• Title/Summary/Keyword: Address system

Search Result 2,417, Processing Time 0.029 seconds

Jain's hand retractor system and stand: an innovative device for hand surgery

  • Jain, Aakansh
    • Archives of Plastic Surgery
    • /
    • v.48 no.4
    • /
    • pp.389-391
    • /
    • 2021
  • Solo hand surgery is becoming increasingly common, mostly due to a lack of assistants and dedicated operating theatres. The solo hand surgeon faces challenges of proper hand positioning, elevation, and skin flap/tissue retraction. Most commercially available hand retractors or stands do not address all the relevant problems and are not economically feasible for trainee surgeons. The Jain's hand retractor system and stand, described herein, provides solutions to all these problems, and its simple design helps surgeons to reproduce it easily.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

Performance Analysis of Multitone FH/MFSK System with Stage Address Coding in Subband and Nonsegmented Frequency Band (서브밴드 및 넌세그먼트 주파수대에서 어드레스 코딩을 사용한 FH / MFSK 시스템의 성능 분석)

  • Moon-Seung Lee
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.7 no.5
    • /
    • pp.418-429
    • /
    • 1996
  • The number of bits per message and the number of tones in the frequency-hopping sequence are determined by the available bandwidth and the data rate of each user. These parameters in turn determine the tone duration which strongly influences the vulnerability of the system to transmission distortions. In this paper, an address code which is assigned to each individual user was employed in order to reduce the collisions or hit. Also the frequency band is divided into several subbands and each user transmits multitone frequency per subband per chip. And the new system which is to increase the duration of each tone by increasing the total number of system frequencies that has been proposed. It is found that an optimum value bit, tone, number of frequencies per chirp can improve the err performance. This flexibility slightly increases maximum efficiecy and makes the the system less vulnerable to multipath delay. So, It is found that as the nuber of user increased 50%, the efficiency as a tuncion of the bandwidth to user'rate ratio improve 20%.

  • PDF

An Agent System for Searching of Host Computer and Blocking Network Access in IPv6 Environment (IPv6 환경에서 호스트 탐색 및 네트워크 접속 차단 에이전트 시스템)

  • Chung, Youn-Ky;Moon, Hae-Eun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.144-152
    • /
    • 2011
  • As IPv4 addresses are exhausting, the use of IPv6 addresses is increasing. IPv6 environment provides address auto-configuration function. If addresses are allocated to each host automatically, network management system has difficulty in inspecting every IP of all devices and keeping the relevant informations. Also, as IP addresses are configured automatically, problems such as malicious users accessing network devices with no restriction can occur. To solve these problems, managing and blocking of malicious user is necessary. In this paper, we suggest agent system for searching of host computer and blocking network access which manages and protects the major network resources efficiently by searching host and blocking unauthorized host access to network in IPv6 environment. According to the test results of function of this agent system in IPv6 environment, we have checked that this system performs searching and blocking function normally.

A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus (ARP spoofing 바이러스에 감염된 단말을 효율적으로 분리하기 위한 네트워크 관리시스템의 설계)

  • Ko, Bong-Koo;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.641-648
    • /
    • 2013
  • ARP spoofing is a typical Internet attack, in which an attacker sends data by changing his's MAC address with the other's one. Currently, this attack is usually dealt with separating the attacking PCs infected with ARP spoofing virus, by keeping network devices investigating by the network manager. However, this manual process has some limitations in time and accuracy. This paper proposes a new network management system to replace the effort of network manager who has to keep on inspecting the network. Along with designing an ARP analyzer and a disconnection notifier and adding them into the existing network management system, the proposed system provides a basement to identify and notify the PC infected by an ARP spoofing virus with fast and high accuracy. As a result, it is expected to minimize the network break off and to make easy the network management.

MOC: A Multiple-Object Clustering Scheme for High Performance of Page-out in BSD VM (MOC: 다중 오브젝트 클러스터링을 통한 BSD VM의 페이지-아웃 성능 향상)

  • Yang, Jong-Cheol;Ahn, Woo-Hyun;Oh, Jae-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.6
    • /
    • pp.476-487
    • /
    • 2009
  • The virtual memory system in 4.4 BSD operating systems exploits a clustering scheme to reduce disk I/Os in paging out (or flushing) modified pages that are intended to be replaced in order to make free rooms in memory. Upon the page out of a victim page, the scheme stores a cluster (or group) of modified pages contiguous with the victim in the virtual address space to swap disk at a single disk write. However, it fails to find large clusters of contiguous pages if applications change pages not adjacent with each other in the virtual address space. To address the problem, we propose a new clustering scheme called Multiple-Object Clustering (MOC), which together stores multiple clusters in the virtual address space at a single disk write instead of paging out the clusters to swap space at separate disk I/Os. This multiple-cluster transfer allows the virtual memory system to significantly decrease disk writes, thus improving the page-out performance. Our experiments in the FreeBSD 6.2 show that MOC improves the execution times of realistic benchmarks such as NS2, Scimark2 SOR, and nbench LU over the traditional clustering scheme ranging from 9 to 45%.

Performance Analysis of Complex Phase-code for Phase Multiplexes Holographic Memory System (위상 다중화 홀로그래픽 메모리 시스템을 위한 CPC 위상코드의 성능 분석)

  • 조병철;김정진;김은수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1C
    • /
    • pp.1-8
    • /
    • 2003
  • In this paper, performance of the CPC(complex phase code) which is recently proposed as a practical phase encoding method for phase-code multiplexes holographic memory system is comparatively analyzed with those of the conventional phase codes such as PR(pure random code), RCE(random code with equality), WHM(Walsh Hadamard Matrix). In computer simulation, the size of an address bean is fixed at 32$\times$32 pixels and 0%-25% phase-error ratio in a pixel are intentionally added to the real phase values to consider the nonlinear phase-modulation characteristics of the practical spatial light modulator. From comparative analysis of crosstalks and signal-to-noise ratios for these phase codes by calculating auto-correlation and cross-correlation, it is found that the CPC have the lowest cross-correlation mean value of 0.021, the lowest standard deviation of 0.0113 and the highest signal-to-noise ratio(SNR) of 27.4 among the four types of phase code. In addition, from the calculation of the number of all possible address beams for these four types of phase code as the size of the address beam is fixed to 3232 pixels, the CPC is found to have 6.334$\times$10$^{49}$ address beams, which are relatively higher number than that of the conventional phase codes.

A File System for Large-scale NAND Flash Memory Based Storage System

  • Son, Sunghoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.1-8
    • /
    • 2017
  • In this paper, we propose a file system for flash memory which remedies shortcomings of existing flash memory file systems. Besides supporting large block size, the proposed file system reduces time in initializing file system significantly by adopting logical address comprised of erase block number and bitmap for pages in the block to find a page. The file system is suitable for embedded systems with limited main memory since it has small in-memory data structures. It also provides efficient management of obsolete blocks and free blocks, which contribute to the reduction of file update time. Finally the proposed file system can easily configure the maximum file size and file system size limits, which results in portability to emerging larger flash memories. By conducting performance evaluation studies, we show that the proposed file system can contribute to the performance improvement of embedded systems.

Integrated Security Management with MCGA in IPv6 Network (IPv6 네트워크 환경에서 MCGA를 고려한 통합적인 보안관리 방안)

  • Oh, Ha-Young;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.27-38
    • /
    • 2007
  • IPv6 has appeared for solving the address exhaustion of IPv4 and for guaranteeing the problems of security and QoS. It occurs the unexpected new attacks of IPv6 as well as the existing attacks of IPv4 because of the increasing address space to 128bits and the address hierarchies for efficient network management and additions of the new messages between nodes and routers like neighbor discovery and auto address configuration for the various comfortable services. For the successful transition from IPv4 to IPv6, we should get the secure compatibility between IPv4 hosts or routers working based on secure and systematic policy and IPv6. Network manager should design security technologies for efficient management in IPv4/IPv6 co-existence network and IPv6 network and security management framework designation. In this paper, we inspected the characteristics of IPv4 and IPv6, study on security requirement for efficient security management of various attacks, protocol, service in IPv4/IPv6 co-existence and IPv6 network, and finally suggest integrated solution about security vulnerability of IPv6 network in considering of analysis of IPv6 system, host and application, IPv6 characteristics, modified CGA(MCGA).

A Distributed address allocation scheme based on three-dimensional coordinate for efficient routing in WBAN (WBAN 환경에서 효율적인 라우팅을 위한 3차원 좌표 주소할당 기법의 적용)

  • Lee, Jun-Hyuk
    • Journal of Digital Contents Society
    • /
    • v.15 no.6
    • /
    • pp.663-673
    • /
    • 2014
  • The WBAN technology means a short distance wireless network which provides each device interactive communication by connecting devices inside and outside of body. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. Wireless body area network is usually configured in energy efficient using sensor and zigbee device due to the power limitation and the characteristics of human body. Wireless sensor network consist of sensor field and sink node. Sensor field are composed a lot of sensor node and sink node collect sensing data. Wireless sensor network has capacity of the self constitution by protocol where placed in large area without fixed position. In this paper, we proposed the efficient addressing scheme for improving the performance of routing algorithm by using ZigBee in WBAN environment. A distributed address allocation scheme used an existing algorithm that has wasted in address space. Therefore proposing x, y and z coordinate axes from divided address space of 16 bit to solve this problems. Each node was reduced not only bitwise but also multi hop using the coordinate axes while routing than Cskip algorithm. I compared the performance between the standard and the proposed mechanism through the numerical analysis. Simulation verified performance about decrease averaging multi hop count that compare proposing algorithm and another. The numerical analysis results show that proposed algorithm reduced the multi hop better than ZigBee distributed address assignment