• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.031 seconds

Quality Assurance of Gastric Cancer Surgery (위암 수술의 질 관리)

  • Lee Hyuk-Joon;Yang Han-Kwang
    • Journal of Gastric Cancer
    • /
    • v.5 no.2
    • /
    • pp.79-88
    • /
    • 2005
  • Quality assurance may be defined as the complete set of systemic actions that is required to achieve a better treatment result by standardizing treatment and by using various audit programs. In general, application of a quality assurance program in surgery is considered to be more difficult than it is in chemotherapy or radiotherapy. However, recently, the importance of quality assurance in the surgical field has been emphasized in clinical trials comparing different surgical procedures and evaluating the role of postoperative adjuvant therapy. In the case of gastric cancer surgery, excellent quality assurance programs have rarely been applied in most large prospective clinical trials. Although the quality assurance in Dutch trial was conducted very systemically and strictly, the situation is quite different from ours. On the other hand, several quality assurance programs in Japanese trials comparing D2 and D2 plus para-arotic lymph node dissection seem to be applicable to Korean clinical trials. Several factors, including selection of appropriate surgeons based on personal experience and annual number of operations, standardization of surgical procedures by education and consensus, development of a unified database program, application of standardized perioperative management, and standardization of pathologic examination, are required to guarantee a successful multi-institutional prospective clinical trial. In contrast, one needs to realize that protocols that are too strict and sophisticated can make the enrollment of patients and surgeons more difficult and can promote protocol violation during the clinical trials. (J Korean Gastric Cancer Assoc 2005;5:79-88)

  • PDF

Grid-Based Key Pre-Distribution for Factory Equipment Monitoring (공장 설비 모니터링을 위한 그리드 기반 키 선분배 기법)

  • Cho, YangHui;Park, JaePyo;Yang, SeungMin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.147-152
    • /
    • 2016
  • Wireless sensor networks that are easy to deploy and install are ideal for building a system that monitors the condition of the equipment in a factory environment where wiring is difficult. The ZigBee has characteristics of low price and low power compared with other wireless communication protocols and is suitable for a monitoring system requiring a plurality of nodes. ZigBee communication requires encryption security between devices because all protocol layers are based on OTM trusted by each other. In the communication between nodes, node authentication must be guaranteed and exposure of confidential information managed by each node should be minimized. The facilities of the factory are regular and stationary in distribution location. In order to protect the information gathered from the sensor in the factory environment and the actuator control information connected to the sensor node, we propose a cryptosystem based on the two - dimensional grid - based key distribution method similar to the distribution environment of the facility.

Service Identification Method for Encrypted Traffic Based on SSL/TLS (SSL/TLS 기반 암호화 트래픽의 서비스 식별 방법)

  • Kim, Sung-Min;Park, Jun-Sang;Yoon, Sung-Ho;Kim, Jong-Hyun;Choi, Sun-Oh;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2160-2168
    • /
    • 2015
  • The SSL/TLS, one of the most popular encryption protocol, was developed as a solution of various network security problem while the network traffic has become complex and diverse. But the SSL/TLS traffic has been identified as its protocol name, not its used services, which is required for the effective network traffic management. This paper proposes a new method to generate service signatures automatically from SSL/TLS payload data and to classify network traffic in accordance with their application services. We utilize the certificate publication information field in the certificate exchanging record of SSL/TLS traffic for the service signatures, which occurs when SSL/TLS performs Handshaking before encrypt transmission. We proved the performance and feasibility of the proposed method by experimental result that classify about 95% SSL/TLS traffic with 95% accuracy for every SSL/TLS services.

Design and Operation of LAN Interconnection Service for Satellite Links (위성링크를 위한 LAN 접속 서비스 설계과 운영)

  • Kim, Jeong-Ho;Choe, Gyeong-Su
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.961-968
    • /
    • 1996
  • In the frame of Koreasat Project, it has been identified the task to implement a pilot satellite network module to provide LAN-to-LAn in ground system for satellite links. The pilot network will support an experiment to verify the performances of the considered applications through a satellite.This paper proposes a satellite-LAN interconnecting architecture making full use of satellite benefits and counteracting satellite demerits. The architectureprovides high quality data transmission and high perfrmance for satellite bit errors by using a connection- oriented satellite protocol which can establish multiple logical links between two nodes. As a protocol conversion method, router-type interconnection was selected to guard against problems. Based on this architecture, a satellite LAN interconnecting system has been designed, which includes a 1.8 meter antenna with a 4 watt transceiver, a satellite modem and the developed satellite network interface. The system can support high speed transmission rates of up to 1.544 Mbs and superior network management as well.

  • PDF

A Method of Selecting Candidate Core for Shared-Based Tree Multicast Routing Protocol (공유기반 트리 멀티캐스트 라우팅 프로토콜을 위한 후보 코어 선택 방법)

  • Hwang Soon-Hwan;Youn Sung-Dae
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.10
    • /
    • pp.1436-1442
    • /
    • 2004
  • A shared-based tree established by the Core Based Tree multicast routing protocol (CBT), the Protocol Independent Multicast Sparse-Mode(PIM-SM), or the Core-Manager based Multicast Routing(CMMR) is rooted at a center node called core or Rendezvous Point(RP). The routes from the core (or RP) to the members of the multicast group are shortest paths. The costs of the trees constructed based on the core and the packet delays are dependent on the location of the core. The location of the core may affect the cost and performance of the shared-based tree. In this paper, we propose three methods for selecting the set of candidate cores. The three proposed methods, namely, k-minimum average cost, k-maximum degree, k-maximum weight are compared with a method which select the candidate cores randomly. Three performance measures, namely, tree cost, mean packet delay, and maximum packet delay are considered. Our simulation results show that the three proposed methods produce lower tree cost, significantly lower mean packet delay and maximum packet delay than the method which selects the candidate cores randomly.

  • PDF

An Integrated Development Environment for SyncML Server Applications (SyncML 서버 응용 개발을 위한 통합 개발 환경)

  • Lee, Ji-Yeon;Choi, Hoon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.1
    • /
    • pp.37-48
    • /
    • 2004
  • The SyncML, the standard synchronization protocol, supports the synchronization of various application services between a client and a server such as an address book, a calendar. Even with this standard protocol, SyncML application developers usually spend a long time and efforts implementing service specific logics and databases. This paper designed and implemented the SDE(Service Development Environment) which is an integrated development environment for SyncML server developers to develop an application service rapidly and correctly. The SDE consists of two components i.e., the Sync Library and the SEG(Sync Engine Generator) tool. To prove the applicability of this study we implemented a SyncML server by using the SDE and also carried out the correctness tests and the performance test. We hope this system helps developers implement mobile application services more efficiently.

An AODV-Based Two Hops Dynamic Route Maintenance in MANET (MANET에서의 AODV 기반 2홉 동적 경로유지 기법 연구)

  • Moon, Dae-Keun;Kim, Hag-Bae
    • The KIPS Transactions:PartC
    • /
    • v.14C no.2
    • /
    • pp.191-198
    • /
    • 2007
  • A mobile ad-hoc network (MANET) is an autonomous, infrastructure-less system that consists of mobile nodes. In MANET, on demand routing protocols are usually used because network topology changes frequently. AODV, which is a representative on demand routing protocol, operates using the routing table of each node that includes next hop of a route for forwarding packets. It maintains the established route if there is not an expiration of route or any link break. In the paper, we propose a partially adaptive route maintenance scheme (AODV-PA) based on AODV, which provides dynamic route modification of initial route for selecting the effective route using not only next hop but also next-hop of next-hop (i.e. 2-hop next node) acquired through route discovery process. In addition, the proposed scheme additionally manages the routing table for preventing exceptional link breaks by route modification using HELLO messages. We use NS 2 for the computer simulation and validate that the proposed scheme is better than general AODV in terms of packet delivery ratio, latency, routing overhead.

A Study on the Energy Efficient MAC Layer ARQ Protocol for Wireless Ubiquitous Networks (무선 유비쿼터스 네트워크를 위한 에너지 효율적인 MAC Layer ARQ 프로토콜에 대한 연구)

  • Roh, Jae-Sung;Kim, Wan-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.54-60
    • /
    • 2011
  • The development of wireless sensor networks (WSN) can be motivated by several types of applications. However, these applications demand an energy-efficient WSN that can prolong the network lifetime and can provide high throughput, low latency and delay. Designing wireless sensor networks with the capability of prolonging network lifetime catch the attention of many researchers in wireless system and network field. Contrasts with Mobile Ad Hoc Network system, Wireless Sensor Networks designs focused more on survivability of each node in the network instead of maximizing data throughput or minimizing end-to-end delay. In this paper, we will study part of data link layer in Open Systems Interconnection (OSI) model, called medium access control (MAC) layer. Since the MAC development of energy aware MAC Protocol for wireless sensor layer controls the physical radio part, it has a large impact on the overall energy consumption and the lifetime of a node. This paper proposes a analytical approach that tries to reduce idle energy consumption, and shows the increasement of network end-to-end arrival rate due to efficiency in energy consumption from time slot management.

Design and Implementation of a Ubiquitous Health Care System based on Sensor Network (센서네트워크에 기반한 유비쿼터스 헬스케어 시스템의 설계 및 구현)

  • Kim, Jeong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • In this paper, we have implemented a ubiquitous healthcare system that can measure and check human's health in anytime and anywhere. The implemented prototype are composed of both front-end and back-end. The front-end have several groups: environment sensor group such as temperature, humidity, photo, voice sensor, health sensor group such as blood pressure, heart beat, electrocardiogram, spo2 sensor, gateway for wired/wireless communication, and RFID reader to identify personal. The back-end has a serial forwarder to propagate measurment results, monitor program, and medical information server The implemented sensor node constructs a sensor network using the Zigbee protocol and is ported the tinyOS. The data gathering base node is linux-based terminal that can transfer a sensed medial data through wireless LAN. And, the medical information server stores the processed medical data and can promptly notify the urgent status to the connected medical team. Through our experiments, we've confirmed the possibility of ubiquitous healthcare system based on sensor network using the Zigbee.

Design and Implementation of DHCP Supporting Network Attack Prevention (네트워크 공격 방지를 지원하는 DHCP의 설계 및 구현에 관한 연구)

  • Yoo, Kwon-joeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.747-754
    • /
    • 2016
  • DHCP(Dynamic Host Configuration Protocol) is a protocol for efficiency and convenience of the IP address management. DHCP automatically assigns an IP address and configuration information needed to run the TCP/IP communication to individual host in the network. However, existing DHCP is vulnerable for network attack such as DHCP spoofing, release attack because there is no mutual authentication systems between server and client. To solve this problem, we have designed a new DHCP protocol supporting the following features: First, ECDH(Elliptic Curve Diffie-Hellman) is used to create session key and ECDSA(Elliptic Curve Digital Signature Algorithm) is used for mutual authentication between server and client. Also this protocol ensures integrity of message by adding a HMAC(Hash-based Message Authentication Code) on the message. And replay attacks can be prevented by using a Nonce. As a result, The receiver can prevent the network attack by discarding the received message from unauthorized host.