KEYWORDS: Video, Network architectures, Network security, Optical networks, Fiber to the x, Information security, Error control coding, Receivers, Control systems, Lithium
The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services such as IPTV. The document proposed a novel scheme, based on the former research for controllable multicast over EPON system, mainly considering system security and maintainability. It can both control the IPTV program source's and the receiver's validity, improving the efficiency and precision. The processing of the two configurations mode is given in detail.
To address the disadvantages of the EPON+EOC technical scheme used in the bidirectional reformation of
HFC network and broadband access application, this paper proposes the concept of Ethernet Passive
Electronic Network(EPEN) based on MPCP protocol. All kinds of modulated EOC technologies are based on
CSMA/CA half-duplex mode MAC protocol, showing low efficiency in access network application. Learning
from EPON point to multi-point (P2MP) control protocol, this paper originally proposes the concept of
full-duplex EPEN based on MPCP protocol for upstream. This paper describes the network architecture of
EPEN, and discusses the technical implementation scheme of the EPEN system. At present the core
technologies and implementation of software and hardware of EPEN are being studied.
This paper describes the design of a burst-mode ultra-long haul PON trunk fiber protector based on SOA. It's
transparent to protocols and thus compatible with various PON systems. With this technology, the robustness
and transmission distance of PON network can be greatly improved and extended. The fiber protector supports
a maximum transmission distance of 50km and a 1:128 branching ratio. It supports automatic protection
switching of trunk fiber whose longest protection switching time is less than 20ms. In addition, in the design of
the ultra-long haul PON system, by EPON as an example, the ranging of EPON system, RTT compensation
and other parameters also need to be amended. As a result, this article also makes research and description
on synchronization, ranging, time delay compensation, and other key parameters of the EPON system.
Performance management is a very important part of network management system, it monitors network usage and
troubleshoot network-related problems, captures and stores significant network traffic data to analysis network QoS. A
methodology of performance management for EPON is proposed in this paper, which consists of three parts: statistics
collector, embedded performance database, data analyzer and processor.
The character of 1Gbps bandwidth and tree-based structure make EPON very suitable for broadcast or multicast services
such as IPTV. In this paper we focus on security mechanisms that should be available to groups that specifically request
it, and therefore are willing to pay the extra cost of implementing those mechanisms. We concentrate on two issues: how
unauthorized multicast traffic can be prevented by means of multicast transit traffic control; how a group's susceptibility
is likely to be reduced by means of multicast group access control. We have proposed a novel scheme that should be
available to multicast groups that desire precautionary measures be taken to avert the threats of Invalid source and
unauthorized access.
The IP surveillance market is growing significantly and is receiving global attention now. IP camera is the heart of this
new surveillance system. As the key component of IP camera, video capture port contributes greatly to camera's cost.
CCD image sensors are employed in most IP camera for its excellent performance and maturity in the market. In fact,
new types of CMOS image sensors have become possible recent years due to CMOS technology improvements. This
paper presents a design of an IP camera's video capture port using CMOS image sensor based on embedded environment.
Also contained is a brief introduction to the hardware design including the interface and PCB layout. The paper also
provides information on setup of important registers, functions usage and debug tips. The design was tested on an IP
camera which has been on market for three years. The results show that using CMOS image sensor can achieve good
image and save cost. Therefore, it is well suited for the surveillance field where image resolution is not the focus. The
method can easily be extended to any other IP camera design with little change both in hardware and software.
KEYWORDS: Optical imaging, Interference (communication), Signal to noise ratio, Image processing, Data processing, Biomedical optics, Signal analyzers, Photonics, Data analysis, Light
In intrinsic signal optical imaging data, the response signal related cortical activity is very small compared to the background signal intensity and accompanied with unwanted noise from several different sources. Although there are some sophisticated data analysis techniques developed to achieve this critical demand, experience proved that no method perfect enough to be optimal for all experimental situations. Here we introduced a simple and practicable pre-processing method to attenuate the global noise source, such as the fluctuation of the illuminating light, changes of the animal's blood pressure and vasomotor oscillations. Before image processing to characterize the spatiotemporal response from cortical activity, each frame of image data was divided by the average or median of the current frame data. We applied the method to both simulated data and experimental optical imaging data to evaluate the validity and limitation.
The image registration is one of the key points in the integrative analysis of image data. In this paper, a full- automatic method for registration between SPOT and TM image is described. The results of the experiment show that the method is much better than traditional manual approach both in the efficiency and the accuracy.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.