• Title/Summary/Keyword: Timestamp

Search Result 128, Processing Time 0.025 seconds

A Study on the Modeling and Analysis of Cell Delay Variation Compensation using Variable Timestamp Method in the Satellite TDMA Transmission (위성 TDMA 전송에서 가변타임스탬프 방식의 셀 지연변이 보상의 모델과 해석)

  • 김정호;박진양
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1395-1406
    • /
    • 2001
  • In order to cover a widespread service range, terrestrial/satellite-mixed network is being combined with terrestrial ATM network. This dissertation analyzes and investigates several previously existent CDV compensation methods in order to compensate CDV arising from interfacing satellite TDMA and ATM. Specifically to supplement the problems of timestamp and cell number counting methods, new Variable Timestamp method for CDV compensation is proposed. To evaluate the proposed method, MMPP(Markov Modulated Poisson Process), which can express VBR service very well, is selected as a cell input traffic model of terrestrial transmitting earth station. After several simulation, it is also confirmed that CDV compensation capability for VBR services is very superior to the cell number counting method. In this case, as the timestamp number Nts increases, CDV compensation capability increases, and the CDV distribution length is reduced.

  • PDF

Automatic RTP Time-stamping Method for SVC Video Transmission (SVC 비디오 전송을 위한 RTP 타임스탬프 자동 생성 방법)

  • Seo, Kwang-Deok;Jung, Soon-Heung;Kim, Jae-Gon;Yoo, Jeong-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.471-479
    • /
    • 2008
  • In this paper, we propose a novel algorithm to automatically generate an RTP timestamp value that is required for the RTP packetization in order to transmit SVC video over various If networks such as Internet. Unlike the conventional single layer coding algorithms such as H.263, MPEG-4 and H.264, SVC generates a multi-layered single bitstream which is composed of a base layer and one or more enhancement layers in order to simultaneously provide temporal, spatial, and SNR scalability. Especially, in order to provide temporal scalability based on hierarchical B-picture prediction structure, the encoding (or transmission) and display order of pictures in SVC coding is completely decoupled. Thus, the timestamp value to be specified at the header of each RTP packet in video transmission does not increase monotonically according to the display time instant of each picture. Until now, no method for automatically generating an RTP timestamp when SVC video is loaded in a RTP packet has teen introduced. In this paper, a novel automatic RTP timestamp generation method exploiting the TID (temporal ID) field of the SVC NAL unit header is proposed to accommodate the SVC video transmission.

A Timestamp Tree-based Cache Invalidation Report Scheme in Mobile Environments (모바일 환경에서 타임스탬프 트리 기반 캐시 무효화 보고 기법)

  • Jung, Sung-Won;Lee, Hak-Joo
    • Journal of KIISE:Databases
    • /
    • v.34 no.3
    • /
    • pp.217-231
    • /
    • 2007
  • Frequent disconnection is connected directly to client's cache consistency problem in Mobile Computing environment. For solving cache consistency problem, research about Invalidation Report is studied. But, existent invalidation report structure comes with increase of size of invalidation report structure and decline of cache efficiency if quantity of data become much, or quantity of updated data increases. Also, while existent method confirms whole cache, invalidation report doesn't support selective listening. This paper proposes TTCI(Timestamp Tree-based Cache Invalidation scheme) as invalidation report structure that solve problem of these existing schemes and improve efficiency. We can make TTCI using timestamp of updated data, composing timestamp tree and list ID of data in updated order. If we utilize this, each client can confirm correct information in point that become own disconnecting and increase cache utilization ratio. Also, we can pare down client's resources consumption by selective listening using tree structure. We experimented in comparison with DRCI(Dual-Report Cache Invalidation) that is existent techniques to verify such efficiency of TTCI scheme.

A Steganographic Data Hiding Method in Timestamps by Bit Correction Technique for Anti-Forensics

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.75-84
    • /
    • 2018
  • In this research, a bit correction technique of data hiding method in timestamp of MFT entry in NTFS file system is proposed. This method is proposed in two ways, depending on the number of bytes of data to hide. A basic data hiding method using a bit correction technique to solve the problems of the conventional 2-byte technique is proposed. In order to increase the capacity of the data, a 3-byte data hiding method using an extended bit correction technique is proposed. The data hiding method in the timestamps is based on the fact that is not revealed in the Windows explorer window and the command prompt window even if any data is hidden in the timestamp area of less than one second. It is shown that the validity of the proposed method through the experimental two cases of the basic data hiding method by the bit correction method and the 3-byte data hiding method by the extended bit correction method.

A Digital Forensic Method by an Evaluation Function Based on Timestamp Changing Patterns (타임스탬프 변화패턴을 근거로 한 평가함수에 의한 디지털 포렌식 방법)

  • Cho, Gyu Sang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.91-105
    • /
    • 2014
  • This paper proposes a digital forensic method by an evaluation function based on timestamp changing patterns. Operations on file or folder leave changed timestamps, which give the ways to know what operations were executed. Changes of timestamps of ten operations of a file and eight operations of a folder were examined. Analyses on the changes on the eight folder operations are newly added in this paper, which are not performed in the previous works. Based on the timestamps changes of the file and the folder, two evaluation functions are proposed. The first evaluation function checks whether timestamps are changed by file and folder operations, and the second evaluation function checks whether timestamps are originated from a source file or other attribute field. By the two output values from these evaluation functions, a digital forensic investigation on the file or the folder is performed. With some cases, i. e. file copy and folder creation operations, the proposed forensic method is tested for its usefulness.

Performance Improvement Technique of AODV Protocol Using Timestamp per Hop Count in Ad Hoc Networks (Ad Hoc 네트워크에서 Hop 수에 따른 Timestamp 적용을 이용한 AODV 프로토콜 성능 향상 기법)

  • Choi, Jae-Hyung;Shin, Jong-Won;Cho, Hwan-Gue
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.1229-1232
    • /
    • 2003
  • Ad Hoc 네트워크에서 on demand 라우팅 프로토콜로 대표적인 AODV(Ad Hoc On Demand Distance Vector Routing)는 table driven 기반의 라우팅 프로토콜과 비교해 active route만을 라우팅 테이블에 저장하기 때문에 오버헤드가 작고 경로단절시 경로복구를 통해 경로 재설정할 수 있는 장점을 가지고 있으나 경로복구시 대역폭 낭비가 심하고 복구시간이 길다는 drawback을 가지고 있다. 이러한 단점은 많은 라우팅 패킷의 발생으로 기인하는 점이 있다. 본 논문에서는 Expanding Ring Search 알고리즘에서 time out은 timestamp를 이용하여 네트워크 상황에 맞게 가변적으로 적용하는 알고리즘을 개선하여 hop 수에 따라 node traversal time을 설정하도록 제안하였다. 제안한 알고리즘은 시뮬레이션을 통하여 검증하였으며 라우팅 패킷의 발생을 줄이고 throughput에서 향상을 보였다.

  • PDF

A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices

  • Han, Jaehyeok;Lee, Sangjin
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.402-410
    • /
    • 2022
  • Digital data can be manipulated easily, so information related to the timestamp is important in establishing the reliability of the data. The time values for a certain file can be extracted following the analysis of the filesystem metadata or file internals, and the information can be utilized to organize a timeline for a digital investigation. Suppose the reversal of a timestamp is found on a mobile device during this process. In this case, a more detailed analysis is required due to the possibility of anti-forensic activity, but little previous research has investigated the handling and possible manipulation of timestamps on mobile devices. Therefore, in this study, we determine how time values for multimedia files are handled according to the operating system or filesystem on mobile devices. We also discuss five types of timestamps-file created (C), last modified (M), last accessed (A), digitalized (Di), and filename (FN) of multimedia files, and experimented with their operational features across multiple devices such as smartphones and cameras.

Timestamp based Concurrency Control for Read-Only Transaction in Broadcast Disks Environment (방송 디스크 환경에서 읽기 전용 트랜잭션을 위한 타임스탬프 기반 동시성 제어)

  • Lim Sungjun;Cho Haengrae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.317-323
    • /
    • 2005
  • Broadcast disks are suited for disseminating information to a large number of clients in mobile computing environments. In broadcast disks, the server continuously and repeatedly broadcasts all data items in the database to clients without specific requests. The clients monitor the broadcast channel and retrieve data items as they arrive on the broadcast channel. The broadcast channel then becomes a disk from which clients can retrieve data items. This paper proposes a Timestamp based Concurrency Control (TCC) scheme to preserve the consistency of read-only client transactions, when the values of broadcast data items are updated at the server. Previous schemes tried to reduce transaction aborts by consuming considerable amount of downlink communication from the server to clients for transferring control information. On the other hand, the TCC uses a timestamp field of each data item to describe execution order of server transactions. Clients can allow more transaction executions by checking consistency of their read-only transactions with timestamps of data items. As a result, the TCC can reduce the abort ratio of client transactions with minimal control information to be broadcast from the server.

Peer Indexing Scheme using Efficient Data Dissemination in Mobile P2P Environment (이동 P2P 환경에서 효율적인 데이터 전송을 이용한 피어 색인 기법)

  • Kwak, Dong-Won;Bok, Kyoung-Soo;Park, Yong-Hun;Jeong, Keun-Soo;Choi, Kil-Sung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.26-35
    • /
    • 2010
  • In this paper, we propose the peer indexing scheme using data dissemination considering content and mobility. The proposed scheme consists of an index table, a buddy table, a routing table to support the cost of data dissemination, the search accuracy and cost. In this proposed scheme, a neighbor peer is recognized through a signal function and the cost of data dissemination is reduced by timestamp message. The transmitted messages are stored in the index structure considering timestamp and weight of interests which improves search accuracy and reduces the cost of search.

Detection of Malicious Node using Timestamp in USN Adapted Diffie-Hellman Algorithm (Diffie-Hellman 알고리즘이 적용된 USN에서 타임스탬프를 이용한 악의적인 노드 검출)

  • Han, Seung-Jin;Choi, Jun-Hyeog
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.115-122
    • /
    • 2009
  • In this paper, we proposed scheme that we use a difference of timestamp in time in Ubiquitous environments as we use the Diffie-Hellman method that OTP was applied to when it deliver a key between nodes, and can detect a malicious node at these papers. Existing methods attempted the malicious node detection in the ways that used correct synchronization or directed antenna in time. We propose an intermediate malicious node detection way at these papers without an directed antenna addition or the Trusted Third Party (TTP) as we apply the OTP which used timestamp to a Diffie-Hellman method, and we verify safety regarding this. A way to propose at these papers is easily the way how application is possible in Ubiquitous environment.