• Title/Summary/Keyword: Data Exchange Protocol

Search Result 237, Processing Time 0.029 seconds

Implementation and Design of WISD(Web Interface System based DICOM) for Efficient Sharing of Medical Information between Clinics (의료기관간 효과적인 의료정보 공유를 위한 WISD의 설계 및 구현)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.500-508
    • /
    • 2008
  • For efficient compatible system between medical clinics, the medical information has to be built on a standardized protocol such as a HL7 for text data and a DICOM for image data. But it is difficult to exchange information between medical clinics because the systems and softwares are different and also a structure of data and a type of code. Therefore we analyze a structure of DICOM file and design an integrated database for effective information sharing and exchange. The WISD system suggested in this paper separate the DICOM file transmitted by medical clinics to text data and image data and store it in the integrated DB(database) by standardized protocol respectively. It is very efficient that each medical clinic can search and exchange information by web browser using the suggested system. The WISD system can not only search and control of image data and patient information through integrated database and internet, but share medical information without extra charge like construction of new system.

Optimal Diversity-Multiplexing Tradeoff of MIMO Multi-way Relay Channel

  • Su, Yuping;Li, Ying
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.919-922
    • /
    • 2013
  • A MIMO multi-way relay channel with full data exchange in which K users exchange messages with each other via the help of a single relay is considered. For the case in which each link is quasi-static Rayleigh fading and the relay is full-duplex, the fundamental diversity-multiplexing tradeoff (DMT) is investigated, and we show that a compress-and-forward relay protocol can achieve the optimal DMT.

Development Method and Design of B-ISDN Protocol embedded IP-PBX System for Multimedia Communication (B-ISDN프로토콜 내장의 멀티미디어통신용 IP-PBX 시스템의 개발방법 및 설계)

  • Choi Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1700-1709
    • /
    • 2006
  • In this raper we researched on the development methods and design of the B-ISDN protocol embedded IP-PBX System with the computers interconnected by the Internet for the previous telephone exchange and communication. We designed the structure of the user terminal and exchange sewer of the IP-PBX System, defined message and data structure for call control, and designed call control state transition and call control message flows for user's communication. And we researched on the message flows for supplementary services and the call control for multiple calls.

Design of B-ISDN Protocol embedded Internet-Phone PBX System (B-ISDN 프로토콜 내장의 인터넷 폰 교환시스템 설계)

  • Choi Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.821-831
    • /
    • 2006
  • In this paper we researched on the development methods and design of the B-ISDN protocol embedded Internet-Phone PBX System for the previous telephone exchange and communication. We designed the structure of the user terminal md exchange server of the Internet-Phone PBX System, defined message and data structure for call control, and designed call control message flows between sender and receiver terminal for user's communication.

The measurement temperature and analysis used embedded system by internet explorer (인터넷 익스플로러를 통한 임베디드 시스템 기반의 온도 측정 및 분석)

  • 김희식;김영일;설대연;남철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.1003-1006
    • /
    • 2004
  • In this paper have developed a system for monitoring and processing the real time sensor data in remote site through network. For realizing this system, measurement equipment and protocol are used to transmit the measurement data to remote server and to process measurement data. In server part, the received data from remote site sensor is converted to text or graphic charts for user. The measurement device in sensor part receives the sensor data form sensor and store the received data to its internal memory for transmitting data to server part through Internet. Also the measurement device can receive data form server. The temperature sensor is connected to the measurement device located in laboratory and the measurement device measures temperature of laboratory which can be confirmed by user through Internet. We have developed a server programworking on the Linux to store measurement data from measurement device to server memory. The program is use for SNMP(Simple Network Management Protocol) to exchange data with measurement device. Also the program changes the measurement data into text and graphic charts for user display. The program is use apache PHP program for user display and inquiry. The real time temperature measurement system can be apply for many parts of industry and living.

  • PDF

Split Password-Based Authenticated Key Exchange (분할된 패스워드 기반 인증된 키교환 프로토콜)

  • 류종호;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.23-36
    • /
    • 2004
  • This paper presents a password based authentication and key exchange protocol which can be used for both authenticating users and exchanging session keys for a subsequent secure communication over an untrusted network. Our idea is to increase a randomness of the password verification data, i.e., we split the password, and then amplify the split passwords in the high entropy-structured password verification data. And in order to prevent the verifier-compromised attack, we construct our system such that the password verification data is encrypted with the verifier's key and the private key of verifier used to encrypt it is stored in a secure place like a smart cards. Also we propose the distributed password authentication scheme utilizing many authentication servers in order to prevent the server-compromised attack occurred when only one server is used. Furthermore, the security analysis on the proposed protocol has been presented as a conclusion.

Development of Integrated Product Information Model Using STEP (STEP 을 이용한 통합제품정보모델(IPIM) 개발)

  • Suh, Hyo-Won;Yoo, Sang-Bong
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.21 no.3
    • /
    • pp.441-461
    • /
    • 1995
  • This research proposes an Integrated Product Information Model (IPIM) using STEP (Standard for the Exchange of product model data) for Computer Integrated Manufacturing (CIM) of Concurrent Engineering (CE). IPIM is based on Geometry and Topology (STEP Part 42), Form Feature (STEP Part 48), and Tolerance (STEP Part 48) for representing the integrated information of mechanical parts. For the IPIM, 1) new entities are developed for integration of existing entities, and 2) the existing entities are restructured and modified for a special application protocol. In CIM or CE, the advantages of using IPIM having integrated form of geometry, feature and tolerance are 1) integration of product design, process design and manufacturing sequentially or concurrently. 2) keep the product data consistency, modified by different domain, and 3) automatic data exchange between different application software and different hardware. The prototype system is composed of CAD, Data Probe, DBMS and SDAI (Standard Data Access Interface), and the generated STEP data is stored in a step file of DBMS for other applications.

  • PDF

Healing of STEP AP214 Automotive CAD Data (STEP AP214 자동차 설계 데이터 정리 시스템)

  • 양정삼;한순흥
    • Korean Journal of Computational Design and Engineering
    • /
    • v.7 no.3
    • /
    • pp.170-176
    • /
    • 2002
  • To exchange CAD data between heterogeneous CAD systems, we generally use a neutral format especially STEP, which is the international standard (ISO-10303) for product model data exchange. AP214 (Application Protocol) for the automotive industry not only takes into account geometry and organizational data, but also provides a classification mechanism for product modeling. When reading a STEP file during a design process that is exported from other CAD systems, it is a burden to a designer to go through the tedious process of removing duplicate or non-manifold entities, adjusting parts, and rearranging text. We analyze the structure of AP214 and develop a healing tool to solve the following problem. Without the assembly information in the Master workspace of CATIA, or to read a STEP file from Pro/Engineer, a designer should do a repetitive process of disintegrating an assembly into parts one by one. We have developed a post-processing tool for STEP AP214 that separates out a part from an assembly model and adjusts superfluous or useless entities using the ACIS kernel.

A Spatio-Temporal Geocasting Protocol Using Regional Caching in Vehicular Ad-Hoc Networks (VANET 망에서 지역적 캐싱을 이용하는 시공간 지오캐스팅 프로토콜)

  • Lee, Hyunkyu;Shin, Yongje;Choi, Hyunsuk;Lee, Euisin;Park, Soochang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.137-144
    • /
    • 2018
  • Vehicular Ad-hoc Networks (VANETS) have enabled to provide a variety of applications such as accident notification, content usage, etc. These applications have spatio-temporal data which have an interesting region and a lifetime according to their properties. However, geocasting protocols to deliver data to an interesting region can provide data to all vehicles in the region through a single transmission only at the current time, but cannot provide data to vehicles passing through the region during the lifetime of the data. Thus, we propose a spatio-temporal geocasting protocol called STGP using a regional caching scheme to send data to vehicles in an interesting region during a data lifetime in VANETs. For efficient and reliable regional caching, the proposed protocol uses the beacon-based data sharing, the extra caching elimination, and the distance-based caching exchange. Simulation results verify that the proposed protocol achieves more reliable and efficient data delivery compared with the existing protocol.

A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks (군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구)

  • Shin, Minjeong;Kim, Sungun
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.