• Title/Summary/Keyword: Application protocol

Search Result 1,507, Processing Time 0.03 seconds

The use of auxiliary devices during irrigation to increase the cleaning ability of a chelating agent

  • Prado, Marina Carvalho;Leal, Fernanda;Simao, Renata Antoun;Gusman, Heloisa;do Prado, Maira
    • Restorative Dentistry and Endodontics
    • /
    • v.42 no.2
    • /
    • pp.105-110
    • /
    • 2017
  • Objectives: This study investigated the cleaning ability of ultrasonically activated irrigation (UAI) and a novel activation system with reciprocating motion (EC, EasyClean, Easy Equipamentos $Odontol\acute{o}gicos$) when used with a relatively new chelating agent (QMix, Dentsply). In addition, the effect of QMix solution when used for a shorter (1 minute) and a longer application time (3 minutes) was investigated. Materials and Methods: Fifty permanent human teeth were prepared with K3 rotary system and 6% sodium hypochlorite. Samples were randomly assigned to five groups (n = 10) according to the final irrigation protocol: G1, negative control (distilled water); G2, positive control (QMix 1 minute); G3, QMix 1 minute/UAI; G4, QMix 1 minute/EC; G5, QMix 3 minutes. Subsequently the teeth were prepared and three photomicrographs were obtained in each root third of root walls, by scanning electron microscopy. Two blinded and pre-calibrated examiners evaluated the images using a four-category scoring system. Data were statistically analyzed using Kruskal-Wallis and Dunn tests (p < 0.05). Results: There were differences among groups (p < 0.05). UAI showed better cleaning ability than EC (p < 0.05). There were improvements when QMix was used with auxiliary devices in comparison with conventional irrigation (p < 0.05). Conventional irrigation for 3 minutes presented significantly better results than its use for 1 minute (p < 0.05). Conclusions: QMix should be used for 1 minute when it is used with UAI, since this final irrigation protocol showed the best performance and also allowed clinical optimization of this procedure.

Mobility-Aware Ad Hoc Routing Protocols for Networking Mobile Robot Teams

  • Das, Saumitra M.;Hu, Y. Charlie;Lee, C.S. George;Lu, Yung-Hsiang
    • Journal of Communications and Networks
    • /
    • v.9 no.3
    • /
    • pp.296-311
    • /
    • 2007
  • Mobile multi-robot teams are useful in many critical applications such as search and rescue. Explicit communication among robots in such mobile multi-robot teams is useful for the coordination of such teams as well as exchanging data. Since many applications for mobile robots involve scenarios in which communication infrastructure may be damaged or unavailable, mobile robot teams frequently need to communicate with each other via ad hoc networking. In such scenarios, low-overhead and energy-efficient routing protocols for delivering messages among robots are a key requirement. Two important primitives for communication are essential for enabling a wide variety of mobile robot applications. First, unicast communication (between two robots) needs to be provided to enable coordination and data exchange. Second, in many applications, group communication is required for flexible control, organization, and management of the mobile robots. Multicast provides a bandwidth-efficient communication method between a source and a group of robots. In this paper, we first propose and evaluate two unicast routing protocols tailored for use in ad hoc networks formed by mobile multi-robot teams: Mobile robot distance vector (MRDV) and mobile robot source routing (MRSR). Both protocols exploit the unique mobility characteristics of mobile robot networks to perform efficient routing. Our simulation study show that both MRDV and MRSR incur lower overhead while operating in mobile robot networks when compared to traditional mobile ad hoc network routing protocols such as DSR and AODV. We then propose and evaluate an efficient multicast protocol mobile robot mesh multicast (MRMM) for deployment in mobile robot networks. MRMM exploits the fact that mobile robots know what velocity they are instructed to move at and for what distance in building a long lifetime sparse mesh for group communication that is more efficient. Our results show that MRMM provides an efficient group communication mechanism that can potentially be used in many mobile robot application scenarios.

The Implementation of Real-Time Vital Sign Information Transmission Monitoring System using TMO (TMO를 이용한 실시간 생체정보 전송 모니터링 시스템 구현)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.33-40
    • /
    • 2008
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems. It is able to apply to remote medical examination and treatment. Through the proper data exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.

  • PDF

User Authentication Mechanism of Ad-hoc Network (Ad Hoc망의 사용자 인증 메커니즘)

  • Lee, Cheol-Seung;Park, Do-Jun;Shin, Myung-Suk;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.713-716
    • /
    • 2004
  • In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc routing protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal.

  • PDF

A Time-limited Forward-secure Proxy Signature Scheme (유효 기간을 갖는 포워드-시큐어 대리 서명 방법)

  • 김상희;조태남;이상호;채기준;박운주;나재훈
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.484-493
    • /
    • 2003
  • Proxy signature scheme is a cryptographic protocol that an original signer delegates her signing capability to a proxy signer, and then the proxy signer is able to create signatures on behalf of the original signer. In general, there is time-limit for which the signing capability of the proxy signer is valid. One of methods to limit the valid delegation time is to make public delegation information contain the expiration date of the delegation. however, in this method we cannot prevent the proxy signer from signing after the valid delegation is expired because no one knows the exact time when the proxy signer signed a message. The validity of the past legal signatures cannot be preserved in case that the proxy singer´s key is compromised during the delegation period. In this paper, we propose a new scheme, time-limited forward-secure proxy signature protocol, which prevents the proxy singer from signing after the valid delegation is expired and which preserves the validity of the past legal signatures even if the signing key is compromised. The proposed scheme does not require the exact time-information by making an original signer control time-related parameters and satisfies the forward-security property in each update-period of the proxy signing key. The time-period is determined according to the application characteristics or security policies.

SIP6 supporting the Differentiated Call Processing Scheme (차별화된 호 처리 기법을 지원하는 SIP6)

  • 김진철;최병욱;장천현;김기천;한선영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.621-630
    • /
    • 2003
  • In this paper, we implemented SIP protocol that supports IPv6 and differentiated call processing scheme for NGN(Next Regeneration Network). In NGN, SIP processes call signaling among various application services. A softswitch and SIP server must give priority to sensitive services such as Fax, network management and home networking that require a fast call setup time. Also, the support of IPv6 is needed under consideration of All-IP. We proposed differentiated call processing scheme. The differentiated call processing scheme supports differentiated call processing as priority of service class on call processing in SW server We defined three service classes and use the Flow Label field of the IPv6 header for setting service class. Through the performance analysis, we proved that it improves throughput for call message with the high priority. The result of performance analysis demonstrates that differentiated call processing scheme gives better performance for the service requiring a fast session establishment in NGN.

Performance analysis of the Resource Reservation Schemes using Mobile Cluster based H-MRSVP in Wireless Mobile Networks (무선 이동망에서 이동 클러스터 기반의 H-MRVP를 이용한 자원관리 기법의 성능 분석)

  • Ma, Gyeong-Min;Won, Jeong-Jae;Lee, Hyeong-U;Jo, Chung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.283-292
    • /
    • 2002
  • This paper develops a scheme of resource management for guaranteeing QoS of realtime traffic in wireless mobile internet environments Mobile terminal has significant impact on the QoS originating mobility provided to a real-time application. The currently proposed MRSVP is not clear the boundary of resource reservation tregion and also can give rise to signal overhead to maintain sessions. To solve above problem, we propose the new reservation protocol, mobile cluster based H-MRSVP to combine MRSVP with moving cluster concept. In this paper, we analytically design our model for guaranteeing the QoS of realtime traffic and compare the three schemes: guard channel allocation schemes, DCA and our model. The performance measures are the probabilities of new call blocking, handoff dropping, resource utilization and service completion versus the system offered Erlang load. Consequently, Simulation indicate our model is more flexible than DCA in a view pint of channel utilization and gains the advantage over guard channel scheme with respects to the mobility.

A Design of Resource Reservation Mechanism with Micro Host Mobility (단말의 마이크로 이동성을 고려한 자원예약 메커니즘의 설계)

  • Koh, Kwang-Sin;Cha, Woo-Suk;Ahn, Jae-Young;Cho, Gi-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.733-742
    • /
    • 2002
  • It has been known that the host mobility feature has very significant impact on the QoS (Quality of Service), which is usually required to a real-time multimedia application. The existing QoS support mechanisms to provide the real-time services to fixed network environment, like as RSVP, are inadequate to accommodate the mobile hosts which can frequently change their point of attachments to the fixed network. So, MRSVP (Mobile RSVP) protocol has been proposed to reduce the impacts of host mobility on QoS guarantees, in which a mobile host needs to make advance resource reservations at multiple locations it may possibly visit during the lifetime of the connection. This paper proposes a dynamic dual anchor node (DDAN) architecture which integrates the MRSVP and RSVP tunnel, in addition to the Mobile IP Regional Registration protocol. By limiting the resource reserved in local area, it preserves the lower level of resource reservation, but provides approximately the same degree of QoS support as the existing MRSVP.

A Study on Improving the Fairness by Dropping Scheme of TCP over ATM (ATM상의 TCP 패킷 폐기정책에 따른 공정성 개선에 관한 연구)

  • Yuk, Dong-Cheol;Park, Seung-Seob
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3723-3731
    • /
    • 2000
  • Recently, the growth of applications and services over high-speed Internet increase, ATM networks as wide area back-bone has been a major solution. The conventional TCP suite is still the standard protocol used to support upper application on current Internet and uses a window based protocol for flow control in the transport layer. When TCP data uses the UBR service in ATM layer, the control method is also buffer management. If a cell is discarded in ATM layer. one whole packet of TCP will be lost. Which is responsible for most TCP performance degradation and do not offer sufficiently QoS. To solve this problem, Several dropping strategies, such as Tail Drop, EPD, PPO, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP fairness of end to end, we propose a packet dropping scheme algorithm using two fixed threshold. Under similar condition, we compared our proposed scheme with other dropping strategies. Although the number of VC is increased, simulation results showed that the proposed scheme can allocate more fairly each VC than other schemes.

  • PDF

Embedded System Design of Automotive Media Server Platform with the MOST Interface (MOST 인터페이스를 갖는 차량용 미디어 서버 플랫폼에 대한 임베디드 시스템 설계)

  • Kwak, Jae-Min;Park, Pu-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.262-267
    • /
    • 2006
  • For growing need for the multimedia application in the vehicles, the MOST protocol has been focused on. The MOST protocol supports three kinds of communication modes; short control message, asynchronous packets, and reserved synchronous stream data. Because of a variety of transportation, the MOST is suitable for various applications in vehicle environment. In this paper, we implemented embedded system which is MOST-enabled AMS platform and tested the network communication operation through the control port and the synchronous channel of the source port. We implemented the prototype platforms which communicate each other on the MOST's POF network. Moreover we implemented the DivX decoder attached AMS platform and verified the operation by transferring the video stream and the control messages through the MOST network.

  • PDF