• Title/Summary/Keyword: Inter-Session

Search Result 43, Processing Time 0.028 seconds

An Efficient Distribution Method of Inter-Session Shared Bandwidth Based on Fairness (공정성 기반의 세션간 공유 대역폭의 효율적 분배 기법)

  • Hwang, Kil-Hong;Ku, Myung-Mo;Kim , Sang-Bok
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.905-912
    • /
    • 2004
  • It is a study LVMPD to solve the fairness problem of inter-session shared bandwidth. Whenever congestion occurs in one session, the highest layer is dropped. Also the highest layer of other sessions in non-congestion is dropped by iner-session fairness. While there is spare bandwidth, receivers of session in non-congestion can't use bandwidth efficiently. In this paper, we proposed a distribution method to use efficiently spare bandwidth that occurred by inter-session fairness. In our method, we considered the highest layer those receivers receiving and the higher layer those receivers requesting. The sender assigns the packet-deleting priority to packets when congestion occurs in receivers, and sets layer add/drop flag when receivers of session in non-congestion request the higher layer. The switch deletes packets with packet-deleting priority and transfers packets with layer add/drop flag for session in non-congestion. Therefore receivers of session in non-congestion can add the higher layer. In experimental results, it was known that proposed algorithm use the inter-session shared bandwidth more effectively compared with already known method.

  • PDF

Session Control Mechanism for Peer-to-Peer IPTV Services (P2P IPTV 서비스를 위한 세션 제어 메카니즘)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.87-92
    • /
    • 2008
  • This paper proposes a session control model for the P2P(Peer to Peer) IPTV(Internet Protocol Television) services and presents the IPTV session control procedures based on the proposed model. Since, while public IPTV traffic is usually processed via a separate network, P2P IPTV traffic is processed together with the conventional Internet access traffic, the P2P IPTV control mechanism needs to provide multi-stream processing for the constituent TPS(Triple Play Service) traffic and corresponding QoS(Quality of Service) control functions. Besides, P2P IPTV session control mechanism should provide appropriate multicast control functions in order to support effective transmission of video traffic generated by personal IPTV broadcasters. The P2P IPTV session control model proposed in this paper is designed to be based on the standard SIP(Session Initiation Protocol), IGMP(Internet Group Management Protocol), and COPS(Common Open Policy Service) protocol so that it can contribute to the easy and prompt deployment of inter-operable P2P IPTV platform.

Reliability Study of Measuring Range of Motion Glenohumeral Joint Internal Rotation With Pressure Biofeedback Stabilization

  • Hwang, Ui-jae;Ha, Sung-min;Jeon, In-chul;Jung, Sung-hoon;Choi, Kyu-hwan;Kim, Su-jung;Kwon, Oh-yun
    • Physical Therapy Korea
    • /
    • v.22 no.4
    • /
    • pp.62-70
    • /
    • 2015
  • The aims of the current study were to assess reliability of range of motion (ROM) measurement of glenohumeral internal rotation (GIR) with a pressure biofeedback stabilization (PBS) method and to compare the reliability between manual stabilization (MS) and the PBS method. In measurement of pure glenohumeral joint motion, scapular stabilization is necessary. The MS method in GIR ROM measurement was used to restrict scapular motion by pressing the palm of the tester's hand over the subject's clavicle, coracoid process, and humeral head. The PBS method was devised to maintain consistent pressure for scapular stabilization during GIR ROM measurement by using a pressure biofeedback unit. GIR ROM was measured by 2 different stabilization methods in 32 subjects with GIR deficit using a smartphone clinometer application. Repeated measurements were performed in two test sessions by two testers to confirm inter- and intra-rater reliability. After tester A performed measurements in test session 1, tester B's measurements were conducted one hour later on the same day to assess the inter-rater reliability and then tester A performed again measurements in test session 2 for confirming the intra-rater reliability. Intra-class correlation coefficient (ICC) (2,1) was applied to assess the inter-rater reliability and ICC (3,1) was applied to determine the intra-rater reliability of the two methods. In the PBS method, the intra-rater reliability was excellent (ICC=.91) and the inter-rater reliability was good (ICC=.84). The inter-rater and intra-rater reliability of the PBS method was higher than in the MS method. The PBS method could regulate manual scapular stabilization pressure in inter- and intra-rater measuring GIR ROM. Results of the current study recommend that the PBS method can provide reliable measurement data on GIR ROM.

Tree-based Navigation Pattern Analysis

  • Choi, Hyun-Jip
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.1
    • /
    • pp.271-279
    • /
    • 2001
  • Sequential pattern discovery is one of main interests in web usage mining. the technique of sequential pattern discovery attempts to find inter-session patterns such that the presence of a set of items is followed by another item in a time-ordered set of server sessions. In this paper, a tree-based sequential pattern finding method is proposed in order to discover navigation patterns in server sessions. At each learning process, the suggested method learns about the navigation patterns per server session and summarized into the modified Rymon's tree.

  • PDF

Supporting Service Continuity in Ubiquitous Network Environment with IMS Extension (IMS 확장을 통한 유비쿼터스 네트워크 환경에서의 서비스 연속성 지원)

  • Yim, Jong-Choul;Bae, Hyun-Joo;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1148-1159
    • /
    • 2012
  • It is of great significance in the NGN - which supports a ubiquitous network environment in which users can use multiple devices and all the devices are connected to networks - to support the terminal mobility as well as service continuity. The IMS architecture, which is considered as session control layer in the NGN, exists to support a wide range of advanced new services in addition to the traditional voice and data connectivity offerings of "old" telecommunications. The recent IMS specification also defines IUT (Inter UE Session Transfer) functionality in order to support service continuity in the NGN. However, service continuity in IMS has a limitation that two terminals involved in session transfer should belong to the same user. In this paper, we proposed a new device discovery mechanism for IMS and extended UEs with a few capabilities to overcome some of IMS's limitations. We also analysed how much overhead of the proposed method in terms of signaling cost will be.

Normal MR Spectroscopic Findings of the Cerebellum and Pons: Comparison of the Results between Intra-Unit and Inter-Unit Studies (소뇌와 뇌교의 정상 자기공명분광 소견: 같은 장비내 및 다른 장비간의 결과 비교)

  • 최준일;장기현;송인찬;도강현;이준우
    • Investigative Magnetic Resonance Imaging
    • /
    • v.5 no.2
    • /
    • pp.123-129
    • /
    • 2001
  • Purpose: The purposes of this study are to evaluate normal MR spectroscopy (MRS) data of the cerebellum and pons, and to evaluate intra-unit and inter-unit differences of the results. Materials and methods: Nine normal volunteers (mean age 23 years) were studied with two 1.5 Tesla MR units (A and B units). A total of four sessions of MRS study were performed with two sessions in ea.ch MR unit in each volunteer. In each session, MRS data were obtained from bilateral cerebellar hemisphere and pons. MRS was performed using spin-echo single voxel technique with repetition time of 2000 ms, echo time of 288ms and 128 averagings. Voxel size was $2{\;}{\times}{\;}2{\;}{\times}{\;}1.5{\;}cm$ in the cerebellum and $1.5{\;}{\times}{\;}1.5{\;}{\times}{\;}1.5{\;}cm$ in the pons. Metabolite ratios of NAA/Cho, NAAcCr, NAAc(Cho+Cr) and Cr/Cho (both peak heights and the peak areas) were compared among the results of four sessions of MRS for evaluation of intra-unit and inter-unit differences. Results: In the cerebellum, mean (SO values of peak height NAA/Cho, NAA/Cr, NAA/(Cho+Cr) and Cr/Cho ratios obtained in the first session of A unit were $1.08{\pm}O.16,{\;}1.44{\pm}O.286,{\;}0.61{\pm}O.09{\;}and{\;}O.76{\pm}0.13$, respectively. Comparing with the results of the second session, intra-unit differences were 3-7%. In B unit intra-unit differences were 1-9%, except for 22% of Cr/Cho ratio. Inter-unit differences between A and B units were 1-26%. In the pons, mean ISD values of peak height NANCho, NANCr, NANICho + Cr) and Cr/Cho ratios obtained in the first session of A unit were $1.51{\pm}O.35,{\;}3.35{\pm}O.78,{\;}1.02{\pm}0.16{\;}and{\;}0.47{\pm}O.14$, respectively. Mean NAAfCho, NANCr and NAAI(Cho+ Cr} ratios of the pons were significantly higher than those of the cerebellum. Intra-unit differences were 2-21 % in A unit and 4-18 % in B unit. Inter-unit differences between A and B units were 1-18%. The mean values obtained by using peak area were generally higher and wider in range than those of peak height in both units. Conclusion: Mean NAAfCho, NAAlCr and NAAf(Cho+Cr) ratios of the cerebellum were significanHy lower than those of the pons. Intra-unit differences of most metabolites ratios were generally not significant, whereas inter-unit differences were greater than intra-unit differences in more metabolite ratios. Therefore, normal MRS data of the cerebellum and the pons should be obtained in every MR unit, before MRS applications in the diseases of the cerebellum and the pons.

  • PDF

A Session Key Establishment Scheme in Mobile Ad-Hoc Networks (이동 애드혹 네트워크에서 세션 키 설정 방안)

  • 왕기철;정병호;조기환
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.353-362
    • /
    • 2004
  • Mobile Ad-Hoc network tends to expose scarce computing resources and various security threats because all traffics are carried in air along with no central management authority. To provide secure communication and save communication overhead, a scheme is inevitable to serurely establish session keys. However, most of key establishment methods for Ad-Hoc network focus on the distribution of a group key to all hosts and/or the efficient public key management. In this paper, a secure and efficient scheme is proposed to establish a session key between two Ad-Hoc nodes. The proposed scheme makes use of the secret sharing mechanism and the Diffie-Hellman key exchange method. For secure intra-cluster communication, each member node establishes session keys with its clusterhead, after mutual authentication using the secret shares. For inter-cluster communication, each node establishes session keys with its correspondent node using the public key and Diffie-Hellman key exchange method. The simulation results prove that the proposed scheme is more secure and efficient than that of the Clusterhead Authentication Based Method(1).

An Inter-provider Roaming Authentication and Key Establishment Protocol Providing Anonymity in IEEE 802.16e Networks (IEEE 802.16e 네트워크에서 익명성을 제공하는 사업자간 로밍 인증 및 키 설정 프로토콜)

  • Park, Young-Man;Park, Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11C
    • /
    • pp.1023-1029
    • /
    • 2006
  • In this Paper, we present a novel authentication and key exchange(AKE) protocol for inter-NSP(provider) roaming in IEEE 802.16e networks. The proposed protocol allows performing both user and device authentication jointly by using two different authentication credentials and Provides user anonymity and session key establishment. Also, this protocol requires only two round number message exchange between foreign network and home network.

Intra- and Inter-Rater Reliability of Measuring Passive Range of Shoulder Motion With Smartphone and Goniometer in Patients With Stroke (뇌졸중 환자의 수동적 어깨 관절 가동범위 측정에 관한 스마트폰과 측각기의 측정자내, 측정자간 신뢰도 연구)

  • Park, Il-Woo;Lim, One-Bin;Park, Kyue-Nam;Yi, Chung-Hwi
    • Physical Therapy Korea
    • /
    • v.21 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • The purpose of this study were to determine the intra-rater and inter-rater reliability of shoulder passive range of motion measurement using the "Clinometer + bubble level", a smartphone application and to compare with the intra-rater and inter-rater reliability of measurement using a goniometer. Twenty six patients with stroke were recruited for this study. Two raters measured the passive range of motion of four types of shoulder movements (forward flexion; FF, abduction; ABD, external rotation at $90^{\circ}$ abduction; ER90 and internal rotation at $90^{\circ}$ abduction; IR90) using a goniometer and a smartphone to determine within-day inter-rater reliability. A retest session was performed thirty minutes later to determine within-day intra-rater reliability. The reliability was assessed using intraclass correlation coefficients (ICC) and the standard error of measurement (SEM). The ICC (2,1) for the inter-rater reliabilities of the goniometer and smartphone were good in FF and ABD [ICC (2,1)=.75~.87] and excellent in ER90 [ICC (2,1)=.90~.95]. The intra-rater reliabilities for the goniometer and smartphone were good or more than good, with an ICC (3,1) value >.75, the exception was IR90 measured by rater 2 on the smartphone. These results suggest that smartphone could be used as an alternative method tool for measurement of passive shoulder range of motion in patients with stroke.

Inter-device Mutual authentication and Formal Verification in M2M Environment (M2M 환경에서 장치간 상호 인증 및 정형검증)

  • Bae, WooSik
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.219-223
    • /
    • 2014
  • In line with the advanced wireless communication technology, M2M (Machine-to-Machine) communication has drawn attention in industry. M2M communication features are installed and operated in the fields where human accessibility is highly limited such as disaster, safety, construction, health and welfare, climate, environment, logistics, culture, defense, medical care, agriculture and stockbreeding. In M2M communication, machine replaces people for automatic communication and countermeasures as part of unmanned information management and machine operation. Wireless M2M inter-device communication is likely to be exposed to intruders' attacks, causing security issues, which warrants proper security measures including cross-authentication of whether devices are legitimate. Therefore, research on multiple security protocols has been conducted. The present study applied SessionKey, HashFunction and Nonce to address security issues in M2M communication and proposed a safe protocol with reinforced security properties. Notably, unlike most previous studies arguing for the security of certain protocols based on mathematical theorem proving, the present study used the formal verification with Casper/FDR to prove the safety of the proposed protocol. In short, the proposed protocol was found to be safe and secure.