• Title/Summary/Keyword: protocol Analysis

Search Result 2,517, Processing Time 0.026 seconds

Noise and Image Quality Analysis of Brain CT Examination (두부 CT검사에서의 노이즈 및 화질분석)

  • Choi, Seok-yoon;Im, In-chul
    • Journal of radiological science and technology
    • /
    • v.42 no.4
    • /
    • pp.279-284
    • /
    • 2019
  • The purpose of this study was to find the best protocol for balance of image quality and dose in brain CT scan. Images were acquired using dual-source CT and AAPM water phantom, noise and dose were measured, and effective dose was calculated using computer simulation program ALARA(S/W). In order to determine the ratio of image quality and dose by each protocol, FOM (figure of merits) equation with normalized DLP was presented and the result was calculated. judged that the ratio of image quality and dose was excellent when the FOM maximized. Experimental results showed that protocol No. 21(120 kVp, 10 mm, 1.5 pitch) was the best, the organ with the highest effective dose was the brain(33.61 mGy). Among organs with high radiosensitivity, the thyroid gland was 0.78 mGy and breast 0.05 mGy. In conclusion, the optimal parameters and the organ dose in the protocol were also presented from the experiment, It may be helpful to clinicians who want to know the protocol about the optimum state of image quality and dose.

Performance Analysis of the WDM Protocol for the Multicast Traffics (멀티캐스트 트래픽 처리를 위한 WDM 프로토콜의 성능분석)

  • 정길현;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.64-74
    • /
    • 2001
  • In this paper, a dynamic minislot reservation protocol(DMRP) is proposed and analyzed to improve the performance of the multicast traffic processing in wavelength division multiplexing(WDM) networks. For the proposed protocol analysis, the WDM network architecture with a passive star coupler is used. One pair of transceiver is used for a control channel and the ocher pair of transceiver with one fixed transmitter and one tunable receiver are used for data transmission. In this protocol. the packets which fail to have successful transmission in the present time slot due to data channel and destination collisions, have priority to have successful reservation in the contention-less minislots of the next time slot. Therefore, protocols have improved the throughput and the system delay performance caused by the reduced probabilities of control channel contentions and destination collisions probability. Today, the efficient protocol that can handle the various types of data traffic is needed. As results, the DMRP is useful to improve the performance of throughput and system delay characteristics regardless of the kinds of traffic.

  • PDF

A Vulnerability Analysis of Multi-Context RFID Mutual Authentication Protocol (다중 컨텍스트 RFID 상호 인증 프로토콜의 보안 취약점 분석)

  • Kim, Young-Back;Kim, Sung-Soo;Chung, Kyung-Ho;Kim, Soo-Yong;Yun, Tae-Jin;Ahn, Kwang-Seon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.71-80
    • /
    • 2013
  • In this paper, we analyze the security vulnerability through the several attack scenarios for the MCR-MAP(Multi-Context RFID Mutual Authentication Protocol) proposed by Ahn et al. And we propose the secure mutual authentication protocol that improved a prior MCR-MAP. The suggested protocol uses the ID of the legal tag and the timestamp generated by the server, when the tag tries to authenticate. And when the tag creates the credential, we create the new secret key computing the XOR operation between the secret key shared with the server and the tag timestamp generated by the server. As a result, the proposed protocol provides the secure mutual authentication and then is safe to spoofing attack. Also it provides forward-secrecy and then is safe to offline brute-burst attack. In this paper, we compare and verify the security vulnerability of the prior and the proposed protocol through the security analysis.

Implementation of the Label Distribution Protocol for the Multiprotocol Label Switching (Multiprotocol Label Switching System을 위한 Label Distribution Protocol 구현)

  • 박재현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2249-2261
    • /
    • 1999
  • In this paper, we describe the design and implementation of the Label Distribution Protocol (LDP) for Multiprotocol Label Switching System. We review the implementation issues of LDP that is required to make a gigabit switched router, and propose a detail design of it. We present the data structures and procedures for the LDP as a result, which are based on IETF standard. We present design issues for applying this to carrier class products. The implemented protocol could afford 40,000 entries of the IP routing table that is required for deploying this system to commercialized data network. Furthermore this system implemented using the standard API of Unix, as a result, it has portability. By implementing LDP based on the international standard and these implementation issues, we expect that the implemented LDP will be interoperable with other commercialized products. We prove the validity of the design of the LDP through prototyping, and also verify the prototype with the specification using the process algebra and the performance analysis.

  • PDF

Analysis and Improved Solution of Hussian et al.'s Authentication Protocol for Digital Rights Management

  • Mi-Og Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.67-74
    • /
    • 2023
  • In this paper, we analyze the authentication protocol for DRM proposed by Hussain et al. in 2022, and present an improved solution. Hussain et al. argued that their authentication protocol guarantees man-in-the-middle attack, replay attacks, and mutual authentication. However, as a result of analyzing Hussain et al.'s authentication protocol in this paper, Hussain et al.'s authentication protocol still has an insider attack problem, a problem with Yu et al.'s authentication protocol that they pointed out. For this reason, when an inside attacker acquires information on a mobile device, a user impersonation attack was also possible. In addition, there were problems with the user's lack of ID format verification and the problem of the secret key mismatch of the digital contents between the server and the user. Therefore, this paper proposes an improved solution to solve these problems. As a result of analysis in this paper, the improved solution is safe from various attacks such as smart card attack, insider attack, and password guessing attack and can safely authenticate users of DRM.

Detecting artefacts in analyses of extreme wind speeds

  • Cook, Nicholas J.
    • Wind and Structures
    • /
    • v.19 no.3
    • /
    • pp.271-294
    • /
    • 2014
  • The impact of artefacts in archived wind observations on the design wind speed obtained by extreme value analysis is demonstrated using case studies. A signpost protocol for detecting candidate artefacts is described and its performance assessed by comparing results against previously validated data. The protocol targets artefacts by exploiting the serial correlation between observations. Additional "sieve" algorithms are proposed to identify types of correctable artefact from their "signature" in the data. In extreme value analysis, artefacts displace valid observations only when they are larger, hence always increase the design wind speed. Care must be taken not identify large valid values as artefacts, since their removal will tend to underestimate the design wind speed.

A Study on the IEEE802.11 MAC Analysis and Implementation (IEEE802.11 매체 접속 제어의 분석 및 구현에 관한 연구)

  • Kim, Ji-Hoon;Ahn, Do-Rang;Lee, Dong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.469-471
    • /
    • 2002
  • This paper presents analysis of the IEEE802.11 MAC protocol and implementation of the asynchronous communication portion of the IEEE802.11 MAC protocol. we have used PRISM2 chipsets from intertsil to build physical layer and PCI controller from PLX to interface LLC layer. This study is shown to be able to apply to MAC implementation in high speed LAN.

  • PDF

Performance Analysis of NTT/BT Protocol (NTT/BT 프로토콜의 성능 분석)

  • 이창훈;백상엽;이동주
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.22 no.2
    • /
    • pp.99-123
    • /
    • 1997
  • Performance analysis of NTT/BT protocol is investigated, which is a GFC (Generic Flow Control) ptotocol in ATM (Asynchronous Transfer Mode ) network and is based on cyclic reset mechanism. THe mean cell delay time is proposed as a performance measure of NTT/BT protocol. The mean cell delay time is defined as the duration from the instant the cell arrives at the transmission buffer until the cell is fully transmitted. The process of cell transmission can be described as a single server queueing modle with two dependent services. By utilizing this model, mean cell delay time is obtained and sensitivity of the factors such as window size and reset period is also analysed.

  • PDF

Study on the Performance Analysis of Building Automation Network (빌딩 자동화 통신망의 성능해석에 관한연구)

  • 홍승호;송원석
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.52 no.6
    • /
    • pp.359-364
    • /
    • 2003
  • BACnet is a standard data communication protocol for building automation and control systems. MS/TP is most widely used LAN protocol for data communication among field devices in the BACnet-based building automation. In this study, the performance of MS/TP protocol is investigated using a simulation model. This study evaluates the delay characteristics of MS/TP being used to deliver a BACnet application service. Analysis of the simulation results was used to identify the network parameters that influence the performance of BACnet application service and to develop recommendatioins that should be considered when designing and operating BACnet systems.

An Analysis of Network-Based Control System Using CAN(Controller Area Network) Protocol (CAN 프로토콜을 이용한 네트워크 기반 제어 시스템의 구조 분석)

  • 전종만;김대원;김홍석;조영조
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.549-549
    • /
    • 2000
  • In the previous work, we dealt with a traffic analysis of network-based control system and its architecture using the CAN protocol. It is difficult to determine an optimal network architecture for a specific system. In this paper, we propose the architecture of network-based control system applicable to a specific AGV system with manipulator arms. We define the fixed number of periodic messages to be occurred in this system. In the proposed system architecture, we analyse its traffic for the real-time communication of all messages, determine the optimal sampling period of an analog sensor to be satisfied with the required specification and the number of possible sensors to be added through simulation.

  • PDF