• Title/Summary/Keyword: Multi-protocol

Search Result 1,146, Processing Time 0.035 seconds

A Study on the Construction of MVCT Dose Calculation Model by Using Dosimetry Check™ (Dosimetry Check™를 이용한 MVCT 선량계산 모델 구축에 관한 연구)

  • Um, Ki-Cheon;Kim, Chang-Hwan;Jeon, Soo-Dong;Back, Geum-Mun
    • Journal of radiological science and technology
    • /
    • v.43 no.6
    • /
    • pp.431-441
    • /
    • 2020
  • The purpose of this study was to construct a model of MVCT(Megavoltage Computed Tomography) dose calculation by using Dosimetry Check™, a program that radiation treatment dose verification, and establish a protocol that can be accumulated to the radiation treatment dose distribution. We acquired sinogram of MVCT after air scan in Fine, Normal, Coarse mode. Dosimetry Check™(DC) program can analyze only DICOM(Digital Imaging Communications in Medicine) format, however acquired sinogram is dat format. Thus, we made MVCT RC-DICOM format by using acquired sinogram. In addition, we made MVCT RP-DICOM by using principle of generating MLC(Multi-leaf Collimator) control points at half location of pitch in treatment RP-DICOM. The MVCT imaging dose in fine mode was measured by using ionization chamber, and normalized to the MVCT dose calculation model, the MVCT imaging dose of Normal, Coarse mode was calculated by using DC program. As a results, 2.08 cGy was measured by using ionization chamber in Fine mode and normalized based on the measured dose in DC program. After normalization, the result of MVCT dose calculation in Normal, Coarse mode, each mode was calculated 0.957, 0.621 cGy. Finally, the dose resulting from the process for acquisition of MVCT can be accumulated to the treatment dose distribution for dose evaluation. It is believed that this could be contribute clinically to a more realistic dose evaluation. From now on, it is considered that it will be able to provide more accurate and realistic dose information in radiation therapy planning evaluation by using Tomotherapy.

Weight Adjustment Scheme Based on Hop Count in Q-routing for Software Defined Networks-enabled Wireless Sensor Networks

  • Godfrey, Daniel;Jang, Jinsoo;Kim, Ki-Il
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.1
    • /
    • pp.22-30
    • /
    • 2022
  • The reinforcement learning algorithm has proven its potential in solving sequential decision-making problems under uncertainties, such as finding paths to route data packets in wireless sensor networks. With reinforcement learning, the computation of the optimum path requires careful definition of the so-called reward function, which is defined as a linear function that aggregates multiple objective functions into a single objective to compute a numerical value (reward) to be maximized. In a typical defined linear reward function, the multiple objectives to be optimized are integrated in the form of a weighted sum with fixed weighting factors for all learning agents. This study proposes a reinforcement learning -based routing protocol for wireless sensor network, where different learning agents prioritize different objective goals by assigning weighting factors to the aggregated objectives of the reward function. We assign appropriate weighting factors to the objectives in the reward function of a sensor node according to its hop-count distance to the sink node. We expect this approach to enhance the effectiveness of multi-objective reinforcement learning for wireless sensor networks with a balanced trade-off among competing parameters. Furthermore, we propose SDN (Software Defined Networks) architecture with multiple controllers for constant network monitoring to allow learning agents to adapt according to the dynamics of the network conditions. Simulation results show that our proposed scheme enhances the performance of wireless sensor network under varied conditions, such as the node density and traffic intensity, with a good trade-off among competing performance metrics.

TTCG : Three-Tier Context Gathering Technique for Mobile Devices (이동 단말기를 위한 Three-Tier 상황정보 수집 기법)

  • Sho, Su-Hwan;Kim, Seung-Hoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.1
    • /
    • pp.64-72
    • /
    • 2009
  • Previous research on sensor networks mainly focused on efficient transmission of data from sensors to fixed sink nodes. Recently there has been active research on mobile sink nodes, but the re-search of an environment where both fixed sink nodes and mobile sinks are present at the same time is rather scarce. This paper proposes a technique for context gathering by mobile devices with the sink functionality added through fixed sinks under a previously built, cluster based multi hop sensor network environment. To this end, clustering of mobile devices were done based on the fixed sinks of a previously built sensor network, and by using appropriate fixed sinks, context gathering was made possible. By mathematical comparison with TTDD routing protocol, which was proposed for mobile sinks, it was conformed that performance increases in energy with the number of mobile sinks, and with the number of movements by mobile devices.

Development of Cloud-Based Telemedicine Platform for Acute Intracerebral Hemorrhage in Gangwon-do : Concept and Protocol

  • Hyo Sub Jun;Kuhyun Yang;Jongyeon Kim;Jin Pyeong Jeon;Jun Hyong Ahn;Seung Jin Lee;Hyuk Jai Choi;Jong Wook Choi;Sung Min Cho;Jong-Kook Rhim
    • Journal of Korean Neurosurgical Society
    • /
    • v.66 no.5
    • /
    • pp.488-493
    • /
    • 2023
  • We aimed to develop a cloud-based telemedicine platform for patients with intracerebral hemorrhage (ICH) at local hospitals in rural and underserved areas in Gangwon-do using artificial intelligence and non-face-to-face collaboration treatment technology. This is a prospective and multi-center development project in which neurosurgeons from four university hospitals in Gangwon-do will participate. Information technology experts will verify and improve the performance of the cloud-based telemedicine collaboration platform while treating ICH patients in the actual medical field. Problems identified will be resolved, and the function, performance, security, and safety of the telemedicine platform will be checked through an accredited certification authority. The project will be carried out over 4 years and consists of two phases. The first phase will be from April 2022 to December 2023, and the second phase will be from April 2024 to December 2025. The platform will be developed by dividing the work of the neurosurgeons and information technology experts by setting the order of items through mutual feedback. This article provides information on a project to develop a cloud-based telemedicine platform for acute ICH patients in Gangwon-do.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Study of Performance Analysis on Effective Multiple Buffering and Packetizing Method of Multimedia Data for User-Demand Oriented RTSP Based Transmissions Between the PoC Box and a Terminal (PoC Box 단말의 RTSP 운용을 위한 사용자 요구 중심의 효율적인 다중 수신 버퍼링 기법 및 패킷화 방법에 대한 성능 분석에 관한 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.54-75
    • /
    • 2011
  • PoC(Push-to-talk Over Cellular) is an integrated technology of group voice calls, video calls and internet based multimedia services. If a PoC user can not participate in the PoC session for various reasons such as an emergency situation, lack of battery capacity, then the user can use the PoC Box which has a similar functionality to the MM Box in the MMS(Multimedia Messaging Service). The RTSP(Real-Time Streaming Protocol) method is recommended to be used when there is a transmission session between the PoC box and a terminal. Since the existing VOD service uses a wired network, the packet size of RTSP-based VOD service is huge, however, the PoC service has wireless communication environments which have general characteristics to be used in RTSP method. Packet loss in a wired communication environments is relatively less than that in wireless communication environment, therefore, a buffering latency occurs in PoC service due to a play-out delay which means an asynchronous play of audio & video contents. Those problems make a user to be difficult to find the information they want when the media contents are played-out. In this paper, the following techniques and methods were proposed and their performance and superiority were verified through testing: cross-over dual reception buffering technique, advance partition multi-reception buffering technique, and on-demand multi-reception buffering technique, which are designed for effective picking up of information in media content being transmitted in short amount of time using RTSP when a user searches for media, as well as for reduction in playback delay; and same-priority packetization transmission method and priority-based packetization transmission method, which are media data packetization methods for transmission. From the simulation of functional evaluation, we could find that the proposed multiple receiving buffering and packetizing methods are superior, with respect to the media retrieval inclination, to the existing single receiving buffering method by 6-9 points from the viewpoint of effectiveness and excellence. Among them, especially, on-demand multiple receiving buffering technology with same-priority packetization transmission method is able to manage the media search inclination promptly to the requests of users by showing superiority of 3-24 points above compared to other combination methods. In addition, users could find the information they want much quickly since large amount of informations are received in a focused media retrieval period within a short time.

Comparison of Population Monitoring Methods for Breeding Forest Birds in Korean Temperate Mixed Forests (국내 온대 혼효림에 서식하는 산림성 조류의 번식기 개체군 모니터링 방법에 대한 비교)

  • Nam, Hyun-Young;Choi, Chang-Yong;Park, Jin-Young;Hur, Wee-Haeng
    • Journal of Korean Society of Forest Science
    • /
    • v.108 no.4
    • /
    • pp.663-674
    • /
    • 2019
  • Birds are effective ecological indicators but there is no national protocol in place to monitor population dynamics of forest birds in Korea. To support the establishment of future monitoring protocols, we compared the results of two generally used monitoring methods for forest bird surveys in two temperate mixed forests in central Korea. There was no statistical difference in the number of species and individuals detected per unit survey effort when comparing line transects and point counts. The number of species and individuals were higher in a five-minute count than in a three-minute point count, but the total accumulated number of expected observed species showed no difference between the two count durations. The number of observed species and individuals increased in both methods as plot radius or transect width increased, suggesting that multi-layer or multi-band surveys may be useful for quantitative and qualitative objectives. The decreasing number of observed species and individuals after sunrise suggested that bird monitoring should be conducted earlier in the morning, within four hours after sunrise. To detect 70% of the total number of species, 7.0 to 7.6 survey hours, equivalent to 42 three-minute counts (95% confidence interval [CI]: 26 to 61) or 33 five-minute counts (95% CI: 19 to 53) were needed for unlimited radius point counts. On the other hand, 4.8 survey hours, equivalent to 26 line transect counts (95% CI: 15 to 45) using 200-m transects with unlimited width, were required to achieve the same level of species detection. Therefore, the line transect method may be more effective than the point count method, at least in terms of local species richness assessment. For national forest bird monitoring, our data indicated that one or both survey methods can be selected as a basic protocol, based on the goals and scales of monitoring, forest types, and the conditions of the target areas.

Development of Analytical Reference Material for Proficiency Test of Pesticide Multi-residue Analysis in Green-pepper (풋고추 농약다성분분석 정도관리용 분석표준물질 개발)

  • Kim, Jong-Hwan;Choi, Sung-Gil;Oh, Young-Gon;Kwon, Young-Sang;Hong, Su-Myeong;Sung, Mun-Hyun;Lee, Se-Ja;Hwang, Sun-Young;Seo, Jong-Su
    • The Korean Journal of Pesticide Science
    • /
    • v.20 no.3
    • /
    • pp.211-220
    • /
    • 2016
  • This study was to develop the analytical reference material of green-pepper for multi-residue analysis of pesticides. According to the ISO Guide 35, ISO Guide 13528 and EURL-PT protocol, the homogeneity, stability, assigned value and uncertainty were calculated to assess if it was suitable to be used as the proficiency test or quality control. The values of the within-bottle standard variation ($s_{wb}$) and the between-bottle standard variation ($s_{bb}$) were 1.7~3.7% of assigned value according to the requirement of the ISO guide 35. And, the uncertainty ($u^*{_{bb}}$) due to inhomogeneity was 0.8~1.1% for all pesticides. The storage stabilities of ten-pesticides at various conditions were assessed. For all target pesticides, the slop ($b_1$) values were smaller than the corresponding values of $[t_{0.95,n-2}{\times}s(b_1)]$ specified by the ISO guide 35, indicating that there were no statistically significant decreases in the concentration of the target pesticides when the analytical reference material was stored at room temperature ($20{\sim}30^{\circ}C$) for 7 days, freezing ($-20^{\circ}C$) for 30 days and deep freezer ($-80^{\circ}C$. except for bifenthrin, fenpropathrin) for 245 days. For proficiency test by using it developed by Korea Institute of Toxicology, inter-lab test was performed with eight organization performing the residual pesticide analysis. We found that there were some different results among them. Some were assessed as questionable or unacceptable for two pesticides and one organization didn't analyze the six pesticides. From these results, this green-pepper analytical reference material containing ten-pesticides could be used as a tool for the proficiency test to improve the reliability or consistency for pesticide residue's results.

On Method for LBS Multi-media Services using GML 3.0 (GML 3.0을 이용한 LBS 멀티미디어 서비스에 관한 연구)

  • Jung, Kee-Joong;Lee, Jun-Woo;Kim, Nam-Gyun;Hong, Seong-Hak;Choi, Beyung-Nam
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2004.12a
    • /
    • pp.169-181
    • /
    • 2004
  • SK Telecom has already constructed GIMS system as the base common framework of LBS/GIS service system based on OGC(OpenGIS Consortium)'s international standard for the first mobile vector map service in 2002, But as service content appears more complex, renovation has been needed to satisfy multi-purpose, multi-function and maximum efficiency as requirements have been increased. This research is for preparation ion of GML3-based platform to upgrade service from GML2 based GIMS system. And with this, it will be possible for variety of application services to provide location and geographic data easily and freely. In GML 3.0, it has been selected animation, event handling, resource for style mapping, topology specification for 3D and telematics services for mobile LBS multimedia service. And the schema and transfer protocol has been developed and organized to optimize data transfer to MS(Mobile Stat ion) Upgrade to GML 3.0-based GIMS system has provided innovative framework in the view of not only construction but also service which has been implemented and applied to previous research and system. Also GIMS channel interface has been implemented to simplify access to GIMS system, and service component of GIMS internals, WFS and WMS, has gotten enhanded and expanded function.

  • PDF