• Title/Summary/Keyword: national protocols

Search Result 820, Processing Time 0.035 seconds

Design and implementation of wireless home network system using Home Network Control Protocol

  • Yoon, Dae-Kil;Lee, Kam-Rok;Myoung, Kwan-Joo;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1558-1562
    • /
    • 2005
  • This paper describes the design and implementation of a wireless home network system using Home Network Control Protocol (HNCP) called the wireless HNCP home network system. For wireless interfaces of HNCP, IEEE 802.11b and IEEE 802.15.4 standard protocols are considered. With the implementation of the wireless HNCP home network system, a simple analysis about coexistence between IEEE 802.11b and IEEE 802.15.4 is achieved. Through the implemented wireless HNCP home network system and the analytical results about the coexistence between both two different wireless protocols, the feasibility of the wireless HNCP home network system is shown.

  • PDF

Evaluation of network protocols for automotive data communication (차량용 데이터 통신을 위한 네트워크 프로토콜의 평가)

  • Yun, Jung-A;Nam, Sang-Woon;Kim, Kee-Woong;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.6
    • /
    • pp.632-638
    • /
    • 1997
  • The growing number of electronic components used in automobiles has given rise to problems concerning the increasing number, size and weight of the wiring harnesses. As an approach to resolve these problems, multiplexed wiring systems using automotive communication protocol such as Controller Area Network(CAN), Advanced PALMNET and J1850 have been developed by many automobile companies. In order to compare these protocols quantitatively, this paper presents the performance evaluation of CAN and Advanced PALMNET via discrete event simulation. Through numerous simulation experiments, several important quantitative performance factors such as the probability of a transmission failure, average system delay(data latency), and throughput have been evaluated.

  • PDF

Design of Routing Protocols for WMN: Factors and Case Study

  • Gao, Hui;Lee, Hyung-ok;Kwag, Young-wan;Nam, Ji-seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.799-801
    • /
    • 2012
  • Wireless Mesh Network (WMN) can be defined as a communication network consisting of radio nodes organized in a mesh topology, which has been attracting much attention due to its promising technology. This paper addressed the factors on how to design routing protocols for WMN. 2 examples of designing routing metric and routing algorithm are given for case study. With consideration of those factors such as wireless broadcast advantage (WBA)/channel assignment (CA) or intra-flow/inter-flow interference high throughput is achieved.

Risk Factors for the Probability of Pregnancy Following Synchronization Protocols in Dairy Cows (젖소에서 배란동기화 프로그램 적용 후 임신율에 영향을 미치는 요인 분석 연구)

  • Jeong, Jae-Kwan;Kang, Hyun-Gu;Jung, Young-Hun;Hur, Tai-Young;Kim, III-Hwa
    • Journal of Veterinary Clinics
    • /
    • v.31 no.5
    • /
    • pp.382-388
    • /
    • 2014
  • The objective of this study was to determine the risk factors associated with pregnancy following 3 synchronization protocols in dairy cows. Data were collected on 1,952 cows from 22 dairy farms, including synchronization protocols ($PGF_{2{\alpha}}$ + estradiol benzoate [PG+EB], Ovsynch, and CIDR-ovsynch), cow parity, body condition score (BCS), and dates of previous calving, insemination and conception. The odds ratio (OR) for pregnancy were analyzed by logistic regression using the LOGISTIC procedure in SAS. The analysis revealed that farm (p = 0.005), cow parity (p = 0.0001), BCS (p < 0.005), and AI season (p < 0.05) significantly affected and calving to AI interval tended to affect (p < 0.1) the probability for pregnancy. Although synchronization protocols did not affect the probability for pregnancy (p > 0.05), cow parity and synchronization protocols showed a significant interaction (p < 0.005); the OR (0.60) was significantly lower (p < 0.0001) for multiparous cows compared to primiparous cows using PG+EB, whereas the OR (1.44) tended to be higher (p < 0.1) for multiparous cows compared to primiparous cows using the Ovsynch, and the probability for pregnancy did not differ between multiparous and primiparous cows using the CIDR-ovsynch (p > 0.05). Cows with BCS ${\geq}$ 3.00 were more likely pregnant (OR: 1.41) compared with cows having BCS ${\leq}$ 2.75, whereas cows inseminated during summer had a lower OR (0.73) compared with those inseminated during spring. Cows with a calving to AI interval > 150 days were more likely to be pregnant (OR: 1.20) compared with cows with a calving to AI interval ${\leq}$ 150 days. In conclusion, the OR for pregnancy following synchronization protocols in dairy cows was affected by farm, parity, BCS, calving to AI interval of the cow, and AI season, and there was a significant interaction between cow parity and synchronization protocols; the OR for pregnancy was lower for multiparous cows compared with primiparous cows using the PG+EB protocol.

A Study on the Problems and Solutions of Environmental Impact Assessment System for Environmentally Sound and Sustainable Development (ESSD를 위한 지역 환경영향평가제도의 문제점 및 개선방안 연구)

  • Oh, Hae-Sub;Lim, Hyung-Baek
    • Journal of Agricultural Extension & Community Development
    • /
    • v.6 no.1
    • /
    • pp.15-24
    • /
    • 1999
  • There have always been dilemmas between development and environmental conservation throughout the world. Gradually environmental contamination threatens sustainable development and conservation. we try to study on the sustainable development with environmental conservation. One of the instruments to get this goal is Environmental Impact Statement. Environmental Impact Statement has now become a standard tool of decision making in Environmentally Sound and Sustainable Development. The objectives of this study is to explore and suggest some suggestions for improvements of EIA. 1. Identify all criteria and standards that apply to physical and social environmental components and dynamics. 2. Giving attention to the purpose of the criterion and standard, with respect to resource use and quality. 3. Demonstrate the relevance legal, technical, and scientific authority by early planning through construction, operation and maintenance phases. 4. Implement rationales and protocols for the documentation of standard analytical methods, location of sampling points and statistical analysis of data. 5. Establish precise protocols by predictions of environmental impact relevant for established criteria and standards. Reviewing these protocols with relevant legal authorities prior to their implementation is important.

  • PDF

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards

  • Reddy, Alavalapati Goutham;Das, Ashok Kumar;Yoon, Eun-Jun;Yoo, Kee-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3371-3396
    • /
    • 2016
  • Authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in computing technologies and associated constraints. Lu et al. recently proposed a biometrics and smartcards-based authentication scheme for multi-server environment. The careful analysis of this paper demonstrates Lu et al.'s protocol is susceptible to user impersonation attacks and comprises insufficient data. In addition, this paper proposes an improved authentication with key-agreement protocol for multi-server architecture based on biometrics and smartcards. The formal security of the proposed protocol is verified using the widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our protocol can withstand active and passive attacks. The formal and informal security analysis, and performance analysis sections determines that our protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

Testbed Implementation and Performance Evaluation of High Speed Transport Protocols using TEIN2 Networks (TEIN2를 활용한 고대역 전송계층 프로토콜 테스트베드 구축 및 성능 분석)

  • Lee, Gi-Ra;So, Sang-Ho;Choi, Yun-Chul;Park, Man-Kyu;Lee, Jae-Yong;Kim, Byung-Chul;Kim, Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.104-113
    • /
    • 2009
  • Recently, high-speed Internet users and broadband network infrastructure are increasing. However, the TCP protocol widely used in the Internet is an appropriate transport only for the legacy Internet, it is inefficient for traffic transport for network environments with large bandwidth-delay product. In order to remedy this problem, there have been many researches about improved congestion control algorithms for broadband networks. In these studies, most of performance evaluation has been done by simulations. In this paper, after we reviewed the proposed high bandwidth transport layer protocols, we implemented a real testbed, measured the performance and analyzed the problems of high-speed transport protocols through the international research network TEIN2 between three nations, Korea, China, and Germany.

Identification of a Technique Optimized for the Isolation of Spermatogonial Stem Cells from Mouse Testes

  • Han, Na Rae;Park, Hye Jin;Lee, Hyun;Yun, Jung Im;Choi, Kimyung;Lee, Eunsong;Lee, Seung Tae
    • Journal of Embryo Transfer
    • /
    • v.33 no.4
    • /
    • pp.327-336
    • /
    • 2018
  • To date, there are no protocols optimized to the effective separation of spermatogonial stem cells (SSCs) from testicular cells derived from mouse testes, thus hindering studies based on mouse SSCs. In this study, we aimed to determine the most efficient purification method for the isolation of SSCs from mouse testes among previously described techniques. Isolation of SSCs from testicular cells derived from mouse testes was conducted using four different techniques: differential plating (DP), magnetic-activated cell sorting (MACS) post-DP, MACS, and positive and negative selection double MACS. DP was performed for 1, 2, 4, 8, or 16 h, and MACS was performed using EpCAM ($MACS^{EpCAM}$), Thy1 ($MACS^{Thy1}$), or GFR ${\alpha}1$ ($MACS^{GFR{\alpha}1}$) antibodies. The purification efficiency of each method was analyzed by measuring the percentage of cells that stained positively for alkaline phosphatase. DP for 8 h, $MACS^{Thy1}$ post-DP for 8 h, $MACS^{GFR{\alpha}1}$, positive selection double $MACS^{GFR{\alpha}1/EpCAM}$, and negative selection double $MACS^{GFR{\alpha}1/{\alpha}-SMA}$ were identified as the optimal protocols for isolation of SSCs from mouse testicular cells. Comparison of the purification efficiencies of the optimized isolation protocols showed that, numerically, the highest purification efficiency was obtained using $MACS^{GFR{\alpha}1}$. Overall, our results indicate that $MACS^{GFR{\alpha}1}$ is an appropriate purification technique for the isolation of SSCs from mouse testicular cells.

Improved RFID Mutual Authentication Protocol using One-Time Pad and One-Time Random Number Based on AES Algorithm (OTP와 일회성 난수를 사용한 AES 알고리즘 기반의 개선된 RFID 상호 인증 프로토콜)

  • Yun, Tae-Jin;Oh, Se-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.163-171
    • /
    • 2011
  • Because RFID systems use radio frequency, they have many security problems such as eavesdropping, location tracking, spoofing attack and replay attack. So, many mutual authentication protocols and cryptography methods for RFID systems have been proposed in order to solve security problems, but previous proposed protocols using AES(Advanced Encryption Standard) have fixed key problem and security problems. In this paper, we analyze security of proposed protocols and propose our protocol using OTP(One-Time Pad) and AES to solve security problems and to reduce hardware overhead and operation. Our protocol encrypts data transferred between RFID reader and tag, and accomplishes mutual authentication by one time random number to generate in RFID reader. In addition, this paper presents that our protocol has higher security and efficiency in computation volume and process than researched protocols and S.Oh's Protocol. Therefore, our protocol is secure against various attacks and suitable for lightweight RFID tag system.

DT-GPSR: Delay Tolerant-Greedy Perimeter Stateless Routing Protocol (DT-GPSR: 지연감내형 GPSR 라우팅 프로토콜)

  • Nam, Jae-Choong;Cho, You-Ze
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.2
    • /
    • pp.189-197
    • /
    • 2016
  • Mobile ad-hoc networks (MANETs) experience frequent link disconnections due to non-uniform node distribution and mobility. Thus, end-to-end path establishment-based routing protocols cause frequent transmission failures in MANETs, resulting in heavy control messages for path reestablishment. While location-based MANET routing protocols, such as Greedy Perimeter Stateless Routing (GPSR), use location information to forward messages in a hop-by-hop routing fashion without an end-to-end path establishment procedure, such protocols encounter communication void problems when message forwarding to the next hop fails due to the absence of a relay node. Therefore, to solve this problem, this paper proposes a Delay Tolerant-GPSR (DT-GPSR) protocol, which combines Delay Tolerant Networking (DTN) technology with the GPSR protocol. The performance of DT-GPSR is compared with the performances of the original GPSR and PRoPHET routing protocols through simulation using NS-2. The simulation results confirm that DT-GPSR outperforms GPSR and PRoPHET in terms of the message delivery ratio and message delivery delay.