• 제목/요약/키워드: Protocol Analysis

Search Result 2,547, Processing Time 0.025 seconds

Economic analysis of integrated data analysis at variety marine protocols (다양한 해양 프로토콜의 분류 및 통합 데이터를 분석한 독립서버에 대한 경제적 분석)

  • Jang, Hyun-Young;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.243-246
    • /
    • 2016
  • Data transfer technique is one of the key elements of the IT infrastructure, in accordance with each environment and function, using some kind of protocol. Using the three protocols such as WCDMA, AIS, and TRS at sea IT industry. so It uses three protocols saw has a problem that the operation of each protocol-specific server. so server maintenance costs increase and sea Device Manager has been placed in a situation which operates to develop each of the protocol-specific analysis program. The reason of the protocol is divided into three, marine equipment (lighthouses, buoys, light buoy) manufacturing companies and the date of manufacture, such as, communication environment (distance, communication speed) because such is wrong all, trying to unify this and enormous cost and time is a situation that can not be the exchange occurred when. So in the Ministry of Maritime Affairs and Fisheries, the number of frequency of use is low, communication performance is seeking to refrain from Kure each local organizations and companies the use of low TRS protocol. his paper is intended to conduct research on the basis of the actual data to analyze whether the method is how economical to store a single DB by analyzing other types of protocols. This reduces the shortage of marine IT industry, even a little, shall helps reduce administrative costs.

  • PDF

Early gonadotropin-releasing hormone antagonist start improves follicular synchronization and pregnancy outcome as compared to the conventional antagonist protocol

  • Park, Chan Woo;Hwang, Yu Im;Koo, Hwa Seon;Kang, Inn Soo;Yang, Kwang Moon;Song, In Ok
    • Clinical and Experimental Reproductive Medicine
    • /
    • v.41 no.4
    • /
    • pp.158-164
    • /
    • 2014
  • Objective: To assess whether an early GnRH antagonist start leads to better follicular synchronization and an improved clinical pregnancy rate (CPR). Methods: A retrospective cohort study. A total of 218 infertile women who underwent IVF between January 2011 and February 2013. The initial cohort (Cohort I) that underwent IVF between January 2011 and March 2012 included a total of 68 attempted IVF cycles. Thirty-four cycles were treated with the conventional GnRH antagonist protocol, and 34 cycles with an early GnRH antagonist start protocol. The second cohort (Cohort II) that underwent IVF between June 2012 and February 2013 included a total of 150 embryo-transfer (ET) cycles. Forty-three cycles were treated with the conventional GnRH antagonist protocol, 34 cycles with the modified early GnRH antagonist start protocol using highly purified human menopause gonadotropin and an addition of GnRH agonist to the luteal phase support, and 73 cycles with the GnRH agonist long protocol. Results: The analysis of Cohort I showed that the number of mature oocytes retrieved was significantly higher in the early GnRH antagonist start cycles than in the conventional antagonist cycles (11.9 vs. 8.2, p=0.04). The analysis of Cohort II revealed higher but non-significant CPR/ET in the modified early GnRH antagonist start cycles (41.2%) than in the conventional antagonist cycles (30.2%), which was comparable to that of the GnRH agonist long protocol cycles (39.7%). Conclusion: The modified early antagonist start protocol may improve the mature oocyte yield, possibly via enhanced follicular synchronization, while resulting in superior CPR as compared to the conventional antagonist protocol, which needs to be studied further in prospective randomized controlled trials.

Effects of an Infection Control Protocol for Coronavirus Disease in Emergency Mechanical Thrombectomy

  • Eun, Jin;Lee, Min-Hyung;Im, Sang-Hyuk;Joo, Won-Il;Ahn, Jae-Geun;Yoo, Do-Sung;Park, Hae-Kwan
    • Journal of Korean Neurosurgical Society
    • /
    • v.65 no.2
    • /
    • pp.224-235
    • /
    • 2022
  • Objective : Since the outbreak of the coronavirus disease 2019 (COVID-19) pandemic, neurointerventionists have been increasingly concerned regarding the prevention of infection and time delay in performing emergency thrombectomy procedures in patients with acute stroke. This study aimed to analyze the effects of changes in mechanical thrombectomy protocol before and after the COVID-19 pandemic on procedure time and patient outcomes and to identify factors that significantly impact procedure time. Methods : The last-normal-to-door, first-abnormal-to-door, door-to-imaging, door-to-puncture, and puncture-to-recanalization times of 88 patients (45 treated with conventional pre-COVID-19 protocol and 43 with COVID-19 protection protocol) were retrospectively analyzed. The recanalization time, success rate of mechanical thrombectomy, and modified Rankin score of patients at discharge were assessed. A multivariate analysis was conducted to identify variables that significantly influenced the time delay in the door-to-puncture time and total procedure time. Results : The door-to-imaging time significantly increased under the COVID-19 protection protocol (p=0.0257) compared to that with the conventional pre-COVID-19 protocol. This increase was even more pronounced in patients who were suspected to be COVID-19-positive than in those who were negative. The door-to-puncture time showed no statistical difference between the conventional and COVID-19 protocol groups (p=0.5042). However, in the multivariate analysis, the last-normal-to-door time and door-to-imaging time were shown to affect the door-to-puncture time (p=0.0068 and 0.0097). The total procedure time was affected by the occlusion site, last-normal-to-door time, door-to-imaging time, and type of anesthesia (p=0.0001, 0.0231, 0.0103, and 0.0207, respectively). Conclusion : The COVID-19 protection protocol significantly impacted the door-to-imaging time. Shortening the door-to-imaging time and performing the procedure under local anesthesia, if possible, may be required to reduce the door-to-puncture and door-to-recanalization times. The effect of various aspects of the protection protocol on emergency thrombectomy should be further studied.

DLNA Protocol Inspection Tool for Compatibility Analysis

  • Park, Se-Ho;Park, Yong-Suk;Seo, Jeong-Wook;Choi, Jun-Rim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2104-2117
    • /
    • 2014
  • The propagation of smart devices and the rapid expansion of wireless mobile networks have increased the need for ubiquitous device connectivity and contents access. DLNA is currently being used as the de facto standard for connectivity of consumer devices in the digital home. The guidelines provided by DLNA are intended to facilitate device and contents discovery, management, sharing and distribution. However, consumer experience with DLNA has been rather poor and usability not up to speed. Different problems and issues in limited compatibility have been reported due to manufacturer customizations. Such compatibility issues are often difficult to identify by average consumers who are not savvy in information communications and multimedia technology. In this paper, the design and implementation of a DLNA protocol inspection tool is presented for compatibility analysis among DLNA certified devices. The tool monitors the home network and performs analysis of the underlying protocols used by DLNA. The tool can be used for diagnostics and troubleshooting, enabling the user to identify compatibility issues between devices or problems in the network.

Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity

  • Hamarsheh, Ala;Goossens, Marnix;Alasem, Rafe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1230-1251
    • /
    • 2011
  • This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers' hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user's hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.

A Study on Asynchronous MAC Protocol with Dynamic Preamble Length in Wireless Sensor Networks (WSN에서 프리앰블 다이나믹을 이용한 비동기 MAC 프로토콜 연구)

  • Han, Hyeon-Ho;Hong, Yeong-Pyo;Lee, Sang-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3563-3570
    • /
    • 2010
  • MAC protocol has been studied for reducing energy consumption in wireless sensor networks. The overhearing and idle In the existing asynchronous MAC Protocol will occur due to unnecessary energy consumption. In this paper, to solve these problems, the Preamble to change the structure of the destination address, the Preamble of the end times, the data including the length of the Preamble and Data Overhearing reduce the length of the Check Interval Data generated according to the presence of the Dynamic Value dynamically adjustable by changing the DPL (Dynamic Preamble Length)-MAC protocol was proposed. Moreover, the existing asynchronous MAC protocol of wireless sensor networks and DPL-MAC protocol proposed in this paper to simulate the energy consumption and latency were assessed in terms of comparative analysis.

A Study on the Smartcard-Based Authentication Protocol Design with Advanced Security in the Multiple Server Environments (다중 서버 환경에서 안전성이 향상된 스마트카드 기반 인증 프로토콜 설계에 관한 연구)

  • Bae, Won-il;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.329-341
    • /
    • 2017
  • A multi-server architecture has been proposed to increase the efficiency of resources due to the rapid growth of computer networks and service providing servers. The smartcard-based authentication protocol in the multi-server environments has been continuously developed through various studies. Recently, Chun-Ta Li et al proposed an authentication protocol that solves Xiong Li el al's authentication protocol vulnerability to user impersonation attack and session key disclosure attack. However, Chun-Ta Li et al's authentication protocol has a problem with user impersonation in the vulnerability analysis and has an unsuitable authentication process. Therefore, this paper proposes a smartcard-based authentication protocol in the multi-server environments that solves the denial of service attack and replay attack vulnerabilities of the authentication protocol proposed by Xiong Li et al.

A Study on Implementation of a VXIbus System Using Shared Memory Protocol (공유메모리 프로토콜을 이용한 VXIbus 시스템 구현에 관한 연구)

  • 노승환;강민호;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.9
    • /
    • pp.1332-1347
    • /
    • 1993
  • Existing instruments are composed independently according to their function and user constructed instrumentation system with those instruments. But in the late 1980s VXI bus enables to construct instrumentation system with various modular type instruments. For an VXI bus system with the word serial protocol, an increase of data size can degrade the system performance. In this paper shared memory protocol is proposed to overcome performance degradation. The shared memory protocol is analyzed using the GSPN and compared with that of the word serial protocol. It is shown that the shared memory protocol has a better performance than the word serial protocol. The VXI bus message based-system with the proposed shared memory protocol is constructed and experimented with signal generating device and FFT analyzing device. Up to 80 KHz input signal the result of FFT analysis is accurate and that result is agree with that of conventional FFT analyzer. In signal generating experiment from 100 KHz to 1.1 GHz sine wave is generated.

  • PDF

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

Hybrid S-ALOHA/TDMA Protocol for LTE/LTE-A Networks with Coexistence of H2H and M2M Traffic

  • Sui, Nannan;Wang, Cong;Xie, Wei;Xu, Youyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.687-708
    • /
    • 2017
  • The machine-to-machine (M2M) communication is featured by tremendous number of devices, small data transmission, and large uplink to downlink traffic ratio. The massive access requests generated by M2M devices would result in the current medium access control (MAC) protocol in LTE/LTE-A networks suffering from physical random access channel (PRACH) overload, high signaling overhead, and resource underutilization. As such, fairness should be carefully considered when M2M traffic coexists with human-to-human (H2H) traffic. To tackle these problems, we propose an adaptive Slotted ALOHA (S-ALOHA) and time division multiple access (TDMA) hybrid protocol. In particular, the proposed hybrid protocol divides the reserved uplink resource blocks (RBs) in a transmission cycle into the S-ALOHA part for M2M traffic with small-size packets and the TDMA part for H2H traffic with large-size packets. Adaptive resource allocation and access class barring (ACB) are exploited and optimized to maximize the channel utility with fairness constraint. Moreover, an upper performance bound for the proposed hybrid protocol is provided by performing the system equilibrium analysis. Simulation results demonstrate that, compared with pure S-ALOHA and pure TDMA protocol under a target fairness constraint of 0.9, our proposed hybrid protocol can improve the capacity by at least 9.44% when ${\lambda}_1:{\lambda}_2=1:1$and by at least 20.53% when ${\lambda}_1:{\lambda}_2=10:1$, where ${\lambda}_1,{\lambda}_2$ are traffic arrival rates of M2M and H2H traffic, respectively.