• Title/Summary/Keyword: Translation Protocol

Search Result 77, Processing Time 0.04 seconds

A Group Key Management for Real-Time Multicasting Information Security (실시간 멀티캐스팅 정보보안을 위한 그룹키 관리)

  • Hong, Jong-Joon;Hwang, Kyo-Chul
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.809-814
    • /
    • 2003
  • The multicast transmitting the real-time data to groups may easily have many attacks from abnormal attacks because it has many links as compared to the unicast. The existing group key management architectures for preventing these problems are designed for protocols suitable for a large scale. Thus these architectures applied to a small scale routing protocols may have many overheads with key distribution and a constant core tree. Therefore this paper proposes a groups key management protocol for a secure multicast in PIM-SM multicast group communication. The proposed method divide multicast groups with RO(Rendezvous-Point), and subgroup key managers are established in each RP and can be transmitted groups keys between senders and receivers, so the security cannel is set up for secure data transfer, And this does not have needs of the data translation for group keys and the new key distribution for path change. As a result of this, the data transmission time can be reduced.

Design of the Shortcut based Integrated & Advanced Networking Server(IANS) for QoS path (QoS 경로 설정을 위한 Shortcut 기반 통합 서버 설계)

  • 김기영;이상호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.74-84
    • /
    • 2001
  • In the current Internet, InteServ model based on Resource reSerVation Protocol (RSVP), DiffServ Model based on service differentiation according to per hope behavior(PHB) and traffic engineering policy, and two-tire model of above mentioned two models which are adapted differently as the target network status for providing the end-to-end QoS Path are suggested. But, when we integrated this internet QoS into the ATM based network, differences of the connection setup procedure, name/address translation methods, and QoS provisioning mechanisms for end-to-end path setup procedures are introduced. In this paper, we propose the method of shortcut based QoS path setup procedure to solve these problems, and to guarantee the integration and scalability of Next Generation Internet(NGI) names/address in Integrated IP network into ATM based network. This network should support the engineering differentiated into the multiple service classes, which depend on established by this path is designed suitably into the target router and host step by step. In the near future, this function which provide the QoS guaranteed path based on end-to-end shortcut between the configuration devices are extended into the NGI target network.

  • PDF

Target Word Selection Disambiguation using Untagged Text Data in English-Korean Machine Translation (영한 기계 번역에서 미가공 텍스트 데이터를 이용한 대역어 선택 중의성 해소)

  • Kim Yu-Seop;Chang Jeong-Ho
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.749-758
    • /
    • 2004
  • In this paper, we propose a new method utilizing only raw corpus without additional human effort for disambiguation of target word selection in English-Korean machine translation. We use two data-driven techniques; one is the Latent Semantic Analysis(LSA) and the other the Probabilistic Latent Semantic Analysis(PLSA). These two techniques can represent complex semantic structures in given contexts like text passages. We construct linguistic semantic knowledge by using the two techniques and use the knowledge for target word selection in English-Korean machine translation. For target word selection, we utilize a grammatical relationship stored in a dictionary. We use k- nearest neighbor learning algorithm for the resolution of data sparseness Problem in target word selection and estimate the distance between instances based on these models. In experiments, we use TREC data of AP news for construction of latent semantic space and Wail Street Journal corpus for evaluation of target word selection. Through the Latent Semantic Analysis methods, the accuracy of target word selection has improved over 10% and PLSA has showed better accuracy than LSA method. finally we have showed the relatedness between the accuracy and two important factors ; one is dimensionality of latent space and k value of k-NT learning by using correlation calculation.

지지적 간호중재가 두경부암 수술환자의 불안, 우울에 미치는 효과

  • Seok, Jeong-Hui;Gang, Eun-Sil
    • Korean Journal of Hospice Care
    • /
    • v.3 no.2
    • /
    • pp.19-33
    • /
    • 2003
  • Cancer causes many crises to cancer patients imcluding physical dysfunction and emotional changes such as anxiety, depression as well as a threat of life, fear of death. As it develops, cancer makes people feel powerlessness due to the losses of their own positions, roles and independence. Although occupying a little proportion among all types of cancer, head and neck cancer may cause a wide range of physical transformation by surgical operation, damage to active functions such as eating and speaking, provoke anxiety and depression after its operation, influencing the quality life of head and neck cancer patients. Thus nursing intervention should be developed to provide supportive nursing for head and neck cancer patients and play roles as competent supporters. This study is a nonequivalent, control group, pretest-posttest, non-synchronized quasi-experimental research design to determine, how nursing intervention has effects on anxiety, depressing of head and neck cancer and operated. They were divided into experimental and comparison groups, each consisting of 20 members. The data were collected during the period from December 1, 1999 to April 11, 2000. Tools of the study included the protocol of supportive nursing intervention which was developed by researcher with reference to a literal review and esperts' advice. The measurement tool of anxiety was consisting of totaled 20 question items which was prepared by Spielberger and translated by Kim et al., the device of depression measurement consisting of total 20 question items which was the output of Song's translation the device of depression self-evaluation from Zung. Data were analyzed using the SPSS/PC 9.0 program. The homogeneity of the subjects were tested using x2-test and t-test. 5 hypoteses were tested using t-test. The results of the study can be summarized as follows. 1.The first hypothesis that the experimental group receiving supportive nursing intervention shows a little anxiety than the control group not receiving supportive nursing intervention was supported(t=3.817, P=.000). 2.The second hypothesis that the experimental group receiving supportive nursing intervention shows a little depression than the control group not receiving supportive nursing intervention was supported(t=8.089, P=.000). Consequently, supportive nursing intervention was found an effective nursing intervention strategy to reduce anxiety and depression of head and neck cancer patients. Providing supportive nursing intervention in nursing practice can enhance the quality of life of those cancer patients.

  • PDF

A Design and Implementation of the Management Sever for the Gateway Supporting Home Networking Using the UML (UML을 이용한 흠 네트워킹 지원 게이트웨이 관리 서버 설계 및 구현)

  • 권진혁;민병조;강명석;남의석;김학배
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.3
    • /
    • pp.393-404
    • /
    • 2004
  • Recently, public home have used a more than two computer connected with network, and several home appliances using independently with internet or network are developing to be related closely with the network. Therefore, the home utilized for a simple terminal of the global network in the past is being expanded to another part of the sub network. For a variety of connecting home-area protocols with the existing existing network, we require a new Residential Gateway(RG) that does not only make the home-area network operating in the sub network but also connects to the external network. In this paper, RG has intrinsic limits against flexible service due to IP address assignment and hardware capacity. In order to solve this problem in the RG, we propose a Management Server(MS). The MS that offers the integrated managements and control services for a variety of devices connected the RG in the home-area. It can not only solve the dynamic IP address assigning problem but also assigns private IP addresses to the home network devices through the Network Address Translation(NAT). It also provides somewhat useful functions for the home network and the RG for other additional services. <중략> The MS is using a SNMP protocol for managing the RG in the domain, a polling method of the MS and the RG compose a sequence polling method, a polling method using a multi-process and a multi-thread. In this paper, we introduce a problem with polling method separately, show a polling method between the MS and the RG using a multi-thread.

  • PDF

Acute Oral Toxicity of dsRNA to Honey Bee, Apis mellifera (꿀벌에 대한 dsRNA의 급성섭식독성 평가)

  • Lim, Hye Song;Jung, Young Jun;Kim, Il Ryong;Kim, Jin;Ryu, Sungmin;Kim, Banni;Lee, Jung Ro;Choi, Wonkyun
    • Korean Journal of Environmental Agriculture
    • /
    • v.36 no.4
    • /
    • pp.241-248
    • /
    • 2017
  • BACKGROUND: RNA interference (RNAi) eliminates or decreases gene expression by disrupting the target mRNA or by interfering with translation. Recently, RNAi technique was applied to generate new crop traits which provide protection against pests. To establish the environmental risk assessment protocol of RNAi LMO in lab scale, we developed dsRNA expression system using E. coli and tested acute oral toxicity assay to honey. METHOD AND RESULTS: The dsRNA expression vector, L4440, was chosen and cloned 240 bp of Snf7 and GFP gene fragment. To develop the maximum dsRNA induction condition in E. coli, we tested induction time, temperature and IPTG concentration in media. To estimate the risk assessment of dsRNA to honey bee, it has been selected and cultured with dsRNA supplement for 48 hours according to OECD guideline. As a result, the optimum condition of dsRNA induction was $37^{\circ}C$, 4 hours and 0.4 mM IPTG concentration and the difference between Snf7 and GFP dsRNA molecules from E. coli was not significant in survival and behavior to honey bee. Furthermore, blast search results indicated that effective match of predicted dsRNA fragments were not existed in honey bee genome. CONCLUSION: In this study, we developed and tested the acute oral toxicity of dsRNA using E. coli expression system to honey bee.

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.