• Title/Summary/Keyword: Open Protocol

Search Result 479, Processing Time 0.025 seconds

Bi-directional Bus Architecture Suitable to Multitasking in MPEG System (MPEG 시스템용 다중 작업에 적합한 양방향 버스 구조)

  • Jun Chi-hoon;Yeon Gyu-sung;Hwang Tae-jin;Wee Jae-Kyung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.4 s.334
    • /
    • pp.9-18
    • /
    • 2005
  • This paper proposes the novel synchronous segmented bus architecture that has the pipeline bus architecture based on OCP(open core protocol) and the memory-oriented bus for MPEG system. The proposed architecture has bus architectures that support the memory interface for image data processing of MPEG system. Also it has the segmented hi-directional multiple bus architecture for multitasking processing by using multi -masters/multi - slave. In the scheme address of masters and slaves are fixed so that they are arranged for the location of IP cores according to operational characteristics of the system for efficient data processing. Also the bus architecture adopts synchronous segmented bus architecture for reuse of IP's and architecture or developed chips. This feature is suitable to the high performance and low power multimedia SoC systum by inherent characteristics of multitasking operation and segmented bus. Proposed bus architecture can have up to 3.7 times improvement in the effective bandwidth md up to 4 times reduction in the communication latency.

Multi Agent System (MAS) Framework for Home Network Application (홈 네트워크 응용을 위한 Multi Agent System (MAS) 프레임워크)

  • Jang, In-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.1
    • /
    • pp.80-85
    • /
    • 2007
  • As home network system begins serving in earnest, the recent fruits of research in home service robot show that the new epoch that human and intelligent robots are living, communicating and interacting together at home, may come true in the near future. In the other hand, it is generally known that the multiagent system, performing distributed process together with other different devices in a home network system, is better than single robot or single home server for adapting themselves to home environment and completing their mission because the characteristic of home environment is 'open'. Therefore, in this paper we suggest the framework model to define agents, which is needed lot the home with a home network system, and the communication protocol architecture between agents. For this, we focus our attention on an agent comprising the set of many agent instances rather than the single intelligent or ability of a robot or home server, and also suggest the way of adaptation for agent systems to their environments and interaction with human in the manner of cooperation and negotiation among agents or agent instances in each agent.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Open Services Environment capabilities for NGN Application (NGN 응용을 위한 개방형 서비스 환경 기능)

  • Lee, Won-Suk;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.685-688
    • /
    • 2008
  • A Next Generation Network (NGN) is a packet-based network able to provide services including Telecommunication Services and able to make use of multiple broadband, QoS-enabled transport technologies and in which service-related functions are independent from underlying transport-related technologies. It offers unrestricted access by users to different service providers. It supports generalized mobility which will allow consistent and ubiquitous provision of services to users in this paper. we describe the trend of standardization activity related with open services environment capabilities which had been finally approved at September 2008 in ITU-T. ITU-T SG13 is responsible for studies relating to the architecture, evolution and convergence of next generation networks including frameworks and functional architectures, signalling requirements for NGN.

  • PDF

A Study on Efficient BACnet/SC to ensure Data Reliability in Wireless Environments (무선 환경에서 데이터의 신뢰성을 보장하는 효율적인 BACnet/SC 개선 방안 연구)

  • Seo-yeon Kim;Sung-sik Im;Dong-woo Kim;Su-jin Han;Ki-chan Lee;Soo-hyun Oh
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.11-20
    • /
    • 2024
  • Recently, smart buildings that can efficiently manage energy using ICT technology and operate and control through the building automation system by collecting data from a large number of IoT sensors in real time are attracting attention. However, as data management is carried out through an open environment, the safety of smart buildings is threatened by the security vulnerability of the existing building automation protocol. Therefore, in this paper, we analyze the major data link technology of BACnet, which is used universally, and propose OWE-based efficient BACnet/SC that can ensure the reliability of data in a wireless environment. The proposed protocol enables safe communication even in an open network by applying OWE and provides the same level of security as BACnet/SC in a TLS environment. As a result, it reduces the connection process twice and reduces the average time required by 40%, enabling more efficient communication than before.

Assessment of therapeutic clinical trials for proximal humeral fractures

  • Jonathan Koa;Mohamad Y. Fares;Mohammad Daher;Joseph A. Abboud
    • Clinics in Shoulder and Elbow
    • /
    • v.27 no.2
    • /
    • pp.237-246
    • /
    • 2024
  • Proximal humeral fractures (PHFs) are a common injury among the older population. An ideal therapeutic protocol has yet to be developed, and numerous clinical trials are being conducted to find the best therapeutic approach. The purpose of this study is to evaluate the current body of knowledge available via interventional clinical trials. In December 2022, interventional clinical trials relating to PHFs on Clinicaltrials.gov were screened. Trial characteristics included duration, status, intervention, phase, outcomes, location, and study design. Publications associated with each trial were searched on PubMed/Medline using the ClinicalTrials.gov registry number. The final dataset comprised 64 trials. The most common trial status was completed (36%). The majority did not have a Food and Drug Administration-defined phase (67%), was randomized (81%), involved a single facility (72%), used a parallel assignment intervention model (80%), and used an open-label approach (45%). Eleven trials were associated with a publication, and the publication rate was 17%. Average enrollment was 86 participants, and mean trial duration was 51.4 months. Europe/UK/Russia/Turkey participated in the most trials (70%). Most of the trials were initiated after 2010 (87.5%). Procedure-related interventions (55%) were most common. Disability/function was the most common primary outcome assessed (61%). The low publication rate and the multitude of trials conducted after 2010 highlight the urgency and need for trial results to be published to establish an ideal therapeutic protocol. Since the majority of the trials involved a single institution and an open-label approach, reinforcing blinding and establishing multi-centered trials can improve the validity of the clinical trial results.

Implementation of a QoS routing path control based on KREONET OpenFlow Network Test-bed (KREONET OpenFlow 네트워크 테스트베드 기반의 QoS 라우팅 경로 제어 구현)

  • Kim, Seung-Ju;Min, Seok-Hong;Kim, Byung-Chul;Lee, Jae-Yong;Hong, Won-Taek
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.35-46
    • /
    • 2011
  • Future Internet should support more efficient mobility management, flexible traffic engineering and various emerging new services. So, lots of traffic engineering techniques have been suggested and developed, but it's impossible to apply them on the current running commercial Internet. To overcome this problem, OpenFlow protocol was proposed as a technique to control network equipments using network controller with various networking applications. It is a software defined network, so researchers can verify their own traffic engineering techniques by applying them on the controller. In addition, for high-speed packet processing in the OpenFlow network, programmable NetFPGA card with four 1G-interfaces and commercial Procurve OpenFlow switches can be used. In this paper, we implement an OpenFlow test-bed using hardware-accelerated NetFPGA cards and Procurve switches on the KREONET, and implement CSPF (Constraint-based Shortest Path First) algorithm, which is one of popular QoS routing algorithms, and apply it on the large-scale testbed to verify performance and efficiency of multimedia traffic engineering scheme in Future Internet.

Attacking OpenSSL Shared Library Using Code Injection (코드 주입을 통한 OpenSSL 공유 라이브러리의 보안 취약점 공격)

  • Ahn, Woo-Hyun;Kim, Hyung-Su
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.4
    • /
    • pp.226-238
    • /
    • 2010
  • OpenSSL is an open-source library implementing SSL that is a secure communication protocol. However, the library has a severe vulnerability that its security information can be easily exposed to malicious software when the library is used in a form of shared library on Linux and UNIX operating systems. We propose a scheme to attack the vulnerability of the OpenSSL library. The scheme injects codes into a running client program to execute the following attacks on the vulnerability in a SSL handshake. First, when a client sends a server a list of cryptographic algorithms that the client is willing to support, our scheme replaces all algorithms in the list with a specific algorithm. Such a replacement causes the server to select the specific algorithm. Second, the scheme steals a key for data encryption and decryption when the key is generated. Then the key is sent to an outside attacker. After that, the outside attacker decrypts encrypted data that has been transmitted between the client and the server, using the specified algorithm and the key. To show that our scheme is realizable, we perform an experiment of collecting encrypted login data that an ftp client using the OpenSSL shared library sends its server and then decrypting the login data.

Implementation, Security, and Usability Analysis of Accredited Certificate-based Internet Banking (공인인증서 기반 인터넷 뱅킹의 구현, 보안성, 그리고 편의성 분석)

  • Park, Hye-Seung;Lee, Jae-Hyup;Park, Seung-Chul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • We expect that the accredited certificate-based open banking, which is actively deployed in recent times, will solve the Galapagosization problem of the existing accredited certificate-based closed banking by supporting standard communication protocol and web compatibility. However, it is questionable how much the open banking will answer the security and usability problems of the existing closed banking. This paper is focused on analyzing the differences between the existing closed banking and the open banking, and then evaluates how much the security and usability problems of the existing closed banking are resolved by the open banking. The study firstly analyzes the security vulnerabilities raised in the process of providing closed banking services for the past 15 years or more, the countermeasures applied to enhance security, and the convenience impact of countermeasures. And then, the security and convenience of the open banking is inferred by analyzing the implementation difference between the closed banking and the open banking. The paper also briefly discusses how to improve the open banking to resolve the remaining problems of the open banking.

Control of heparinization by activated clotting time during extracorporeal circulation (개심술시 Activated Clotting Time 을 이용한 Heparin 투여 조절에 관한 임상적 고찰)

  • 서충헌
    • Journal of Chest Surgery
    • /
    • v.16 no.3
    • /
    • pp.281-288
    • /
    • 1983
  • Heparinization is an essential step in extracorporeal circulation for open heart surgery. But wide individual variation to heparin effect sometimes makes it difficult to anticoagulate safely or neutralize appropriately. Because the conventional set protocol of heparinization did not consider this individual variation, a new method of control of heparinization was proposed by Dr. Brian Bull in 1974. We compared the group in which a conventional set protocol was used [Control group] with the other in which a new protocol modified from that of Bull was used [ACT group], on the aspects of the dosages of heparin and protamine administered and postoperative bleeding. Our conventional protocol [Control group] consisted of: 1. Initial heparin was given at dose of 350U/Kg into the right atrium prior to bypass. 2. Additional heparin was given every hour during E.C.C., as much as a half of the Initial dose. 3. 600U of heparin was mixed into every 100ml. of priming solution. 4. The protamine dose was calculated by totalling the units of heparin given to the patient and giving 1 .8mg. of protamine per 100 units of heparin. ACT protocol [ACT group] consisted of: 1. Initial heparinization was same as that of conventional protocol. 2. ACT`s were checked before [A point] and 10 minutes after initial heparinization [B point]. With these 2 points, a dose response curve was drawn. 3. Heparin for the priming solution was same as in control group. 4. Every 30 minutes during E.C.C., ACT`s were checked with Hemochron [International Technidyne Corp.]. ACT between 450 and 600 seconds was regarded as safety zone. If ACT checked at a time was below 450 seconds, heparin dose was calculated on the dose-response curve to lengthen ACT to 480 seconds and was given into the oxygenator. 5. About 10 minutes before the term of E.C.C., ACT was checked to estimate the blood heparin level at the time. Then, protamine dose was calculated at dose of 1.Stag per 100 units of heparin. The calculated dose of protamine was mixed into 50 to lO0ml of 5% Dextrose Water and dripped intravenously during the period of 15 minutes. Compared these two groups mentioned above, results were obtained as follows: 1. Mean value of normal ACT checked with Hemochron on 30 preoperative patients was 124 seconds [range 95-145 sec.]. 2. Doses of heparin and protamine given to the patient were decreased in ACT group as much as 32.2% and 62.2% respectively. 3. Postoperative bleeding and transfusion were also decreased in ACT group in 60.5% and 67.1% respectively. 4. Our modified dose-response curve did not cause any problems in the control of heparinization. 5. Initial heparinization [Heparin 350U/Kg] was sufficient for the most patients until 60 minutes under extracorporeal circulation. 6. We used 1.5mg of protamine to neutralize 100 units of heparin. But smaller dose of protamine may be sufficient for appropriate neutralization.

  • PDF