• Title/Summary/Keyword: Ajou protocol

Search Result 144, Processing Time 0.032 seconds

Analysis of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인항공기의 TM/TC 데이터 프로토콜 분석)

  • Hong, Su-woon;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.391-393
    • /
    • 2017
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. In this paper, we analyze the TM/TC data protocol of two types of military UAV systems currently under development and propose a more efficient TM/TC message design scheme in wireless communication(or datalink) environment. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

  • PDF

Safety and Feasibility of Thallium-201 Myocardial SPECT with Intravenous Infusion of Disodium Adenosine Triphosphate (ATP) in the Diagnosis of Coronary Artery disease (관상동맥 질환 진단에서 ATP부하 T1-201 심근 관류 SPECT의 안전성과 유용성)

  • Pai, Moon-Sun;Park, Chan-H.;Yoon, Seok-Nam;Kim, Won;Kim, Han-Soo
    • The Korean Journal of Nuclear Medicine
    • /
    • v.32 no.3
    • /
    • pp.250-258
    • /
    • 1998
  • Purpose: ATP (adenosine triphosphate) is a potent coronary vasodilator with a rapid onset of action and a very short half-life. Myocardial perfusion scintigraphy with intravenous ATP has not yet been sufficiently proven in the diagnosis, follow-up, and risk stratification of coronary artery disease. The purpose of this study was to evaluate the safety, feasibility and diagnostic accuracy of pharmacologic stress thallium-201 myocardial SPECT using an intra-venous ATP infusion in patients with suspected coronary artery disease. Materials and Methods: Thallium-201 myocardial SPECT in 319 patients with suspected coronary artery disease were performed after the infusion of ATP (0.08 mg/kg/min for 6 min). The adverse effects were carefully monitored. Coronary angiography was also performed within 3 weeks. Results: Although 76.5% of the patients had some adverse effects, they were transient, mild, and well tolerated. In all patients, the ATP infusion protocol was completed and only 2 patients required aminophylline. The adverse effects were dyspnea in 63%, headache in 31%, flushing in 21%, chest pain in 14% and abdominal discomfort in 5% of the patients. The sensitivity and specificity were 80% and 90% respectively. Conclusion: Thallium-201 myocardial SPECT after 6 min-infusion of ATP at a rate of 0.08 mg/kg/min is safe and has a diagnostic value in detecting coronary artery disease.

  • PDF

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Design of TM/TC data protocol of Military Unmanned Aerial Vehicles (군용 무인기의 TM/TC 데이터 프로토콜 설계)

  • Hong, Su-woon;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.506-512
    • /
    • 2018
  • Unmanned aerial vehicles(UAVs) operating in the military for various purposes are designed to transmit information collected according to the purpose to GCS(Ground Control System), and to transmit/receive the vehicle's operational control and status information using wireless communication(or datalink). Currently, the military UAV systems in operation in Korea use unique communication methods, protocols, and message structures for each system. Among these, the Division UAV is designed to transmit fixed size TM/TC data repeatedly and the Corps UAV is designed to transmit aperiodic TM/TC data to the variable length of the message-based. In this paper, we analyze the TM/TC data protocol of existing military UAV systems and present data protocol design method which is considered to be more efficient in wireless communication environment applied to equipment under development. And we will discuss issues to be considered for standardization of technology for ensuring interoperability with many UAVs or newly introduced UAV systems.

An Analysis of the Effect of Pressure Ramp Rate on the Major Parameters of the Standard Hydrogen Fueling Protocol (수소충전 시 압력상승률이 표준충전프로토콜 중요변수에 미치는 영향 해석)

  • Chae, Chungkeun;Kim, Yonggyu;Chae, Seungbeen
    • Journal of the Korean Institute of Gas
    • /
    • v.24 no.1
    • /
    • pp.23-32
    • /
    • 2020
  • It is not easy to fully fuel high pressure(70 MPa) hydrogen in a hydrogen vehicle tank quickly. This is because the temperature inside the tank rises rapidly due to heat caused by the Joule-Thomson effect, etc. So fueling protocols such as SAE J2601 in the U.S. and JPEC-S 0003 in Japan appeared. However, there is a problem with these protocols that a number assumption are introduced and the content is too complex and limited in scope. This study was conducted to develop a new protocol based on complete real-time communication. In this study, the hydrogen fueling simulation program were used to examine how the pressure ramp rate affects the temperature and pressure rise in the tank and the fueling flow rate. The results confirmed that the first parameter to be considered in determining the pressure ramp rate is the temperature of the tank.

Modeling and Simulation of LEACH Protocol to Analyze DEVS Kernel-models in Sensor Networks

  • Nam, Su Man;Kim, Hwa Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.97-103
    • /
    • 2020
  • Wireless sensor networks collect and analyze sensing data in a variety of environments without human intervention. The sensor network changes its lifetime depending on routing protocols initially installed. In addition, it is difficult to modify the routing path during operating the network because sensors must consume a lot of energy resource. It is important to measure the network performance through simulation before building the sensor network into the real field. This paper proposes a WSN model for a low-energy adaptive clustering hierarchy protocol using DEVS kernel models. The proposed model is implemented with the sub models (i.e. broadcast model and controlled model) of the kernel model. Experimental results indicate that the broadcast model based WSN model showed lower CPU resource usage and higher message delivery than the broadcast model.

Development of Sync Agent Protocol for Acquiring User Cognitive Media Info Based on Context Awareness in Wireless Sensor Networks (상황인지형 사용자 미디어 정보 추출을 위한 무선 센서네트워크 기반 동기화 에이전트 프로토콜 개발)

  • Park, Byoung-Ha;Lee, Sang-Won;Hong, In-Hwa;Lee, Sang-Won;Cho, We-Duke
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1137-1140
    • /
    • 2005
  • 유비쿼터스 미디어 공간에서의 상황인지 정보와 사용자 미디어 프로파일에 기반한 미디어 서비스를 위한 디바이스간 연동에 필요한 Sync. Agent 는 사용자 정보, 기호 정보등 디바이스간에 필요한 정보를 사용자의 개입 없이 자동으로 전송 및 수신되어 통신 환경이 이루어질 수 있도록 하는 센서 네트워크 기반의 양방향 소형 통신 모듈을 의미한다. Sync. Agent 프로토콜을 통해 유비쿼터스 미디어 단말과 미디어 서버간 상황인지 정보 융합형 미디어 프로파일 연동을 수행하고, 미디어 단말의 미디어 관련 정보를 미디어 서버에 전송하는 역할을 한다. 본 논문에서는 유비쿼터스 미디어 서비스를 위해 단말 간 자동생성 미디어 정보를 동기화 역할을 수행하는 저전력 무선 Ad-hoc 센서 네트워크 연동 양방향 동기화 프로토콜 설계 및 구현에 관해 논한다.

  • PDF

Messaging Service Interworking between IMS Network and IP-PBX (IMS망과 IP-PBX와의 메세징 서비스 연동)

  • Park, Jun-Seok;Lee, Yun-Jin;Kim, Young-Han;Cho, We-Duk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.468-469
    • /
    • 2012
  • 휴대전화의 보급에 따라 문자 서비스가 대중에 보급되었고, 인터넷의 발전에 따라 인터넷 전화기의 사용이 보편화되면서 이를 이용해서 문자를 주고 받을 수 있다. 사내에서도 비용을 절감하기 위해서 IP-PBX(Internet Protocol Private Branch Exchange) 장비를 이용해 IP폰으로 음성통화나 문자 서비스를 제공 받을 수 있다. 현재 IP-PBX 시스템 상에서 또는, IMS망끼리만 메시지를 주고 받을 수 있었지만 IP-PBX와 IMS망을 연동하는 방법은 없었다. 따라서 본 논문에서는 IMS망과 IP-PBX와 연동해서 메시징 서비스를 제공하는 방법에 대해 제안하였다.

RFID Security Authentication Protocol Using Hash Lock and Real Time (해쉬락과 실시간을 이용한 RFID보안 인증 프로토콜)

  • Bae, Woo-Sik;Lee, Won-Ho;Han, Kun-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.352-354
    • /
    • 2006
  • RFID 시스템에서 태그와 리더사이의 통신은 무선을 통해 이루어짐에 따라 보안상 많은 취약점이 존재하다. 본 논문에서는 여러 보안 문제 중 프라이버시 보호를 위한 기존 기법의 취약점을 보완하여 태그가 리더로부터 수신한 난수로부터 매 세션마다 실시간으로 새로운 해쉬 함수를 생성하는 인증 프로토콜을 제안한다. 제안된 해쉬 기반 인증 프로토콜은 스푸핑 공격, 재전송 공격, 트래픽 분석 및 위치 추적 등의 공격에 대해 안전하며 연산을 최소화하여 다양한 적용성을 제공한다.

  • PDF

Development of Kill Chain Based Effective Maritime Operations Model for Naval Task Forces (Kill Chain 기반 해상기동부대의 효과적인 해상작전 모델 제안)

  • Lee, Chul-Hwa;Jang, Dong-Mo;Lee, Tae-Gong;Lim, Jae-Sung
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.177-186
    • /
    • 2012
  • Navy establishes the Naval Task Forces (TF) for many kinds of maritime operations. Then the TF in the maritime environment performs simultaneous component operations such as ASUW (Anti-Surface Warfare), ASW (Anti-Submarine Warfare), AAW (Anti-Aircraft Warfare), and assault operations. The TF consists of many tactical systems for the completion of missions C4I, VOIP (Voice Over Internet Protocol), DMHS (Digital Massage Handling System), and TDLs (Tactical Data Links) such as LINK-11, 16, ISDL (Inter Site Data Link). When the TF executes naval operations to complete a mission, we are interested in the kill chain for the maritime operations in the TF. The kill chain is a standard procedure for the naval operations to crush enemy defenses. Although each ship has a procedure about a manual for 'how to fight', it leave something to be desired for the TF detailed kill chain currently. Therefore, in this paper, we propose the naval TF's kill chain to perform the naval operations. Then, the operational effectiveness of the TF in the kill chain environment is determined through operation scenarios of TDL system implementation. It is to see the operational information sharing effect to a data link model based on MND-AF OV 6c (statement of tracking operational status) in the maritime operations applied to TDL and is to identify improvements in information dissemination process. We made the kill chain of maritime TF for the effective naval operations.