• Title/Summary/Keyword: Duplicate

Search Result 571, Processing Time 0.024 seconds

Fast Handover Provision Mechanism through Reduction of CoA Configuration Time (CoA 설정 시간 단축을 통한 빠른 핸드오버 제공 메카니즘)

  • Choi, Ji-Hyoung;Lee, Dong-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.79-82
    • /
    • 2007
  • Recently the diffusion of the advancement of mobile communication technique and mobile terminal increased, The users were demanded seamless services when carrying and moving. It proposed the FMIPv6 (Fast Handoff for Mobile IPv6) from the IETF like this meeting this requirement. The handover procedure of the FMIPv6 causes to defecate with movement detection, new CoA configuration and binding update. But, the delay occurs from each process, when the DAD(Duplicate Address Detection) of the CoA executing, the big delay occurs. This paper proposes a scheme of delay reduction, it omits DAD process and stores in the AR(Access Router) relates in the CoA of the mobile terminal information.

  • PDF

Historic plant specimens collected from the Korean Peninsula in the early 20th century (I) (20세기 초에 채집된 한반도 고표본 (I))

  • Im, Hyoung-Tak;Son, Hyun-Duk;Im, Jae-Suk
    • Korean Journal of Plant Taxonomy
    • /
    • v.46 no.1
    • /
    • pp.33-54
    • /
    • 2016
  • Many of the historic plant specimens collected from the Korean Peninsula in the early 20th century deposited in herbaria in Korea were destroyed during the Korean War. However, duplicates of the specimens deposited in the Herbarium of the University of Tokyo (TI) remained unharmed. We examined historic plant specimens, identified undetermined specimens, and made a list to provide fundamental information on the early taxonomic history of Korea. One set of duplicate specimens was donated by TI and deposited into the Chonnam National University herbarium (CNU) and into the herbarium of the National Institute of Biological Resources in Korea (KB).

A Study on the Case Analysis in the Causes of Child Abuse by His Parents (부모에 의한 아동학대 발생원인의 사례분석 연구)

  • Kim, Hyang-Mi;Hong, Sung-Dae
    • Industry Promotion Research
    • /
    • v.1 no.1
    • /
    • pp.105-113
    • /
    • 2016
  • The problem of child abuse have came to the fore thesedays. This study recognized that most of the causes of generating child abuse are responsible for their parents and revealed it through case analysis. The followings are the causes of occuring child abuse by paraents. Parents' social and psychological problems were found out to be the cases of the child abuse. Child abuse is referred to the phenomenon causing wife abuse and child abuse at the same time. Consequently, child abuse is mostly occured by their parents and it is the result of parents' social, psychological and duplicate abuse.

Effectiveness of DUPACK-independent TCP in Coded Wireless Mesh Networks (중복 승인을 사용하지 않는 TCP의 코드화된 무선 메쉬 망에서의 효과)

  • Lim, Chan-Sook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.7-13
    • /
    • 2011
  • While the TCP throughput degradation problem in coded wireless mesh networks is well-known, few effective solutions have been proposed. Most schemes proposed attempts to mask packet reordering by ordering packets at a lower layer or to adjust a packet transmission rate to solve the scarcity problem of coding opportunities. Through the throughput comparison of traditional standard TCP variants, we show that losses and duplication of TCP acknowledgements in coded wireless mesh networks can impact throughput. In addition, we show that a TCP variant that does not rely on duplicate acknowledgements is more suitable for coded wireless mesh networks.

Job Analysis of Medical Care Client Managers based on DACUM (데이컴 (DACUM)기법을 이용한 의료급여관리사의 직무분석)

  • Choi, Jeong-Myung
    • Korean Journal of Occupational Health Nursing
    • /
    • v.20 no.3
    • /
    • pp.299-307
    • /
    • 2011
  • Purpose: The purpose of this study is to establish the standards for duty of Medical Care Client Managers and analyze the extent of accomplishment, importance, and difficulty according to the standards. Methods: The draft for duty of Medical Care Client Managers was formed by the method of developing a curriculum (DACUM) and data were collected from 185 Medical Aid Client Managers in 234 areas to evaluate the actual frequency of accomplishment, importance and difficulty in comparison with the standards for duties. Results: The standard duty draft for Medical Care Client Manager is composed of five separate groups of duties and thirty five tasks. The five duties are Case Management, Extension Approval, External Cause of Injury, Duplicate Claims and Other Administrations. Seven Tasks are allocated to each duty such as Case Management, Extension Approval and External Cause of Injury. Five tasks are allocated to 'Duplicate Claims' duty and nine tasks are allocated to 'Other Administrations' duty. Conclusion: From the results of analysis for duties, it was apprehensive about overburdened responsibilities and carelessness in professional duties. It was necessary to establish specific guidelines for duties because of redundent application or regional variation in frequency of accomplishing other administrative duties. It was necessary to relieve a regional disparity of business charge and also was necessary to propose an alternative plan to relieve the overburdened responsibilities.

A Cluster-based Address Allocation Protocol in MANET Environment (MANET 환경에서 클러스터 기반 주소 할당 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9A
    • /
    • pp.898-904
    • /
    • 2007
  • I must receive node discernment address for communication between node that participate to network in MANETs(Mobile Ad-hoc Networks). Address is created by node confidence or different node. I achieve address redundancy check (Duplicate Address Detection) to examine whether this address is available unique address. However, this method happens problem that MANETs' extensity drops. This paper can manage by group unit binding transfer nodes to group in MANETs. I suggest method that apply special quality of cluster that exchange subordinate decrease and mobility government official of control message are easy in address assignment protocol minimize time required in redundancy check and solves extensity problem. Method that propose in this paper shows excellent performance according to node number increase than wave and MANETConf [2] through simulation.

IPv6 Autoconfiguration for Hierarchical MANETs with Efficient Leader Election Algorithm

  • Bouk, Safdar Hussain;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.248-260
    • /
    • 2009
  • To connect a mobile ad hoc network (MANET) with an IP network and to carryout communication, ad hoc network node needs to be configured with unique IP adress. Dynamic host configuration protocol (DHCP) server autoconfigure nodes in wired networks. However, this cannot be applied to ad hoc network without introducing some changes in auto configuration mechanism, due to intrinsic properties (i.e., multi-hop, dynamic, and distributed nature) of the network. In this paper, we propose a scalable autoconfiguration scheme for MANETs with hierarchical topology consisting of leader and member nodes, by considering the global Internet connectivity with minimum overhead. In our proposed scheme, a joining node selects one of the pre-configured nodes for its duplicate address detection (DAD) operation. We reduce overhead and make our scheme scalable by eliminating the broadcast of DAD messages in the network. We also propose the group leader election algorithm, which takes into account the resources, density, and position information of a node to select a new leader. Our simulation results show that our proposed scheme is effective to reduce the overhead and is scalable. Also, it is shown that the proposed scheme provides an efficient method to heal the network after partitioning and merging by enhancing the role of bordering nodes in the group.

Tree-Pattern-Based Clone Detection with High Precision and Recall

  • Lee, Hyo-Sub;Choi, Myung-Ryul;Doh, Kyung-Goo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.1932-1950
    • /
    • 2018
  • The paper proposes a code-clone detection method that gives the highest possible precision and recall, without giving much attention to efficiency and scalability. The goal is to automatically create a reliable reference corpus that can be used as a basis for evaluating the precision and recall of clone detection tools. The algorithm takes an abstract-syntax-tree representation of source code and thoroughly examines every possible pair of all duplicate tree patterns in the tree, while avoiding unnecessary and duplicated comparisons wherever possible. The largest possible duplicate patterns are then collected in the set of pattern clusters that are used to identify code clones. The method is implemented and evaluated for a standard set of open-source Java applications. The experimental result shows very high precision and recall. False-negative clones missed by our method are all non-contiguous clones. Finally, the concept of neighbor patterns, which can be used to improve recall by detecting non-contiguous clones and intertwined clones, is proposed.

Fast Handover Provision Mechanism through Reduction of CoA Configuration Time (CoA 설정 시간 단축을 통한 빠른 핸드오버 제공 메카니즘)

  • Jin, Sung-Ho;Choi, Ji-Hyoung;Kim, Dong-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2027-2031
    • /
    • 2007
  • Recently the diffusion of the advancement of mobile communication technique and mobile terminal increased, The users were demanded seamless services when carrying and moving. It proposed the FMIPv6(Fast Handoff for Mobile IPv6) from the IETF like this meeting this requirement. The handover procedure of the FMIPv6 causes to defecate with movement detection, new CoA configuration and binding update. But, the delay occurs from each process, when the DAD(Duplicate Address Detection) of the CoA executing, the big delay occurs. This paper proposes a scheme of delay reduction, it omits DAD process and stores in the AR(Access Router) relates in the CoA of the mobile terminal information.

A Security Model for Duplication Resistant eSeal (복제 공격 저항성을 갖는 전자봉인 보안 모델)

  • Kim, Joo-Hae;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.111-116
    • /
    • 2007
  • An eSeal(Electrical Seal) is an active RFID device which installed on the door of a container. The main role of the tag is to make sure the seal is not breaking by unauthorized people. Because an eSeal uses RFID system, we need to prevent eavesdrop and impersonate. Moreover, an eSeal which uses a secure protocol must not be able to duplicate. If duplication resistant property is not provide to a eSeal, an attacker may replace a object in the sealed container and reseal the container with duplicated eseal to hide breaking of the eSeal. In this paper, we provide a protocol which resist duplicate an eSeal during prevent eavesdrop and impersonation.