• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.025 seconds

A study of multi protocol communication on single serial interface (Serial 전송라인에서 Multi-Protocol 통신의 구현 연구)

  • Lee, Jae-Cheol;Ko, Dae-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.464-469
    • /
    • 2008
  • The RS-232C (Unbalanced serial) and RS-485 (balanced serial) are standard in serial communication. RS-485 uses a differential electrical signal, as opposed to unbalanced signals referenced to ground with the RS-232. Differential transmission, which uses two lines each for transmit and receive signal results in greater noise immunity and longer distances as compared to the RS-232C. The greater noise immunity and distance are big advantages in industrial environments. In general, one protocol on one serial interface is very normal application. In this study, we implemented multi protocols on one serial RS-485 interface and examine the performance and result with hanging multi equipments.

  • PDF

Development and Application of Timeout Protocol on OR (수술실 타임아웃 프로토콜 개발 및 적용)

  • Park, Jeong-Sook;Kim, Eun-Hee;Lee, Hye-Ran
    • Korean Journal of Adult Nursing
    • /
    • v.20 no.2
    • /
    • pp.353-363
    • /
    • 2008
  • Purpose: This study was conducted to develop a timeout protocol as the process of patients verification in the operating room, and to evaluate its effects. Methods: The timeout protocol was developed based on the experience of practices and the universal protocol of JCAHO 2004. The subjects of this study were 192 surgical members working in the operating room at an university hospital in Daegu, Korea. Results: The timeout protocol was developed in six steps; participants verification, encouragement of compliance, verification of right 3 PSP, agreement of surgical team members, verification of the parties to a patient, patient agreement. The data which have been resulted from the experimental group show significantly higher than those of control group as follows; cognition(t = -6.580, p = .000), contents of performance; progress of anesthesiologist as leader(${\chi}^2$ = 29.029, p = .000), verification of right patient, right site and right procedure(${\chi}^2$ = 40.663, p = .000), participation of surgical team(${\chi}^2$ = 68.412, p = .000), and the number of cases of performance(${\chi}^2$ = 242.900, p = .000). Conclusion: It suggests that medical accidents caused by failures in a preoperative verification process can be prevented if a timeout is conducted active involvement and effective communication among surgical team members for a final verification of the correct patient, procedure, and site.

  • PDF

Conceptual Study of the Application Software Manager Using the Xlet Model in the Nuclear Fields (원자력 관점에서의 Xlet 모델을 이용한 응용 소프트웨어 관리자 개념 연구)

  • Joon-Koo Lee;Hee-Seok Park;Heui-Youn Park;In-Soo Koo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.59-65
    • /
    • 2003
  • In order to reduce the cost of software maintenance including software modification, we suggest the object oriented program with checking the version of application program using the Java language and the technique of executing the downloaded application program via network using the application manager. In order to change the traditional scheduler to the application manager we have adopted the Xlet concept in the nuclear fields using the network. In usual Xlet means a Java application that runs on the digital television receiver. The Java TV Application Program Interface(API) defines an application model called the Xlet application lifecycle. Java applications that use this lifecycle model are called Xlets. The Xlet application lifecycle is compatible with the existing application environment and virtual machine technology. The Xlet application lifecycle model defines the dialog(protocol) between an Xlet and its environment

  • PDF

Desing of the High-Perfrimance Group Transport Protocol To support QoS for Distributed Multimedia Application over ATM (ATM 상에서 분산 멀티미디어 응용을 위한 서비스 품질을 지원하는 고성능 그룹 트랜스포트 프로토콜 설계)

  • Song, Byeong-Gwon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.1059-1075
    • /
    • 1997
  • The transprot layer protocol for distrubuted multimedia applications in high speed network should gurantee the Quality of Serivce(QoS)requested by uwer.,The QoS Parmenters can be divied into two calssifications:those depend on the speed of a network such as bandiwidth,end-to-end transmission delay and throughput;and net- woek independent parameters such as various typed of group communications, retransmission method based on multimeda characteristic,acceptable packet wrror rate and transmission priority.In this proposed protocol,we divided user's QoS into performance redated parmeters and non-performance related parameters.The perform- ance-related paramenters are mapped into ATM traddic paramenters by the Distributed QoS Manger(DQM),the QoS manager,and the non-performance redlted paramenters are supported by the Distributed Multimedia Trans-port protocol(DMTP),a high-performance group transport protocol.Especially,becaues the DMTP is designed with considering the IP protocol,it can be efficiently used as an underlying protocol not onlu in ATM,but also in Ethernet,Token ring and FDDI LAN.

  • PDF

Performance Analysis of Position Based Routing Protocol for UAV Networks (UAV 네트워크 환경에 적합한 위치기반 라우팅 프로토콜의 성능 분석)

  • Park, Young-Soo;Jung, Jae-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.188-195
    • /
    • 2012
  • Many systems are developing for the realization of NCW(Network Centric Warfare). UAV(Unmanned Aerial Vehicle) Network is attracting attention in a lot of military applications. In general, UAVs have the potential to create an ad-hoc network and greatly reduce the hops from source to destination. However, UAV networks exhibit unique properties such as high mobility, high data rate, and real time service. The routing protocols are required to design the multi-hop routing protocols that can dynamically adapt to the requirements of UAV network. In this paper we analyse Geographic Routing Protocol is based on geographical distance between source and destination for efficient and reliable transmission. Geographic Routing Protocol is evaluated in video service scenarios with TDMA model in our simulation. The simulation results show that the performance of Geographic Routing Protocol is better than the MANET Routing Protocol in terms of packet received ratio, end to end delay, and routing traffic sent.

Investigation of the Effect of kV Combinations on Image Quality for Virtual Monochromatic Imaging Using Dual-Energy CT: A Phantom Study

  • Jeon, Pil-Hyun;Chung, Heejun;Kim, Daehong
    • Journal of Radiation Protection and Research
    • /
    • v.43 no.1
    • /
    • pp.1-9
    • /
    • 2018
  • Background: In this study, we investigate the image quality of virtual monochromatic images synthesized from dual-energy computed tomography (DECT) at voltages of 80/140 kV and 100/140 kV. Materials and Methods: Virtual monochromatic images of a phantom are synthesized from DECT scans from 40 to 70 keV in steps of 1 keV under the two combinations of tube voltages. The dose allocation of dual-energy (DE) scan is 50% for both low- and high-energy tubes. The virtual monochromatic images are compared to single-energy (SE) images at the same radiation dose. In the DE images, noise is reduced using the 100/140 kV scan at the optimal monochromatic energy. Virtual monochromatic images are reconstructed from 40 to 70 keV in 1-keV increments and analyzed using two quality indexes: noise and contrast-to-noise ratio (CNR). Results and Discussion: The DE scan mode with the 100/140 kV protocol achieved a better maximum CNR compared to the 80/140 kV protocol for various materials, except for adipose and brain. Image noise is reduced with the 100/140 kV protocol. The CNR values of DE with the 100/140 kV protocol is similar to or higher than that of SE at 120 kV at the same radiation dose. Furthermore, the maximum CNR with the 100/140 kV protocol is similar to or higher than that of the SE scan at 120 kV. Conclusion: It was found that the CNR achieved with the 100/140 kV protocol was better than that with the 80/140 kV protocol at optimal monochromatic energies. Virtual monochromatic imaging using the 100/140 kV protocol could be considered for application in breast, brain, lung, liver, and bone CT in accordance with the CNR results.

A Proposal for the Practical and Secure Electronic Voting Protocol (실용적이고 안전한 전자투표 프로토콜에 관한 연구)

  • 김순석;이재신;김성권
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2000
  • We have seen a lot of developments on computer application areas with the wide spread use of computers and the rapid growth of communication network. It is necessary to use a cryptographic technique for electronic voting, but, at present, despite of its importance electronic voting protocols so far have many shortcomings. In this paper, with the assumption of a trustable voting centers we propose a large-scale and practical electronic voting protocol satisfying protocol requirements, such as secureness, fairness, privacy of voter and correctness. Voters are able to get a vote without revealing their voted information by using the blinding technique. We can find the injustice between a voter and the tallier by using undeniable challenge and responsible protocol. Also, we proposes a secure protocol that compensates a integrity of electronic voting and protects a privacy of voter from outer attacks as using a anonymity of voter.

Clinical Trial Protocol Development of Acupuncture for Disaster Survivors: Results from an Expert Survey (전문가 설문조사에 기반한 재난 경험자에 대한 침치료 임상연구 프로토콜 개발)

  • Huiyong Kwak;Chanyoung Kwon;Jungtae Leem;Sang-Ho Kim
    • Journal of Oriental Neuropsychiatry
    • /
    • v.35 no.1
    • /
    • pp.15-26
    • /
    • 2024
  • Objectives: The objective of this study is to develop a specialized clinical research protocol for acupuncture treatment specifically designed for disaster survivors based on insights from an expert survey. Methods: An expert panel comprising specialists in neuropsychiatry, acupuncture, and clinical research methodology was assembled. Initial data to inform the clinical research protocol design was collected utilizing open-ended responses, multiple-choice questions, and a 5-point Likert scale to gauge agreement levels. Next, this data was disseminated to a panel of experts. A cohesive clinical research protocol was then formulated during a core panel meeting by integrating insights from a panel of 10 experts. Results: The protocol developed herein entails a non-randomized controlled study involving participants aged 19~64 years old who have been identified as high-risk or cautious according to the National Trauma Center screening test. The study design includes the establishment of an active control group, which allows for the assessment of an additional effect through comparison with conventional therapy. The selected acupuncture approach involves a combination of manual acupuncture and ear acupuncture. For clinical outcome assessment, the Clinician-Administered Posttraumatic Stress Disorder Scale for DSM-5 was proposed to gauge trauma symptoms. Representative scales for various domains such as depression, anxiety, anger, insomnia, pain, and quality of life were also provided for reference. Conclusions: The developed protocol is anticipated to streamline the swift design and initiation of clinical trials during disaster scenarios. It is also designed to be scalable, thereby enabling its application in both non-randomized control group studies and single-group before-and-after comparisons.

Verifying Active Network Applications (액티브 네트워크 응용의 검증)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

A Scheme for Providing Anonymity and Untraceability in Mobile Computing Environments (이동 컴퓨팅 환경에서의 익명성과 불추적성 지원 기법)

  • Choi, Sun-Young;Park, Sang-Yun;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.570-577
    • /
    • 2001
  • In recent years, Internet-based application services on the mobile environment have been activated, and the developments of mobile internet application for user authentication and privacy have been required. Especially, the research for preventing disclosure of identity caused by user mobility is on the progress. In this paper, we introduce the study of an authentication protocol for anonymity and untraceability supporting the protection of user identity and the authenticated secure association mechanism between mobile hosts and remote domains. In this protocol use public cryptography.

  • PDF