• Title/Summary/Keyword: Protocol Design

Search Result 2,595, Processing Time 0.023 seconds

The effect of taping applied to the lower trapezius muscle on the upper trapezius muscle tone, pain, and cervical range of motion in chronic upper trapezius pain patients (만성 상부승모근 통증 환자의 하부승모근에 적용한 테이핑이 상부승모근 긴장도 통증 목뼈 가동성에 미치는 영향)

  • Lee, Yang-Jin;Park, Dong-Chun;Kim, Won-Deuk;Kim, Sung-Yeol
    • Journal of Korean Physical Therapy Science
    • /
    • v.28 no.1
    • /
    • pp.46-53
    • /
    • 2021
  • Background: The purpose of this study was to investigate the effect of taping applied to the lower trapezius on the upper trapezius muscle tone, pain intensity, cervical rotation range of motion in chronic upper trapezius pain patients. Design: Case-control study. Methods: Twenty subjects with chronic upper trapezius pain were classified into an experimental group and a control group. The experimental group applied lower trapezius facilitation taping and the control group applied sham taping. Taping Before and after the application of taping, muscle tone, pain intensity, and cervical rotation range of motion of the upper trapezius were measured. Results: In the experimental group, there were significant differences in the pressure pain threshold and muscle tone before and after taping. In the comparison between groups, there was a significant difference in muscle tone between the experimental group and the control group. Conclusion: The application of the lower trapezius facilitation taping was found to be effective in reducing the pressure threshold and muscle tone of the upper trapezius. Therefore, it is expected that more effective treatment can be provided by adding lower trapezius facilitation taping to the treatment protocol for patients with chronic shoulder pain.

Design of Proxy Registration Protocols for Stock Trading System (증권거래시스템에 적합한 위임등록프로토콜의 설계)

  • 이용준;박세준;오해석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.13-23
    • /
    • 2004
  • Proxy signature scheme based on delegation of warrant is studied in these days. Proxy signature is a signature scheme that the original signer delegates his signing warrant to the proxy signer, and the proxy signer creates a signature on behalf of the original signer. For using this scheme, the security for Protecting from the forgeability or misuse is necessary. There are several security requirements for using the proxy signature schemes. In this paper we suggest the proxy-register protocol scheme that original signer registers to the verifier about the proxy related information. In our scheme, verifier verifies the signature that original signer creates about the proxy information and sets the warrant of proxy signer, validity period for proxy signature and some limitation. Finally, we will show the advantages of our suggestion by comparing with the previous proxy signature schemes.

A Lightweight Hardware Accelerator for Public-Key Cryptography (공개키 암호 구현을 위한 경량 하드웨어 가속기)

  • Sung, Byung-Yoon;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1609-1617
    • /
    • 2019
  • Described in this paper is a design of hardware accelerator for implementing public-key cryptographic protocols (PKCPs) based on Elliptic Curve Cryptography (ECC) and RSA. It supports five elliptic curves (ECs) over GF(p) and three key lengths of RSA that are defined by NIST standard. It was designed to support four point operations over ECs and six modular arithmetic operations, making it suitable for hardware implementation of ECC- and RSA-based PKCPs. In order to achieve small-area implementation, a finite field arithmetic circuit was designed with 32-bit data-path, and it adopted word-based Montgomery multiplication algorithm, the Jacobian coordinate system for EC point operations, and the Fermat's little theorem for modular multiplicative inverse. The hardware operation was verified with FPGA device by implementing EC-DH key exchange protocol and RSA operations. It occupied 20,800 gate equivalents and 28 kbits of RAM at 50 MHz clock frequency with 180-nm CMOS cell library, and 1,503 slices and 2 BRAMs in Virtex-5 FPGA device.

Stochastic Mobility Model Design in Mobile WSN (WSN 노드 이동 환경에서 stochastic 모델 설계)

  • Yun, Dai Yeol;Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1082-1087
    • /
    • 2021
  • In MANET(mobile ad hoc network), Mobility models vary according to the application-specific goals. The most widely used Random WayPoint Mobility Model(RWPMM) is advantageous because it is simple and easy to implement, but the random characteristic of nodes' movement is not enough to express the mobile characteristics of the entire sensor nodes' movements. The random mobility model is insufficient to express the inherent movement characteristics of the entire sensor nodes' movements. In the proposed Stochastic mobility model, To express the overall nodes movement characteristics of the network, the moving nodes are treated as random variables having a specific probability distribution characteristic. The proposed Stochastic mobility model is more stable and energy-efficient than the existing random mobility model applies to the routing protocol to ensure improved performances in terms of energy efficiency.

Development of Wire/Wireless Communication Modules using Environmental Sensor Modules for LNG Storage Tanks (LNG 저장탱크용 환경 센서 모듈을 이용한 유무선 통신 모듈 개발)

  • Park, Byong Jin;Kim, Min Sung
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.53-61
    • /
    • 2022
  • Accidents are steadily occurring due to machine defects and carelessness during LNG storage operations. In previous studies, an environmental sensor module capable of measuring pressure, temperature, gas concentration, and flow to detect danger in advance was developed and the response speed according to the amount of leaked gas was measured. This paper proposes the development of a wired and wireless communication module that transmits data measured by the environmental sensor module to embedded devices connected to wired and wireless networks of SPI, UART, and LTE. First, a data communication module capable of interworking with an environmental sensor is designed. Design a protocol between devices in the Local Control Part and wired and wireless protocols in the Local Control Part and Remote Control Part. Ethernet, WiFi, and LTE communication modules were designed, and UART and SPI channels that can be linked with embedded controllers were designed. As a result, it was confirmed through a UI (User Interface) that each embedded device transmits data measured by the environmental sensor module while simultaneously communicating on a wired and wireless basis.

P2P Based Telemedicine System Using Thermographic Camera (열화상 카메라를 포함한 P2P 방식의 원격진료 시스템)

  • Kim, Kyoung Min;Ryu, Jae Hyun;Hong, Sung Jun;Kim, Hongjun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.547-554
    • /
    • 2022
  • Recently, the field of telemedicine is growing rapidly due to the COVID-19 pandemic. However, the cost of telemedicine services is relatively high, since cloud computing, video conferencing, and cyber security should be considered. Therefore, in this paper, we design and implement a cost-effective P2P-based telemedicine system. It is implemented using the widely used the open source computing platform, Raspberry Pi, and P2P network that frees users from security problems such as the privacy leakage by the central server and DDoS attacks resulting from the server/client architecture and enables trustworthy identifying connection system using SSL protocol. Also it enables users to check the other party's status including body temperature in real time by installing a thermal imaging camera using Raspberry Pi. This allows several medical diagnoses that requires visual aids. The proposed telemedicine system will popularize telemedicine service and meet the ever-increasing demand for telemedicine.

Association Between Insomnia and Constipation: A Multicenter Three-year Cross-sectional Study Using Shift Workers' Health Check-up Data

  • Yun, Byung-Yoon;Sim, Juho;Yoon, Jin-Ha;Kim, Sung-Kyung
    • Safety and Health at Work
    • /
    • v.13 no.2
    • /
    • pp.240-247
    • /
    • 2022
  • Background: Although insomnia and constipation are highly prevalent worldwide, studies examining a possible association between them are lacking. We examined the relationship between insomnia and constipation in shift workers who have a high prevalence of insomnia and other diseases. Methods: This study had a multicenter cross-sectional design and conducted using health examination data including self-reported questionnaires. In total, 12,879 and 4,650 shift workers were enrolled in Severance Hospital and Wonju Severance Hospital, respectively, during 2015-2017. Multivariate logistic regression models and subgroup analysis were performed in each center with the same protocol, using a common data model. Results: The mean age of the total population was 44.35 (standard deviation = 8.75); the proportion of males was 56.9%. Female sex, being underweight and non-smoker were strongly associated with an increased risk of constipation symptom (p < 0.001). Pooled odds ratios (ORs) were calculated using ORs of both centers with weights; there was a significant dose-response relationship (sub-threshold 1.76 [95% confidence interval [CI] 1.62-1.91]; moderate 2.28 [95% CI 2.01-2.60]; severe 4.15 [95% CI 3.18-5.41] in the final model, p for trend < 0.001). Subgroup analysis performed by stratifying sex and pooled ORs showed a similar trend to that of the entire group. Conclusion: We observed a strong correlation between insomnia and constipation in this population. Our findings may help in formulating guidelines and policies to improve quality of life in shift workers through the management of sleep quality and proper bowel function. This study is the first to report this relationship among people working in shifts.

A New Design of Privacy Preserving Authentication Protocol in a Mobile Sink UAV Setting (Mobile Sink UAV 환경에서 프라이버시를 보장하는 새로운 인증 프로토콜 설계)

  • Oh, Sang Yun;Jeong, Jae Yeol;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1247-1260
    • /
    • 2021
  • For more efficient energy management of nodes in wireless sensor networks, research has been conducted on mobile sink nodes that deliver data from sensor nodes to server recently. UAV (Unmanned Aerial vehicle) is used as a representative mobile sink node. Also, most studies on UAV propose algorithms for calculating optimal paths and have produced rapid advances in the IoD (Internet of Drones) environment. At the same time, some papers proposed mutual authentication and secure key exchange considering nature of the IoD, which requires efficient creation of multiple nodes and session keys in security perspective. However, most papers that proposed secure communication in mobile sink nodes did not protect end-to-end data privacy. Therefore, in this paper, we propose integrated security model that authentication between mobile sink nodes and sensor nodes to securely relay sensor data to base stations. Also, we show informal security analysis that our scheme is secure from various known attacks. Finally, we compare communication overhead with other key exchange schemes previously proposed.

Cognitive Training Protocol Design and System Implementation using AR (증강현실을 이용한 인지훈련 프로토콜 설계 및 시스템 구현)

  • Cheol-Seung, Lee;Kuk-Se, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1207-1212
    • /
    • 2022
  • Realistic media, the next-generation media technology in the era of the 4th industrial revolution, is becoming an issue as a technology to experience through an environment that optimizes user experience, especially! It is rapidly developing into the health and healthcare convergence and complex fields. Realistic media technologies and services are being adopted to solve the problems of the increase in chronic diseases due to the increase in the elderly population and the lack of infrastructure and professional manpower in the fields of cognitive training and rehabilitation. Therefore, in this study, a cognitive training system was designed and implemented for the purpose of improving cognitive ability and daily life activity in subjects with mild cognitive impairment (MCI) who require cognitive rehabilitation. In the future, an integrated service platform with interactive communication and immediate feedback as an intelligent cognitive rehabilitation integrated platform based on AI and BigData is left as a research project.

A Study of Virtual IoT System using Edge Computing (엣지 컴퓨팅 기반 가상 IoT 시스템 연구)

  • Kim, Min-A;Seok, Seung-Joon
    • KNOM Review
    • /
    • v.23 no.1
    • /
    • pp.51-62
    • /
    • 2020
  • Open IoT platform that shares communication infrastructure and provides cloud resources can flexibly reduce development period and cost of smart service. In this paper, as an open IoT platform, we propose a virtual IoT system based on edge computing that implements a virtual IoT device for a physical IoT device and allows service developers to interact with the virtual device. A management server in the edge cloud, near the IoT physical device, manages the creation, movement, and removal of virtual IoT devices corresponding to the physical IoT devices. This paper define the operations of the management server, the physical IoT device, and the virtual IoT device, which are major components of the virtual IoT system, and design the communication protocol required to perform the operations. Finally, through simulations, this paper evaluate the performance of the edge computing based virtual IoT system by confirming that each component performs the defined states and operations as designed.