• 제목/요약/키워드: long protocol

검색결과 580건 처리시간 0.024초

시간 요구 웹서비스 트랜잭션을 위한 예약기반 규약 (A Reservation-Based Protocol for Timely Web Services Transaction)

  • 림 청;아지즈 나스리디노프;변정용
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.996-999
    • /
    • 2010
  • Business transactional process is usually long running computation which requests services from multiple enterprises. Web Services Transaction specification (WS-TX) defines a protocol, WS-BusinessActivity which is specifically designed for such lengthy interaction and maintains overall consistency through compensation. However timely web services transaction is prone to compensate due to tasks' missing deadline. Therefore, this paper proposes a reservation-based protocol which is used to select providers who can provide resources promptly and deselect ones who may fail. And this selection happens during resource reservation phase and before real commitment. In this way, we achieve the goal of minimizing transactions' compensation. Finally, we design the framework architecture for the proposed protocol that is extended from WS-BusinessActivity.

Early gonadotropin-releasing hormone antagonist start improves follicular synchronization and pregnancy outcome as compared to the conventional antagonist protocol

  • Park, Chan Woo;Hwang, Yu Im;Koo, Hwa Seon;Kang, Inn Soo;Yang, Kwang Moon;Song, In Ok
    • Clinical and Experimental Reproductive Medicine
    • /
    • 제41권4호
    • /
    • pp.158-164
    • /
    • 2014
  • Objective: To assess whether an early GnRH antagonist start leads to better follicular synchronization and an improved clinical pregnancy rate (CPR). Methods: A retrospective cohort study. A total of 218 infertile women who underwent IVF between January 2011 and February 2013. The initial cohort (Cohort I) that underwent IVF between January 2011 and March 2012 included a total of 68 attempted IVF cycles. Thirty-four cycles were treated with the conventional GnRH antagonist protocol, and 34 cycles with an early GnRH antagonist start protocol. The second cohort (Cohort II) that underwent IVF between June 2012 and February 2013 included a total of 150 embryo-transfer (ET) cycles. Forty-three cycles were treated with the conventional GnRH antagonist protocol, 34 cycles with the modified early GnRH antagonist start protocol using highly purified human menopause gonadotropin and an addition of GnRH agonist to the luteal phase support, and 73 cycles with the GnRH agonist long protocol. Results: The analysis of Cohort I showed that the number of mature oocytes retrieved was significantly higher in the early GnRH antagonist start cycles than in the conventional antagonist cycles (11.9 vs. 8.2, p=0.04). The analysis of Cohort II revealed higher but non-significant CPR/ET in the modified early GnRH antagonist start cycles (41.2%) than in the conventional antagonist cycles (30.2%), which was comparable to that of the GnRH agonist long protocol cycles (39.7%). Conclusion: The modified early antagonist start protocol may improve the mature oocyte yield, possibly via enhanced follicular synchronization, while resulting in superior CPR as compared to the conventional antagonist protocol, which needs to be studied further in prospective randomized controlled trials.

A LOW-COST PROTOCOL IN SENSOR NETWORK UBIQUITOUS ENVIRONMENT

  • Lee Dong-heui;Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.766-769
    • /
    • 2005
  • In a ubiquitous environment made up of multiple sensors, most sensors participate in communications with limited battery, and the sensor node isn't able to participate in communications when all the battery is used up. When an existing authentication method is used for the sensor node which has to participate in a long term communication with limited battery, it creates a problem by making the length of network maintenance or sensor node's operation time relatively shorte. Therefore, a network structure where RM (Register Manager) node and AM (Authentication Manager) node are imported to solve the energy consumption problem during a communication process is presented in this thesis. This offers a low power protocol based on safety through a mutual authentication during communications. Through registration and authentication manager nodes, each sensor nodes are ensured of safety and the algorithm of key's generation, encryption/descramble and authentication is processed with faster operation speed. So the amount of electricity used up during the communications between sensor nodes has been evaluated. In case of the amount of electrical usage, an average of $34.783\%$ for the same subnet and 36.855 for communications with two different subnets, are reduced. The proposed method is a protocol which maintains the limited battery for a long time to increase the effectiveness of energy usage in sensor nodes and can also increase the participation rate of communication by sensor nodes.

  • PDF

Fast Millimeter-Wave Beam Training with Receive Beamforming

  • Kim, Joongheon;Molisch, Andreas F.
    • Journal of Communications and Networks
    • /
    • 제16권5호
    • /
    • pp.512-522
    • /
    • 2014
  • This paper proposes fast millimeter-wave (mm-wave) beam training protocols with receive beamforming. Both IEEE standards and the academic literature have generally considered beam training protocols involving exhaustive search over all possible beam directions for both the beamforming initiator and responder. However, this operation requires a long time (and thus overhead) when the beamwidth is quite narrow such as for mm-wave beams ($1^{\circ}$ in the worst case). To alleviate this problem, we propose two types of adaptive beam training protocols for fixed and adaptive modulation, respectively, which take into account the unique propagation characteristics of millimeter waves. For fixed modulation, the proposed protocol allows for interactive beam training, stopping the search when a local maximum of the power angular spectrum is found that is sufficient to support the chosen modulation/coding scheme. We furthermore suggest approaches to prioritize certain directions determined from the propagation geometry, long-term statistics, etc. For adaptive modulation, the proposed protocol uses iterative multi-level beam training concepts for fast link configuration that provide an exhaustive search with significantly lower complexity. Our simulation results verify that the proposed protocol performs better than traditional exhaustive search in terms of the link configuration speed for mobile wireless service applications.

넌코히어런트 전송 방식에서 초음파를 이용한 디지털 통신속도 개선 프로토콜 제안 (Proposal of a non-coherent Communication Protocol with Ultra Sonic which can Improve the Communication Speed)

  • 윤병우
    • 융합신호처리학회논문지
    • /
    • 제10권1호
    • /
    • pp.1-6
    • /
    • 2009
  • 수중이나 지하에서는 매질의 전도성으로 인하여 전파를 이용한 무선 통신이 어렵다. 이러한 경우 초음파 등과 같은 음향신호를 이용하여 무선통신을 하는데 이 경우도 시변 다경로현상, 도플러효과, 각종 감쇄 등으로 인하여 코히어런트방식의 통신에서는 장거리 전송이 어렵다. 따라서 장거리 전송에서는 FSK 등과 같은 넌코히어런트방식의 데이터 전송방식을 사용하는데 이 경우 음향신호의 전송속도가 늦다는 특성 때문에 넓은 대역폭의 데이터 전송이 어렵다. 수중에서 다양한 통신 수요에 따라 음성통신 뿐만 아니라 화상 데이터 전송 등이 요구되는데 이와 같은 많은 데이터 전송시 넌코히어런트방식의 통신에서 그 요구조건을 만족시키기가 어렵다. 본 연구에서는 시간지연신호에 디지털 데이터를 실음으로써 동시에 8비트 또는 16비트 등과 같이 여러 비트의 데이터를 전송함으로써 전송속도를 개선할 수 있는 새로운 전송프로토콜을 제안한다.

  • PDF

MIPv6 최적화 프로토콜 시리즈의 후속 단계 개선 연구 (A Study on Improving the Subsequent Phase of OMIPv6 Protocol Series)

  • 유일선;김흥준
    • 한국정보통신학회논문지
    • /
    • 제11권11호
    • /
    • pp.2039-2046
    • /
    • 2007
  • 최근에 RR(Return Routability) 프로토콜을 개선하기 위해 공개키 기반의 OMIPv6 시리즈가 제안되었다. OMIPv6 시리즈는 강력한 장기키(long-term key)를 생성하는 초기 단계와 장기키를 바탕으로 이후의 바인딩 갱신 과정을 최적화 하는 후속 단계로 구성된다. 본 논문에서는 OMIPv6 시리즈의 후속 단계를 성능과 보안성, 적용성 측면에서 비교 분석한 후, 비교 분석 결과에 근거하여 개선안을 제시한다. 또한, 제안한 개선안이 성능과 보안성, 적용성을 전체적으로 고려할 때 다른 프로토콜에 비해 우수함을 보인다.

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card

  • Li, Xiaowei;Zhang, Yuqing;Liu, Xuefeng;Cao, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권5호
    • /
    • pp.1313-1327
    • /
    • 2013
  • How to make people keep both the confidentiality of the sensitive data and the privacy of their real identity in communication networks has been a hot topic in recent years. Researchers proposed privacy-preserving authenticated key exchange protocols (PPAKE) to answer this question. However, lots of PPAKE protocols need users to remember long secrets which are inconvenient for them. In this paper we propose a lightweight three-party privacy-preserving authentication key exchange (3PPAKE) protocol using smart card to address the problem. The advantages of the new 3PPAKE protocol are: 1. The only secrets that the users need to remember in the authentication are their short passwords; 2. Both of the users can negotiate a common key and keep their identity privacy, i.e., providing anonymity for both users in the communication; 3. It enjoys better performance in terms of computation cost and security. The security of the scheme is given in the random oracle model. To the best of our knowledge, the new protocol is the first provably secure authentication protocol which provides anonymity for both users in the three-party setting.

근위 경골 절골술 후 한방 재활치료 프로토콜을 적용한 재활치료의 임상적 효과: 증례 보고 (A Rehabilitation Protocol for High Tibial Osteotomy in Korean Medicine: A Report of 3 Cases)

  • 금지혜;하원배;고낙용;이정한
    • 한방재활의학과학회지
    • /
    • 제28권3호
    • /
    • pp.107-118
    • /
    • 2018
  • In this study, we propose a rehabilitation protocol involving Korean medicine for patients after high tibial osteotomy (HTO) and report its effectiveness. Three patients underwent HTO using the rehabilitation protocol involving Korean medicine. We estimated the outcome evaluating physical examination findings of the knee joint, numeric rating scale, pain disability index, Lysholm knee score, and walking state. After the treatment, we observed that knee movement and muscular strength were improved. In addition, the numeric rating scale, pain disability index, Lysholm knee score, and walking state of patients were improved. Therefore, a rehabilitation protocol involving Korean medicine can be effectively used for patients after HTO. The limitation of this study was the insufficient number of cases and the difficulty of follow-up because of the characteristics of this operation and the long periods of time that are needed for each phase of the protocol. Further studies are needed to design a rehabilitation protocol involving Korean medicine.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • 디지털산업정보학회논문지
    • /
    • 제13권1호
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

클러스터 구성 최적화를 통한 무선 센서 네트워크 수명 개선 (Lifetime Improvement of WSN by Optimizing Cluster Configuration)

  • 이종용
    • 한국인터넷방송통신학회논문지
    • /
    • 제18권5호
    • /
    • pp.117-121
    • /
    • 2018
  • 무선 센서 네트워크는 센서 노드들이 무선으로 구성되어 있는 네트워크이다. 무선으로 구성이 되기 때문에 설치 장소에 제약이 없다. 대신 센서 노드들은 배터리와 같은 제한된 에너지를 가지게 된다. 따라서 네트워크를 오랫동안 유지하려면 에너지 소모를 최소화하여야 한다. 에너지 소모를 최소화하기 위한 여러 프로토콜이 제안되었는데, 그 중 대표적인 프로토콜이 LEACH 프로토콜이다. LEACH 프로토콜은 클러스터 방식 프로토콜로 센서 공간을 클러스터로 나눔으로써 에너지 소모를 최소화한다. 클러스터의 구성에 따라 네트워크 수명이 증가할 수도 있지만, 오히려 수명이 단축될 수도 있다. 본 논문에서는 LEACH Protocol에서 클러스터 헤드 선출 방법을 개선하여 네트워크 수명을 향상시키고자 한다.