• 제목/요약/키워드: Evaluation Protocol

검색결과 1,033건 처리시간 0.028초

의복구매시의 정보처리와 평가과정 (Consumer Information Processing and Evaluation in Clothing Purchase Decision Making)

  • 이영선
    • 한국의류학회지
    • /
    • 제21권8호
    • /
    • pp.1323-1333
    • /
    • 1997
  • The objectives of this study were to identify 1) the steps of information processing and evaluation in clothing purchase decision making, 2) evaluative criteria and determinant attributes at each step, 3) decision making rule, and 4) the effect of clothing involvement on information processing and evaluation. The data were obtained 71 female adults using questionnaire, observation and protocol in real shopping behavior. Consumer's information processing and evaluation was a circulated process composed of multi-steps. Consumer considered aesthetic and intrinsic evaluative criteria to be important and used compensatory and noncompensatory rule together at each decision making step. Clothing involvement had an partial effect on information processing and evaluation.

  • PDF

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

수중 전파 지연을 고려한 매체 접근 제어 프로토콜에 대한 성능 평가 (Performance Evaluation of an Underwater Propagation Delay-Aware Medium Access Control Protocol)

  • 황호영;김우식;이상국;조호신
    • 한국음향학회지
    • /
    • 제34권6호
    • /
    • pp.463-469
    • /
    • 2015
  • 본 논문에서는 수중 전파 지연을 고려한 매체 접근 제어 프로토콜을 제안하고 제안하는 프로토콜의 성능을 평가한다. 제안하는 수중 전파 지연을 고려한 매체 접근 제어 프로토콜은 한 슬롯 시간 내에 여러 개의 RTS(Request-To-Send) 프레임들이 싱크 노드에 수신되는 경우에 RTS 프레임들이 겹치지 않게 수신되면 이들을 복원할 수 있다. 본 논문에서는 제안하는 수중 전파 지연을 고려한 매체 접근 제어 프로토콜의 성능 평가를 다양한 환경에서 수행하고 기존의 매체 접근 제어 프로토콜과도 성능을 비교 분석한다.

A novel method for the management of proximal segment using computer assisted simulation surgery: correct condyle head positioning and better proximal segment placement

  • Lee, Yong-Chan;Sohn, Hong-Bum;Kim, Sung-Keun;Bae, On-Yu;Lee, Jang-Ha
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • 제37권
    • /
    • pp.21.1-21.8
    • /
    • 2015
  • Computer Assisted Simulation Surgery (CASS) is a reliable method that permits oral and maxillofacial surgeons to visualize the position of the maxilla and the mandible as observed in the patient. The purpose of this report was to introduce a newly developed strategy for proximal segment management according to Balanced Orthognathic Surgery (BOS) protocol which is a type of CASS, and to establish the clinical feasibility of the BOS protocol in the treatment of complex maxillo-facial deformities. The BOS protocol consists of the following 4 phases: 1) Planning and simulation phase, 2) Modeling phase, 3) Surgical phase, and 4) Evaluation phase. The surgical interventions in 80 consecutive patients were planned and executed by the BOS protocol. The BOS protocol ensures accuracy during surgery, thereby facilitating the completion of procedures without any complications. The BOS protocol may be a complete solution that enables an orthognatic surgeon to perform accurate surgery based on a surgical plan, making real outcomes as close to pre-planned outcomes as possible.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권3호
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

VANET 환경에서 멀티 비콘을 적용한 충돌 회피 알고리즘에 관한 연구 (A Study of Collision Avoidance Algorithm Based on Multi-Beacon in the Vehicular Ad-hoc Network)

  • 김재완;엄두섭
    • 한국IT서비스학회지
    • /
    • 제11권4호
    • /
    • pp.195-213
    • /
    • 2012
  • In ubiquitous environments, the Intelligent Transportation System (ITS) protocol is a typical service used to improve the quality of life for humans. The Vehicular Ad-hoc Network (VANET) protocol, a part of ITS, needs further study with regards to its support for high reliability, high speed mobility, data transmission efficiency, and so on. The IEEE 802.11 standard provides a high data rate channel, but it was designed for peer-to-peer network protocols. IEEE 802.11p also provides a high data rate channel, however, it only facilitates communication between roadside and on-board equipment. A VANET has characteristics that enable its topology to change rapidly; it can also be expanded to a multi-hop range network during communication. Therefore, the VANET protocol needs a way to infer the current topology information relating to VANET equipped vehicles. In this paper, we present the Multi-Beacon MAC Protocol, and propose a method to resolve the problem of beacon collisions in VANET through the use of this Multi-Beacon MAC protocol. Evaluation of the performance of Multi-Beacon MAC protocol by means of both mathematical analyses and simulation experiments indicate that the proposed method can effectively reduce beacon collisions and improve the throughput and the delay between vehicles in VANET systems.

수중 모바일 애드 혹 네트워크를 위한 MAC 프로토콜 설계 및 구현 (Design and Implementation of MAC Protocol for Underwater Mobile Ad-hoc Networks)

  • 이진영;윤남열;박수현
    • 전자공학회논문지
    • /
    • 제51권4호
    • /
    • pp.76-89
    • /
    • 2014
  • 본 논문에서는 수중 매체의 특성 중의 하나인 긴 전송 지연을 고려한 수중 모바일 애드 혹 네트워크 기반의 MAC 프로토콜을 제안한다. 특히, 이에 효율적인 3-way handshaking 방식(RTS/CTS/DATA)을 채택하였으며 기존 방식의 문제점인 RTS 메시지와 CTS 메시지 간의 충돌을 회피할 수 있는 방법을 제시함으로써 데이터 전송의 비효율성을 극복할 수 있다. 또한, 본 논문에서 제안하는 MAC 프로토콜은 현재 구현이 가능한 기술을 통하여 수중 모바일 애드 혹 네트워크에서 실질적으로 적용이 가능한 MAC 프로토콜로서, 수중 환경의 여러 특성들을 고려하여 설정한 가변적인 RWT(Request-To-Send Waiting Time)을 통하여 이동 노드의 움직임에 따른 다양한 네트워크의 크기를 반영한다. 마지막으로 실험을 통해 데이터 처리량, 패킷 수신 실패율, 평균 전송 시간, 에너지 소비량, 채널 이용률 측면에서 기존의 MAC 프로토콜과 성능을 비교 및 분석함으로써 그 효율성을 검증한다.

방화벽 문제를 극복한 인터넷 전화 서비스의 구현 (Implementation of an Internet Telephony Service that Overcomes the Firewall Problem)

  • 손주영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제27권1호
    • /
    • pp.65-75
    • /
    • 2003
  • The internet telephony service is one of the successful internet application services. VoIP is the key technology for the service to come true. VoIP uses H.323 or SIP as the standard protocol for the distributed multimedia services over the internet environment, in which QoS is not guaranteed. VoIP carries the packetized voice by using the RTP/UDP/IP protocol stack. The UDP-based internet services cause the data transmission problem to the users behind the internet firewall. So does the internet telephony service. The users are not able to listen the voices of the counter-parts on the public internet or PSTN. It makes the problem more difficult that the internet telephony service addressed in this paper uses only one UDP port number to send the voice data of all sessions from gateway to terminal node. In this paper, two schemes including the usage of dummy UDP datagrams, and the protocol conversion are suggested. The implementation of one of the schemes, the protocol conversion, and the performance evaluation are described in detail.

K-Grid 통합 노드 데이터 모델링 및 정보교환 프로토콜 설계와 시험 (K-Grid Integrated Data Modeling and Data Exchange Protocol Design and Evaluation)

  • 최중인
    • 조명전기설비학회논문지
    • /
    • 제25권12호
    • /
    • pp.119-131
    • /
    • 2011
  • To be integrated into the IEC 61970-based K-Grid, application of open communication protocol and sub-system modeling to major nodes is needed. In this paper, a module which links load nodes in customers to CIM based on psXML/oBIX, one of open protocols, was developed and data modeling and communication protocols of IEC 61850-7-42 based DER and ESS which apply the module to the customers who have DER and ESS were designed. Also the XML-based distributed database middleware was designed. The proposed modeling and protocols were applied to the building in which commercial DER products and the effectiveness of the proposed data modeling and the communication protocol were evaluated.

Experimental Performance Evaluation of BACnet MS/TP Protocol

  • Park, Tae-Jin;Song, Won-Seok;Hong, Seung-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • 제5권5호
    • /
    • pp.584-593
    • /
    • 2007
  • BACnet is a standard data communication protocol especially designed for building automation and control networks. BACnet uses the Master-Slave/Token-Passing (MS/TP) protocol as one of its field-level networks. In this study, the performance of the BACnet MS/TP protocol is evaluated using an experimental model. The network performance is investigated and evaluated in terms of token rotation time and round trip time. The experimental results show that the performance of the MS/TP network is heavily influenced by the network traffic load, the assignment of MS/TP node address and the network configuration parameter called $N_{max_info-frames}$. Based on the experimental results, simple practical designing guidelines for BACnet MS/TP network systems are also proposed.