• Title/Summary/Keyword: telecommunication network

Search Result 1,262, Processing Time 0.032 seconds

A Study on Telcos′ Strategies to Digital Converged Service and Its Prospects; Focusing on TV-based VOD Service (통신사업자의 통신방송 융합사업 진출전략 및 전망 - TV-based VOD를 중심으로 -)

  • 조병선;황호영
    • Journal of Korea Technology Innovation Society
    • /
    • v.7 no.2
    • /
    • pp.459-479
    • /
    • 2004
  • As the high-speed internet access market steadily nears its maturity phase, growth is quickly tapering off and competition, intensifying. As a result telecommunications companies are at present faced with the urgent need to evolve away from a growth model based on continuous acquisition of new subscribers. The recent convergence of telecommunication and broadcasting has come about precisely at this transitional period in the telecommunications market, and is perceived by the industry both as a new business opportunity and as a threat. TV-based VOD(Video on Demand), for one, is able to attract new customers desiring multimedia services of superior quality and to lock-in existing customers. Meanwhile, the latest evolution in network development is brightening the market prospect for TV-based VOD. The service has now hit the market, deployed over VDSL networks - a next-generation high-speed internet - and advanced cable modem networks, delivering high-definition DVD-quality videos. TV-based VOD is a service whose deployment is closely linked to the evolution of subscriber networks. According to the forecast produced by the present study, based on the forecast on the post-ADSL market and a survey conducted on VOD, as post-ADSL subscribers increase from 1.53 million in 2003 to 4.44 million in 2004, and 9.87 million in 2006, the percentage of post-ADSL subscribers with intention to also subscribe to a VOD service is expected to rise from 16% to 34% in 2006. Accordingly, VOD subscribers are estimated to increase from 0.24 million in 2003 to 0.98 million in 2004 and to 3.35 million in 2006.

  • PDF

Diffusion Patterns of Mobile Telecommunications Services in the European Countries (이동통신서비스 확산패턴 - 유럽국가 자료를 중심으로)

  • Kim, Jin Ki
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.4
    • /
    • pp.1243-1261
    • /
    • 2017
  • Mobile telecom markets have dramatically increased in the last decade due to a remarkable subscriber base growth. The diffusion patterns of the services are a major concern for mobile carriers preparing those new services. We assume that the diffusion patterns of those services will be similar to those of previous mobile services, and discovering the diffusion patterns of those services is an essential task of mobile carriers for preparing the next mobile services. This study attempts to classify some groups which show similar diffusion patterns of mobile services. Using a traditional diffusion model, this study estimates diffusion patterns of twenty five western European countries. The estimation is based on the monthly penetration ratio of those countries from 1993 to 2004. Based on the estimation, the cluster analysis discovers that there are two different countries groups in terms of mobile diffusion pattern: high imitation countries and low imitation countries. The critical point for classifying the two groups in terms of imitation effect was 0.90. The results provide the basis for developing a causal relationship model which explains the different diffusion pattern of mobile services and planning new networks for the advanced mobile services.

Algorithmic Generation of Self-Similar Network Traffic Based on SRA (SRA 알고리즘을 이용한 Self-Similar 네트워크 Traffic의 생성)

  • Jeong HaeDuck J.;Lee JongSuk R.
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.281-288
    • /
    • 2005
  • It is generally accepted that self-similar (or fractal) Processes may provide better models for teletraffic in modem computer networks than Poisson processes. f this is not taken into account, it can lead to inaccurate conclusions about performance of computer networks. Thus, an important requirement for conducting simulation studies of telecommunication networks is the ability to generate long synthetic stochastic self-similar sequences. A generator of pseudo-random self similar sequences, based on the SRA (successive random addition) method, is implemented and analysed in this paper. Properties of this generator were experimentally studied in the sense of its statistical accuracy and the time required to produce sequences of a given (long) length. This generator shows acceptable level of accuracy of the output data (in the sense of relative accuracy of the Hurst parameter) and is fast. The theoretical algorithmic complexity is O(n).

A Bandwidth Allocation Method by Internet Service Types - Focus on Elementary and Middle Schools (인터넷 서비스 유형별 대역폭 할당 방안 - 초.중등학교 중심으로)

  • Park, Hyeong-Yong;Hwang, Jun;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.49-57
    • /
    • 2010
  • Today, internet traffic is rapidly increasing by the appearance of a large number of website thru a numerous internet service provider and the introduction of advanced teaching methods like utilizing ICT(Information and Communication Technology) education. At these actualities, it is requested to increase internet bandwidth in the scene of school; however, it is difficult to resolve the request quickly because of the government's budget and technical problems. In this circumstance, this paper proposes a method to raise the efficiency of internet operations with the current bandwidth. In order to achieve the purpose of this paper, the analysis of internet traffic has been done by the traffic currently being used in school, and an internet bandwidth distribution model differ from the existing standpoint is developed with the analyzed result. It can be used to predict the increase in the bandwidth which may be requested at school in the future, and it can support the office of education for appropriate bandwidth allocation at schools and reduction of school budget in telecommunication. Also, it can be adopted as a future oriented reference model for network policy.

A Group Update Technique based on a Buffer Node to Store a Vehicle Location Information (차량 위치 정보 저장을 위한 버퍼 노드 기반 그룹 갱신 기법)

  • Jung, Young-Jin;Ryu, Keun-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.1
    • /
    • pp.1-11
    • /
    • 2006
  • It is possible to track the moving vehicle as well as to develop the location based services actively according to the progress of wireless telecommunication and GPS, to the spread of network, and to the miniaturization of cellular phone. To provide these location based services, it is necessary for an index technique to store and search too much moving object data rapidly. However the existing indices require a lot of costs to insert the data because they store every position data into the index directly. To solve this problem in this paper, we propose a buffer node operation and design a GU-tree(Group Update tree). The proposed buffer node method reduces the input cost effectively since the operation stores the moving object location data in a group, the buffer node as the unit of a non-leaf node. hnd then we confirm the effect of the buffer node operation which reduces the insert cost and increase the search performance in a time slice query from the experiment to compare the operation with some existing indices. The proposed tufter node operation would be useful in the environment to update locations frequently such as a transportation vehicle management and a tour-guide system.

Implementation of Ubiquitous Application based on Context-Awareness (상황 인식 기반의 유비쿼터스 어플리케이션 구현)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.744-751
    • /
    • 2008
  • Ubiquitous computing is a new paradigm of telecommunication technology and is embedded with advanced computing technology to process a large amount of data in a normal environment. Generally, ail equipment is embedded with sensors and operating devices to interaction with communication functions. That is why ubiquitous computing must be able to access any devices anywhere at anytime in order to perform appropriate functions. Unfortunately, however, it is difficult to make an optimized design for applications which can effectively interaction with various functions in distributed environment like ubiquitous computing. Therefore, this paper is aimed at deploying interface with server nodules and virtual prototyping by utilizing LabVIEW and embedded application software with additional network function. In addition, given information about sensors collected from context-awareness and location-awareness, it will suggest the ideal ubiquitous application based on context-awareness and apply the advanced application to device control and monitoring through context awareness of lab.

Real-time Intelligent Health and Attention Monitoring System for Car Driver by Measurement of Vital Signal (생체신호 측정에 의한 실시간 지능형 운전자 건강 및 주의 모니터링 시스템)

  • Shin, Heung-Sub;Jung, Sang-Joong;Seo, Yong-Su;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.545-548
    • /
    • 2009
  • Recently, researches related to automative mechanism have been widely studied to increase the driver's safety by continuously monitoring the driver's health condition to prevent driver's drowsiness. This paper describes the design of wearable chest belt for ECG and reflectance pulse oximetry for $SpO_2$ sensors based on wireless sensor network to monitor the driver's healthcare status. ECG, $SpO_2$ and heart rate signals can be transmitted via wireless sensor node to base station connected to the server. Intelligent monitoring system is designed at the server to analyze the $SpO_2$ and ECG signals. HRV(Heart Rate Variability) signals can be obtained by processing the ECG and PPG signals. HRV signals are further analyzed based on time and frequency domain to determine the driver's drowsiness status.

  • PDF

Recognition of Occluded Face (가려진 얼굴의 인식)

  • Kang, Hyunchul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.682-689
    • /
    • 2019
  • In part-based image representation, the partial shapes of an object are represented as basis vectors, and an image is decomposed as a linear combination of basis vectors where the coefficients of those basis vectors represent the partial (or local) feature of an object. In this paper, a face recognition for occluded faces is proposed in which face images are represented using non-negative matrix factorization(NMF), one of part-based representation techniques, and recognized using an artificial neural network technique. Standard NMF, projected gradient NMF and orthogonal NMF were used in part-based representation of face images, and their performances were compared. Learning vector quantizer were used in the recognizer where Euclidean distance was used as the distance measure. Experimental results show that proposed recognition is more robust than the conventional face recognition for the occluded faces.

Position Tracking Method in Construction field using IT Technology (IT기술을 이용한 건설현장 내 위치관제 기법)

  • Kim, Hyun-soo;Do, Seoung-bok;Choi, Hyun-young;Jang, Young-gu;Jeon, Heung-su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.475-478
    • /
    • 2014
  • This paper proposed the position tracking and recognition method of workers and cars in construction field. The reason why the position of workers and cars has to be tracked is to prevent the safety accident, emergency rescue, and theft of building materials by unauthorized people and car, etc. To realize the tracking, it needs to adopt the Information Telecommunication technology to the construction field as an integrated support system. In this paper, we proposed the continuous positioning tracking algorithm for workers and moving cars using the selected wireless communication network. And we proposed the virtual gateway method to detect the entrance status of moving workers and cars. All of these proposed methods are evaluated in real construction field using the prototype of support system made by ourselves.

  • PDF

Device Caching Strategy Maximizing Expected Content Quality

  • Choi, Minseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.111-118
    • /
    • 2021
  • This paper proposes a novel method of caching contents that can be encoded into multiple quality levels in device-to-device (D2D)-assisted caching networks. Different from the existing caching schemes, the author allows caching fractions of an individual file and considers the self cache hit event, which the user can find the desired content in its device. The author analyzes the tradeoff between the quality of cached contents and the cache hit rate, and proposes the device caching method maximizing the expected quality that the user can enjoy. Depending on the parameter of the relationship between the quality and the file size, the optimal caching method can be obtained by solving the convex optimization problem and the DC programming problem. If the file size increases faster than the quality, the cached fractions of the contents continuously increase as the popularity grows. Meanwhile, if the file size increases slower than the quality, some of the high-popularity files are entirely cached but others are not cached at all.