• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.028 seconds

Query Technique for Quick Network Routing changing of Mobility Sensor Node in Healthcare System (헬스케어 시스템에서 이동형 센서노드의 신속한 네트워크 라우팅 변화를 위한 질의기법)

  • Lee, Seung-chul;Kwon, Tae-Ha;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.517-520
    • /
    • 2009
  • Healthcare application system has been actively researched to apply WSN technology to healthcare area with a mobile sensor node of low cost, low power, and small size. Sensor node has the problem for transmission range of RF power and time delay of the wireless routing connectivity between sensor nodes. In this paper, we proposes a new method utilizing mobile sensor nodes with relay sensor nodes for quick network routing changing using query technique in healthcare system. A query processor to control and manage the routing changing of sensor nodes in a wireless sensor network was designed and implemented. The user's PC transmits the beacon message which will change the quick link routing according to activity status of patient in wireless sensor network. We describe the implementation for query protocol that is very effective of power saving between sensor nodes.

  • PDF

The Design of Package Contents Authoring and Consuming Tools for Open IPTV Service (개방형 IPTV 서비스를 위한 패키지 콘텐츠 저작 및 소비 도구 설계)

  • Lee, Young-Il;Kim, Kwang-Yong;Yoo, Jeong-Ju;Lyu, Won;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.827-830
    • /
    • 2009
  • Feature of current IPTV services is that the IPTV Provider buys the rights of contents from contents author and provides consumers monopolistically with those. In this environment, IPTV is indistinguishable from the way of existing broadcasting services. To shift away from this structure, it is necessary to guarantee the common user's participation and provide the Open IPTV services for customers to be allowed to have be defined for more opportunities to select the contents. However, there are some problems to conduct Open IPTV service due to a variety of rights protection solutions designed by previous digital broadcast providers. Therefore, a new framework is needed to overall Open IPTV environment. This paper provides the design can packaging contents authoring and consuming tool for IPTV application service based on Open IPTV.

  • PDF

An Analysis of Installation of Railway Construction Project Management System on Carbon Reduction (철도건설 사업관리시스템 도입에 따른 탄소저감 효과 분석)

  • Park, Jun-Tae;Ahn, Tae-Bong
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.3
    • /
    • pp.382-388
    • /
    • 2017
  • In response to the global warming crisis, the Kyoto protocol was established by major developed countries in 1997. The Paris Agreement, which imposes a carbon reduction obligation for both developed countries and developing countries, was signed in 2015. Regulations and efforts to reduce greenhouse gas emissions accordingly have been implemented. In this study, we analyzed the reduction of carbon emissions computerizing of the traditional project management system for efficient railway construction at Korea Rail Network Authority. We suggest a model that measures two major effects of carbon reduction, stemming from transportation and from a decrease of paper use. In this paper, we calculate the amount of carbon reduction and the economic effect of carbon reduction with application of the construction project management system at Korea Rail Network Authority. The model and methodology in this study are expected to be helpful to measure the carbon reduction performance for similar e-transformation.

The Review of Clinical Studies Published in The Journal of Korean Medical Ophthalmology & Otolaryngology & Dermatology (한방안이비인후피부과학회지에 게재된 임상실험연구에 대한 고찰)

  • Kim, Chul-Yun;Seo, Hyung-Sik;Kim, Nam-Kwen;Lee, Dong-Jin;Kwon, Kang
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.27 no.4
    • /
    • pp.1-15
    • /
    • 2014
  • Objective : This study was carried out to analyze the quality and quantity of Clinical Trials that have been published in the journal of korean medical ophthalmology, otolaryngology, dermatology(JKOOD). Methods : We analyzed 25 clinical trials that published in JKOOD from 1988 to 2014. We excluded case reports, protocol and retrospective studies and classified searched papers into three categories; Randomized Clinical Trials(RCT), Non Randomized Clinical Trials(NRCT), Before After Study(BAS) by using study Design Algorithm for Medical literature of Intervention(DMAI). All articles were analyzed according to diagnosis, statistics program and intervention period. The bias of RCTs were evaluated by Cochrane Risk of Bias(RoB). Result : 1. The number of searched journals is 25 papers; 13 RCT, 2 NRCT, 10 BAS 2. Distribution of clinical trial; 'Atopic dermatitis' ranked the highest(44%) in disease, 'External application' raked the highest(71%) in treatment method. 3. 'allocation sequence' and 'prevention of allocated intervent to patients and therapists' are graded 'Low' but 'incomplete outcome date' and 'selective outcome' are graded 'Uncertain'. Conclusions : It is necessary to study more RCT. It will be helpful to study systematic reviews and meta analysis in JKOOD.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.

Implementation of Maritime Telemedicine System Using Android (안드로이드를 이용한 해양원격진료시스템 구현)

  • Lee, Ho-Tae;Kim, Byoung-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.221-228
    • /
    • 2018
  • The purpose of this study is to design and implement a maritime telemedicine system to provide the best medical service for patients who rescue and happens in sailing ship. For this purpose, INMARSAT and MVAST, which are necessary communication channels for maritime telemedicine, were examined and diversity in maritime communication path was suggested. It was implemented to enable maritime telemedicine by linking smart devices and medical devices for physical examination. The marine telemedicine system adopts the HTTP communication protocol to configure the web server and process the client request. The patient's chart information was entered using an application for AndroidPad and the patient was diagnosed using Bluetooth electronic stethoscope for diagnosis. This system enables appropriate medical treatment to emergency patients at maritime, which ultimately can improve medical services. It is expected to be a more effective medical support system through linkage with various medical equipment.

Anisotropic Total Variation Denoising Technique for Low-Dose Cone-Beam Computed Tomography Imaging

  • Lee, Ho;Yoon, Jeongmin;Lee, Eungman
    • Progress in Medical Physics
    • /
    • v.29 no.4
    • /
    • pp.150-156
    • /
    • 2018
  • This study aims to develop an improved Feldkamp-Davis-Kress (FDK) reconstruction algorithm using anisotropic total variation (ATV) minimization to enhance the image quality of low-dose cone-beam computed tomography (CBCT). The algorithm first applies a filter that integrates the Shepp-Logan filter into a cosine window function on all projections for impulse noise removal. A total variation objective function with anisotropic penalty is then minimized to enhance the difference between the real structure and noise using the steepest gradient descent optimization with adaptive step sizes. The preserving parameter to adjust the separation between the noise-free and noisy areas is determined by calculating the cumulative distribution function of the gradient magnitude of the filtered image obtained by the application of the filtering operation on each projection. With these minimized ATV projections, voxel-driven backprojection is finally performed to generate the reconstructed images. The performance of the proposed algorithm was evaluated with the catphan503 phantom dataset acquired with the use of a low-dose protocol. Qualitative and quantitative analyses showed that the proposed ATV minimization provides enhanced CBCT reconstruction images compared with those generated by the conventional FDK algorithm, with a higher contrast-to-noise ratio (CNR), lower root-mean-square-error, and higher correlation. The proposed algorithm not only leads to a potential imaging dose reduction in repeated CBCT scans via lower mA levels, but also elicits high CNR values by removing noisy corrupted areas and by avoiding the heavy penalization of striking features.

Dynamic Routing and Priority-based Data Transmission Schemes in Avionic Ethernet for Improving Network QoS (항공전자 이더넷의 네트워크 성능 향상을 위한 동적 라우팅 기법 및 우선순위기반 데이터 전송 기법)

  • Lee, Won Jin;Kim, Yong Min
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.4
    • /
    • pp.302-308
    • /
    • 2019
  • Aircraft data network (ADN) is a data networking for signal transmission among avionic systems in aircraft, and it mostly has been applied MIL-STD-1553B that guarantees high reliability considering its application environments. However, commercial Ethernet has been widely applied for ADN recently, and its range of applications have increased. Ethernet provides high speed of data transmission, however, it could not guarantee quality of service (QoS) so high as MIL-STD-1553B. In this paper, we propose dynamic routing and priority based data transmission schemes in order to improve the QoS of legacy Ethernet. Our propose schemes can be applied to Ethernet switch, and it is able to manage network traffic efficiently, and reduce the time for data transmission. We analyze the packet transmission time for both legacy and proposed schemes in Ethernet environments using simulation, and we show that our proposed scheme can reduce the time for data transmission compare to legacy spanning tree protocol.

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.