• 제목/요약/키워드: scheme

검색결과 29,291건 처리시간 0.041초

Adaptive Rate Control Scheme for Streaming-based Content Sharing Service

  • Lee, Sunghee;Chung, Kwangsue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.784-799
    • /
    • 2013
  • This paper presents an adaptive rate control scheme for streaming-based content sharing service. This scheme delivers multimedia contents from a user device to another device or seamlessly redirects streaming service across heterogeneous user devices. In the proposed scheme, a streaming server adjusts video quality level according to the network and client status. Our scheme is different from other rate control schemes, because the video quality at the server is decided not only based on the available bandwidth, but also based on the device characteristics and bandwidth requirement at the access network. We also propose a bandwidth estimation method to achieve more equitable bandwidth allocations among streaming flows competing for the same narrow link with different Round Trip Times (RTTs). Through the simulation, we prove that our scheme improves the network stability and the quality of streaming service by appropriately adjusting the quality of the video stream. The simulation results also demonstrate the ability of the proposed scheme in ensuring RTT-fairness while remaining throughput efficient.

WELL-BALANCED ROE-TYPE NUMERICAL SCHEME FOR A MODEL OF TWO-PHASE COMPRESSIBLE FLOWS

  • Thanh, Mai Duc
    • 대한수학회지
    • /
    • 제51권1호
    • /
    • pp.163-187
    • /
    • 2014
  • We present a multi-stage Roe-type numerical scheme for a model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage in the construction of the scheme computes the volume fraction at every time step. The second stage deals with the nonconservative terms in the governing equations which produces states on both side of the contact wave at each node. In the third stage, a Roe matrix for the two-phase is used to apply on the states obtained from the second stage. This scheme is shown to capture stationary waves and preserves the positivity of the volume fractions. Finally, we present numerical tests which all indicate that the proposed scheme can give very good approximations to the exact solution.

Improvement of Mobile U-health Service System Using Feces and Urine Sensing U-Care Scheme

  • Min, Byung-Won
    • International Journal of Contents
    • /
    • 제12권4호
    • /
    • pp.17-22
    • /
    • 2016
  • This paper presents a novel method to design and implement mobile u-health system by defining the essential elements of mobile healthcare services. We choose common service elements for the proposed u-healthcare scheme and design the service platform. Especially we focus on automatic feces or urine sensing u-care scheme to prove the effectiveness of our platform. We construct the system with sensing part with a manikin and a diaper, wireless communication part with feces or urine sensing data, and coordinator system based on the u-health platform defined in this paper. Experimental results show that our scheme is useful in the area of u-care service for the handicapped, the elderly, and patients who can hardly move by themselves. In addition the designed scheme offers a realized u-care scheme with the purpose of advanced developing tools for application or service developers.

효율성 제고를 위한 근사적 증거병합 방법 (An Approximate Evidence Combination Scheme for Increased Efficiency)

  • 이계성
    • 정보처리학회논문지B
    • /
    • 제9B권1호
    • /
    • pp.17-22
    • /
    • 2002
  • Dempster-Shafer 증거병합 방법의 가장 큰 문제는 계산 복잡도가 지수적인 증가를 갖는다는 점이다. 이는 가설 집단을 이루는 원소의 개수가 각 가설을 이루는 속성 값들의 모든 부분 집합으로 focal 요소로 구성되기 때문이다. 이 문제를 피하기 위해 본 논문에서는 근사적 증거 병합 방법을 제안한다. 이 방법은 간단한 응용에 적용하여 그 성능을 조사하고 다른 증거 병합 방법의 하나인 VBS의 결과와 비교해 본다. 근사적 증거 병합방법은 계산 속도를 크게 개선하였고 전문가가 허용하는 편차 수준에서 신뢰 값을 갖는 것으로 평가되었다.

UCI를 위한 식별 메타데이터 설계 (Design of Identification Metadata for UCI)

  • 박승범;이상원
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2013년도 제48차 하계학술발표논문집 21권2호
    • /
    • pp.97-99
    • /
    • 2013
  • Although UCI Identification metadata is not represented in the UCI syntax, it means a set of elements that enable users to easily and quickly identify. Against this backdrop, we research on how to design identification metadata for UCI. First of all, we check ISO/IEC 11179 and compare this with UCI properties. And then we defines nine components (such as UCI, Identifier, Title, Type, Mode, Format, Contributor, ContributorEntitiy, and ContributorRole) as elements of the identification metadata and establish encoding scheme with several parts (such as List of Encoding Scheme, Encoding Scheme of Identifier, Encoding Scheme of Type, Encoding Scheme of Mode, Encoding Scheme of Format, and Encoding Scheme of ContributorRole).

  • PDF

상용코드를 이용한 원심펌프 임펠러 유동평가 (Flow Evaluations of Centrifugal Pump Impeller Using Commercial Code)

  • 심창열;홍순삼;강신형
    • 유체기계공업학회:학술대회논문집
    • /
    • 유체기계공업학회 2000년도 유체기계 연구개발 발표회 논문집
    • /
    • pp.285-292
    • /
    • 2000
  • Numerical calculation is applied to centrifugal pump at design condition by using commercial code STAR-CD and Tascflow, and these results are compared with experimental data at impeller outlet. Numerical analysis is also performed by changing turbulence model and discretization scheme at design condition using Tascflow. Turbulence model and discretization scheme used to Tascflow are k-$\epsilon$, k-$\omega$ turbulence model and upwind, modified linear profile scheme. W;th the same turbulence model and discretization scheme, two results of STAR-CD and Tascflow are very similar. But there is significant difference in numerical results near hub and shroud of impeller with different kinds of turbulent model and discretization scheme at design condition. And with k- $\omega$ turbulence model and modified linear profile scheme, it is showed that numerical results are very similar to experimental results of impeller outlet

  • PDF

An Improved Smart Card-based User Authentication Scheme with Session Key Agreement for Telecare Medicine Information System

  • Yang, Hyungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권3호
    • /
    • pp.35-43
    • /
    • 2017
  • In 2013, Lee-Lie proposed secure smart card based authentication scheme of Zhu's authentication for TMIS which is secure against the various attacks and efficient password change. In this paper, we discuss the security of Lee-Lie's smart card-based authentication scheme, and we have shown that Lee-Lie's authentication scheme is still insecure against the various attacks. Also, we proposed the improved scheme to overcome these security problems of Lee-Lie's authentication scheme, even if the secret information stored in the smart card is revealed. As a result, we can see that the improved smart card based user authentication scheme for TMIS is secure against the insider attack, the password guessing attack, the user impersonation attack, the server masquerading attack, the session key generation attack and provides mutual authentication between the user and the telecare system.

High Level Object Oriented Real-Time Simulation Programming and Time-triggered Message-triggered Object(TMO) Scheme

  • Jeong, Chan-Joo;Na, Sang-Donh
    • 한국정보통신학회논문지
    • /
    • 제6권6호
    • /
    • pp.856-862
    • /
    • 2002
  • The object-oriented(00) distributed real-time(RT) programming movement started in1990's and is growing rapidly at this turn of the century. Distributed real-time simulation is a field in its infancy but it is bounded to receive steadily growing recognition for its importance and wide applicability. The scheme is called the distributed time-triggered simulation scheme which is conceptually simple and easy to use but widely applicable. A new generation object oriented(00) RT programming scheme is called the time-triggered message triggered object(TMO)programming scheme and it is used to make specific illustrations of the issues. The TMO structuring scheme is a general-style components structuring scheme and supports design of all types of component including hard real time objects and non real time objects within one general structure.

Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme

  • Li, Jiguo;Huang, Xinyi;Mu, Yi;Wu, Wei
    • Journal of Communications and Networks
    • /
    • 제10권1호
    • /
    • pp.10-17
    • /
    • 2008
  • In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificateless public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme.

양방향 중계 채널에서의 직교성을 이용한 네트워크 부호화 기법 (Network Coding Scheme using Orthogonality for Two-Way Relay Channel)

  • 옥준호;임진수;신동준
    • 한국통신학회논문지
    • /
    • 제36권3C호
    • /
    • pp.170-174
    • /
    • 2011
  • 본 논문은 양방향 중계 채널(Two-Way Relay Channel) 에서 기존에 연구되었던 협력 통신(Cooperative Communication) 에서 네트워크 부호화(Network Coding)에 대해 간단히 소개한다. 협력 통신 시스템에서의 직교성을 이용한 새로운 네트워크 부호화 기법을 제안한다. 제안된 직교 사상 네트워크 부호화 기법은 기존에 널리 사용되고 있는 DF(Decode-and-Forward) 모듈러 합 기법의 전송률을 유지하면서 DF 기법의 단점인 오류 전파(Error Propagation) 현상을 제거하여 향상된 BER(Bit Error Rate) 성능을 보인다.