• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.033 seconds

A Comparative Clinical Trial to Evaluate the Efficacy and Safety of 'Hwangryunhaedok-tang' in Treatment of Gastritis : Study Protocol (위염 환자를 대상으로 황련해독탕 투여에 따른 치료효과, 안전성 평가를 위한 단일 비교 임상 연구 : 임상연구 프로토콜)

  • Kim, Hee-Yeon;Choi, Jun-Yong;Cheon, Jin-Hong;Kim, Kyung ho;Kim, Kwang-Youn;Oh, Tae-woo;Kim, Young woo;Park, Kwang Il;Kim, Kibong
    • Herbal Formula Science
    • /
    • v.27 no.3
    • /
    • pp.213-221
    • /
    • 2019
  • Objectives : The purpose of this study is to confirm the efficacy and safety of the treatment of gastritis with 'Hwangryunhaedok-tang'. Methods : Total 20 people, between 19 and 65 years old, will be recruited to participate in a comparative clinical trial. All subjects will take 2 capsules of Hwangryunhaedok-tang (Redoxin Cap.), 3 times a day, 30 minutes after meals, for 8 weeks. Outcomes will be measured at the baseline, 4th week, and 8th week. Primary outcomes is the improvement rates of gastritis symptoms, such as heartburn, nausea/vomiting, abdominal bloating, anorexia, heartburn, and trim. Results : This trial was approved by institutional review board of Pusan National University Korean Medicine Hospital (registry number: 2018011), and registered in Clinical Research information Service, one of WHO. Recruitment opened in April 2019 and is supposed to be completed by December 2019. Conclusions : This trial will provide clinical information to determine the efficacy and safety of treatment of gastritis with 'Hwangryunhaedok-tang'.

Energy Efficient Routing Protocol in Wireless Sensor Network (무선 센서 네트워크에서 에너지 효율적인 라우팅 프로토콜)

  • 손병락;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.9 no.2
    • /
    • pp.65-73
    • /
    • 2004
  • By the progress of communication and hardware technology, It is possible to organize wireless sensor nodes using the tiny sensor in recently. It is a critical aspect to minimize energy consumption for long-term lively sensor because wireless sensor nodes are associated with the available resources. The wireless sensor network is restricted in communication, exhaustion of power, and computation but it is very similar an Ad-Hoc network. Each sensor node products a few data and application layer of each sensor has slow transmitting feature. Unlike Ad-hoc, which is usually source or sink, base station of the each senor nodes works as sink and the other nodes except sink node works as source. Generally, wireless sensor network keep staying fixed state and observing circumstances continuously after setting up. It doesnt fit for the wireless sensor networks under functioning of existing ad-hoc networks because original Ad-Hoc network routing protocol couldnt operate for wireless sensor network features. This thesis propose the effective routing protocol way in the filed of the expanded routing protocol based on tree with considering on the characteristic of wireless sensor networks pattern.

  • PDF

A Study on Logical Cooperative Entity-Based Multicast Architecture Supporting Heterogeneous Group Mobility in Mobile Ad Hoc Networks (Mobile Ad Hoc 네트워크에서 이질적 그룹 이동성을 지원하는 논리적 협업 개체 기반의 멀티캐스트 구조 연구)

  • Kim, Kap-Dong;Kim, Sang-Ha
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.171-178
    • /
    • 2007
  • In mobile ad hoc networks, an application scenario requires mostly group mobility behavior in the mix of group moving nodes and individually moving nodes. The nodes of those applications tend to belong to the movement group with similar movement behavior. Group mobility is one of the good methods to improve scalability, and reduces the protocol overhead. In this paper, we propose the multicast architecture which regards nodes that have equal group mobility in the heterogeneous group mobility network as the single entity with the multiple interfaces and composes multicast tree, The logical cooperative entity-based multicast architecture accommodates the scalability, the multicast tree simplification, and the protocol overhead reduction which arc obtained from the hierarchical multicast architecture, while it maintains the nat multicast architecture for the data transmission. It also prevents the concentration of the energy consumption dispersing data forwarding load into the several ingress/egress nodes. Results obtained through simulations show that logical cooperative entity based multicast protocol with multiple interfaces offers the protocol scalability and the efficient data transmission.

An Analysis of the Vulnerability of SSL/TLS for Secure Web Services (안전한 웹 서비스를 위한 SSL/TLS 프로토콜 취약성 분석)

  • 조한진;이재광
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1269-1284
    • /
    • 2001
  • The Secure Sockets Layer is a protocol for encryption TCP/IP traffic that provides confidentiality, authentication and data integrity. Also the SSL is intended to provide the widely applicable connection-oriented mechanism which is applicable for various application-layer, for Internet client/server communication security. SSL, designed by Netscape is supported by all clients' browsers and server supporting security services. Now the version of SSL is 3.0. The first official TLS vl.0 specification was released by IETF Transport Layer Security working group in January 1999. As the version of SSL has had upgraded, a lot of vulnerabilities were revealed. SSL and TLS generate the private key with parameters exchange method in handshake protocol, a lot of attacks may be caused on this exchange mechanism, also the same thing may be come about in record protocol. In this paper, we analyze SSL protocol, compare the difference between TLS and SSL protocol, and suggest what developers should pay attention to implementation.

  • PDF

Effects of Oral Care Protocol on Oral Mucositis in Hematologic Malignancy Patients Receiving Chemotherapy (구강관리 프로토콜 적용이 항암화학요법을 받는 혈액암 환자의 구내염에 미치는 영향)

  • Park, Soo Jin;Cha, Gyeong Suk;Kim, Hyeung Sun;Park, Eun Young
    • Journal of Korean Clinical Nursing Research
    • /
    • v.22 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • Purpose: This study was done to identify effects of oral care protocol on oral mucositis and oral care performance in hematologic malignancy patients receiving chemotherapy. Methods: The design of this study was a nonequivalent control group pretest-posttest design. Both groups were patients diagnosed with hematologic malignancies who were receiving chemotherapy-each group had 20 patients. In the experimental group, patients were given intensive education on oral care based on the oral care protocol, whereas in the controlled group, each patient was given an educational brochure. Before chemotherapy, and 3 days, 7 days, and 14 days after chemotherapy, oral mucositis status of two groups were assessed using the guide to physical assessment of the oral cavity. Oral care performance was examined before chemotherapy and 14 days later. Results: The experimental group with the oral care protocol showed a significant difference (F=18.15, p<.001) in the oral mucositis status, and also in oral care performance (t=-10.33, p<.001). Conclusion: Findings indicate that the application of the oral care protocol is an effective tool for lowering the occurrence of oral mucositis and enhancing oral care performance in hematologic malignancy patients receiving chemotherapy.

Routing Protocol using Node Connectivity for Hierarchical Wireless Sensor Network (계층형 무선센서네트워크에서 노드 연결성을 이용한 라우팅 프로토콜)

  • Choi, Hae-Won;Kim, Sang-Jin;Ryoo, Myung-Chun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3A
    • /
    • pp.269-278
    • /
    • 2010
  • There are tendency that wireless sensor network is one of the important techniques for the future IT industry and thereby application areas in it are getting growing. Researches based on the hierarchical network topology are evaluated in good at energy efficiency in related protocols for wireless sensor network. LEACH is the best well known routing protocol for the hierarchical topology. However, there are problems in the range of message broadcasting, which should be expand into the overall network coverage, in LEACH related protocols. This dissertation proposes a new routing protocol to solve the co-shared problems in the previous protocols. The basic idea of our scheme is using the table for nodes connectivity and node energy information. The results show that the proposed protocol could support the load balancing by distributing the clusters with a reasonable number of member nodes and thereby the network life time would be extended in about 1.8 times longer than LEACH.

Interworking of SIP Authentication with DIAMETER and Security Analysis (SIP와 DIAMETER의 인증 연동 및 안전성 분석)

  • 박성준;정수환;이병길;김현곤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.426-435
    • /
    • 2004
  • The DIAMETER protocol provides Authentication, Authorization, and Accounting (AAA) transactions across the Internet. SIP(Session Initiation Protocol) will be used for new types of signaling, such as instant messaging and application level mobility across networks. And SIP will be a major signaling protocol for next generation wireless networks. But the Digest authentication scheme is not using a secure method of user authentication in SIP, and it is vulnerable to man-in-the-middle attacks or dictionary attacks. This study focused on designing a SIP proxy for interworking with AAA server with respect to user authentication and security analysis. We compared and analyzed the security aspects of the scenarios and propose two proposals that a response which include the user address and password-based mutual authentication and key agreement protocol. It is claimed to be more secure against common attacks than current scenarios.

Routing Protocol for Wireless Sensor Network Considering Data Transmission Stability and Load Quantity (선형적 데이터 전달의 안정성과 부하량을 고려한 무선 센서 네트워크 라우팅 프로토콜)

  • Hwang, Min;Cheon, Seung-Hwan;You, Jin-Ho;Kien, Nguyen Trung;Lee, Guee-Sang
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.11
    • /
    • pp.111-119
    • /
    • 2007
  • Sensor networks are needed for special purposes such as collecting or transmitting information by using sensor devices, for which various routing protocols have been proposed. Among existing protocols, the modified PEGASIS routing technique is known to be effective when applied to cases with directional transmissions of data. However it does not consider recovery from errors or guaranteeing stability in data transmission, while sensor devices performing repetitive relays and controls are prone to errors. In this paper, a double relay routing protocol for Zigbee based sensor networks where data are transfered reliably with a linear direction. The proposed protocol is effective in the sense that it secures the relaible transmission of data with minimal energy consumption based on a directional data transfer. A streetlight control system has been presented as an application of the proposed protocol.

Hop Based Gossiping Protocol (HoGoP) for Broadcasting Message Services in Wireless Sensor Networks (무선 센서 망에서 브로드캐스팅 메시지 서비스를 위한 홉 기반 가십 프로토콜)

  • So, Won-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.144-153
    • /
    • 2010
  • Flooding based routing protocols are usually used to disseminate information in wireless sensor networks. Those approaches, however, require message retransmissions to all nodes and induce huge collision rate and high energy consumption. In this paper, HoGoP (Hop based Gossiping Protocol) in which all nodes consider the number of hops from sink node to them, and decide own gossiping probabilities, is introduced. A node can decide its gossiping probability according to the required average reception percentage and the number of parent nodes which is counted with the difference between its hop and neighbors' ones. Therefore the decision of gossiping probability for network topology is adaptive and this approach achieves higher message reception percentage with low message retransmission than the flooding scheme. Through simulation, we compare the proposed protocol with some previous ones and evaluate its performance in terms of average reception percentage, average forwarding percentage, and forwarding efficiency. In addition, average reception percentage is analyzed according to the application requirement.

Privacy Preserving and Relay Attack Preventing Multi-Context RFID Mutual Authentication Protocol (프라이버시를 제공하고 중계 공격에 안전한 다중-컨텍스트 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.1028-1037
    • /
    • 2011
  • Recently, Selim et al proposed public key cryptography based privacy preserving multi-context RFID authentication protocol. However Selim et al's proposed protocol not only doesn't fit into passive tag based RFID system because it uses public key based encryption algorithm to perform authentication between reader and tag, but also is insecure to an impersonation attack because it doesn't provide mutual authentication. In order to eliminate the above described efficiency problem and security vulnerabilities, this paper proposes a new multi-context RFID mutual authentication protocol that can prevent privacy invasion and tag impersonation attack through providing mutual authentication between single passive tag which is located different application space and readers which provide multi-context purposes and can secure against relay attack and denial-of-service attack. As a result, the proposed protocol performs secure mutual authentication based on the collected space and time information from the RFID reader and provides strong security and high computation efficiency because if performs secure one-way hash function and symmetric encryption operations suitable to the environments of passive RFID tags.