• Title/Summary/Keyword: national protocols

Search Result 837, Processing Time 0.026 seconds

A Software VIA based PC Cluster System on SCI Network (SCI 네트워크 상의 소프트웨어 VIA기반 PC글러스터 시스템)

  • Shin, Jeong-Hee;Chung, Sang-Hwa;Park, Se-Jin
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.4
    • /
    • pp.192-200
    • /
    • 2002
  • The performance of a PC cluster system is limited by the use of traditional communication protocols, such as TCP/IP because these protocols are accompanied with significant software overheads. To overcome the problem, systems based on user-level interface for message passing without intervention of kernel have been developed. The VIA(Virtual Interface Architecture) is one of the representative user-level interfaces which provide low latency and high bandwidth. In this paper, a VIA system is implemented on an SCI(Scalable Coherent Interface) network based PC cluster. The system provides both message-passing and shared-memory programming environments and shows the maximum bandwidth of 84MB/s and the latency of $8{\mu}s$. The system also shows better performance in comparison with other comparable computer systems in carrying out parallel benchmark programs.

A Study on IPTV Video Quality by Routing Protocols in Wireless LAN (무선 LAN 환경에서 경로 배정 프로토콜에 따른 IPTV 영상 서비스 품질에 관한 연구)

  • Jung, Jae-hoon;Park, Seung-seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.572-575
    • /
    • 2009
  • With the advent of integration environment of broadcasting and communication, IPTV has been widely used. It provides services such as information, movie contents and broadcasting through TV using super-high speed networks. Developments of Wireless LAN and IP network technology create various and fusional services such as IPTV, VoIP that are based on IP network. The development of Wireless LAN is very important in IPTV network field which requires the best quality of service on the security, QoS and bandwidth. In this Paper, We configure the experimental network in its RIP and OSPF environment to test the Video Quality of IPTV in Wireless LAN. We measure and evaluate broadcasting quality by using PSNR to show the corelation of Routing Protocols in Wireless LAN in which how they affect to the IPTV real-time Video Quality.

  • PDF

Implementation of Enhanced Recovery after Surgery (ERAS) Program in Perioperative Management of Gastric Cancer Surgery: a Nationwide Survey in Korea

  • Jeong, Oh;Kim, Ho Goon
    • Journal of Gastric Cancer
    • /
    • v.19 no.1
    • /
    • pp.72-82
    • /
    • 2019
  • Purpose: Despite its clinical benefits, enhanced recovery after surgery (ERAS) is less widely implemented for gastric cancer surgery. This nationwide survey investigated the current status of the implementation of ERAS in perioperative care for gastric cancer surgery in South Korea. Materials and Methods: This survey enrolled 89 gastric surgeons from 52 institutions in South Korea. The questionnaire consisted of 24 questions about the implementation of the ERAS protocols in the management of gastric cancer surgery. The survey was carried out using an electronic form sent via email. Results: Of the 89 gastric surgeons, 58 (65.2%) answered that they have knowledge of the concept and details of ERAS, 45 (50.6%) of whom were currently applying ERAS for their patients. Of the ERAS protocols, preoperative education (91.0%), avoidance of preoperative fasting (68.5%), maintenance of intraoperative normothermia (79.8%), thromboprophylaxis (96.5%), early active ambulation (64.4%), and early removal of urinary catheter (68.5%) were relatively well adopted in perioperative care. However, other practices, such as avoidance of preoperative bowel preparation (41.6%), provision of preoperative carbohydrate-rich drink (10.1%), avoidance of routine abdominal drainage (31.4%), epidural anesthesia (15.9%), single-dose prophylactic antibiotics (19.3%), postoperative high oxygen therapy (36.8%), early postoperative diet (14.6%), restricted intravenous fluid administration (53.9%), and application of discharge criteria (57.3%) were not very well adopted for patients. Conclusions: Perioperative management of gastric cancer surgery is largely heterogeneous among gastric surgeons in South Korea. Standard perioperative care based on scientific evidence needs to be established to improve the quality of surgical care and patient outcomes.

A Security SoC supporting ECC based Public-Key Security Protocols (ECC 기반의 공개키 보안 프로토콜을 지원하는 보안 SoC)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1470-1476
    • /
    • 2020
  • This paper describes a design of a lightweight security system-on-chip (SoC) suitable for the implementation of security protocols for IoT and mobile devices. The security SoC using Cortex-M0 as a CPU integrates hardware crypto engines including an elliptic curve cryptography (ECC) core, a SHA3 hash core, an ARIA-AES block cipher core and a true random number generator (TRNG) core. The ECC core was designed to support twenty elliptic curves over both prime field and binary field defined in the SEC2, and was based on a word-based Montgomery multiplier in which the partial product generations/additions and modular reductions are processed in a sub-pipelining manner. The H/W-S/W co-operation for elliptic curve digital signature algorithm (EC-DSA) protocol was demonstrated by implementing the security SoC on a Cyclone-5 FPGA device. The security SoC, synthesized with a 65-nm CMOS cell library, occupies 193,312 gate equivalents (GEs) and 84 kbytes of RAM.

Implementation of Video Signal Delivery Protocols for the Camera Device via the Internet (인터넷을 통한 카메라 디바이스의 영상신호 전달 프로토콜 구현)

  • Lee, Ji-Hoon;Chung, Hae;Baek, Bong-Ki;Jo, Young-Rae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.691-700
    • /
    • 2021
  • The IP cameras have rapidly replaced the analog CCTVs as the cameras have the advantages of not only being able to remotely monitor, but also supplying power through the UTP cable, In this paper, we introduce the protocol architecture of the ONVIF standard which is widely applied to the IP camera and other Internet protocols to support it, and implement the ONVIF Device on a commercial board. Although these functions can be controlled by the Client (PC), several functions such as privacy masks, temperature display of the thermal camera, and ROI (Region of Interest) are implemented through a web viewer on the device. Through the experiment, the functions of ONVIF Profile S and web viewer are verified through SOAP messages exchanged between Device (IP camera) and Client program and streamed images.

A Design of Blockchain-based LoRa Multi-hop Network for Smart Grid (스마트 그리드를 위한 블록체인 기반 LoRa 멀티홉 네트워크 설계)

  • Jeon, Seongho;Kim, Seungku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.440-448
    • /
    • 2021
  • This paper presents problems of network technology in smart grid and implements a blockchain-based LoRa multi-hop network to solve them. Since some smart grid applications are operated in harsh environments, it is difficult to establish communication infrastructure. We propose a LoRa network with multi-hop using the Flooding routing protocol. Smart grid environment composes an independent network using various power grid protocols depending on the application. Since this has a problem that an independent infrastructure must be established for each network, a single gateway device supports multiple power grid protocols to implement a method for network integration. Lastly, the author applied Hyperledger-based blockchain to the LoRa network to ensure the integrity of data in a smart grid environment, and strengthened security by physically distributing it. After constructing the three suggestions on the actual test bed, we confirmed that the network operates normally through experiments.

Neuroimaging in Randomized, Multi-Center Clinical Trials of Endovascular Treatment for Acute Ischemic Stroke: A Systematic Review

  • Chong Hyun Suh;Seung Chai Jung;Byungjun Kim;Se Jin Cho;Dong-Cheol Woo;Woo Yong Oh;Jong Gu Lee;Kyung Won Kim
    • Korean Journal of Radiology
    • /
    • v.21 no.1
    • /
    • pp.42-57
    • /
    • 2020
  • Appropriate use and analysis of neuroimaging techniques is an inevitable aspect of clinical trials for patients with acute ischemic stroke. Neuroimaging examinations were recently used to define the core eligibility criteria and outcomes in acute ischemic stroke research. Recent clinical trials for endovascular treatment in acute ischemic stroke have also demonstrated the efficacy or safety of endovascular treatment using various imaging modalities as well as clinical indices. Furthermore, independent imaging reviews and imaging core laboratory assessments are essential to manage and analyze imaging data in order to enhance the reliability of the outcomes. Therefore, we systematically reviewed the use of neuroimaging in recent randomized clinical trials for endovascular treatment of acute ischemic stroke in order to provide a thorough summary, which would serve as a resource guiding the use of appropriate imaging protocols and analyses in future clinical trials for acute ischemic stroke. This review will help researchers select appropriate imaging biomarkers among the various imaging protocols available and apply the selected type of imaging examination for each study in accordance with the academic purpose.

Efficient Authentication Protocol for Mobile Networks

  • Kim Kee-Won;Jeon Jun-Cheol;Yoo Kee-Young
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.181-184
    • /
    • 2006
  • The mobile devices are constrained to be low battery, and the mobile data channel is low data rate. Therefore, the computational cost on the client side of the authentication protocol should be low. In 2005, Hwang and Su proposed an efficient authentication protocol for mobile networks. Hwang-Su protocol is more efficient than other related protocols. In this paper, we propose a new efficient authentication protocol for mobile networks. The proposed protocol is more efficient than Hwang-Su's in computational respect although our protocol is nearly equal to Hwang-Su's in communication respect. It is suitable to apply in the mobile networks.

  • PDF

Evolution of E-commerce Protocols in IPv6 (IPv6 기반의 전자상거래 보안 프로토콜의 진화)

  • Choi, Jung-Sun;Kim, Geon-Ung;Park, Ryoung-Sik
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.1565-1568
    • /
    • 2001
  • 인터넷의 보급으로 전자상거래가 활성화 되고 있는 시점에서 무엇보다 중요한 것이 보안 문제인데, 현재의 인터넷에서 전자상거래와 관련하여 이용되고 있는 보편적인 보안 프로토콜이 SET와 SSL이다. IPv4의 여러 가지 한계를 극복하고자 진행되고 있는 IPv6에서 무엇보다도 주목한 점은 망 차원에서의 보안기능이 강화되고 있다는 점인데, 본 논문에서는 이러한 IPv6외 IPsec과 SET 그리고 SSL의 기능 및 역할을 고찰하구 향후 차세대 인터넷에서의 전자상거래 관련 보안 프로토콜의 진화 방향을 제시한다.

  • PDF

PCR of Gut Contents for a Food Web Study of a Marine Ecosystem

  • Kim, Nack-Keun;Kim, Kyoung-Sun;Kim, Hyun-Woo
    • Fisheries and Aquatic Sciences
    • /
    • v.10 no.4
    • /
    • pp.179-185
    • /
    • 2007
  • Understanding dietary habits is one of the most important factors in studying food webs and other ecological processes. Here we designed universal primers to amplify portions of the 18S and 28S rDNA sequences to examine gut contents using PCR techniques. The gut contents of sailfin sandfish (Arctoscopus japonicus) and pacific squid (Todarodes pacificus) were examined. In total, 11 families of prey were identified with 18S and 28S rDNA using the universal primers. The DNA sequence data indicated that the primer sets successfully amplified a wide spectrum of species and represented gut contents in a relatively convenient way. We found that information in the NCBI database was not yet sufficient to discriminate the species we isolated. In addition, technology for the separation of heterogeneous PCR products and better resolution and quantification protocols would help increase data accuracy.