• Title/Summary/Keyword: Protocol-Based Approach

Search Result 435, Processing Time 0.034 seconds

Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information (방송프로그램 보호신호에 기반한 지상파 방송프로그램 보호 시스템)

  • Choo, Hyon-Gon;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.192-204
    • /
    • 2010
  • As illegal distribution of the terrestial DTV broadcast program occurs very frequently in on-line, the needs to protect broadcast program have increased. In this paper, a new approach to implement a system for terrestial DTV broadcast program protection based on program protection information(PPI) is proposed. In our approach, the broadcast program is recorded with encryption according to redistribution condition of the PPI and packaged into a file with key information and PPI together. And we also define a set of domain protocol for supporting user fair-use of broadcast program. In the proposed system, copy control can also be provided by process of home domain management. Implementation results show that our system can protect broadcast programs with efficiency and can support conditional distribution within home domain in order to satisfy user fair-use.

The Effect of Trauma Team Approach on the Management of Hemodynamically Unstable Pelvic Bone Fracture: Retrospective Comparative study

  • Cho, Won-Tae;Cho, Jae-Woo;Kim, Jinil;Kim, Jin-Kak;Oh, Jong-Keon;Kim, Hak Jun;Kim, Namryeol;Cho, Jun-Min
    • Journal of Trauma and Injury
    • /
    • v.29 no.4
    • /
    • pp.139-145
    • /
    • 2016
  • Purpose: The major pelvic trauma results in high mortality with associated fatal other injuries. During early stage of resuscitation, multidisciplinary approach is essential to improve the survival and outcomes. This study aims to report the effect and positive outcome of the trauma team approach on the management of hemodynamically unstable pelvic bone fracture. Methods: This retrospective review included all patients with hemodynamically unstable pelvic bone fracture admitted between March 2007 and December 2015. Patients were divided into group A, which comprised those admitted before the trauma team approach was started, and group B, which comprised those admitted after the approach was started. The advanced trauma life support protocol was followed for all patient. The comparisons between the two groups were based on medical records. Study variables included demographics, initial vital sign, injury severity score, fracture type, and injury mechanism. We analyzed the outcomes in each group with respect to the time interval for doctors' arrival, total length of stay in the emergency department (ED), time interval for computed tomography evaluation, 24-hour mortality, time interval for definitive fixation, and definitive fixation in the time-window of opportunity. Results: Fifty-three patients met the inclusion criteria. No statistically significant differences in demographic data existed between the two groups. The time interval for doctors' arrival (min, $63.09{\pm}50.48$ vs $21.48{\pm}17.75$; p=0.038) and total length of stay in the ED (min, $269.33{\pm}105.96$ vs $115.49{\pm}56.24$; p=0.023) were significantly improved. The 24-hour mortality was not significantly different between the two groups.(%, 14.3 vs 12.0; p=1.000) However, the time interval for definitive fixation and definitive fixation in the time-window of opportunity showed better results. Conclusion: The trauma team approach has positive effects, which include initial resuscitation through multidisciplinary approach and shortening the time interval to definitive fixation, on the management of hemodynamically unstable pelvic bone fracture.

NetFPGA based capsulator Implementation and its performance evaluation for Future Internet OpenFlow Testbed (미래인터넷 OpenFlow 테스트베드 구축을 위한 NetFPGA기반 캡슐레이터 구현 및 성능평가)

  • Choi, Yun-Chul;Min, Seok-Hong;Kim, Byung-Chul;Lee, Jae-Yong;Kim, Dae-Young
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.7
    • /
    • pp.118-127
    • /
    • 2010
  • Current TCP/IP-based Internet architecture has been used for over 30 years, however it will confront with fundamental problems due to new protocol extension limitation since communication environments will change drastically and various user requirements will be emerging in near future. To solve these problems, major countries have started Future Internet researches based on clean slate approach and they will deploy large-scale testbed to experiment and verify new functions. OpenFlow switch technology has been proposed as a new experimental technology for independent protocol that can utilized the legacy network devices and does not interfere with the production Internet traffic. Korea also started Future Internet testbed project called FIRST and OpenFlow switch with NetFPGA card will be used to deploy this testbed. To interconnect distributed testbed using OpenFlow switches, logical tunnel should be established by encapsulating MAC frame inside a unicast IP packet between OpenFlow switches because OpenFlow switches are not directly connected. In this paper, we have implemented a NetFPGA-based that performs MAC in IP tunneling between various OpenFlow switch sites implemented in domestic research network KOREN. The performance evaluation shows that the NetFPGA-based capsulator reveals better performance than the software-based tunneling and it can be utilized as a testbed for experimentation of Future Internet technologies.

A Review of Fashion Therapy and Proposal of Protocol (패션 테라피 고찰과 프로토콜 제안)

  • Lee, Sae Eun;Lee, Yuri;Ha, Jisoo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.40 no.5
    • /
    • pp.788-800
    • /
    • 2016
  • This study proposes an execution protocol for fashion therapy. Research on fashion therapy are limited and insufficient for the current need for the establishment of a fashion therapy theory. This study introduces cognitive behavior therapy, embodied cognition, and object relations theory as theories that underlie fashion therapy. A fashion therapy system model is provided based on the analysis of art therapy to explore its applicability to fashion therapy. The fashion therapy system model utilizes fashion items to managing pain and stress to better competence, encouragement and self-expression mechanisms to improve social, psychological, emotional and behavioral functions. In addition, 8 phases of the fashion therapy process (inquiry, forming rapport, assessment, goal-objective, observation, selection of strategy and design, practice, and the final evaluation and closing of fashion therapy) are suggested for developing a practical fashion therapy program. This study is to help overcome a negative perspective on fashion that provokes an excessive spending behavior and to make a practical contribution by creating more social value through fashion. The significance of the study is in the attempt to create an interdisciplinary approach of psychotherapy and fashion that can be extend into the fashion and textile discipline.

The Design and Performance Analysis of Effficient VoIP Service Scheme for High Speed Packet Switching based on IMT-2000 (IMT-2000 기반 고속 패킷 교환 방식에서의 효율적인 VoIP 서비스 지원 방안 설계와 성능 분석)

  • Lee, Tae-Ro;Lee, Sung-Won;Han, Chi-Geun;Ryoo, In-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.8
    • /
    • pp.2463-2472
    • /
    • 2000
  • In this paper, we consider pits and falls of V oIP service scheme over the air link environment. It results that V oIP over packet switching is a more attractive approach in several points. We point out the ffilIior requirements for successful V oIP service over the air. Also, we propose V oIP CP concept for efficient wireless channel utilization. Additionally, we analyze and evaluate the performance. According to the results, It shows that the long cycle VolP vocoder CODEC such as ITU-T G.723 is better than short cycle V oIP vocoder CODEC. In this case, the increase of the simultaneous user of system is almost 60% larger than conventional circuit switching.

  • PDF

ARM: Anticipated Route Maintenance Scheme in Location-Aided Mobile Ad Hoc Networks

  • Park Seungjin;Yoo Seong-Moo;Al-Shurman Mohammad;VanVoorst Brian;Jo Chang-Hyun
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.325-336
    • /
    • 2005
  • Mobile ad hoc networks (MANET) are composed of moving wireless hosts which, within range of each other, form wireless networks. For communication to occur between hosts that are not within each other's range, routes involving intermediate nodes must be established; however, since the hosts may be in motion, a host that was part of a route may move away from its upstream and downstream partners, thus breaking the route. In this paper, we propose anticipated route maintenance (ARM) protocol with two extensions to route discovery based routing scheme: Extend the route when nodes on a link move apart from each other and they have common neighbor that can be 'inserted' in the path, and shrink route when a node discovers that one of its neighbor which is not the next hop is also on the same route several hops later on. By utilizing only local geographic information (now a part of some route finding algorithms), a host can anticipate its neighbor's departure and, if other hosts are available, choose a host to bridge the gap, keeping the path connected. We present a distributed algorithm that anticipates route failure and performs preventative route maintenance using location information to increase a route lifespan. The benefits are that this reduces the need to find new routes (which is very expensive) and prevents interruptions in service. As the density of nodes increases, the chance to successfully utilize our route maintenance approach increases, and so does the savings. We have compared the performance of two protocols, pure dynamic source routing (DSR) protocol and DSR with ARM. The simulation results show how ARM improves the functionality of DSR by preventing the links in the route from breaking. Packets delivery ratio could be increased using ARM and achieved approximately $\100%$ improvement. The simulations clarify also how ARM shows a noticeable improvement in dropped packets and links stability over DSR, even though there is more traffic and channel overhead in ARM.

Design and Implementation of the Surrogate Transaction Manager for Mobile GIS (모바일 GIS를 위한 대리 트랜잭션 관리자의 설계 및 구현)

  • 반재훈;문선희;김동현;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.4
    • /
    • pp.397-407
    • /
    • 2003
  • Transactions of updating spatial dta with mobile clients are log transactions because a user disconnected from a server surveys real features and updates them. In this environment, it is appropriate to exploit the optimistic approach based on the validation test in order to control the concurrency of transactions. On the contrary, the pessimistic concurrency control scheme makes transactions wait for a long time due to the lock. In this paper, we propose the surrogate transaction model and implement its manager for the S-S-M(Server-Surrogate PC-Mobile Client) structure which is appropriate for updating spatial data in mobile environments. In the S-S-M structure, the mobile client communicates with the server by the surrogate PC. We extend the validation condition in consideration of spatial relationships between spatial objects in this model. We also present the commit protocol where the user of a surrogate PC adjusts objects of the conflicted surrogate transaction to minimize costs for the abortion of the transaction.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Equal Energy Consumption Routing Protocol Algorithm Based on Q-Learning for Extending the Lifespan of Ad-Hoc Sensor Network (애드혹 센서 네트워크 수명 연장을 위한 Q-러닝 기반 에너지 균등 소비 라우팅 프로토콜 기법)

  • Kim, Ki Sang;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.269-276
    • /
    • 2021
  • Recently, smart sensors are used in various environments, and the implementation of ad-hoc sensor networks (ASNs) is a hot research topic. Unfortunately, traditional sensor network routing algorithms focus on specific control issues, and they can't be directly applied to the ASN operation. In this paper, we propose a new routing protocol by using the Q-learning technology, Main challenge of proposed approach is to extend the life of ASNs through efficient energy allocation while obtaining the balanced system performance. The proposed method enhances the Q-learning effect by considering various environmental factors. When a transmission fails, node penalty is accumulated to increase the successful communication probability. Especially, each node stores the Q value of the adjacent node in its own Q table. Every time a data transfer is executed, the Q values are updated and accumulated to learn to select the optimal routing route. Simulation results confirm that the proposed method can choose an energy-efficient routing path, and gets an excellent network performance compared with the existing ASN routing protocols.

D-ARP Scheme for Full Mesh Routing in Partial BMA Network (제한적 BMA 네트워크에서 Full Mesh 라우팅을 위한 D-ARP 기법)

  • Kim, Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1088-1094
    • /
    • 2021
  • This paper proposes a partial BMA (Broadcasting Multiple Access) network structure and D-ARP (Distributed Address Resolution Protocol) method in order to support full mesh routing function in the DAMA (Demand Assigned Multiple Access)-based MF-TDMA (Multi Frequency-Time Division Multiple Access) satellite system. The partial BMA network enables legacy router devices and routing protocols to be adopted in the satellite communication system, and decreases the amount of routing protocol overhead. In addition, we introduce the D-ARP method that help a spoke satellite node acquiring the MAC (Media Access Control) address from remote satellite nodes in none BMA satellite network. The D-ARP method provides the MAC address of remote nodes to each other nodes through the broadcasting-enabled satellite channel. And we lastly evaluate and analysis the network performance of the proposed approach.