• Title/Summary/Keyword: Manager Protocol

Search Result 158, Processing Time 0.027 seconds

The DEVS-based Detailed Implementation Method of the Command and Fire Control System for the Underwater Vehicle DEVS-HLA Simulation in the Engagement Level (교전급 수중운동체 DEVS-HLA 시뮬레이션을 위한 전술통제체계의 DEVS 기반 상세 구현 방법)

  • Son, Myeong-Jo;Cha, Ju-Hwan;Kim, Tae-Wan;Lee, Kyu-Yeul;Nah, Young-In
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.47 no.4
    • /
    • pp.628-645
    • /
    • 2010
  • To perform the engagement level simulation between the underwater vehicle model and the surface model those are constituted with various systems/ sub-systems, we implemented four different federates as a federation according to the IEEE 1516 HLA (High Level Architecture) protocol that is the international standard in the distributed simulation. Those are CFCS (Command and Fire Control System) federate, motion federate, external entities (torpedos, countermeasure and surfaceship) federate, and visualization federate that interacts with OSG (Open Scene Graph)-based visualization rendering module. In this paper, we present the detailed method about the model constitution for discrete event simulation in the distributed environment. For the sake of this purpose, we introduce the DEVS (Discrete Event System Specification)-HLA-based modeling method of the CFCS federate that reflects not only the interations between models, but also commands from user and tactics manager that is separated from the model. The CFCS federate makes decisions in various missions such as the normal diving, the barrier misision, the target motion analysis, the torpedo launch, and the torpedo evasion. In the perspective of DEVS modeling, the CFCS federate is the coupled model that has the tactical data process model, command model and fire control model as an atomic model. The message passing and time synchronization with other three federates are settled by the $m\ddot{a}k$ RTI (Runtime Infrastructure) that supports IEEE 1516. In this paper, we provides the detailed modeling method of the complicated model that has hierarchical relationship such as the CFCS system in the submarine and that satisfies both of DEVS modeling method for the discrete event simulation and HLA modeling method for the distributed simulation.

Comparative Study for Basic Protocol of High Dose Ablation Therapy (고용량 방사성옥소 치료의 기본 Protocol 비교)

  • Moon, Jae-Seung;Jeong, Hee-Il;Lee, Chi-Young
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.12 no.3
    • /
    • pp.147-156
    • /
    • 2008
  • Purpose: All acts which are enforced from the radioactive iodine therapeutic team is a in its own way principle and provision. Therefore unification of all acts can not be appropriately. We will make the standard coherence. Materials & Methods: From 5 November, 2007 to 17 November 2007, we conducted a questionnaire survey of the nuclear medicine manager of 30 hospitals. The contents of a questionnaire is medical treatment section, patient management, prosecuting attorney section, waste management and safety supervision in about the patient and a questionnaire was drawn up in the method which selects an item. Results: 30 hospital agencies are operating purely for I-131 high dose ablation therapy. Diagnostic study and daily schedule had the difference of some. The most of education for the patients took charge of doctor and nurse. The satisfaction of education was evaluated as the high thing. The safety supervision of waste management accomplishment and Safety supervision the patient and the worker observed on the basis of atomic energy law. Conclusion: Specific standards with sufficient amount of information and practical contents should have been presented through the following data. However, it seems to be lacking in many aspects. Nevertheless, respondents rated 70.9%, which is relatively high, on the value of clinical utilization, and I am very thankful for the evaluation. For many years from now, it may seem necessary for a lot of research on the specific matters based on these data to be conducted.

  • PDF

A Study on the Changes in the Back Garden of Gyeongbokgung Palace during Cheongwadae Period through an Interview with Landscape Manager (조경 관리자 인터뷰를 통한 청와대 시기 경복궁 후원의 변화에 관한 연구)

  • Kim, Kyu-Yeon;Lee, Shi-Young;Choi, Jaehyuck;Choi, Jong-Hee
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.41 no.2
    • /
    • pp.26-34
    • /
    • 2023
  • This study conducted interviews with former and current managers of Cheongwadae landscape architecture to provide basic information necessary to preserve, manage, and utilize Gyeongbokgung Palace's back garden, and the main conclusions summarized are as follows. First, the topography changed a lot with the construction of the main building and the official residence under President Roh Tae-woo. The water system was connected to Gyeongbokgung Palace in the past, but is now disconnected. Second, in the case of planting, the most important principles were the president's security and protocol, and accordingly, trees were placed or managed. Trees were planted by introducing excellent trees in various regions, and wildflowers and ground cover plants were frequently replaced according to the season. Third, facilities and roads were arranged for the president's protocol, hobbies, and workers' rest, and fire-fighting facilities were installed to prevent disaster in the forest area of Baegaksan Mountain. Fourth, the biggest inflection point of Gyeongbokgung Palace's back garden during Cheongwadae period was the change in topography due to the new construction of the main building and official residence during President Roh Tae-woo, the removal of A and B barbed wire fences that separated space during President Roh Moo-hyun, and the extensive landscaping carried out for the G20 Summit under President Lee Myung-bak. The area of Gyeongbokgung Palace's back garden is expected to face another inflection point due to the opening of Cheongwadae on May 10, 2022, and the work of evaluating the historical, academic, and landscape values of Gyeongbokgung Palace's back garden should be carried out while preserving the status.

Efficacy and Safety of Combination Treatment of Traditional Korean Medicine after Gastric Cancer Surgery: A Systematic Review and Meta-analysis Protocol (위암 수술 후 항암치료를 병행한 한의치료의 유효성 및 안전성: 체계적 문헌고찰 및 메타분석 프로토콜)

  • Jong-hee Kim;Eunbin Kwag;So-jung Park;Donghyun Kim;Soodam Kim;Jihye Park;Hwa-seung Yoo
    • Herbal Formula Science
    • /
    • v.31 no.4
    • /
    • pp.361-371
    • /
    • 2023
  • Objectives : Gastric cancer is a malignant tumor of the digestive tract that not only has a high mortality rate, but also affects quality of life. In Traditional Korean Medicine, acupuncture and herbal medicines can increase the survival rate for Gastric cancer and improve the quality of life. Traditional Korean Medicine treatment played an important role when used alone or in combination with chemotherapy. However, there is still insufficient evidence to support the efficacy and safety of Traditional Korean Medicine in patients undergoing chemotherapy after surgery. Therefore, the purpose of this study is to systematically evaluate the effect of oriental medicine treatment on patients as a complementary therapy for Gastric cancer. Methods : 2 researchers will search using EMBASE, Pubmed, CNKI, Cochrane Library, CiNii, KMBASE, KISS, OASIS, RISS, ScienceON. The search period of the database is from inception until June 2022. This study will include a randomized controlled trial of GC for acupuncture and herbal treatment. Primary outcomes include anti-cancer effects. Secondary outcomes evaluate survival rates and improvements in quality of life. The data uses Review Manager Software 5.4. Results : This study will provide a systematic evaluation by synthesizing the anti-cancer effect, survival rate and quality of life of Gastric cancer when Traditional Korean Medicine is combined with chemotherapy. Conclusion : The conclusion of this study will provide a basis for determining whether Traditional Korean Medicine treatment for Gastric cancer treatment is an effective and safe treatment method in clinical practice.

Pharmacoacupuncture for the Treatment of Frozen Shoulder: protocol for a systematic review and meta-analysis

  • Ji-Ho Lee;Hyeon-Sun Park;Sang-Hyeon Park;Dong-Ho Keum;Seo-Hyun Park
    • Journal of Pharmacopuncture
    • /
    • v.27 no.1
    • /
    • pp.14-20
    • /
    • 2024
  • Objectives: Frozen shoulder (FS) is one of the most challenging shoulder disorders for patients and clinicians. Its symptoms mainly include any combination of stiffness, nocturnal pain, and limitation of active and passive glenohumeral joint movement. Conventional treatment options for FS are physical therapy, nonsteroidal anti-inflammatory drugs, injection therapy, and arthroscopic capsular release, but adverse and limited effects continue to present problems. As a result, pharmacoacupuncture (PA) is getting attention as an alternative therapy for patients with FS. PA is a new form of acupuncture treatment in traditional Korean medicine (TKM) that is mainly used for musculoskeletal diseases. It has similarity and specificity compared to corticosteroid injection and hydrodilatation, making it a potential alternative injection therapy for FS. However, no systematic reviews investigating the utilization of PA for FS have been published. Therefore, this review aims to standardize the clinical use of PA for FS and validate its therapeutic effect. Methods: The protocol was registered in Prospero (CRD42023445708) on 18 July 2023. Until Aug. 31, 2023, seven electronic databases will be searched for randomized controlled trials of PA for FS. Authors will be contacted, and manual searches will also be performed. Two reviewers will independently screen and collect data from retrieved articles according to predefined criteria. The primary outcome will be pain intensity, and secondary outcomes will be effective rate, Constant-Murley Score, Shoulder Pain and Disability Index, range of motion, quality of life, and adverse events. Bias and quality of the included trials will be assessed using the Cochrane handbook's risk-of-bias tool for randomized trials. Meta analyses will be conducted using Review Manager V.5.3 software. GRADE will be used to evaluate the level of evidence for each outcome. Results: This systematic review and meta-analysis will be conducted following PRISMA statement. The results will be published in a peer-reviewed journal. Conclusion: This review will provide scientific evidence to support health insurance policy as well as the standardization of PA in clinical practice.

A Remote SNMP Connection Request Mechanism for NATed Devices using UDP Hole Punching and Heuristic Hole Binding Time Search (UDP 홀 펀칭과 경험적 홀 유지시간 탐색을 이용한 NAT 환경단말의 SNMP 원격 접속요청 메커니즘)

  • Park, Choon-Gul;Kim, Seong-Il;Jeong, Ki-Tae;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.367-373
    • /
    • 2008
  • Recently, the NAT middlebox widely deployed in the home network environment prohibits DM operations from reaching user devices behind NAT. In this article, we focus on NAT issues to manage home network devices. Particularly, we discuss standardization efforts, and present our proposal to deploy DM services for VoIP and IPTV devices under NAT. By slightly changing behaviors of Simple Network Management Protocol (SNMP) Manager and Agent, and defining additional Management Objects (MOs) to gather NAT binding information, we could solve the NAT traversal problem under symmetric NAT. Moreover, we propose an enhanced method to search the UDP hole binding time of the NAT box. We applied our method to randomly selected 22 VoIP devices out of 194 NATed hosts in the real broadband network and have achieved 99% of the success ratio for exchanging SNMP request messages and 26% of enhancement for searching the UDP hole binding time.

Controlled Bandwidth Borrowing with Extended RSVP-TE to Maximize Bandwidth Utilization

  • Kim Chul;Kim Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.64-72
    • /
    • 2004
  • Multiprotocol Label Switching (MPLS) has been developed as a key technology to enhance the reliability, manageability and overall quality of service of core If networks with connection-oriented tunnel LSP and traffic engineering such as constraint-based routing, explicit routing, and restoration. In this paper, we propose a control bandwidth borrowing scheme that maximizes the utilization of tunnel LSPs or physical links by an extension to the RSVP-TE label distribution protocol. MPLS-based core switching network and VPN services rely on the establishment of connection-oriented tunneled LSPs that are configured or predefined by network management systems. The mechanism of network management system varies from (i) a relatively static LSP establishment accounting, to (ii) a dynamic QoS routing mechanisms. With the use of hierarchical LSPs, the extra bandwidth that is unused by the trunk (outer) LSPs should be fully allocated to their constituent end-to-end user traffic (inner) LSPs in order to maximize their utilization. In order to find out the unused extra bandwidth in tunnel LSP or physical link and redistribute these resources to constituent LSPs, we expend the functionality of RSVP-TE and the found unused extra bandwidth is redistributed with a weight-based recursive redistribution scheme. By the extended RSVP-TE and proposed recursive redistributed scheme, we could achieve the instantaneous maximized utilization of tunnel LSP or physical link suffering from the potential under-utilization problem and guarantee the end-to-end QoS requirements. With the proposed scheme, network manager can manage more effectively the extra available bandwidth of hierarchical LSPs and maximize the instantaneous utilization of the tunneled LSP resources.

Design of an In-vehicle Intelligent Information System for Remote Management (차량 원격 진단 및 관리를 위한 차량 지능 정보시스템의 설계)

  • Kim, Tae-Hwan;Lee, Seung-Il;Lee, Yong-Doo;Hong, Won-Kee
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1023-1026
    • /
    • 2005
  • In the ubiquitous computing environment, an intelligent vehicle is defined as a sensor node with a capability of intelligence and communication in a wire and wireless network space. To make it real, a lot of problems should be addressed in the aspect of vehicle mobility, in-vehicle communication, common service platform and the connection of heterogeneous networks to provide a driver with several intelligent information services beyond the time and space. In this paper, we present an intelligent information system for managing in-vehicle sensor network and a vehicle gateway for connecting the external networks. The in-vehicle sensor network connected with several sensor nodes is used to collect sensor data and control the vehicle based on CAN protocol. Each sensor node is equipped with a reusable modular node architecture, which contains a common CAN stack, a message manager and an event handler. The vehicle gateway makes vehicle control and diagnosis from a remote host possible by connecting the in-vehicle sensor network with an external network. Specifically, it gives an access to the external mobile communication network such as CDMA. Some experiments was made to find out how long it takes to communicate between a vehicle's intelligent information system and an external server in the various environment. The results show that the average response time amounts to 776ms at fixed place, 707ms at rural area and 910ms at urban area.

  • PDF

The Development of Tactical Training Evaluation System using WMN (WMN 기반 전술훈련 평가시스템(TTES) 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.191-196
    • /
    • 2012
  • The tactical training system that was applied to wire at open terrain and field is no training accomplishment in conformity with battlefield situation portrayal. Therefore, this paper developed the tactical training and evaluation system for growing fruitfully that is installed as a tactical training monitoring system by USN WMN through controlled sensing interlock for collecting sensing data and guaranteed training equipment status and report training result for serviceability of manager. additionally we implemented controller for managing server of sending and manipulating of being gathered training data by sensor using USN and system as GUI methods. This system is easy for adapting new and improved protocol in order to processing many function of H/W and algorithms which is generated by controlled system is applicable easily.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.