• Title/Summary/Keyword: Application protocol

Search Result 1,507, Processing Time 0.036 seconds

A Design and Implementation of ZigBee Educational System in USN Environment (USN환경에서 교육용 ZigBee 장비의 설계 및 구현)

  • Park, Gyun Deuk;Chung, Joong Soo;Jung, Kwang Wook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.5
    • /
    • pp.335-340
    • /
    • 2013
  • This paper has designed and realized educational ZigBee equipment befitting to the USN environment. In addition, this study has enabled users to exercise operation process for software technology education and to propose software design methods in the process in the USN environment through practice equipment for ZigBee education. As for the development environment of system, Atmega128 process of Atmel is used for CPU; AVR compiler for the debugging environment; C language for firmware development language; and C++ for application program. The system operation process is initiated by coordinator's sensing information reading order from the hyper terminal through a server through the Internet or directly connected; and then delivering it to a terminating device by using ZigBee technology. The terminating device delivers various sensing information to the coordinator which delivers it to a server through the Internet or to a HYPER terminal directly connected to the coordinator. As for the educational course, it is about practices on such ZigBee operation process and relevant programing skills. Regarding it, the communication between coordinator and terminating device is designed by utilizing physical layer of ZigBee protocol, MAC layer and network layer while the communication between server and coordinator is designed by proposing an independent protocol on TCP/IP socket and the protocol processing procedure during sensing data delivery is verified by interpretation.

Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System (안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구)

  • Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.111-122
    • /
    • 2018
  • Using OAuth protocol, third-party applications on the Android operating system use user's credentials or access tokens that have access authority on user's resources to gain user's account and personal information from account information providers. These credentials and token information are stored in the device by the OAuth data management method provided by the Android operating system. If this information is leaked, the attacker can use the leaked credential and token data to get user's personal data without login. This feature enables the digital forensic investigator to collect data directly from the remote server of the services used by the target of investigation in terms of collecting evidence data. Evidence data collected at a remote location can be a basis for secondary warranties and provide evidence which can be very important evidence when an attacker attempts to destroy evidence, such as the removal of an application from an Android device. In this paper, we analyze the management status of OAuth tokens in various Android operating system and device environment, and show how to collect data of various third party applications using it. This paper introduces a method of expanding the scope of data acquisition by collecting remote data of the services used by the subject of investigation from the viewpoint of digital forensics.

A Management for IMS Network Using SDN and SNMP (SDN과 SNMP를 이용한 IMS 네트워크 관리)

  • Yang, Woo-Seok;Kim, Jung-Ho;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.694-699
    • /
    • 2017
  • In accordance with the development of information and communications technology, a network user has to be able to use quality of service (QoS)-based multimedia services easily. Thus, information and communications operators began to focus on a technique for providing multimedia services. The IP Multimedia Subsystem (IMS) is a platform based on Internet Protocol (IP) as a technology for providing multimedia services and application services. The emerging 5G networks are described as having massive capacity and connectivity, adaptability, seamless heterogeneity, and great flexibility. The explosive growth in network services and devices for 5G will cause excessive traffic loads. In this paper, software-defined networking (SDN) is applied as a kind of virtualization technology for the network in order to minimize the traffic load, and Simple Network Management Protocol (SNMP) is used to provide more efficient network management. To accomplish these purposes, we suggest the design of a dynamic routing algorithm to be utilized in the IMS network using SDN and an SNMP private management information base (MIB). The proposal in this paper gives information and communications operators the ability to supply more efficient network resources.

RFID Tag Search Protocol Preserving Privacy of Reader Holders (이동형 리더 소지자의 프라이버시를 보호하는 RFID 태그 검색 프로토콜)

  • Chun, Ji-Young;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.59-69
    • /
    • 2009
  • RFID tag search system which is used to find a specific tag has an application such as asset management, supply chain, and this search scheme has been given much attention so far. In RFID tag search system, especially, mobility of the reader is important in order to search tags. Therefore, even though the handheld reader cannot connect with the central database because of unreliable wireless connection or remote location, handheld reader should search the specific tag without help of the central database. In addition, in RFID tag search system, users hold not the tag but the reader, the privacy of users should be considered. Since the signal strength of the reader is stronger than that of the tag, the privacy of the reader holder is very important. Recently, in order to solve these problems, a number of RFID tag search schemes have been proposed. However, since these schemes did not consider the privacy of reader holders, there are serious privacy breaches of reader holders. In this paper, we propose efficient RFID tag search protocol for passive tags. Our proposed scheme preserves the privacy of reader holders.

Assessing the Impact of 'Marine Invasive and Harmful Species': A Semi-Quantitative Tool and Protocol for Environmental and Socio-Economic Evaluation ('해양교란유해종'의 영향 평가: 환경 및 사회경제적 평가를 위한 준정량 도구 및 프로토콜)

  • KWANG YOUNG KIM
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.29 no.2
    • /
    • pp.116-138
    • /
    • 2024
  • This study presents a new tool and protocol to assess the impact of 'Marine Invasive and Harmful Species' (MIHS) on marine environments and socio-economic aspects. It addresses shortcomings in the Marine Ecosystems Conservation and Management Act in South Korea by proposing an impact assessment framework divided into marine environmental and socio-economic groups. Six distinct evaluation categories are included in each group, and a semi-quantitative five-step scale is utilized to provide a flexible approach, addressing a variety of issues from ecological disturbances to effects on health and property. The assessment tool is applied through a systematic five-stage process based on the Delphi method. This approach posters collaboration among a diverse sets of experts and stakeholders, enabling a comprehensive evaluation that incorporates various perspectives. The study also examines strategies to effectively manage uncertainties and improve the consistency of the outcomes. The application of this assessment protocol is expected to be crucial in quantifying the ecological damage caused by MIHS and in identifying management and prevention priorities. The ultimate aim of this evaluation process is to aid decision-makers in developing strategies to preserve the marine ecosystem and mitigate socio-economic impacts.

Optimization of Protocol for Injection of Iodinated Contrast Medium in Pediatric Thoracic CT Examination (소아 흉부 CT검사에서 조영제 주입에 관한 프로토콜의 최적화)

  • Kim, Yung-Kyoon;Kim, Yon-Min
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.6
    • /
    • pp.879-887
    • /
    • 2019
  • The purpose of this study is to establish a physiological injection protocol according to body weight, in order to minimize amount of contrast medium and optimize contrast enhancement in pediatric patients performing thoracic CT examinations. The 80 pediatric patients under the age of 10 were studied. Intravenous contrast material containing 300 mgI/ml was used. The group A injected with a capacity of 1.5 times its weight, and groups B, C and D added 5 to 15 ml of normal saline with a 10% decrease in each. The physiologic model which can be calculated by weight about amount of injection of contrast medium and normal saline, flow rate and delay time were applied. To assess image quality, measured average HU value and SNR of superior vena cava, pulmonary artery, ascending and descending aorta, right and left atrium, right and left ventricle. CT numbers of subclavian vein and superior vena cava were compared to identify the effects of reducing artifacts due to normal saline. Comparing SNR according to the contrast medium injection protocol, significant differences were found in superior vena cava and pulmonary artery, descending aorta, right and left ventricle, and CT numbers showed significant differences in all organs. In particular, B group with a 10% decrease in contrast medium and an additional injection of saline showed a low degree of contrast enhancement in groups with a decrease of more than 20%. In addition, the group injected with normal saline greatly reduced contrast enhancement of subclavian vein and superior vena cava, and the beam hardening artifact by contrast medium was significantly attenuated. In conclusion, the application of physiological protocol for injection of contrast medium in pediatric thoracic CT examinations was able to reduce artifacts by contrast medium, prevent unnecessary use of contrast medium and improve the effect of contrast enhancement.

Improvement and Effectiveness for Chemical Control Protocol of Sweet Persimmon Anthracnose Disease (단감 탄저병 방제법 개선을 위한 살균제 선발 및 효과)

  • Jeon, Chang Wook;Kwon, Youngho;Lee, Jung Han;Kwak, Youn-Sig
    • The Korean Journal of Pesticide Science
    • /
    • v.19 no.3
    • /
    • pp.312-316
    • /
    • 2015
  • Anthracnose, caused by Colletotrichum spp. is the most important and devastating disease in sweet persimmon production in worldwide. There is no alternative control method or resistant cultivar is available. Therefore, chemical controls are widely accepted to control the disease. Three fungicides among 16 fungicides have been selected to apply in field condition. The selected three fungicides (metconazole, dithianon and propineb) showed lower EC50 and reliable control effect in both in vitro and in vivo. According to general guide line of anthracnose disease control method recommended 8 times spay of the fungicide. In this study, we performed 8, 4, and 2 times spay of the fungicides. For 8 times application, practice spray machine has been used and for 4 and 2 time application, a recently invented spray machine was input. The fungicides have been treated from middle of June to end of August in 2014 year. Control effect of among the selected fungicides showed similar result regardless of sort of the fungicide. However, frequency of spray result showed significantly different results, 8 and 4 times fungicide application showed low and similar disease occurrence, but 2 times application showed intermediated disease occurrence between 4 times treatment and untreated control. Taken together, result showed that 4 times application with effective fungicide, mechanically advanced tool can reduced the anthracnose disease damage in sweet persimmon production.

3G+ CDMA Wireless Network Technology Evolution: Application service QoS Performance Study (3G+ CDMA망에서의 기술 진화: 응용 서비스 QoS 성능 연구)

  • 김재현
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.10
    • /
    • pp.1-9
    • /
    • 2004
  • User-Perceived application-level performance is a key to the adoption and success of CDMA 2000. To predict this performance in advance, a detailed end-to-end simulation model of a CDMA network was built to include application traffic characteristics, network architecture, network element details, and protocol features. We assess the user application performance when a Radio Access Network (RAN) and a Core Network (CN) adopt different transport architectures such as ATM and If. For voice Performance, we found that the vocoder bypass scenario shows 8% performance improvement over the others. For data packet performance, we found that HTTP v.1.1 shows better performance than that of HTTP v.1.0 due to the pipelining and TCP persistent connection. We also found that If transport technology is better solution for higher FER environment since the IP packet overhead is smaller than that of ATM for web browsing data traffic, while it shows opposite effect to small size voice packet in RAN architecture. Though simulation results we showed that the 3G-lX EV system gives much better packet delay performance than 3G-lX RTT, the main conclusion is that end-to-end application-level performance is affected by various elements and layers of the network and thus it must be considered in all phases of the technology evolution process.

M2M Network Platform Using the MSRP (MSRP를 이용한 M2M 플랫폼 구조)

  • Kim, Jung-Ho;Been, Jae-Man;Kang, Seung-Chan;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.752-757
    • /
    • 2016
  • Machine to Machine (M2M) communications is communications between a business application and devices via a communication network without any direct human interaction. The aim of our research is to connect any M2M device with an M2M AS (Application server) through an IMS (IP Multimedia Subsystem) Network Core using a M2M Gateway, in order to develop an M2M Horizontal Services Platform over IMS. An IP Multimedia Subsystem (IMS) is an architectural framework defined by the wireless standards body of the 3rd Generation Partnership Project (3GPP) for delivering IP multimedia services to mobile users. This paper shows the design and implementation of a Horizontal M2M Network Services Platform over an IP Multimedia Subsystem (IMS) using the Message Session Relay Protocol (MSRP). We summarize the protocols and architectures that formed the basis for the creation of our architecture. We provide a detailed description of our architecture design, describing the call flow of the proposed architecture and the entities operating in each process. We also describe the design and implementation process detailing the different tools used, explaining the selection of each component and its importance; also how we designed and implemented the M2M gateway, M2M Application Server, Open IMS Core, business application and M2M devices.

Processing of Various RFID Reader Devices for ALE Middleware (ALE 미들웨어를 위한 다양한 RFID 리더 처리 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol;Lee, Dong-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.55-64
    • /
    • 2009
  • For realizing ubiquitous computing, many research activities are geared towards various areas including embedded computing, RFID, USN, home networking, context-awareness, and etc. By using the ability of RFID technology to recognize a number of objects simultaneously, more convenient ubiquitous application services are effectively provided. In this case, RFID middleware playing a role as a bridge between RFID reader devices and application services is required as well. In this paper, we propose a method of handling a number of types of RFID reader devices in ALE middleware of EPCglobal. For this, the information of connection and data protocol for a reader device is stored in a database as ontology meta-data, and used to interpret the data read by a reader device. By adding ontology data into a database, even though an RFID device newly emerges, ALE middleware can not only handle the device, but also be effectively extended through reusing ontology data, without any changes in the middleware.