889 research outputs found

    Modelling and verification of interworking between SIP and H.323

    Get PDF
    Various standards organizations have considered signaling for voice and video over IP from different approaches. There are currently two standards for signaling and control of Internet telephone calls, namely ITU-T Recommendation H.323 and the IETF Session Initiation Protocol (SIP). H.323 is an umbrella standard that provides a well-defined system architecture and implementation guidelines that cover the entire call set-up, call control, and the media used in the call. SIP is a text-based protocol that was designed to work hand in hand with other core Internet protocols such as HTTP. Both protocols provide comparable functionality using different mechanisms and provide similar quality of service. While SIP is more flexible and scalable, H.323 offers better network management and interoperability. Although there are numerous industry debates about the merits of the two protocols, the truth is that both of them, along with other complementary protocols, are necessary to provide universal access and to support IP-based enhanced services. Both protocols have been widely deployed, so interworking between SIP and H.323 is essential to ensure full end-to-end connectivity. Because of the inherent differences between H.323 and SIP, accommodation must be made to allow interworking between the two protocols. In this thesis, a new system model is established for simulating and verifying interworking between SIP and H.323. Five main components of this system are modelled by SDL/MSC: H.323 endpoint, H.323 gatekeeper, SIP-H.323 interworking facility, SIP server, SIP endpoint. Two configurations have been used in this model. One is that both protocols work within the same administrative domain, the other one is that both protocols are operating in separate administrative domains. Using a series of scenarios, it has been shown that the model meets the functional specifications outlined in SIP-H323-Interworking specification documents

    PENGARUH DUKUNGAN SOSIAL ORANG TUA DAN TEMAN SEBAYA TERHADAP KEPERCAYAAN DIRI REMAJA

    Get PDF
    Banda Ace

    CofiFab: Coarse-to-fine fabrication of large 3D objects

    Get PDF
    This paper presents CofiFab, a coarse-to-fine 3D fabrication solution, which combines 3D printing and 2D laser cutting for cost-effective fabrication of large objects at lower cost and higher speed. Our key approach is to first build coarse internal base structures within the given 3D object using laser-cutting, and then attach thin 3D-printed parts, as an external shell, onto the base to recover the fine surface details. CofiFab achieves this with three novel algorithmic components. First, we formulate an optimization model to compute fabricatable polyhedrons of maximized volume, as the geometry of the internal base. Second, we devise a new interlocking scheme to tightly connect laser-cut parts into a strong internal base, by iteratively building a network of nonorthogonal interlocking joints and locking parts around polyhedral corners. Lastly, we also optimize the partitioning of the external object shell into 3D-printable parts, while saving support material and avoiding overhangs. These components also consider aesthetics, stability and balancing in addition to cost saving. As a result, CofiFab can efficiently produce large objects by assembly. To evaluate its effectiveness, we fabricate objects of varying shapes and sizes, where CofiFab significantly improves compared to previous methods

    Foveation scalable video coding with automatic fixation selection

    Full text link

    Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model

    Full text link
    Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses this resource allocation issue by constructing a game theoretic model. A defender and an attacker are players and the interaction is formulated as a trade-off between protecting targets and consuming resources. The action cost which is a necessary role of consuming resource, is considered in the proposed model. Additionally, a bounded rational behavior model (Quantal Response, QR), which simulates a human attacker of the adversarial nature, is introduced to improve the proposed model. To validate the proposed model, we compare the different utility functions and resource allocation strategies. The comparison results suggest that the proposed resource allocation strategy performs better than others in the perspective of utility and resource effectiveness.Comment: 14 pages, 12 figures, 41 reference

    Synthesis and Characterization of Different Crystalline Calcium Silicate Hydrate: Application for the Removal of Aflatoxin B1 from Aqueous Solution

    Get PDF
    Different crystalline calcium silicate hydrates (CSH) were synthesized under specific hydrothermal conditions and several methods were used to analyze samples. Amorphous calcium silicate hydrates (ACSH) mainly consists of disordered calcium silicate hydrate gel (C-S-H gel) and crystalline calcium silicate hydrates (CCSH) consists of crystallized tobermorite. The adsorption of carcinogenic aflatoxin B1 (AFB1) onto ACSH and CCSH was investigated. The adsorption kinetics was studied using pseudo-first-order and pseudo-second-order kinetic models and intraparticle diffusion model. The pseudo-second-order model provided the best correlation and the intraparticle diffusion controlled the adsorption process of AFB1 onto CCSH. Adsorption isotherm parameters were obtained from Langmuir and Freundlich and the adsorption data fitted to Freundlich much better. Based on the results of N2 adsorption/desorption, adsorption kinetics, and adsorption isotherms, the adsorption mechanism of AFB1 onto CCSH was developed. All results indicate that CCSH has a great potential to be a safe, easy-made, and cost-effective material for the control of AFB1 contamination
    • …
    corecore