experiments optimal efficiency with a small amount compared to the conventional sensor of the home security system by the two ultrasonic sensors located in the optimal position. It was able to use two ultrasonic sensors to determine whether the intruder's highly efficient and reliable intrusion, and connect the servo motor at the bottom of the camera so you can shoot adjusted to the attacker's location to shoot the intruder's image. In addition, by using a Web server and stored the recorded image and two ultrasonic sensor data and provide a Web page for a user to monitor at all remote locations.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.