• Title/Summary/Keyword: 관리 프로토콜

Search Result 1,785, Processing Time 0.036 seconds

Study of standardization of coupling PLC Device in Ubiquitous Environment (유비쿼터스 환경에서 PLC 가전기기의 장치연결 표준화에 대한 연구)

  • Jean, Jae-hwan;Oh, Am-suk;Kang, Sung-in;Kim, Gwan-hyung;Choi, Sung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.227-230
    • /
    • 2009
  • This paper presents an architecture of various devices convergence for ubiquitous network. Integration of a variety of devices be can connect to every kind of device should not be constrained. We construct PLC to UPnP protocol architecture and UPnP Bridge Module for interconnecting Non-IP devices with heterogeneous network interfaces to UPnP devices on UPnP networks.

  • PDF

A Case Study about implementation of Personalized Services Environment using UICC on Mobile Open Platform (차세대 UICC 기술을 이용한 모바일 오픈 플랫폼 기반 개인화 서비스 환경 구축 사례)

  • Sohn, Young-Seol;Park, Joon-Ho;Ok, Chang-Seok
    • Annual Conference of KIPS
    • /
    • 2009.04a
    • /
    • pp.1128-1131
    • /
    • 2009
  • 폐쇄적 무선망 및 단말 플랫폼의 개방화 추세에 따라 이동통신사업자(MNO)는 자사 고객 retention 및 신규 수익창출을 위해 다양한 전략을 수립하고 있다. 그리고 고객은 이러한 개방 환경에서 이동통신사업자(MNO)의 단말 및 망에 구애받지 않고 자신의 개인정보 및 멀티미디어 컨텐츠 서비스를 편리하게 이용하기를 원하고 있다. 본 논문에서는 와이브로(WiBro)가입자 인증을 위해 단말에 필수 탑재되는 UICC 에 웹 기능 및 대용량 메모리 기술을 추가하여 이를 기반으로 개인화 서비스 제공을 위한 인프라 구축 사례를 살펴본다. 먼저, UICC 기반 개인화 서비스 인프라를 구성하는 UICC 및 단말에서 구현되어야 할 SCWS 및 대용량 메모리 처리 기술을 소개하고 이를 위한 기술 요구사항을 정의한다. 그리고, 해당 UICC 및 단말을 원격에서 관리하기 위해 플랫폼에서 구현하여야 할 제어 프로토콜 기술을 살펴보고, 이를 위한 기술 요구사항을 정의한다. 다음으로 최종적으로 구축된 전체 시스템의 구성 및 서비스 흐름을 기술하고, 끝으로 이러한 인프라를 통하여 제공될 수 있는 개인화 서비스를 소개하고 향후 방향을 소개함으로써 글을 맺는다.

Anonymity Management for Privacy Protection in OMADRM (OMADRM 에서 라이선스 서버로부터 개인정보와 활동 보호를 위한 익명성 보장 방법)

  • Lee, Seungick;Park, Heejae;Kim, Jong;Hong, Sung Je
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.1135-1138
    • /
    • 2007
  • 저작권 관리 환경에서 프라이버시 보호를 위한 이전 연구들은 라이센스 서버로부터 개인정보는 분리하였지만 한 디바이스에서 사용된 컨텐츠 내역들에 대한 정보는 분리하지 못하였다. 이는 이전연구에서 라이센스 서버는 디바이스 식별자와 개인정보와의 관계만을 유추하여 어떤 사용자가 어떤 컨텐츠들을 사용했는지를 모두 알 수 있다는 것을 의미한다. 본 논문에서는 OMADRM v2 를 기반으로 하여 라이센스 서버로부터 개인정보뿐만 아니라 사용된 컨텐츠 내역들에 대한 정보도 분리할 수 있는 익명의 인증 프로토콜과 익명성이 보장되면서도 오직 합법적인 디바이스 만이 라이센스를 사용하는 것을 보장하는 토큰 기반의 암호학적 체인을 제안하였다. 따라서 본 논문에서 우리는 OMADRM v2 에서 이전 연구들보다 개선된 사용자 프라이버시 보호를 달성하였다.

External Auditing on Absorbed Dose Using a Solid Water Phantom for Domestic Radiotherapy Facilities (고체팬텀을 이용한 국내 방사선 치료시설의 흡수선량에 대한 조사)

  • Choi, Chang-Heon;Kim, Jung-In;Park, Jong-Min;Park, Yang-Kyun;Cho, Kun-Woo;Cho, Woon-Kap;Lim, Chun-Il;Ye, Sung-Joon
    • Radiation Oncology Journal
    • /
    • v.28 no.1
    • /
    • pp.50-56
    • /
    • 2010
  • Purpose: We report the results of an external audit on the absorbed dose of radiotherapy beams independently performed by third parties. For this effort, we developed a method to measure the absorbed dose to water in an easy and convenient setup of solid water phantom. Materials and Methods: In 2008, 12 radiotherapy centers voluntarily participated in the external auditing program and 47 beams of X-ray and electron were independently calibrated by the third party’s American Association of Physicists in Medicine (AAPM) task group (TG)-51 protocol. Even though the AAPM TG-51 protocol recommended the use of water, water as a phantom has a few disadvantages, especially in a busy clinic. Instead, we used solid water phantom due to its reproducibility and convenience in terms of setup and transport. Dose conversion factors between solid water and water were determined for photon and electron beams of various energies by using a scaling method and experimental measurements. Results: Most of the beams (74%) were within ${\pm}2%$ of the deviation from the third party's protocol. However, two of 20 X-ray beams and three of 27 electron beams were out of the tolerance (${\pm}3%$), including two beams with a >10% deviation. X-ray beams of higher than 6 MV had no conversion factors, while a 6 MV absorbed dose to a solid water phantom was 0.4% less than the dose to water. The electron dose conversion factors between the solid water phantom and water were determined: The higher the electron energy, the less is the conversion factor. The total uncertainty of the TG-51 protocol measurement using a solid water phantom was determined to be ${\pm}1.5%$. Conclusion: The developed method was successfully applied for the external auditing program, which could be evolved into a credential program of multi-institutional clinical trials. This dosimetry saved time for measuring doses as well as decreased the uncertainty of measurement possibly resulting from the reference setup in water.

Meta-analysis of the Effects of Obesity Management Program for Children (국내 비만아동의 비만관리프로그램의 효과에 대한 메타분석)

  • Sung, Kyung-Suk;Yoon, Young-Mi;Kim, Eun-Joo
    • Child Health Nursing Research
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2013
  • Purpose: The aims of this study is to analysis the effects of obesity management programs for children and to measure the differences in the effects by type and dependent variables in order to analyze the structures of the programs. Methods: Sixty-one peer-reviewed journals including child obesity and intervention studies published between 2000 and 2010 were included for meta-analysis. Effect size and statistics of homogeneity were by STAT 10.0. Results: A total of 61 studies were used in the analysis, and the effect size of the independent studies was determined to be -0.23 (95% CI, -0.32 ~ -0.15). Serum Leptin and Insulin were the big effect size among the studies that used dependent variables. The theses used in the research did not display publishing bias. Conclusion: Obesity management programs that have been confirmed to be effective need to be developed into regional protocols. A continuous control of obese children and research for effective intervention program are in need.

Flexible Disjoint Multipath Routing Protocol Using Local Decision in Wireless Sensor Networks (무선 센서 네트워크에서 지역 결정을 통한 유연한 분리형 다중경로 라우팅 프로토콜)

  • Jung, Kwansoo;Yeom, Heegyun;Park, Hosung;Lee, Jeongcheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.911-923
    • /
    • 2013
  • Multipath routing is one of challenging issues for improving the reliability of end-to-end data delivery in wireless sensor networks. Recently, a disjointedness and management of path have been studying to enhance the robustness and efficiency of the multipath routing. However, previous multipath routing protocols exploit the disjointed multipath construction method that is not to consider the wireless communication environment. In addition, if a path failures is occurred due to the node or link failures in the irregular network environment, they maintain the multipath through the simple method that to construct a new extra path. Even some of them have no a method. In order to cope with the insufficiency of path management, a hole detouring scheme, to bypass the failures area and construct the new paths, was proposed. However, it also has the problem that requires a heavy cost and a delivery suspension to the some or all paths in the hole detouring process due to the centralized and inflexible path management. Due to these limitations and problems, the previous protocols may lead to the degradation of data delivery reliability and the long delay of emergency data delivery. Thus, we propose a flexible disjoint multipath routing protocol which constructs the radio disjoint multipath by considering irregular and constrained wireless sensor networks. It also exploits a localized management based on the path priority in order to efficiently maintain the flexible disjoint multipath. We perform the simulation to evaluate the performance of the proposed method.

LFH: Low-Cost and Fast Handoff Scheme in Proxy Mobile IPv6 Networks with Multicasting Support (프록시 모바일 IPv6 네트워크에서 멀티캐스팅을 지원하는 저비용의 빠른 이동성관리 기법)

  • Kim, Eunhwa;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.265-278
    • /
    • 2013
  • With the recent advancements in various wireless communication technologies, the importance of mobile multicasting is coming to the fore, in an effort to use network resources more efficiently. In the past, when various mobile IP-based multicast techniques were proposed, the focus was put on the costs needed for network delivery for providing multicast services, as well as on minimizing the multicast handover delay. For techniques using MIPv6 (Mobile IPv6), a host-based mobility management protocol, however, it is fundamentally difficult to resolve the problems of handover delay and tunnel convergence. To resolve these problems, a network-based mobility management protocol called PMIPv6 (Proxy Mobile IPv6) was standardized. Although performance is improved in PMIPv6 over MIPv6, it still suffers from the problems of handover delay and tunnel convergence. In this paper, to overcome these limitations, a technique called LFH (Low-cost and Fast Handoff) is proposed for fast and low-cost mobility management with multicasting support in PMIPv6 networks. To reduce the interactions between the complex multicast routing protocol and the multicast messages, a simplified proxy method called MLD (Multicast Listener Discovery) is implemented and modified. Furthermore, a TCR (Tunnel Combination and Reconstruction) algorithm was used in the multicast handover procedure within the LMA (Local Mobility Anchor) domain, as well as in the multicast handover procedure between domains, in order to overcome the problem of tunnel convergence. As a result, it was found that LFH has reduced multicast delay compared to other types of multicast techniques, and that it requires lower costs as well.

Performance Analysis of Fast Handover Scheme Based on Secure Smart Mobility in PMIPv6 Networks (프록시 모바일 IPv6 네트워크에서 안전한 스마트 이동성에 기반한 빠른 핸드오버 기법의 성능분석)

  • Yoon, KyoungWon;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.121-133
    • /
    • 2013
  • Defect-free transfer service on the Next-generation wireless network extensive roaming mobile node (MN) to provide efficient mobility management has become very important. MIPv6(Mobility IPv6) is one of mobility management scheme proposed by IETF(Internet Engineering Task Force), and IPv6-based mobility management techniques have been developed in various forms. One of each management techniques, IPv6-based mobility management techniques for PMIPv6 (MIPv6) system to improve the performance of a variety of F-PMIPv6 (Fast Handover for Proxy MIPv6) is proposed. However, the F-PMIPv6 is cannot be excellent than PMIPv6 in all scenarios. Therefor, to select a proper mobility management scheme between PMIPv6 and F-PMIPv6 becomes an interesting issue, for its potenrials in enhancing the capacity and scalability of the system. In this paper, we develop an analytical model to analyze the applicability of PMIPv6 and F-PMIPv6. Based on this model, we design an Secure Smart Mobility Support(SSM) scheme that selects the better alternative between PMIPv6 and F-PMIPv6 for a user according to its changing mobility and service characteristics. When F-PMIPv6 is adopted, SSM chooses the best mobility anchor point and regional size to optimize the system performance. Numerical results illustrate the impact of some key parameters on the applicability of PMIPv6 and F-PMIPv6. Finally, SSM has proven even better result than PMIPv6 and F-PMIPv6.

Risk Assessment Tools for Invasive Alien Species in Japan and Europe (일본과 유럽의 침입외래생물 생태계위해성평가 기법)

  • Kil, Jihyon;Mun, Saeromi;Kim, Chang-Gi
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.3
    • /
    • pp.191-197
    • /
    • 2015
  • Invasive alien species are considered to be one of the main factors that cause biodiversity loss. Establishment of management strategies through continuous monitoring and risk assessment is a key element for invasive alien species management policy. In the present study, we introduce examples of ecological risk assessment tools developed in Japan, Germany-Austria and Belgium. Invasive alien species have been designated in Japan based on the assessment of risks to ecosystems, human health and primary industry. German-Austrian Black List Information System categorized alien species into Black List, White List and Grey List according to their risks to biodiversity. In the Harmonia Information System developed in Belgium, invasiveness, adverse impacts on native species and ecosystem functions and invasion stages were assessed and alien species were categorized into Black List, Watch List and Alert List. These international risk assessment tools may be helpful to improve our national risk assessment protocol for the prioritization of invasive alien species management.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.