• Title/Summary/Keyword: Protocol developing

Search Result 427, Processing Time 0.023 seconds

An Enhanced DAP-NAD Scheme for Multi-Hop Transmission in Combat Net Radio Networks (전투 무선망에서 다중 홉 전송을 위한 향상된 DAP-NAD 기법)

  • Jung, Jong-Kwan;Kim, Jong-Yon;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.977-985
    • /
    • 2012
  • Recently, many countries have been developing new protocols to improve the performance of tactical ad hoc networks for implementing NCW (Network Centric Warfare). Combat net radio (CNR) networks are the most important communication infra for the ground forces such as infantry of Army. U.S. Army had developed MIL-STD-188-220D that is the Interoperability Standard for DMTDs (Digital Messages Transfer Device Subsystems) for voice and data communication in CNR. MIL-STD-188-220D is a candidate for MAC protocol of TMMR which is next radio and has a few constraints to used in TMMR. NAD (Network Access Delay) defined in MIL-STD-188-220D needs time synchronization to avoid collision. However, it is difficult for time synchronization to fit in multi-hop environment. We suggest the enhanced DAP (Deterministic Adaptable Priority)-NAD to prevent conflicts and decrease delays in multi-hop CNR. Simulation results show that the proposed scheme improves the performance in multi-hop CNR networks.

Optimal Conditions for the Embryonic Development of Sea Urchin, Strongylocentrotus intermedius for Using the Bioassay (북쪽말똥성게, Strongylcentrotus intermedius를 이용한 생물검정 최적 발생조건)

  • Ryu, Tae-Kwon;Sung, Chan-Gyoung;Han, Gi-Myung;Hwang, In-Young;Lee, Taek-Kyun;Lee, Chang-Hoon
    • Environmental Analysis Health and Toxicology
    • /
    • v.22 no.3
    • /
    • pp.211-218
    • /
    • 2007
  • Even though some standard developmental bioassay protocols for environmental assessment using sea urchins have already been described, there have not been many attempts to apply and modify these protocols with Korean species. Therefore, there is a strong need to establish standard bioassay protocols using sea urchins commonly found in Korea. Prior to developing a new protocol, it is essential to know the optimal conditions for the bioassay procedures. We investigated the optimal conditions (temperature, salinity, and embryo density) of the sea urchin Strongylocentrotus intermedius. The ideal temperature for developmental bioassay of S. intermedius was determined to be $15^{\circ}C$ and the time required for the embryo to become pluteus larva was 72 hr. The optimal range of salinity for the embryo toxicity using S. intermedius was between 30 to 32 psu, which is similar to the range found in the natural habitats of adult populations. The optimum density of embryos at the beginning of bioassays was 100 embryos/mL. When the assays were carried out at higher densities, the proportion of normally developed larvae decreased significantly.

Design and Implementation of an IP-based Fixed VoIP Emergency System (IP-기반 고정형 VoIP 긴급통화 시스템 설계 및 구현)

  • Ko, Sang-Ki;Chon, Ji-Hun;Choi, Sun-Wan;Kang, Shin-Gak;Huh, Mi-Young
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.245-252
    • /
    • 2008
  • An emergency service over Voice over IP (VoIP) network is an essential condition, like the existing telecommunication services. To support for the emergency services, standardization works have been performed. The National Emergency Number Association (NENA) has been developing the framework and procedures for an emergency service for Non-IP based network, rather than protocols. In contrast, the Internet Engineering Task Force (IETF) has been only focused on end-to-end IP-based emergency calls. The NENA architecture is incompatible with the IETF protocols. To solve the problem, we design and implement a SIP-based VoIP emergency system by adopting the NENA architecture and by applying IETF protocols, for both IP-based Pubic Safety Answering Point (PSAP) and PSTN-based PSAP. It is implemented and tested under UNIX environment.

An Analysis of Installation of Railway Construction Project Management System on Carbon Reduction (철도건설 사업관리시스템 도입에 따른 탄소저감 효과 분석)

  • Park, Jun-Tae;Ahn, Tae-Bong
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.3
    • /
    • pp.382-388
    • /
    • 2017
  • In response to the global warming crisis, the Kyoto protocol was established by major developed countries in 1997. The Paris Agreement, which imposes a carbon reduction obligation for both developed countries and developing countries, was signed in 2015. Regulations and efforts to reduce greenhouse gas emissions accordingly have been implemented. In this study, we analyzed the reduction of carbon emissions computerizing of the traditional project management system for efficient railway construction at Korea Rail Network Authority. We suggest a model that measures two major effects of carbon reduction, stemming from transportation and from a decrease of paper use. In this paper, we calculate the amount of carbon reduction and the economic effect of carbon reduction with application of the construction project management system at Korea Rail Network Authority. The model and methodology in this study are expected to be helpful to measure the carbon reduction performance for similar e-transformation.

One-time Session Key based HTTP DDoS Defense Mechanisms (일회성 세션 키 기반 HTTP DDoS 공격 방어기법)

  • Choi, Sang-Yong;Kang, Ik-Seon;Kim, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.95-104
    • /
    • 2013
  • DDoS attacks have became as a social threat since 2009 7.7 DDoS turmoil. Even though defence techniques have been developing to provide against those threats, they become much more sophisticate. In recent years, the attack form of DDoS is changing from high amount of traffic attack of network layers to highly sophisticate small amount of application layers. To make matters worse, attack agent for the attack has became very intelligent so that it is difficult to be blocked since it can't be distinguished from normal PCs. In the user authentication system(such as CAPTCHA) User intervention is required to distinguish normal PCs and intelligent attack agents and in particular, in a NAT environment, IP-based blocking method can be cut off the normal users traffic at the same time. This research examined defense techniques which are able to distinguish between agent and normal PC and effectively block ways the HTTP DDoS offense applying one-time session key based authentication method using Cookie which is used in HTTP protocol to protect web sever from sophisticate application layer of DDoS.

Developing Geriatric Nursing Competency Using Information and Communication Technology: Focusing on a Case of Depression Assessment (ICT 기반 노인간호 역량 개발: 우울증 측정 사례를 중심으로)

  • Kim, Heejung;Hong, Soyun;Kwon, Sooyoung;Kim, Namhee
    • Journal of Korean Gerontological Nursing
    • /
    • v.20 no.sup1
    • /
    • pp.119-126
    • /
    • 2018
  • Purpose: The aim of this study was to describe problems and solutions for older adults living alone and using wearable devices to report depressive moods in daily life. In addition, gerontology nurses' competencies and strategies were discussed based on lessons learned from the observational study. Methods: A hybrid method was used, combining literature review and content analyses based on interviews with 53 participants and observations done by the research team. Results: Main issues and relevant strategies were identified in terms of (1) applicability of information and communications technology (ICT) devices for older adults, (2) feasibility of older adults' use of ICT devices, (3) integration of ICT devices into daily life, and (4) relevant issues when older adults use ICT. Important roles and competencies were discussed regarding general and gerontology aspects of ICT. Conclusion: Findings indicate that a wearable device is feasible to measure daily depressive moods in older adults living alone in community settings. To extend our research protocol to practice, gerontology nurses must adequately prepare to meet emerging health care trends and end users' needs for ICT-based nursing. It is necessary to develop diverse educational programs and active involvement in research and design of relevant devices and programs.

IP-Based Heterogeneous Network Interface Gateway for IoT Big Data Collection (IoT 빅데이터 수집을 위한 IP기반 이기종 네트워크 인터페이스 연동 게이트웨이)

  • Kang, Jiheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.173-178
    • /
    • 2019
  • Recently, the types and amount of data generated, collected, and measured in IoT such as smart home, security, and factory are increasing. The technologies for IoT service include sensor devices to measure desired data, embedded software to control the devices such as signal processing, wireless network protocol to transmit and receive the measured data, and big data and AI-based analysis. In this paper, we focused on developing a gateway for interfacing heterogeneous sensor network protocols that are used in various IoT devices and propose a heterogeneous network interface IoT gateway. We utilized a OpenWrt-based wireless routers and used 6LoWAN stack for IP-based communication via BLE and IEEE 802.15.4 adapters. We developed a software to convert Z-Wave and LoRa packets into IP packet using our Python-based middleware. We expect the IoT gateway to be used as an effective device for collecting IoT big data.

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

Cognitive Training Protocol Design and System Implementation using AR (증강현실을 이용한 인지훈련 프로토콜 설계 및 시스템 구현)

  • Cheol-Seung, Lee;Kuk-Se, Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1207-1212
    • /
    • 2022
  • Realistic media, the next-generation media technology in the era of the 4th industrial revolution, is becoming an issue as a technology to experience through an environment that optimizes user experience, especially! It is rapidly developing into the health and healthcare convergence and complex fields. Realistic media technologies and services are being adopted to solve the problems of the increase in chronic diseases due to the increase in the elderly population and the lack of infrastructure and professional manpower in the fields of cognitive training and rehabilitation. Therefore, in this study, a cognitive training system was designed and implemented for the purpose of improving cognitive ability and daily life activity in subjects with mild cognitive impairment (MCI) who require cognitive rehabilitation. In the future, an integrated service platform with interactive communication and immediate feedback as an intelligent cognitive rehabilitation integrated platform based on AI and BigData is left as a research project.

A Study on IKE v2 Analysis Method for RealTime (NIKEv2 AR : IKE v2 실시간 분석 기술 연구)

  • Park, Junghyung;Ryu, Hyungyul;Ryou, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.661-671
    • /
    • 2022
  • Due to the COVID-19 pandemic, remote working, e-learning, e-teaching and online collaboration have widely spread and become popular. Accordingly, the usage of IPsec VPN for security reasons has also dramatically increased. With the spread of VPN, VPN vulunerabilities are becoming an important target of attack for attackers, and many studies have been conducted on this. IKE v2 analysis is an essential process not only for developing and building IPsec VPN systems but also for security analysis. Network packet analysis tools such as Wireshark and Tcpdump are used for IKE v2 analysis. Wireshark is one of the most famous and widely-used network protocol analyzers and supports IKE v2 analysis. However Wireshark has many limitations, such as requiring system administrator privileges for IKE v2 analysis. In this paper, we describe Wireshark's limitations in detatil and propose a new analysis method. The proposed analysis method can analyze all encrypted IKE v2 messages in real time from the session key exchange In addition, the proposed analysis method is expected to be used for dynamic testing such as fuzzing as packet manipulation.