• Title/Summary/Keyword: information layer

Search Result 5,632, Processing Time 0.043 seconds

Cross-layer Video Streaming Mechanism over Cognitive Radio Ad hoc Information Centric Networks

  • Han, Longzhe;Nguyen, Dinh Han;Kang, Seung-Seok;In, Hoh Peter
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3775-3788
    • /
    • 2014
  • With the increasing number of the wireless and mobile networks, the way that people use the Internet has changed substantively. Wireless multimedia services, such as wireless video streaming, mobile video game, and mobile voice over IP, will become the main applications of the future wireless Internet. To accommodate the growing volume of wireless data traffic and multimedia services, cognitive radio (CR) and Information-Centric Network (ICN) have been proposed to maximize the utilization of wireless spectrum and improve the network performance. Although CR and ICN have high potential significance for the future wireless Internet, few studies have been conducted on collaborative operations of CR and ICN. Due to the lack of infrastructure support in multi-hop ad hoc CR networks, the problem is more challenging for video streaming services. In this paper, we propose a Cross-layer Video Streaming Mechanism (CLISM) for Cognitive Radio Ad Hoc Information Centric Networks (CRAH-ICNs). The CLISM included two distributed schemes which are designed for the forwarding nodes and receiving nodes in CRAH-ICNs. With the cross-layer approach, the CLISM is able to self-adapt the variation of the link conditions without the central network controller. Experimental results demonstrate that the proposed CLISM efficiently adjust video transmission policy under various network conditions.

Design and Implementation of TCP Supporting Optional Encryption Functionalities (선택적인 암호화 기능을 지원하는 TCP의 설계 및 구현)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.190-195
    • /
    • 2018
  • Recently, Due to the ongoing increase in cyber attacks and the improved awareness of privacy protection, most Internet services encrypt the traffic by using security protocols. Existing security protocols usually have additional layer between transport layer and application layer, and they incur additional costs because of encrypting all the traffic transmitted. This results in unnecessary performance degradation because it also encrypts data that does not require confidentiality. In this paper, we propose TCP OENC(Optional Encryption) which enables users of the application layer to optionally encrypt only confidential data. TCP OENC operates by TCP option to allow the application layer to encrypt the TCP stream transmitted only on demand. And it ensures transparency between the TCP layer and the application layer. To verify this, we verified that TCP OENC optionally encrypts the stream of TCP session on the embedded board. And then analyzed the performance of the encrypted stream by measuring the elapsed time.

256 bit Symmetric SPN Block cipher XSB (256 비트 대칭 SPN 블록 암호 XSB)

  • Cho, Gyeong-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.9-17
    • /
    • 2012
  • In this paper, we propose a SPN 256 bit block cipher so called XSB(eXtended SPN Block cipher) which has a symmetric structure in encryption and decryption. The proposed XSB is composed of the even numbers of N rounds where the first half of them, 1 to N/2-1 round, applies a pre-function and the last half of them, N/2+1 to N round, employs a post-function. Each round consists of a round key addition layer, a substiution layer, a byte exchange layer and a diffusion layer. And a symmetry layer is located in between the pre-function layer and the post-function layer. The symmetric layer is composed with a multiple simple bit slice involution S-Boxes. The bit slice involution S-Box symmetric layer increases difficult to attack cipher by Square attack, Boomerang attack, Impossible differentials cryptanalysis etc.

Uplink Achievable Rate analysis of Massive MIMO Systems in Transmit-correlated Ricean Fading Environments

  • Yixin, Xu;Fulai, Liu;Zixuan, Zhang;Zhenxing, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.261-279
    • /
    • 2023
  • In this article, the uplink achievable rate is investigated for massive multiple-input multiple-output (MIMO) under correlated Ricean fading channel, where each base station (BS) and user are both deployed multiple antennas. Considering the availability of prior knowledge at BS, two different channel estimation approaches are adopted with and without prior knowledge. Based on these channel estimations, a two-layer decoding scheme is adopted with maximum ratio precoding as the first layer decoder and optimal second layer precoding in the second layer. Based on two aforementioned channel estimations and two-layer decoding scheme, the exact closed form expressions for uplink achievable rates are computed with and without prior knowledge, respectively. These derived expressions enable us to analyze the impacts of line-of-sight (LoS) component, two-layer decoding, data transmit power, pilot contamination, and spatially correlated Ricean fading. Then, numerical results illustrate that the system with spatially correlated Ricean fading channel is superior in terms of uplink achievable rate. Besides, it reveals that compared with the single-layer decoding, the two-layer decoding scheme can significantly improve the uplink achievable rate performance.

2-D MMFF Model and Performance Analysis of 2-layer coded Video Traffic Sources (2-차원 MMFF 모델을 이용한 2-계층 부호화 영상 트래픽의 모델링 및 성능 분석)

  • 안희준;노병희;김재균
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.1
    • /
    • pp.17-32
    • /
    • 1996
  • In this paper, a model for two-layered video traffic is proposed. The performance analysis of the proposed model and the effects of two-layer coding scehemes in ATM networks are also studied. ATM-based networks give the possibility to support image codingat variable bit rate(VBR). Two layer coding is one of the very promising methods among many proposed methods to compensate the cell loss, the major drawback in ATM networks. From the experimental data of the 2-layer coded video traffics, it is observed that traffic patterns of base layer and enhanced layer are highly correlate to each other, when constant image quality is kept. With this observation, coded two layered video traffic can be modeled as 2-dimensional Markov chain. The model well fit the real experimental data. The model was used for the analysis of the performance of statistical multiplexer with priorites in ATM networks.

  • PDF

Application of Submarine Stealth for Non-acoustic Detecting (비음향 탐지억제를 위한 잠수함의 스텔스 적용)

  • Choi, Chang-Mook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.263-265
    • /
    • 2012
  • 잠수함이 가장 취약한 시기는 잠수함이 스노클이나 잠망경 운용을 위하여 잠망경 심도로 항해할 경우이며, 이때에는 비음향 탐지센서인 레이더와 광학, 사람에 의한 시각에 탐지될 확률이 매우 높다. 따라서 본 논문에서는 이러한 상황에서 탐지되는 취약성을 극복하고자 잠수함 마스트 및 잠망경 부분에 비음향 스텔스를 적용하고자 한다. 먼저 비음향 탐지센서에 대해서 조사하고, 그에 따른 스텔스 기법을 분야별 분석하여 최적화한 결과 다층형 구조로 선체표면부터 RAM layer, IR layer, Camouflage layer 구조로 각각 RAM layer는 자성재료인 페라이트계열로 3~5mm, IR layer는 Ceramic 또는 Nickel 계열로 1~2mm, Camouflage layer는 군청색 계열 페인팅을 제시하였다.

  • PDF

The decision method of free buffer size in hardware protocol stack (Hardware protocol stack에서 free buffer size결정 방법)

  • Moon, Choon-Kyoung;Kim, Young-Keun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.212-214
    • /
    • 2004
  • Hardware implemented ring buffer systems and methods are presented for the effective management of the ring buffer in TCP/IP communication. The layer interface of the ring buffer systems transfer free buffer and used buffer size information to the TCP/IP stack upper or low layer. The pointer updation interface calculates a temporary pointer from the data size which is needed by the present pointer of the ring buffer and upper or lowyer layer. The pointer manager of the ring buffer systems is responsible for saving the present pointer of the ring buffer, updating the ring buffer pointer to the new pointer, calculating the free buffer size and used buffer size of the ring buffer, and transferring the information to the upper layer. The ring buffer systems help the TCP/IP layer and TCP/IP upper or lower layer to decide the sending or receiving data size effectively. The delay of transferring data can be lowered by the ring buffer system.

  • PDF

Adaptable Online Game Server Design

  • Seo, Jintaek
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.82-87
    • /
    • 2020
  • This paper discusses how to design a game server that is scalable, adaptable, and re-buildable with components. Furthermore, it explains how various implementation issues were resolved. To support adaptability, the server comprises three layers: network, user, and database. To ensure independence between the layers, each layer was designed to communicate with each other only via message queues. In this architecture, each layer can have an arbitrary number of threads; thus, scalability is guaranteed for each layer. The network layer uses input/output completion ports(IOCP), which shows the best performance on the Windows platform, it can handle up to 5,000 simultaneous connections on a typical entry-level computer, despite being built with a single-threaded user layer. To completely separate the database from the game server, the SQL code was not directly embedded in the database layer.

The Effects of Hydrophobic Buffer Layer Without Losing Dielectric Property on Organic Transistors

  • Song, June-Yong;Jung, Jae-Il;Choi, Yoon-Seuk;Kim, Hak-Rin;Kim, Jae-Hoon
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.737-740
    • /
    • 2007
  • The buffer layer was spin-coated on the dielectric layer of OTFTs to introduce the hydrophobicity for enhancing the device performance. this functional layer contains the water-proof ingredient to reduce the surface energy and more importantly, does not harm the dielectric property of the dielectric layer. With the help of proposed hydrophobic layer, the transistor showed dramatic improvement at electrical performance which was almost 20 times higher mobility compared to the non-treated case. And on/off ratio was also guaranteed as $10^{5{\sim}6}$.

  • PDF

New Approach to Optimize the Size of Convolution Mask in Convolutional Neural Networks

  • Kwak, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • Convolutional neural network (CNN) consists of a few pairs of both convolution layer and subsampling layer. Thus it has more hidden layers than multi-layer perceptron. With the increased layers, the size of convolution mask ultimately determines the total number of weights in CNN because the mask is shared among input images. It also is an important learning factor which makes or breaks CNN's learning. Therefore, this paper proposes the best method to choose the convolution size and the number of layers for learning CNN successfully. Through our face recognition with vast learning examples, we found that the best size of convolution mask is 5 by 5 and 7 by 7, regardless of the number of layers. In addition, the CNN with two pairs of both convolution and subsampling layer is found to make the best performance as if the multi-layer perceptron having two hidden layers does.