• Title/Summary/Keyword: WPA

Search Result 39, Processing Time 0.022 seconds

Survival Analysis of Patients with Brain Metastsis by Weighting According to the Primary Tumor Oncotype (전이성 뇌종양 환자에서 원발 종양 가중치에 따른 생존율 분석)

  • Gwak, Hee-Keun;Kim, Woo-Chul;Kim, Hun-Jung;Park, Jung-Hoon;Song, Chang-Hoon
    • Radiation Oncology Journal
    • /
    • v.27 no.3
    • /
    • pp.140-144
    • /
    • 2009
  • Purpose: This study was performed to retrospectively analyze patient survival by weighting according to the primary tumor oncotype in 160 patients with brain metastasis and who underwent whole brain radiotherapy. Materials and Methods: A total of 160 metastatic brain cancer patients who were treated with whole brain radiotherapy of 30 Gy between 2002 and 2008 were retrospectively analyzed. The primary tumor oncotype of 20 patients was breast cancer, and that of 103 patients was lung cancer. Except for 18 patients with leptomeningeal seeding, a total of 142 patients were analyzed according to the prognostic factors and the Recursive Partitioning Analysis (RPA) class. Weighted Partitioning Analysis (WPA), with the weighting being done according to the primary tumor oncotype, was performed and the results were correlated with survival and then compared with the RPA Class. Results: The median survival of the patients in RPA Class I (8 patients) was 20.0 months, that for Class II (76 patients) was 10.0 months and that for Class III (58 patients) was 3.0 months (p<0.003). The median survival of patients in WPA Class I (3 patients) was 36 months, that for the patients in Class II (9 patients) was 23.7 months, that for the patients in Class III (70 patients) was 10.9 months and that for the patients in Class IV (60 patients) was 8.6 months (p<0.001). The WPA Class might have more accuracy in assessing survival, and it may be superior to the RPA Class for assessing survival. Conclusion: A new prognostic index, the WPA Class, has more prognostic value than the RPA Class for the treatment of patients with metastatic brain cancer. This WPA Class may be useful to guide the appropriate treatment of metastatic brain lesions.

Design of Wi-Fi P2P Connection Manager Using wpa_supplicant (wpa_supplicant를 이용한 Wi-Fi P2P용 커넥션 매니저 설계)

  • Yun, Min-Hong;Kim, Do-Hyung;Ryu, Cheol;Lee, Jae-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.280-282
    • /
    • 2012
  • Wi-Fi P2P는 Wi-Fi Alliance에 의해 제정된 표준 규격으로 근접 거리에 위치한 장치들간의 효율적이고 빠른 데이터 송수신을 위해 IEEE 802.11n을 이용하고 있다. 근접거리 통신을 위한 기존 블루투스 등의 규격이 갖는 단점을 보완했다는 점에 있어 높은 평가를 받고 있으며, 모바일 디바이스용 플랫폼인 Android ICS 버전부터 공식적으로 지원됨에 따라 널리 사용될 것으로 전망된다. 한편, 한국전자통신연구원(ETRI)에서는 오랫동안 PAN 수준의 네트워킹을 연구해왔으며 그 일환으로 PAN 및 M2M에 적합한 통신 수단으로 여겨지는 Wi-Fi P2P에 대한 연구도 진행 중에 있다. 이에 본 논문에서는 ETRI가 과제를 수행하면서 부수적으로 연구한 Wi-Fi P2P를 위한 Linux용 플랫폼 구조를 공유하고자 한다. 특히 Linux Wireless 프로젝트인 hostap에 속한 wpa_supplicant를 이용해 실제로 동작하는 Wi-Fi P2P 커넥션 매니저를 설계하고 구현하는 방법을 설명함으로써 Android 플랫폼이 아닌 일반적인 Linux 장치에서 Wi-Fi P2P를 사용할 수 있는 방법에 대해 논한다.

Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN (무선 랜 환경 인증 메커니즘의 취약성 분석 및 대응방안 연구)

  • Choi, Jin-Ho;Oh, Soohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1219-1230
    • /
    • 2012
  • Recently, lots of users are using wireless LAN providing authentication and confidentiality with security mechanism such as WEP, WPA. But, weakness of each security mechanism was discovered and attack methods that user's information was exposed or modified to the third parties with it and abused by them were suggested. In this paper, we analyzed architecture of security mechanisms in wireless LAN and performed PSK cracking attack and cookie session hijacking attack with the known vulnerability. And, an improved 4-way handshake mechanism which can counter PSK cracking attack and a cookie replay detection mechanism which can prevent cookie session hijacking attack were proposed. Proposed mechanisms are expected to apply to establish more secure wireless LAN environment by countering existing vulnerability.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

A Study on Vulnerability Analysis and Security Plan through Public WiFi Attack (공공 와이파이 공격을 통한 취약점 분석 및 보안방안에 관한 연구)

  • Cho, Young-nam;Jo, Jeong-won;Jeong, Chae-eun;Kang, Da-seul;Jang, Won-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.493-496
    • /
    • 2018
  • Wi-Fi Protected Access2 (WPA2), a recommended Wi-Fi communication security technology, vulnerabilities are found and Users' personal information may also be exposed. In this paper, we analyze security vulnerabilities of public Wi-Fi by attack and seek to find ways to securely use Wi - Fi by users.

  • PDF

Secured Network Design for Hyper Market by applying MACsec(802.1AE) Protocol (MACsec(802.1AE) 프로토콜 기반 대형마켓 보안 네트워크 설계)

  • Lee, Jun-Won;Park, Seon-Ho;Gum, Ki-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.804-807
    • /
    • 2010
  • 네트워크를 통해 고객의 신용카드 및 매출정보를 전송하는 대형마켓의 경우, 데이터링크 레이어 보안은 매우 중요하다. 본 논문은 현재 WPA/WPA2 형태로 무선 네트워크에 국한되어 있는 데이터링크 레이어 보안수준을 MACsec(IEEE 802.11AE)를 이용하여 전체 데이터링크 레이어 구간으로 확대하고, 나아가 SecY(MAC Security Entity)의 Secure Frame의 처리 방식을 응용한 무선랜 인증방안을 제시하고자 한다.

Review on the Protected Areas Issues within Mid-Long Term National Plans for Territory and Environment of Korea; Focus on the "Biodiversity 2011-2020 Strategic Targets" and "Protected Areas Decision" (우리나라 국토 및 환경 분야 중장기 국가계획의 보호지역 관련 내용 고찰 - "생물다양성협약 2011~2020 전략목표" 및 "보호지역 결정문" 내용을 중심으로-)

  • Heo, Hag Young
    • Journal of Environmental Policy
    • /
    • v.11 no.4
    • /
    • pp.3-37
    • /
    • 2012
  • In perspective of biodiversity conservation and protected areas (PAs), the aims of the study are to review the mid-long term national plans, which deal with national territory and environment in Korea, and to find out the way to improve this issue. Key issues were drawn by referring "Biodiversity 2011-2020 Strategic Targets" and "Protected Area Decision" in CBD CoP-10 and 7 National comprehensive or basic Plans were reviewed. Quoting Biodiversity 2011-2020 Strategic Target 5, "By 2020, the rate of loss of all natural habitats, including forests, is at least halved and where feasible brought close to zero, and degradation and fragmentation is significantly reduced", most of national plans included various methods such as "No Net Loss of Green", "No Net Loss of Wetlands", and so on. Regarding the target 11, "By 2020, at least 17% of terrestrial and inland water, and 10% of coastal and marine areas, ecologically representative and well connected systems of PAs and other effective area-based conservation measures, and integrated into the wider landscape and seascapes", 15% by 2015 was set up as a target of total PAs in Korea and 13% by 2015 or 2020 was set up as a target of coastal and marine PAs. CBD CoP-10 Decision X/31 (Protected Areas) invites parties to develop a national long-term action plan for the implementation of PoWPA and describes 10 issues that need greater attention. National action plan for the implementation of PoWPA doesn't be mentioned at any national plans even PoWPA. Regarding the 10 issues, most of issues were well reflected within various national plans, however there is still a need to improve the details and corelation between plans. Particularly, in terms of management effectiveness evaluation (MEE), there was no national plan to directly deal with MEE even though CBD invites parties to work towards assessing 60% of the total PAs by 2015. Based on the review results, below 4 items were suggested; (1)"The Comprehensive Plan of the National Territory" needs more attention on the Biodiversity Conservation and PAs, (2)Consider to establish "National PA System Plan" embedded into "the Comprehensive Plan of National Environment", (3)Establish a "National Action Plan for the implementation of PoWPA", (4)Improve the National Plans through linking with Biodiversity 2011-2020 Strategic Targets and relevant PA key issues.

  • PDF

A Porting Technique of WiFi Device on Android Platform (안드로이드 플랫폼에 WiFi 디바이스 탑재 기법)

  • Jeong, Uyeong;Ju, Youngkwan;Jeon, Joongnam
    • Journal of Convergence Society for SMB
    • /
    • v.2 no.1
    • /
    • pp.51-58
    • /
    • 2012
  • Android platform is a powerful operating system developed on Linux 2.6 Kernel, and provides many features such as comprehensive libraries, a multimedia environment, and powerful interface for phone applications. Since Android is an open operating system, which can be installed in any vendors's equipments. Current smartphones as well as netbooks, navigations, car PCs, tablet PCs, Industrial PCs are used in various fields. It is difficult a lot that to mount to other devices on the Android platform or new devices. In this Paper, The process that data that occurred from a hardware was passed to the highest application and Android platform system for managing hardware devices were analyzed. Building Android & driver compilation environment, How to support the protocol for the use of WiFi in the kernel, How to Mount a WiFi device in the kernel, Device driver registration for the Android platform, WiFi Management Service Daemon (wpa_supplicant) and IP allocation services daemon (dhcpcd) registration, How to create a socket for communication between the daemon (wpa_supplicant) and HAL have been presented. In the experiment using the proposed method, WiFi devices were mounted on the Android platform in the X-86 & ARM family. Understanding the whole process of control flow in Android hierarchy is very important to porting a new device on it. The process included in this paper can help technicians who might encounter the obstacles in their porting works.

  • PDF