• Title/Summary/Keyword: protocol Analysis

Search Result 2,534, Processing Time 0.028 seconds

Implementation of RTP/RTCP for Teleconferencing System and Analysis of Quality-of-Service using Audio Data Transmission (영상회의 시스템을 위한 RTP/RTCP 구현 및 오디오 데이터 전송을 위용한 QoS 분석)

  • Kang, Min-Gyu;Hwang, Seung-Koo;Kim, Dong-Kyoo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.12
    • /
    • pp.3047-3062
    • /
    • 1998
  • This paper deseribes the desihn and the implementation of the Realtime Transport Protocol(RTP)/ Rdaltime Control Protocol(RTCP) (RFC 1889,1890) that is used to transmit the audio/video data to any destination and to feedback the Quality of Service (QoS) information of the received media data to the sender, in the teleconferencing systems proposed by ITU-T. These protocols are implemented with multi thead technique and run on top of UDP/IP-Multicast through the socket interface as the underlying protocol. The upper layer is impelmented such that in can be accessed by the H245 comference control protocol. The RTP packetizes the digitized audio/video data from the encoder info a fixed format, and multieast to the participants. The RTCP monitors RTP packets and extracts the QoS values from it such as round-trip delay, jiter and packet loss to form RTCP packets and non periokically sends them to the sender site. In this Paper, we also descritx the study of measurement and analysis for QoS factors that observed on performing teleconferencing system over Internet. The results from this experiment is indicate that RTT and Jitter value are acceptable even entwork load is high. However, it appears that packet loss rate is high in daytime and most losses periods have length one or two.

  • PDF

Establishment of a [18F]-FDG-PET/MRI Imaging Protocol for Gastric Cancer PDX as a Preclinical Research Tool

  • Bae, Seong-Woo;Berlth, Felix;Jeong, Kyoung-Yun;Suh, Yun-Suhk;Kong, Seong-Ho;Lee, Hyuk-Joon;Kim, Woo Ho;Chung, June-Key;Yang, Han-Kwang
    • Journal of Gastric Cancer
    • /
    • v.20 no.1
    • /
    • pp.60-71
    • /
    • 2020
  • Purpose: The utility of 18-fluordesoxyglucose positron emission tomography ([18F]-FDG-PET) combined with computer tomography or magnetic resonance imaging (MRI) in gastric cancer remains controversial and a rationale for patient selection is desired. This study aims to establish a preclinical patient-derived xenograft (PDX) based [18F]-FDG-PET/MRI protocol for gastric cancer and compare different PDX models regarding tumor growth and FDG uptake. Materials and Methods: Female BALB/c nu/nu mice were implanted orthotopically and subcutaneously with gastric cancer PDX. [18F]-FDG-PET/MRI scanning protocol evaluation included different tumor sizes, FDG doses, scanning intervals, and organ-specific uptake. FDG avidity of similar PDX cases were compared between ortho- and heterotopic tumor implantation methods. Microscopic and immunohistochemical investigations were performed to confirm tumor growth and correlate the glycolysis markers glucose transporter 1 (GLUT1) and hexokinase 2 (HK2) with FDG uptake. Results: Organ-specific uptake analysis showed specific FDG avidity of the tumor tissue. Standard scanning protocol was determined to include 150 μCi FDG injection dose and scanning after one hour. Comparison of heterotopic and orthotopic implanted mice revealed a long growth interval for orthotopic models with a high uptake in similar PDX tissues. The H-score of GLUT1 and HK2 expression in tumor cells correlated with the measured maximal standardized uptake value values (GLUT1: Pearson r=0.743, P=0.009; HK2: Pearson r=0.605, P=0.049). Conclusions: This preclinical gastric cancer PDX based [18F]-FDG-PET/MRI protocol reveals tumor specific FDG uptake and shows correlation to glucose metabolic proteins. Our findings provide a PET/MRI PDX model that can be applicable for translational gastric cancer research.

A Research on Streaming Protocol for User-Created Contents in Digital Cable Broadcasting environment (디지털 케이블 방송 환경에서 개인 미디어를 위한 스트리밍 프로토콜 연구)

  • Kim, Seong-Won;Kim, Jung-Hwan;Si, Jang-Hyun;Jung, Moon-Ryul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.1
    • /
    • pp.54-61
    • /
    • 2007
  • In this paper, on-demand service streaming protocol for user-created contents in digital cable broadcasting environment is considered. In order to provide variety media contents service like UCC in digital cable broadcasting environment, the same service model as RVOD(Real Video on Demand) is required and the different interface for each broadcasting platform is needed in a current OCAP environment. Using return path based RTP, we separate existing VOD stream band into broadcasting and VOD stream band. In order to broaden On-demand service, consistent expansion of the infrastructure same as live broadcasting system is inefficient in the digital cable broadcasting environment. Using existing network protocol, the service which is insensitive to the infrastructure for VOD service becomes possible. Therefore we considered the analysis of the class of download available structure in the Set-Top-Box for RTP(Real-time Transport Protocol) and designing the decoding available streaming server for UCC transcoding and transmission in the receiver. Designing a efficient VOD service and system under the broadcasting environment gives a expansion of On-Demand service and more chance to upload and utilization of contents.

An Enhanced Mechanism of Security Weakness in CDMA Service (CDMA 서비스의 보안취약성과 개선방안)

  • Ryu, Dae-Hyun;Jang, Seung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.729-742
    • /
    • 2003
  • Mobile Communication has a possibility of eavesdropping by nature of wireless channel. It is known that eavesdropping of CDMA system is impossible because the voice data spreads with the PN. First of all, we show that it is possible to eavesdrop the CDMA channel by analysis of the forward channel in case that we know the ESN and the MIN. We can monitor the forward traffic channel with easy since ESN and MIN are exposed during the call processing in CDMA service in Korea. In this paper, we will show security weakness and propose an enhanced mechanism for CDMA service. We consider the problem of security in the CDMA service. CDMA system has wireless channels to transmit voice or data. By this reason, CDMA communication has a possibility of being eavesdropped by someone. It is known that eavesdropping in CDMA system is impossible because the voice data spreads with the PN. However, we can eavesdrop the CDMA data in FCM protocol in case that we know the ESN and the MIN. In CDMA system, ESN and MIN are exposed to the wireless channel. In this paper, we analyze the flow of the voice and signal in the CDMA system and monitor the forward traffic channel by the FCM protocol. The FCM protocol is proposed to monitor the forward channel in CDMA system. We can show the possibility of monitoring in one-way channel of CDMA system by the FCM protocol. The test instrument based on the FCM protocol is proposed to monitor the CDMA forward channel. We will show the system architecture of the test instrument to monitor the forward channel in CDMA.

Security Analysis of KS X 4600-1 / ISO IEC 12139-1 (원격 검첨용 PLC 기술(KS X 4600-1 / ISO IEC 12139-1) 보안성 분석)

  • Hong, Jeong-Dae;Cheon, Jung-Hee;Ju, Seong-Ho;Choi, Moon-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.65-75
    • /
    • 2011
  • Power Line Communication (PLC) is a system for carrying data on a conductor used for electric power transmission. Recently, PLC has received much attention due to connection efficiency and possibility of extension. It can be used for not only alternative communication, in which communication line is not sufficient, but also for communication between home appliances. Korea Electronic Power Cooperation (KEPCO) is constructing the system, which automatically collects values of power consumption of every household. Due to the randomness and complicated physical characteristics of PLC protocol (KS X4600-1), it has been believed that the current PLC is secure in the sense that it is hard that an attacker guesses or modifies the value of power consumption. However, we show that the randomness of the protocol is closely related to state of the communication line and thus anyone can easily guess the randomness by checking the state of the communication line. In order to analyze the security of PLC, we study the protocol in detail and show some vulnerability. In addition, we suggest that PLC needs more secure protocol on higher layers. We expect that the study of PLC help in designing more secure protocol as well.

Science Teachers' Perceptions About Difficulties and Their Resolution in Science Teaching: Using KTOP (Korean Teaching Observation Protocol) Analysis (과학수업에서의 어려움과 해결방안에 대한 과학교사의 인식 -KTOP (Korean Teaching Observation Protocol) 분석을 이용하여-)

  • Haktae Kim;Jongwon Park
    • Journal of The Korean Association For Science Education
    • /
    • v.43 no.2
    • /
    • pp.111-124
    • /
    • 2023
  • The aim of this study was to explore science teachers' perceptions of good science teaching. To this end, the Korean Teaching Observation Protocol (KTOP), which was developed for the purpose of observing and improving science teaching, was utilized. In the first survey, teachers were asked whether they thought each item in the KTOP was important for good science teaching, the extent to which they implemented these items, and the level of difficulty in implementing them. The second survey asked teachers what they believed to be the reasons and solutions for the KTOP items that they had responded as difficult to implement. The responses obtained from 63 teachers in the first survey and 35 teachers in the second survey were categorized based on the characteristics of the responses. The categorized contents were then summarized and discussed for their features. As a result, science teachers responded that all items in KTOP, except for one, are important for good science teaching. However, it was also shown that the level of execution was low in cases where implementation was difficult. For the 13 KTOP items that were considered important but difficult to implement and showed relatively low implementation level, many respondents (69%) attributed the reason to both students and teachers. However, the most common response (60%) was that the teacher should solve those difficulties. From this, it was found that understanding and supporting teachers, as well as enhancing their competencies, are more important for good science teaching than external factors. We hope that this research findings will help to better understand the specific difficulties that science teachers face in their classes and contribute to practical efforts that aim to address these challenges.

Delay based Authentication Model for Flooding of Service Tolerance of Rehabilitation Psychology Analysis System (재활심리분석시스템의 폭주서비스 감내를 위한 지연기반 인증모델)

  • Lim, Ho-Chan;Kim, Young-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2073-2081
    • /
    • 2013
  • Today's rapidly changing society can lead to maladaptive behaviors. In the situations, rehabilitation psychology analysis using the on-line test be needed to solve the problem. However, Internet-based rehabilitation psychology analysis by a malicious attacker may still be vulnerable to denial-of-service attacks. The service flooding attacks render the server incapable of providing its service to legitimate clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimate users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.

Performance Analysis of Routing Protocols for Mobile Ad-hoc Network under Group Mobility Environment (그룹 이동 환경에서의 무선 애드혹 네트워크 라우팅 알고리즘 성능 분석)

  • Yang, Hyo-Sik;Yeo, In-Ho;Rhee, Jong-Myung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.52-59
    • /
    • 2008
  • Most pier performance analysis results for ad-hoc routing protocols have been based upon the model which each node in the network moves independently without restriction. In most real environments, however, it is very common for a group or multiple groups to move under the direction of group leader or group leaders instead of each node's independent movement. This paper presents the performance analysis of routing protocols for mobile ad-hoc network under group mobility environment. The comparative simulations have been made between a table-driven protocol, DSDV, and two on-demand protocols, AODV and DSR, under a group mobility model, RPGM, which is suitable for the practical applications such as military tactical operation. Multiple group movements are also included. The results show that the protocol performances for single group movement are very similar to node independent movement case. However some differences have been observed by varying pause time and connectivity.

Development of implant loading device for animal study about various loading protocol: a pilot study

  • Yoon, Joon-Ho;Park, Young-Bum;Cho, Yuna;Kim, Chang-Sung;Choi, Seong-Ho;Moon, Hong-Seok;Lee, Keun-Woo;Shim, June-Sung
    • The Journal of Advanced Prosthodontics
    • /
    • v.4 no.4
    • /
    • pp.227-234
    • /
    • 2012
  • PURPOSE. The aims of this pilot study were to introduce implant loading devices designed for animal study and to evaluate the validity of the load transmission ability of the loading devices. MATERIALS AND METHODS. Implant loading devices were specially designed and fabricated with two implant abutments and cast metal bars, and orthodontic expansion screw. In six Beagles, all premolars were extracted and two implants were placed in each side of the mandibles. The loading device was inserted two weeks after the implant placement. According to the loading protocol, the load was applied to the implants with different time and method, simulating early, progressive, and delayed loading. The implants were clinically evaluated and the loading devices were removed and replaced to the master cast, followed by stress-strain analysis. Descriptive statistics of remained strain (${\mu}{\varepsilon}$) was evaluated after repeating three cycles of the loading device activation. Statistic analysis was performed using nonparametric, independent t-test with 5% significance level and Friedman's test was also used for verification. RESULTS. The loading devices were in good action. However, four implants in three Beagles showed loss of osseointegration. In stress-strain analysis, loading devices showed similar amount of increase in the remained strain after applying 1-unit load for three times. CONCLUSION. Specialized design of the implant loading device was introduced. The loading device applied similar amount of loads near the implant after each 1-unit loading. However, the direction of the loads was not parallel to the long axis of the implants as predicted before the study.

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.