• Title/Summary/Keyword: 이동성프로토콜

Search Result 1,191, Processing Time 0.037 seconds

A study on improvement of ISO/IEC 29157 MAC protocol (ISO/IEC 29157 표준 MAC 프로토콜 개선 연구)

  • Cha, Bong-Sang;Jeong, Eui-Hoon;Jeon, Gwangil;Seo, Dae-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.17-26
    • /
    • 2013
  • ISO/IEC 29157 originally developed in the Republic of Korea and is based on commercially available PicoCast v1.0. ISO/IEC JTC1 SC6 was registered by the international standard on May 2010. A single platform for a variety of applications and media formats to support development objectives were. ISO/IEC 29157 based wireless networks, ie, Pico-net to master node periodically transmit sync signal is synchronized to the number of slave nodes have the communications structure. Pico-net also supports a variety of network topologies and direct communication between nodes(single-hop communication) and QoS is guaranteed. But Pico-net network structure has the following problems. Loss of communication problems due to mobile nodes, resulting in limitations of node mobility and wireless network operation range of conventional wireless networks operating range less than 1/4 was reduced to the problem. In this paper, a possible solution to the problems mentioned is proposed, using multi-hop communication technology and sync signal transmission technology between nodes.

Development of Experimental System for Green Roof System (옥상녹화 효율성 검증실험장비 개발)

  • Park, JaeRock;Kim, SaeBom;Cheon, JongHyeon;Kim, ByungSung;Shin, HyunSuk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.495-495
    • /
    • 2017
  • 도시화는 불투수면의 증가를 야기 시켜 물순환 왜곡, 다양한 오염 물질의 유입으로 인한 비점오염물질 유출, 인공 배출열의 증가로 인한 도시열섬효과 등 다양한 문제를 유발한다. 이러한 수리수문학적 및 환경생태학적 문제를 저감하기 위하여 도시지역과 같은 개발 사업에서는 수환경을 가능한 자연 상태로 복원하는 저영향개발(Low Impact Development, LID)기법이 중요한 대안으로 제시되고 있다. LID기법 중 하나인 옥상녹화는 에너지 이용을 최소한으로 한 자연 녹음의 효과적인 이용을 도모하여 환경공생도시 조성과 식물을 매개로한 자연 순환 과정을 도시구조에 도입하여 순환 시스템 재생이 가능 하도록한다. 노지녹화는 두꺼운 자연 토양을 이용하는 반면 옥상녹화는 적재하중의 제약(옥상의 적재하중 조건은 $150{\sim}180kgf/m^2$이다. 비중이 1.6~1.8인 토양을 20cm 객토한 경우, 약 $320kgf/m^2 $이상의 적재하중이 되기에 식재기반의 경량화는 중요한 사안이다.)으로 인해 용적밀도가 작은 인공경량토양 또는 개량토양을 이용하며, 토양 두께도 얇게 설정된다. 또한 토양의 두께는 식물의 크기와 종류 및 토양의 조성에 따라 다르기에 적재하중 조건을 고려한 적절한 토양과 식재 식물의 크기와 종류 결정은 중요하다. 이에 본 연구에서는 옥상녹화식생에 대한 평가와 이에 대한 시험 프로세스가 가능한 실험 장치를 개발하였다. 옥상녹화 효율성 검증실험장비는 1m*1m*0.6m 아크릴 재질의 녹화셀로 경사조절이 가능하도록 설계하여 경사변화에 따른 유출, 침투, 증발산량의 탄성도 모의 평가를 할 수 있다. 또한 4점식 형태의 로드셀을 이용하여 녹화셀에서 발생하는 증발산량을 측정하고 관측된 증발산량은 RS-232c 이상의 통신프로토콜을 사용하여 주기적인 관측치의 송수신이 가능하며 주기적 자료송수신 외에도 옥상 녹화셀의 측면에 하중 표시기를 설치하여 관측이 가능하다. 또한 저면에 바퀴설치를 통하여 이동 실험이 용이하며 현재 부산대학교 양산캠퍼스 한국 GI&LID 실증단지 연구센터 내 옥상녹화 실험장에 옥상녹화 효율성 검증 실험 장비를 설치하여 자연 혹은 인공강우를 통한 유출, 침투, 증발산량의 시험계측을 실시중이다. 이러한 옥상녹화 효율성 검증실험장비는 최대 하중 2,000kg, 측정해상도 0.02kg 이상을 허용하는 로드셀과 녹화셀을 이용하여 하중을 고려한 식생의 종류에 따른 평가가 가능하므로 최적 식재기반 단면구조 개발에 이용될 수 있을 것이다. 또한 토양 함수량 변화 측정으로 옥상녹화에 이용되는 다양한 종류의 식물의 염분에 대한 저항성과 식물의 성장능력을 평가하여 녹화공간에 따른 옥상녹화에 사용할 식생을 결정할 수 있다.

  • PDF

Verifiable Could-Based Personal Health Record with Recovery Functionality Using Zero-Knowledge Proof (영지식 증명을 활용한 복원 기능을 가진 검증 가능한 클라우드 기반의 개인 건강기록)

  • Kim, Hunki;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.999-1012
    • /
    • 2020
  • As the utilize of personal health records increases in recent years, research on cryptographic protocol for protecting personal information of personal health records has been actively conducted. Currently, personal health records are commonly encrypted and outsourced to the cloud. However, this method is limited in verifying the integrity of personal health records, and there is a problem with poor data availability because it is essential to use it in decryption. To solve this problem, this paper proposes a verifiable cloud-based personal health record management scheme using Redactable signature scheme and zero-knowledge proof. Verifiable cloud-based personal health record management scheme can be used to verify the integrity of the original document while preserving privacy by deleting sensitive information by using Redactable signature scheme, and to verify that the redacted document has not been deleted or modified except for the deleted part of the original document by using the zero-knowledge proof. In addition, it is designed to increase the availability of data than the existing management schemes by designing to recover deleted parts only when necessary through the Redact Recovery Authority. And we propose a verifiable cloud-based personal health record management model using the proposed scheme, and analysed its efficiency by implementing the proposed scheme.

The Study on Usefulness of LEAP Collimator in Lung Ventilation SPECT (Lung Ventilation SPECT에서 LEAP Collimator의 유용성에 관한 연구)

  • Kim, Jung Soo;Kim, Soo Mee;Kim, Jin Eui;Lee, Jae Sung;Lee, Dong Soo
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.16 no.2
    • /
    • pp.18-24
    • /
    • 2012
  • Purpose : Although lung ventilation SPECT (LV-SPECT) has a good sensitivity in detection of deep lung lesions, it is difficult to apply the LV-SPECT to patients having breathing problems due to limited examination time. In this study, we evaluated the usefulness of LEAP collimator, which provides high detection sensitivity and tolerable resolution, for the LV-SPECT in terms of diagnostic accuracy and examination time. Materials and Methods : Four volunteers inhaled Technegas (370 MBq) and the lung ventilation planar scan (LVPS, 300 counts/view (cpv)) with LEHR collimator was performed using Siemens E.cam scanner as a reference test. LV-SPECT scans were performed with three collimators, LEHR, LEUHR, and LEAP, in low (7 kcpv) and high (70 kcpv) counting modes. The count ratios of left (LT) and right (RT) lung segments were calculated on the geometric mean view of anterior and posterior images for LVPS and on the summed coronal images of LV-SPECT, respectively. Comparing to LVPS, the usefulness of three different collimators for LV-SPECT was evaluated through statistical analysis (paired t-test), on count ratios of lung segments. Results : The average LT:RT ratio in LVPS was 47:53. For LV-SPECT, there were negligible difference of the LT:RT ratios (48:52 on average) among three different collimators in low and high counting modes. Comparing to standard LVPS with LEHR, all LV-SPECTs with different collimators resulted in similar diagnostic accuracy through paired t-test (p>0.05). The scan time in LVPS (6 views) was 17.3 min. For LV-SPECT (128 views) in low counting mode, it took 18.7 (LEUHR), 15.0 (LEHR), and 12.3 min (LEAP), respectively. Conclusion : Comparing to standard LVPS, the LV-SPECT with LEAP in low counting mode provided the comparable diagnostic accuracy in addition to shortened scan time.

  • PDF

Comparison and Analysis of Name-Based Routing Protocols for Information-Centric Network (정보 중심 네트워크를 위한 이름 기반 라우팅 프로토콜의 비교 및 분석)

  • Kim, Jung-Jae;Ryu, Min-Woo;Cha, Si-Ho;Cho, Kuk-Huyn
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1969-1975
    • /
    • 2013
  • ICN (Information-Centric Network) is a next generation Internet communication technology for converting existing Internet communication paradigm to information-based communication paradigm to efficiently use a large amount of information that exists on the Internet. Therefore, unlike existing Internet communication technologies focused on the process of communication using the host address, ICN focuses on the purpose of communication for each information by defining the information of everything that exists on the Internet. For this purpose, ICN uses NbR (Name-based Routing) methods that assign a name to each piece of information, all routers participating in ICN have the physical storage so that they are able to share information with each other. NbR methods on ICN are divided into one-phase routing and two-phase routing depending on how to reach at the storage of each router. However, currently proposed NbR methods cause many problems because they do not reflect the unique characteristics of ICN. Therefore, this paper looked at various NbR issues from caching, access time, distribution, mobility, scaliability, and dissemination of information for an efficient NbR method, and analyzed existing methods proposed for ICN. This paper also proposed a research direction to study the efficient NbR for ICN based on the analysis information.

Research in information & communication technology for water in the four major rivers restoration project (4대강 사업에서 수자원 정보통신기술 발전방향연구)

  • Seo, Gang-Do;Jang, Sang-Bok;Lee, Dong-Hoon;Hwang, Jae-moon;Park, Byung-Don
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.184-187
    • /
    • 2013
  • The Four Major Rivers Restoration Project of is the multi-purpose green growth project in South Korea. Some of the project was progressed by K-water and was declared complete on October 21, 2011. The Four Rivers Restoration Project of Korea was designed to be a packaged project that aims to resolve water-related problems such as floods and droughts and revitalize Korean public spaces near the water. K-water have applied the latest ICT(Information and Communication Technology) for the operating management of 4 Rivers Project facilities. We also have applied ICT for integrating drinking water production facilities. Applying these ICT, we have many experience for integrated water resources management, so we proposed. The first is that the big data collected should be analyzed for making decisions and taking actions while considering multiple viewpoints of how water should be managed. The second is that the new MMI(Man Machine Interface) program should be developed to use domestic needs and promote ease of maintenance for the integrated operation. The third is that the standardization of communication protocol is needed for seamless communication between equipments.

  • PDF

Evaluation of Usability Both Oblique Verification for Inserted Fiducial Marker of Prostate Cancer Patients (Fiducial Marker가 삽입된 전립선암 환자를 대상으로 한 양사방향 촬영의 유용성 평가)

  • Kim, Koon Joo;Lee, Jung Jin;Kim, Sung Gi;Lim, Hyun Sil;Kim, Wan Sun;Kang, Su Man
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.25 no.2
    • /
    • pp.123-129
    • /
    • 2013
  • Purpose: The way check the movement of the fiducial marker insertion in the treatment of patients with prostate cancer. However the existing methods of fiducial marker verification process difficult to identify the specific location of the marker behind the femur and pelvic bone. So to study the evaluation of maker match with using kilo voltage (KV) X-ray by On-board imager to both oblique verification method. Materials and Methods: Five patients were selected for rectal ballooning and inserted fiducial marker. Compare the position of the fiducial marker of reference plan 2D/2D Anterior/Posterior verification method and 2D/2D both oblique verification method. So to measurement the shift score of X, Y, Z (axis) and measure exposure dose given to patients and compare matching time. Results: 2 dimensional OBI KV X-ray imaging using two-dimensional matching image are orthogonal, so locating fiducial marker matching clear and useful DRR (digital reconstruction radiography) OBI souce angle ($45^{\circ}/315^{\circ}$) matching most useful. 2D/2D both oblique verification method was able to see clearly marker behind the pelvic bone. Also matching time can be reduced accordingly. According to the method of each matching results for each patient in each treatment fraction, X, Y, and Z axis the Mean $value{\pm}SD$ (standard deviation) is X axis (AP/LAT: $0.4{\pm}1.67$, OBLIQUE: $0.4{\pm}1.82$) mm, Y axis (AP/LAT: $0.7{\pm}1.73$, OBLIQUE: $0.2{\pm}1.77$) mm, Z axis (AP/LAT: $0.8{\pm}1.94$, OBLIQUE:$1.5{\pm}2.8$) mm. In addition, the KV X-ray source dose radiation exposure given to the patient taking average when AP/LAT matching is (0.1/2.1) cGY, when $315^{\circ}/45^{\circ}$ matching is (0.27/0.26) cGY. Conclusion: In conclusion for inserted fiducial marker of prostate cancer patients 2D/2D both oblique matching method is more accurate verification than 2D/2D AP/LAT matching method. Also the matching time less than the 2D/2D AP/LAT matching method. Taken as the amount of radiation exposure to patients less than was possible. Suggest would improve the treatment quality of care patients more useful to establish a protocol such as case.

  • PDF

The Effect of Wireless Channel Models on the Performance of Sensor Networks (채널 모델링 방법에 따른 센서 네트워크 성능 변화)

  • 안종석;한상섭;김지훈
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.375-383
    • /
    • 2004
  • As wireless mobile networks have been widely adopted due to their convenience for deployment, the research for improving their performance has been actively conducted. Since their throughput is restrained by the packet corruption rate not by congestion as in wired networks, however, network simulations for performance evaluation need to select the appropriate wireless channel model representing the behavior of propagation errors for the evaluated channel. The selection of the right model should depend on various factors such as the adopted frequency band, the level of signal power, the existence of obstacles against signal propagation, the sensitivity of protocols to bit errors, and etc. This paper analyzes 10-day bit traces collected from real sensor channels exhibiting the high bit error rate to determine a suitable sensor channel model. For selection, it also evaluates the performance of two error recovery algorithms such as a link layer FEC algorithm and three TCPs (Tahoe, Reno, and Vegas) over several channel models. The comparison analysis shows that CM(Chaotic Map) model predicts 3-time less BER variance and 10-time larger PER(Packet Error Rate) than traces while these differences between the other models and traces are larger than 10-time. The simulation experiments, furthermore, prove that CM model evaluates the performance of these algorithms over sensor channels with the precision at least 10-time more accurate than any other models.

Shared Tree-based Multicast RP Re-Selection Scheme in High-Speed Internet Wide Area Network (고속 인터넷 환경에서 공유 트리 기반 멀티캐스트 RP 재선정 기법)

  • 이동림;윤찬현
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.60-67
    • /
    • 2001
  • Multicast Protocol for multimedia service on the Internet can be classified into two types, e.g., source based tree and shared tree according to difference of tree construction method. Shared tree based multicast is known to show outstanding results in the aspect of scalability than source based tree. Generally, There have been lots of researches on the method to satisfy QoS constraints through proper Rendezvous Point (RP) in the shared tree. In addition, as the multicast group members join and leave dynamically in the service time, RP of the shared tree should b be reselected for guranteeing Qos to new member, But, RP reselection method has not been considered generally as the solution to satisfy QoS C constraints. In this paper, new initial RP selection and RP reselection method are proposed, which utilize RTCP (Real Time Control Protocol) report packet fields. Proposed initial RP selection and RP reselection method use RTCP protocol which underlying multimedia application service So, the proposed method does not need any special process for collecting network information to calculate RP. New initial RP selection method s shows better performance than random and topology based one by 40-50% in simulation. Also, RP reselection method improves delay p performance by 50% after initial RP selection according to the member’s dynamicity.

  • PDF

An Implementation Method of HB-Family Light-weight Authentication for Device Authentication between ECU (ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법)

  • Kim, Tae Su;Kim, Hyoseung;Woo, Samuel;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.593-607
    • /
    • 2013
  • The In-Vehicle-Networking(IVN) of modern cars is constituted by an small electronic control device called ECU. In the past, there was no way to be able to access the IVN of a driving car. so IVN has been recognized as a closed environment so there is no need to exist authentication protocol between devices which are to configure the internal network and to communicate with other devices. However, constant improvements made it possible to access the IVN in many different ways as the communication technology evolves. This possibility created a need for device authentication in IVN. HB-Family are representative authentication schemes in RFID environment which has similar restrictions to IVN. In this paper, we propose an implementation method of HB-Family for device authentication between ECU considering ECU has low computing power and the message field of CAN protocol has restricted size of 8 bytes. In order to evaluate the efficiency and availability of the authentication schemes adopted our method, we have evaluated the performance based on DSP-28335 device. Further, it was possible to improve the efficiency rate of at lest 10%, up to 36%, and we then analyze this result in various aspects of the IVN.