• Title/Summary/Keyword: protocol Analysis

Search Result 2,517, Processing Time 0.032 seconds

Exploring the Applicability of PLC Protocol for Enhancing Science Teachers' Teaching Expertise on Inquiry Class (과학 교사의 탐구 수업 전문성 신장을 위한 교사학습공동체(PLC) 프로토콜의 활용 가능성 탐색)

  • Lee, Kiyoung;Jeong, Eunyoung;Kwak, Youngsun
    • Journal of The Korean Association For Science Education
    • /
    • v.42 no.4
    • /
    • pp.439-448
    • /
    • 2022
  • The goal of this study is to develop a protocol that can be used for the purpose of developing inquiry class expertise in science teacher PLC, and to explore the possibility of field application of the developed protocol through test application with in-service teachers. PLC protocol for science inquiry class, consisting of five stages, was developed and applied sequentially to six participating teachers. In order to check the applicability of the protocol, the participating teachers wrote a reflection journal for each stage, and after the completion of the five-stage protocol, the participants' perceptions of the protocol were investigated through a group interview. The results are as follows: first, a protocol for enhancing science teachers' professionalism of inquiry classes was composed and developed in five stages such as (1) Revealing ideas about science inquiry classes, (2) Sharing science inquiry class experiences, (3) Looking together at students' scientific inquiry results, (4) Building literacy for science inquiry teaching, and (5) making science inquiry lesson plans. Second, the possibility of extensive application of the PLC protocol developed in this study was confirmed through the reflection journal and post-interview analysis results of the participants. According to the participating teachers, the protocol helped the systematic operation of PLC and teachers' participation. In addition, by experiencing the five-stage protocol, the teachers had an opportunity to reflect on their inquiry classes and ponder for improvement, and gained confidence in inquiry classes. Based on the research results, ways to develop and utilize the PLC protocol for science teachers were suggested.

A LAN Protocol Analyzer including Simulation Function for PC Environment (PC 환경에서 시뮬레이션 기능을 포함한 LAN 프로토콜 분석장비)

  • Chung, Joong-Soo;Lee, Jun-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.5
    • /
    • pp.583-589
    • /
    • 2002
  • The Internet is absolutely contributed to information telecommunication revolution nowadays. Realizing local network at the various type of buildings such as a company and a university, ethernet is used for subnet and FDDI, ATM are used for backbone mainly in order to get internet services. Processing TCP/IP protocol suite and analyzing the protocol exactly is essential to detecting the problem occurring in the network and developing communication equipment. This paper presents implementation of ethernet LAN protocol analyser which monitors and simulates ICP/IP protocol suite carrying the Internet and non-Internet protocol such as Netware and NetBIOS. MS window98 and visual C are used for development environment and application program operates on the NDIS firmware. The performance analysis on the proposed system is carried out as monitoring and simulating the traffic over LAN of a university. In the result of monitoring the system, the processing time of a packet captured over the LAN is about 1.5ms. In case of simulating the system, the processing time to be taken carrying out TCP connection and disconnection once is packet is about 8.6ms. The performance analysis of monitoring and simulation results satisfies with 10 Mbps ethernet LAN environment.

Evaluation of the effective dose and image quality of low-dose multi-detector CT for orthodontic treatment planning (3차원 안모분석을 위한 저선량 Multi-detector CT 영상의 유효선량 및 화질 평가)

  • Chung, Gi-Chung;Han, Won-Jeong;Kim, Eun-Kyung
    • Imaging Science in Dentistry
    • /
    • v.40 no.1
    • /
    • pp.15-23
    • /
    • 2010
  • Purpose : This study was designed to compare the effective doses from low-dose and standard-dose multi-detector CT (MDCT) scanning protocols and evaluate the image quality and the spatial resolution of the low-dose MDCT protocols for clinical use. Materials and Methods : 6-channel MDCT scanner (Siemens Medical System, Forschheim, Germany), was used for this study. Protocol of the standard-dose MDCT for the orthodontic analysis was 130 kV, 35 mAs, 1.25 mm slice width, 0.8 pitch. Those of the low-dose MDCT for orthodontic analysis and orthodontic surgery were 110 kV, 30 mAs, 1.25 mm slice width, 0.85 pitch and 110 kV, 45 mAs, 2.5 mm slice width, 0.85 pitch. Thermoluminescent dosimeters (TLDs) were placed at 31 sites throughout the levels of adult female ART head and neck phantom. Effective doses were calculated according to ICRP 1990 and 2007 recommendations. A formalin-fixed cadaver and AAPM CT performance phantom were scanned for the evaluation of subjective image quality and spatial resolution. Results : Effective doses in ${\mu}Sv$ ($E_{2007}$) were 699.1, 429.4 and 603.1 for standard-dose CT of orthodontic treatment, low-dose CT of orthodontic analysis, and low-dose CT of orthodontic surgery, respectively. The image quality from the low-dose protocol were not worse than those from the standard-dose protocol. The spatial resolutions of both standard-dose and low-dose CT images were acceptable. Conclusion : From the above results, it can be concluded that the low-dose MDCT protocol is preferable in obtaining CT images for orthodontic analysis and orthodontic surgery.

Design and Implementation of Web Interface for Internet management System Using SNMP MIB-II (SNMP MIB-II를 이용한 인터넷 관리 시스템의 웹 인터페이스 설계 및 구현)

  • Yu, Seung-Geun;An, Seong-Jin;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.699-709
    • /
    • 1999
  • This paper is aimed at defining items of analysis using SNMP MIB-II for the purpose of managing the Internet based network running on TCP/IP protocol, and then utilize these items, in conjunction with various Web technology and JAVA to design and implement a Web based interface of a management system to analyze the performance and status of the Internet. Among the required items in order to accomplish this task are utilization, interface packet transmission rate, I/O traffic ratio, and so on. Based on these items, the actual analysis is carried out by the Web interface according to the type of analysis. For instance, the interface executes the function of real-time analysis, collection processing, elementary analysis and detailed analysis. The demand of the user is fed into the Web interface which carried out a real-time analysis with the client system which in turn will eventually produce the results of the analysis. In order words, the interface acts as a mediator server for the analysis system. Furthermore, a protocol for exchange of data and messages between the server and the analysis system, the MATP protocol, was also designed. Finally, the results obtained through the system presented in this paper were displayed on screen according to the type of analysis. The system realized in this paper uses We technology and is independent of platform and allows the user to determine the performance of Internet at his/her own host according to the selected items of analysis.

  • PDF

Marginal and internal fit of all ceramic crown using the replica technique and the triple-scan protocol (Replica technique과 Triple-scan protocol을 이용한 지르코니아 전부도재관의 변연 및 내면 적합도에 관한 비교 연구)

  • Shin, Mi-Sun;Lee, Jang-Hoon
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.55 no.4
    • /
    • pp.372-380
    • /
    • 2017
  • This study was conducted to compare the marginal and internal fit of all ceramic crown using the replica technique and the triple-scan protocol. Materials and methods: Twenty zirconia ceramic crowns were fabricated using titanium abutment model. All crowns were divided into two groups of 10 each, depending on the replica technique and the triple-scan protocol. The internal and marginal fit of 10 zirconia ceramic crowns were measured at 17 points for each specimen using the replica technique. The other 10 ceramic crowns were measured using the triple-scan protocol. Statistical analysis was performed by t-test (${\alpha}=.05$). Results: The mean and standard deviation of marginal and internal fit were significantly different between the replica technique ($49.86{\pm}29.69{\mu}m$) and triple-scan protocol ($75.35{\pm}64.73{\mu}m$, P<.001). The mean and standard deviation of internal fit except marginal fit were $58.38{\pm}31.77{\mu}m$ and $64.00{\pm}46.43{\mu}m$, respectively (P>.343). Conclusion: There was a statistically significant difference in the marginal fit measured by the two methods. However, there was no statistically significant difference in the internal fit between the two methods.

Diversity-Multiplexing Tradeoff Analysis for Half-Duplex Dynamic Decode and Forward Relay MIMO Protocol Using More than Two Source Antennas (두 개 이상의 소스 안테나를 갖는 HD DDF Relay MIMO 프로토콜에 대한 DMT 분석)

  • Kim, Taeyoung;Yim, Changho;Yoon, Eunchul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.5
    • /
    • pp.436-442
    • /
    • 2013
  • The diversity-multiplexing tradeoff (DMT) function of a special half-duplex (HD) dynamic decode and forward (DDF) relay protocol with more than two antennas at the source node, two antennas at the relay node, and two antennas at the destination node is derived. This protocol is compared to a HD NAF protocol with the same number of source antennas and a HD DDF relay protocol with two antennas at the source node, more than two antennas at the relay node, and two antennas at the destination node.

Design of an Authentication Protocol for Privacy Protection in RFID Systems (RFID 시스템에서 프라이버시 보호를 위한 인증프로토콜 설계)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.155-160
    • /
    • 2012
  • This paper proposes an authentication protocol based on hash and AES safe from various types of attacks in order to assure the security of communication between tags and readers, which exchange data with each other wirelessly in a RFID system. The proposed authentication protocol resolves a problem in existing hash-based protocols whereby the same hidden value is generated for the same identification in each session. In order to hide tag identification information a number of complicated calculations were required, but using the proposed AES protocol reduces such calculations, strengthens security against replay attack, spoofing attack, traffic analysis, eavesdropping, etc. and assure mutual authentication between tags and readers.

A wireless MAC protocol for the integrated voice/data services (통합 음성/데이타 서비스를 위한 무선 MAC 프로토콜)

  • 임인택;허정석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1173-1183
    • /
    • 1998
  • This paper proposes an SS-PRMA protocol for the integrated voice and data services in the packet radio networks. In this protocol, the uplink logical channels are provided by combining the time slots and the spreding codes. SS-PRMA protocol contains some features of existing protocols such as PRMA, slotted ALOHA, and CDMA. In the proposed protocol, the voice terminals use a reservation mechanism, and the dta terminals use a slotted ALOHA scheme. The analysis and the simulation results show that most of the performances for the voice traffic can be achieved by employing a few distinct spreading codes and the data traffic throughput is closely related to the number of spreading code channels. Also it shows that the data traffic performance can be significantly improved by applying an FEC scheme to the data link layer.

  • PDF

Improving an RFID Mutual Authentication Protocol using One-time Random Number (개선한 일회성 난수를 이용한 RFID 상호인증 프로토콜)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.2
    • /
    • pp.90-97
    • /
    • 2009
  • In 2008, Kim-Jun proposed a RFID mutual authentication protocol using one-time random number that can withstand malicious attacks by the leakage of important information and resolve the criminal abuse problems. Through the security analysis, they claimed that the proposed protocol can withstand various security attacks including the replay attack. However, this paper demonstrates that Kim-Jun' s RFID authentication protocol still insecure to the replay attack. In addition, this paper also proposes a simply improved RFID mutual authentication protocol using one-time random number which not only provides same computational efficiency, but also withstands the replay attack.

Energy Efficient Cooperative LEACH Protocol for Wireless Sensor Networks

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.358-365
    • /
    • 2010
  • We develop a low complexity cooperative diversity protocol for low energy adaptive clustering hierarchy (LEACH) based wireless sensor networks. A cross layer approach is used to obtain spatial diversity in the physical layer. In this paper, a simple modification in clustering algorithm of the LEACH protocol is proposed to exploit virtual multiple-input multiple-output (MIMO) based user cooperation. In lieu of selecting a single cluster-head at network layer, we proposed M cluster-heads in each cluster to obtain a diversity order of M in long distance communication. Due to the broadcast nature of wireless transmission, cluster-heads are able to receive data from sensor nodes at the same time. This fact ensures the synchronization required to implement a virtual MIMO based space time block code (STBC) in cluster-head to sink node transmission. An analytical method to evaluate the energy consumption based on BER curve is presented. Analysis and simulation results show that proposed cooperative LEACH protocol can save a huge amount of energy over LEACH protocol with same data rate, bit error rate, delay and bandwidth requirements. Moreover, this proposal can achieve higher order diversity with improved spectral efficiency compared to other virtual MIMO based protocols.