• Title/Summary/Keyword: Back Support

Search Result 550, Processing Time 0.022 seconds

A Study of node Authentication in Ad-hoc Network using Java Card (자바 카드를 이용한 Ad-hoc망의 노드 인증에 관한 연구)

  • Lee, Cheol-Seung;Shin, Myeong-Sook;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.902-905
    • /
    • 2005
  • In this paper we challenge the mobile node Authentication using Java Card authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc rooting protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Java Card Authentication of mobile node can possibly be applied to the area of M-Commerce, Wireless Security, and Ubiquitous Computing and so on.

  • PDF

Design and Implementation of an Edge Router having ATM and Ethernet Interfaces using the Programmable Ethernet Packet Processor (프로그램 가능한 이더넷 패킷 프로세서를 이용한 ATM과 Ethernet 인터페이스를 갖는 에지 라우터의 설계 및 구현)

  • Park, Jae-Hyung;Kim, Mi-Hee;Lee, Yoo-Kyung
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.903-910
    • /
    • 2002
  • As the edge router provides the facility that it is capable of interworking with various kinds of networks, the forwarding engine should have the flexibility processing the corresponding types of frames from such network interfaces. In order to support the flexibility, we design and implement a prototype of edge router with ATM and Ethernet interfaces based on the programmable Ethernet packet processor Our forwarding engine handles and forwards the frames from ATM interfaces by using loop-back functionality of Ethernet packet processor. The performance of our edge router is evaluated by experiments throughout its performance of forwarding engine and tested by interworking with another kinds of routers.

A Study on the Success Factors of Innovation Cluster: A Case of the Pangyo Techno Valley in South Korea (혁신클러스터의 성공 요인에 관한 연구 : 판교테크노밸리 사례를 중심으로)

  • Chung, Giduk;Im, Jongbin;Chung, Sunyang
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.4
    • /
    • pp.970-988
    • /
    • 2017
  • As an innovation cluster has become an important policy tool for attaining regional and national competitiveness, many nations and regions are making great efforts to foster innovation clusters. In the case of Korea also, many innovation clusters have been established and some of them are recently receiving a lot of attention due to their performance. In fact, there have been lots of investment by the central and regional governments. However, there have been no in-depth analyses on Korean successful innovation clusters. This study investigates some of the success factors of a Korean representative innovation cluster, Pangyo Techo Valley. We find out that the Pangyo Techno Valley has four groups of success factors: innovative environment, consistent policy support by regional government, knowledge networks, and good feed-back system of innovation. Our findings would have some theoretical and practical implications for innovation cluster research and policy practice.

A Buffer Management Algorithm based on the GOP Pattern and the Importance of each Frame to Provide QoS for Streaming Services in WLAN (WLAN에서 스트리밍 서비스이 QoS를 제공하기 위한 GOP 패턴 및 프레임 중요도에 따른 버퍼 관리 기술)

  • Kim, Jae-Hyun;Lee, Hyun-Jin;Lee, Kyu-Hwan;Roh, Byeong-Hee
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.372-375
    • /
    • 2008
  • IEEE 802.11e standardized the EDCA mechanism to support the priority based QoS. And the virtual collision handler schedules the transmission time of each MAC frame using the internal back-off window according to the access category(AC). This can provides the differentiated QoS to real-time services at the medium traffic load condition. However, the transmission delay of MAC frame for real-time services may be increased as the traffic load of best effort service increases. It becomes more critical when the real-time service uses a compressed mode video codec such as moving picture experts group(MPEG) 4 codec. That is because each frame has the different importance. That is, the I-frame has more information as compared with the P- and the B-frame. In this paper, we proposed a buffer management algorithm based on the frame importance and the delay bound. The proposed algorithm is consisted of the traffic regulator based on the dual token bucket algorithm and the active queue management algorithm. The traffic regulator reduces the transmission rate of lower AC until that the virtual collision handler can transmit an I-frame. And the active queue management discards frame based on the importance of each frame and the delay bound of head of line(HoL) frame when the channel resource is insufficient.

  • PDF

User Authentication Mechanism of Ad-hoc Network (Ad Hoc망의 사용자 인증 메커니즘)

  • Lee, Cheol-Seung;Park, Do-Jun;Shin, Myung-Suk;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.713-716
    • /
    • 2004
  • In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in Ad-hoc network environment. Ad-hoc network is a collection of wireless mobile nodes without the support of a stationary infrastructure. and DSR routing protocol, which is one of famous mobile ad-hoc routing protocols, has the following network path problem. this paper is the security structure that defined in a mobile network and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses Ad-hoc based structure and transmission hierarchical security back of a mobile network, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal.

  • PDF

A Study on Improving the Fairness by Dropping Scheme of TCP over ATM (ATM상의 TCP 패킷 폐기정책에 따른 공정성 개선에 관한 연구)

  • Yuk, Dong-Cheol;Park, Seung-Seob
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3723-3731
    • /
    • 2000
  • Recently, the growth of applications and services over high-speed Internet increase, ATM networks as wide area back-bone has been a major solution. The conventional TCP suite is still the standard protocol used to support upper application on current Internet and uses a window based protocol for flow control in the transport layer. When TCP data uses the UBR service in ATM layer, the control method is also buffer management. If a cell is discarded in ATM layer. one whole packet of TCP will be lost. Which is responsible for most TCP performance degradation and do not offer sufficiently QoS. To solve this problem, Several dropping strategies, such as Tail Drop, EPD, PPO, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP fairness of end to end, we propose a packet dropping scheme algorithm using two fixed threshold. Under similar condition, we compared our proposed scheme with other dropping strategies. Although the number of VC is increased, simulation results showed that the proposed scheme can allocate more fairly each VC than other schemes.

  • PDF

Report on the Guillain-Barre Syndrome with Autonomic Dysfunction(1 Case) (자율신경 기능 이상을 동반한 Guillain-Barre 증후군 1례)

  • Kim, Dong-Ung;Shin, Sun-Ho;Cho, Gwon-Il;Shin, Hak-Su;Han, Myung-A;Choi, Jin-Young;Choi, Woo-Jung;Yang, Jae-Hun;Chung, Yong-Jun;Kim, Kwan-Sick
    • The Journal of Internal Korean Medicine
    • /
    • v.22 no.3
    • /
    • pp.453-458
    • /
    • 2001
  • Guillain-Barre syndrome, or acute inflammatory demyelinating Polyradiculoneuropathy, is frequently accompanied by cardiac and autonomic dysfunction. We report a patient who had tachycardia, orthostatic hypotension, hypertension, pronounced blood pressure fluctuations, abnormal sweating, constipation and urinary frequency as well as qudriparesis. We thought that the GBS was incurred by Damp-Heat, used Heat-Clearing and Dampness-Transforming decoction(Chongjoo-tang) in the early stage. In the later stage, fortifying the Spleen and Boosting Qi plus Supplementing the Kidney decoction(Palmultang+chongawon) was used to remove low back pain and boost recovery. The patient reached the nadir 14 days after onset. He became bed-bound and autonomic dysfunction was very severe. From 3rd week, abnormalities of autonomic function and paresis impoved gradually and he could walk above 5m without walker or equivalent support at the 5th week after onset.

  • PDF

R. L. Moore's Moore Method and its meaning in Korea (Robert Lee Moore의 교수법과 한국에서의 의미)

  • Lee, Sang-Gu;Ree, Sang-Wook;Kim, Duk-Sun
    • Journal for History of Mathematics
    • /
    • v.21 no.1
    • /
    • pp.79-96
    • /
    • 2008
  • In early 21st century, universities in Korea has been asked the new roles according to the changes of educational and social environment. With Korea's NURI and Brain Korea 21 project support, some chosen research oriented universities now should produce "teacher of teachers". We look 100 years back America's mathematics and see many resemblances between the status of US mathematics at that time and the current status of Korean mathematics, and find some answer for that. E. H. Moore had produced many good research mathematicians through his laboratory teaching techniques. R. L. Moore was his third PhD students. He developed his Texas/Moore method. In this article, we analyze what R. L. Moore had done through his American School of Topology and Moore method. We consider the meaning that early University of Texas case gives us in PBL(Problem Based Learning) process.

  • PDF

Numerical and experimental study of multi-bench retained excavations

  • Zheng, Gang;Nie, Dongqing;Diao, Yu;Liu, Jie;Cheng, Xuesong
    • Geomechanics and Engineering
    • /
    • v.13 no.5
    • /
    • pp.715-742
    • /
    • 2017
  • Earth berms are often left in place to support retaining walls or piles in order to eliminate horizontal struts in excavations of soft soil areas. However, if the excavation depth is relatively large, an earth berm-supported retaining system may not be applicable and could be replaced by a multi-bench retaining system. However, studies on multi-bench retaining systems are limited. The goal of this investigation is to study the deformation characteristics, internal forces and interaction mechanisms of the retaining structures in a multi-bench retaining system and the failure modes of this retaining system. Therefore, a series of model tests of a two-bench retaining system was designed and conducted, and corresponding finite difference simulations were developed to back-analyze the model tests and for further analysis. The tests and numerical results show that the distance between the two rows of retaining piles (bench width) and their embedded lengths can significantly influence the relative movement between the piles; this relative movement determines the horizontal stress distribution in the soil between the two rows of piles (i.e., the bench zone) and thus determines the bending moments in the retaining piles. As the bench width increases, the deformations and bending moments in the retaining piles decrease, while the excavation stability increases. If the second retaining piles are longer than a certain length, they will experience a larger bending moment than the first retaining piles and become the primary retaining structure. In addition, for varying bench widths, the slip surface formation differs, and the failure modes of two-bench retained excavations can be divided into three types: integrated failure, interactive failure and disconnected failure.

Self-Consciousness Information of the one who just came up (생겨난 이의 자기의식 정보)

  • Kim, Myeongseok
    • Korean Journal of Logic
    • /
    • v.22 no.1
    • /
    • pp.1-23
    • /
    • 2019
  • Gott, Carter, Leslie, Bostrom and so on, as Descartes did, have made the evidence that is "I am here as an observer" to support many other beliefs. Bostrom and others who studied observation selection effects are missing two points. First, the self-consciousness information of the ones who just came up is distinct from that of the ones who have awoken. The awoken 'I' can trace back by memory to the past, but the 'I' who just came up can not. Second, when calculating credence, we must distinguish the ones in the possible worlds from the ones in the actual worlds. An estimate of credence where only one possible world is actualized among all possible worlds, differs fundamentally from that where all possible worlds are actualized. Keeping these two points in mind, we have explored what is the nature of the self-consciousness information of the one who just came up. We examine in depth the two human embryos thought experiment.