• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.03 seconds

The Integrated SCADA Data Gateway Platform based on SmartGrid (스마트 그리드 기반 통합 SCADA Data Gateway 플랫폼)

  • Song, Byung-Kwen
    • Journal of IKEEE
    • /
    • v.18 no.1
    • /
    • pp.140-145
    • /
    • 2014
  • OPC UA(IEC62541) is a communication protocol for SG(Smart Grid) application platform. It was standardized by IEC TC57 group in December 2012. The IEC61850 has been used in Digital Substation Systems and Smart Distributed Systems. The DNP3.0 has been used for device's data collection/control in Distributed Systems. The DLMS/COSEM has been used to control metering and collect information in the Smart Metering. The top-level SG management platform needs an independent middleware to manage transparently the Power Information Technology, including the IEC61850, DNP3.0, DLMS/COSEM. In this paper, we propose the SDG(Scada Data Gateway) platform. It manages Power Information Technology based Digital Substation Systems and Smart Distributed systems, Smart Metering through OPC UA.

Developing Data Exchange Standard between Roadside-device and Traffic Information Center in accordance with ISO 15784 (ISO 15784를 적용한 교통정보센터와 노변장치간 데이터 교환 표준 개발 _ AVI를 중심으로)

  • Lee, Sang-Hyun;Son, Seung-Neo;Kim, Nam-Sun;Cho, Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.12 no.3
    • /
    • pp.29-41
    • /
    • 2013
  • This study set out to developing data exchange standard between roadside device and traffic information center fitted in a domestic environment by applying international standard ISO 15784. First, we defined message basic concept of 'Dialog' and essential elements should be defined to define the standard message for securing system compatibility by reference ISO 14817 and ISO 14827 Part 1. For defining standard message items exchanged between AVI and traffic information center, we formed Working Group under ITS Standards Technical Committee and analyzed data flow for ITS National Architecture, Standard messages of existing standards, and AVI operation messages actually operated on roadside now. So, we extracted 14 functionally needed messages and defined 28 standard messages adopting 'Dialog' concept. In case of the application protocol for data exchange standards, we defined basic requirements for securing interoperability and interchangeability considering domestic environment by analyzing reference standard of ISO 15784.

Expressed Protein Ligation of 5-Enolpyruvylshikimate-3-phosphate (EPSP) Synthase: An Application to a Protein Expressed as an Inclusion Body

  • Kim, Hak-Jun;Shin, Hee-Jae;Kim, Hyun-Woo;Kang, Sung-Ho;Kim, Young-Tae
    • Bulletin of the Korean Chemical Society
    • /
    • v.28 no.12
    • /
    • pp.2303-2309
    • /
    • 2007
  • Expressed protein ligation (EPL) technique, joining recombinantly expressed proteins to polypeptides, has been widely adopted for addressing various biological questions and for drug discovery. However, joining two recombinant proteins together is sometimes difficult when proteins are expressed insoluble and unrefoldable, because ligation-active proteins via intein-fusion are obtainable when they are folded correctly. We overcame this limitation coexpressing target protein with additional methionine aminopeptidase (MAP) which enhances removal of the initiation methionine of recombinantly expressed protein. Our approach demonstrated that two domains of 46 kDa 5-Enolpyruvylshikimate-3-phosphate (EPSP) synthase, a target of herbicide glyphosate, were successfully joined by native chemical ligation, although its C-terminal domain was expressed as an inclusion body. The intein-fused N-terminal fragment of EPSP synthase (EPSPSN, residues 1-237) was expressed and the ligation-active thioester tagged N-terminal fragment (EPSPSN-thioester) was purified using a chitin affinity chromatography and mercapto-ethanesulphonate (MESNA) as intein thiolysis reagent. Its Cterminal fragment (EPSPSC, residues Met237-238CYS-427), expressed as an inclusion body, was prepared from an additional MAP-expressing strain. Protein ligation was initiated by mixing ~1 mM of EPSPSN-thioester with ~2 mM of EPSPSCCYS (residues 238CYS-427). Also we found that addition of 2% thiophenol increased the ligation efficiency via thiol exchange. The ligation efficiency was ~85%. The ligated full-length EPSP synthase was dissolved in 6 M GdHCl and refolded. Circular dichroism (CD) and enzyme activity assay of the purified protein showed that the ligated enzyme has distinct secondary structure and ~115% specific activity compared to those of wild-type EPSP synthase. This work demonstrates rare example of EPL between two recombinantly expressed proteins and also provides hands-on protein engineering protocol for large proteins.

Analysis of Cross Sectional Ease Values for Fit Analysis from 3D Body Scan Data Taken in Working Positions

  • Nam, Jin-Hee;Branson, Donna H.;Ashdown, Susan P.;Cao, Huantian;Carnrite, Erica
    • International Journal of Human Ecology
    • /
    • v.12 no.1
    • /
    • pp.87-99
    • /
    • 2011
  • Purpose- The purpose of this study was to compare the fit of two prototype liquid cooled vests using a 3D body scanner and accompanying software. The objectives of this study were to obtain quantitative measurements of ease values, and to use these data to evaluate the fit of two cooling vests in active positions and to develop methodological protocol to resolve alignment issues between the scans using software designed for the alignment of 3D objects. Design/methodology/approach- Garment treatments and body positions were two independent variables with three levels each. Quantitative dataset were dependent variables, and were manipulated in 3x3 factorial designs with repeated measures. Scan images from eight subjects were used and ease values were obtained to compare the fit. Two different types of analyses were conducted in order to compare the fit using t-test; those were radial mean distance value analysis and radial distance distribution rate analysis. Findings- Overall prototype II achieved a closer fit than prototype I with both analyses. These were consistent results with findings from a previous study that used a different approach for evaluation. Research limitations/implications- The main findings can be used as practical feedback for prototype modification/selection in the design process, making use of 3D body scanner as an evaluation tool. Originality/value- Methodological protocols that were devised to eliminate potential sources of errors can contribute to application of data from 3D body scanners.

Performance Evaluation of RSIP Gateway in Intranet Environment (인트라넷 환경에서 RSIP 게이트웨이의 성능분석)

  • Kim, Won;Lee, Young-Taek;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.683-688
    • /
    • 2004
  • NAT is a very useful IP address translation technique that allows two connected networks using different and incompatible IP address schemes. But it is impractical to use NAT for an application which uses the encrypted IP packet, embedding IP addresses inside of data payloads, to guarantee End-to-End Security such as IPSec. In addition to rewriting the source/destination IP addresses in the packet, NAT must modify IP checksum every time, which could lead to considerable performance decrease of the overall system in the process of the address translation. RSIP is an alternative to solve these disadvantages of NAT and the address shortage problems. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable public address to a RSIP client temporarily to communicate with public net-work outside of the private network. In this paper, RSIP gateway for intranet environment is designed and its performance is evaluated. From the results of performance evaluation, we knew that RSIP is operated less sensitive to the data traffic. Also, the experiment shows that RSIP performs better than NAT when the transmission data grows larger.

ADesign and Implementation of Policy-based Network Management System for Internet QoS Support Mobile IP Networks (인터넷 QoS 지원 이동 IP 망에서의 정책기반 망 관리 시스템 설계 및 구현)

  • 김태경;강승완;유상조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.192-202
    • /
    • 2004
  • In this paper we have proposed policy-based network management system architecture for Internet QoS support Mobile IP networks that is divided into four layers(application layer, information management layer, policy control layer, device layer), then we propose an implementation strategy of policy-based network management system to enforce various control and network management operations and a model of policy server using SCOPS(Simple Common Open Policy Service) protocol that is developed in this research. For policy-based mobile IP network management system implementation, we have derived four policy classes(access control, mobile IP operation, QoS control, and network monitoring) and we showed operation procedures for each policy scenarios. Finally we have implemented Internet QoS support policy-based mobile IP network testbed and management system and verified out DiffServ policy enforcement behaviors for a target class service that is arranged a specific bandwidth on network congestion conditions.

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Design and Performance Analysis of RSRR Scheduling Algorithm for Enhancing Performance of IEEE 802.11s MCCA (IEEE 802.11s MCCA 의 성능 향상을 위한 RSRR 스케쥴링 알고리즘 설계 및 성능 분석)

  • Kim, Bong Gyu;Jung, Whoi Jin;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.22-33
    • /
    • 2014
  • As a standard of WMNs, IEEE 802.11s supports two kinds of MAC algorithm: a mandatory EDCA used by IEEE 802.11e and an optional MCCA. While EDCA classifies traffic according to four Access Categories (AC) and offer differentiated service using a classified priority, MCCA can guarantee the specific bandwidth of users with a TDMA-style bandwidth reservation scheme between mesh routers. In case that a flow is VBR traffic of a multimedia application, MCCA has disadvantage that the reserved bandwidth does not be used entirely, though it guarantees required bandwidth of users and fairness using bandwidth reservation with neighbors' node. In this paper, we showed a problem that is wastes the reserved bandwidth when MCCA is enabled and proposed a new scheduling algorithm to prevent waste of bandwidth and to improve network utilization effectively, named Resource Sharing Round Robin (RSRR) scheduling. Finally we showed simulation results that performance of a proposed RSRR is better than the legacy MCCA through NS-2 simulation.

First Data On Direct Costs of Lung Cancer Management in Morocco

  • Tachfouti, N.;Belkacemi, Y.;Raherison, C.;Bekkali, R.;Benider, A.;Nejjari, C.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.4
    • /
    • pp.1547-1551
    • /
    • 2012
  • Background: Lung cancer is the leading cause of cancer morbidity and mortality. Its management has a significant economic impact on society. Despite a high incidence of cancer, so far, there is no national register for this disease in Morocco. The main goal of this report was to estimate the medical costs of lung cancer in our country. Methods: We first estimated the number of annual new cases according to stage of the disease on the basis of the Grand-Casablanca-Region Cancer Registry data. For each sub-group, the protocol of treatment was described taking into account the international guidelines, and an evaluation of individual costs during the first year following diagnosis was made. Extrapolation of the results to the whole country was used to calculate the total annual cost of treatments for lung cancer in Morocco. Results: Overall approximately 3,500 new cases of lung cancer occur each year in the country. Stages I and II account for only 4% of cases, while 96% are diagnosed at locally advanced or metastatic stages III and IV. The total medical cost of lung cancer in Morocco is estimated to be around USD 12 million. This cost represents approximately 1% of the global budget of the Health Department. According to AROME Guidelines, about 86% of the newly diagnosed lung cancer cases needed palliative treatment while 14% required curative intent therapy. The total cost of early and advanced stages lung cancer management during the first year were estimated to be 4,600 and 3,420 USD, respectively. Conclusion: This study provides health decision-makers with a first estimate of costs and the opportunity to achieve the optimal use of available data to estimate the needs of health facilities in Morocco. A substantial proportion of the burden of lung cancer could be prevented through the application of existing cancer control knowledge and by implementing tobacco control programs.