The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, considerations on the algorithm that makes the use of general tree structure to enable readily modifiable UI menu structure in an efficient way in terms of time and resource (available memory) of CPUs are described. First, it describes the importance of UI (user interface) and why UI menu structure must be readily modifiable. Following chapter introduces a few data structure as well...
The unified streaming system (USS) is a networked multimedia system which integrates multimedia streaming with software streaming. With the USS, software applications and multimedia contents can be interwoven in a semantic level, so the new kinds of streaming services can be developed. The basic idea of the USS came from the similarity between decoding multimedia contents and executing software applications...
In optical burst switching (OBS) networks, class differentiation is achieved by assigning an adequately long offset time between a burst control packet (BCP) and a data burst (DB). Blocking probability is one of the main performance measures in OBS networks. Though the effects of length distribution of low-class burst and the ratio of arrival rates of low-class and high-class on high-class blocking...
Web services is an emerging technology of distributed computing as an interoperable means of integrating loosely coupled Web applications. To support the business process based on Web services, several specifications, such as BPEL4WS, WSCI, and BPML, were suggested. Among them, BPEL4WS and WSCI may be used to describe a collaborative business process that describes visible message exchanges covering...
In this paper, we propose optimal and suboptimal serial code acquisition schemes for chip-asynchronous direct-sequence spread-spectrum (DS/SS) communications. The conventional serial code acquisition scheme individually compares each value of the correlator outputs with a threshold. Such a scheme is optimum, however, only under the chip-synchronous assumption that it is actually very difficult to...
A new wideband amplifier, which is suitable for ultra-wideband (UWB) system, is proposed in this paper. The proposed amplifier achieves wideband input matching and bell-shaped overall frequency response by combining the frequency response characteristics of a high pass filter and a conventional amplifier, respectively. The simulation results based on a TSMC 0.18 mum CMOS technology show a peak power...
An extensive network and a large variety of users may cause network security problems. So, the research of a network security has being progressed. In this paper, we present network security policy information model (NSPIM) to apply in policy-based network management systems. We define the NSPIM by expending the PCIM/PCIMe from IETF, for guaranteeing the compatibility and the extensibility of representing,...
The SMART server is a special purpose server for efficient multimedia streaming service over high speed networks. For sending multimedia streams at high speed, the SMART server adopts a special hardware called as NS card. The SMART system also has a special file system module and streaming module. In this paper, we focused on distribution of contents between global servers and local servers. Specially,...
The wavelength division multiplexing -passive optical network (WDM-PON) is an advanced optical access network that efficiently transports user traffic from a central office to end stations in the near future. In this paper, we make a description of the development of a platform. This paper mainly introduces the optical modules with its specifications and FTTH link OAM functions
TCP/IP is the most commonly used protocol to communicate between servers, and is used in a wide range of applications. Unfortunately, TCP/IP places a very heavy burden on host CPUs. Server CPUs have begun to choke while processing the TCP/IP overhead associated with transferring data. We have known that the CPU power in today's servers is just sufficient to handle the TCP processing, leaving no CPU...
Internet attack incidents have steadily increased along with the increase in Internet users. To protect systems and networks from these attacks, advanced security systems have been developed. Now that these security systems are operating, their successful management is more important than the purchase and establishment of new information security systems. The acquisition of good systems is ineffective...
Network processors in general, enable us to add, through software, the latest-and-greatest network services while maintaining high packet throughput and low packet latency. Simply put, the network processors offer performance and flexibility for implementing network service. IPSec is a set of protocols developed by the IETF to support secures exchange of packets at the IP layer. This paper describes...
A new method of adaptive digital filtering and digital demodulation based on software radio architecture and used in the remote sensing system is proposed in this paper. Compared with the method once widely used, analog/digital phase lock loop, the new system, as all SWR systems, has three obvious characteristics: easily reconfigured, good flexibility, and modulation. The new method mentioned here...
Four methods of mobile IP (MIP) registration, call admission control (CAC), L2/L3 mobility and DiffServ mapping are mentioned for QoS assurance in portable Internet networks. At first implementation stage of portable Internet operators, affording of best effort services are recommended by applying the QoS assurance methods of CAC of maximum bandwidth, L2 mobility and DiffServ mapping for request services...
This paper improves the conventional Viterbi algorithm so that it can be used for decoding the conventional code with a large constraint length and a very low rate. Through the construction of a Hamming distance table, the novel algorithm greatly improved the performance of the old one. Simulation results indicate that this algorithm could be successfully applied to attack stream cipher, whose LFSR...
WRC-2003 resolved a resolution 141 to review the provisions of current PFD limits in the band 17.7-19.7 GHz for satellite systems using highly inclined orbits (HIO), and adopted a related agenda item 1.18 in preparation for next WRC meeting. In order to review whether the current PFD masks are appropriate to protect terrestrial fixed service (FS) from HIO satellites, analyses of received interference...
An adaptive chunk algorithm is newly devised for the quality of service maintenance of contents streaming under time varying bandwidth conditions as typically shown in Internet environment. A proxy-assisted streaming architecture is designed to incorporate the chunk algorithm, which adaptively compensates the effects of underflow in clients. A least mean square (LMS) based underflow estimation algorithm...
A few opinion leaders in the Internet society gave negative comments against early adoption of IPv6 and often published their opinions at on-line and off-line magazines. So such articles are affecting people interested in and deployment of IPv6. Their arguments were made in two logically wrong ways. Their ideas were just listed on articles without any importance or impact factor information so a technically...
This paper specifies a mechanism for CDMA/WLAN heterogeneous network interworking based on IPv6. A node with two different link-layer interfaces can select one interface for communicating to another node. When the node moves around networks, it is possible to switch another interface because the node is no more available to use the first selected interface. During this switching of interface, service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.