• Title/Summary/Keyword: national protocols

Search Result 812, Processing Time 0.034 seconds

Implementation of a Time Triggered Communication Protocol

  • Kim, Jae-Woo;Kim, Kee-Woong;Kim, Tae-Yol;Lim, Hong-Joon;Ryu, Sye-Hyung;Lee, Suk
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.57.6-57
    • /
    • 2001
  • Jitter occurring during data communication creates difficulties in integrating a system. Such problems arise from using an event triggered communication protocol such as CAN(Controller Area Network) because it cannot be determined when a specific message will be transmitted. In order to avoid this problem, several time triggered communication protocols have been developed orare under development. Those protocols include TTP(TTTech) and TTCAN(BOSCH). But a time triggered communication protocol needs more hardware than an event triggered protocol and has more complicated software algorithm because data and time information goes through the existing data line ...

  • PDF

Improved cryptanalysis of lightweight RFID mutual authentication Protocols LMAP, $M^2AP$, EMAP (경량 RFID 상호인증 프로토콜 LMAP, $M^2AP$, EMAP에 대한 향상된 취약성 분석)

  • Kwon, Dae-Sung;Lee, Joo-Young;Koo, Bon-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.103-113
    • /
    • 2007
  • In this paper, we present a security analysis of Lightweight RFID Mutual Authentication Protocols-LMAP[10], $M^2AP$[11], EMAP[12]. Based on simple logic operations, the protocols were designed to be suitable for lightweight environments such as RFID systems. In [8,9], it is shown that these protocols are vulnerable to do-synchronization attacks with a high probability. The authors also presented an active attack that partially reveals a tag's secret values including its ID. In this paper, we point out an error from [9] and show that their do-synchronization attack would always succeed. We also improve the active attack in [9] to show an adversary can compute a tag's ID as well as certain secret keys in a deterministic way. As for $M^2AP$ and EMAP, we show that eavesdropping $2{\sim}3$ consecutive sessions is sufficient to reveal a tag's essential secret values including its ID that allows for tracing, do-synchronization and/or subsequent impersonations.

Analysis of implant strain value exerted using different screw tightening protocols in screw-retained 3-unit prostheses (3본 나사 유지형 임플란트 보철물의 고정 방식에 따른 임플란트 고정체 치경부에 발생하는 변형율 비교분석)

  • Kim, Sang-Beom;Lee, Du-Hyeong;Lee, Cheong-Hee
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.58 no.4
    • /
    • pp.321-327
    • /
    • 2020
  • Purpose: The purpose of this study was to measure and compare the strain value exerted on the cervical area using different screw tightening protocols in implant-supported, screw-retained 3-unit prostheses. Materials and methods: Strain gauges were attached to four implants: two external and two internal. Thereafter, two study model were designed each type using acrylic resin. CAD-CAM was used to design hex and nonhex abutments for each group (EH, ENH, IH, and INH group) and Screw-cement-retained prostheses were also designed using a nonprecious base metal. Abutment was fixed with 10 Ncm torque, and the prosthesis was cemented. Screws were fixed with 30 Ncm torque using different three protocols. After 5 min, the strain gauge level was measured, and group analysis was performed (α=.05). Results: External group showed significantly lower strain values than internal group and the EH group showed significantly lower strain values than the ENH group (P<.05). There was no difference in strain value based on the types of screw tightening protocols in same group (P>.05). The IH group exhibited significantly higher strain values than the INH group and the IH group showed a significant difference in strain values based on the types of screw tightening protocols used (P<.05). Conclusion: There was no significant effect on the external type in the implant-supported, screw-retained prostheses. However, strain values were high in the internal type, and the types of screw tightening protocol significantly affected these implants.

Hormone Analysis during Artificial Estrus Induction in Korean Black Goats (흑염소의 인공수정 발정동기화 처리방법에 따른 호르몬 변화분석)

  • Kim, Kwan-Woo;Jeon, Dayeon;Lee, Jinwook;Kim, Seungchang;Lee, Sang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.224-230
    • /
    • 2019
  • The purpose of the study is to investigate the change in the blood progesterone (P4) and estrogen (E2) levels when applying different estrus induction protocols to Korean black goats, and this was done to gain understanding about their reproduction physiology. For the experiment, we performed three estrus induction protocols that are commonly used in bovine: controlled internal drug release (CIDR) + prostaglandin $F2{\alpha}$ ($PGF2{\alpha}$), $PGF2{\alpha}$ + gonadotropin-releasing hormone (GnRH) + $PGF2{\alpha}$, and CIDR + $PGF2{\alpha}$ + PMSG. The P4 and E2 concentrations showed different patterns until the last treatment of the three protocols. However, similar concentration patterns were shown after the last treatment in all the protocols. In conclusion, we monitored the blood P4 and E2 levels in Korean black goats following three different estrus induction protocols. Our findings may be used in other breeding programs of Korean black goats, such as artificial insemination and embryo transfer.

Review of Clinical Acupuncture Research Protocols on Cancer in the USA (미국의 암 관련 침 임상 연구 프로토콜 분석)

  • Dobs, Adrian S;Lee, Sang-Hoon
    • The Journal of Korean Medicine
    • /
    • v.28 no.3 s.71
    • /
    • pp.116-125
    • /
    • 2007
  • Objective : To overview the protocols of clinical acupuncture research on cancer in the USA. Methods : Using 'acupuncture' and 'cancer' as keyword search terms in Clinical Trials. gov, 28 clinical studies were found. Three studies by non-American institutions were excluded and 25 studies were analyzed. Analytic parameters were cancer condition, primary outcome, research institution, study design, and acupuncture intervention. Results : Breast cancer was the most frequent single condition in the searched protocols. Pain and quality of life were the primary outcomes in many studies. Memorial Sloan-Kettering Cancer Centerin New York has performed the largest number of acupuncture cancer studies. The majority of studies were randomized controlled trials with active controls or placebo/sham controls. Total enrollment varied between the range of 10 and 700 subjects and ages of these subjects were at least above 18 years old (except one protocol). Most protocols had strict exclusion criteria for acupuncture needling such as bleeding disorders, infection, heart disorder, and central nervous system disorder. Conclusions : Clinical acupuncture studies for cancer patients have focused on pain, quality of life, and side effects induced by anti-cancer therapies. Re-evaluation and cautions for strict exclusion criteria in foreign countries are required to perform multi-national acupuncture trials.

  • PDF

Research on the Performance of Protocols and the Evaluation Metric for VIDEO Transmissions in an Ad Hoc Network

  • Chen, Ruey-Shin;Chao, Louis R.;Chen, Ching-Piao;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.10 no.1
    • /
    • pp.115-126
    • /
    • 2009
  • Video transmission effectiveness in the Ad Hoc network is becoming important recently, if different routing protocols are applied. Some researchers conclude that the reactive protocols are better for file transfer protocol (FTP) and constant bit rate (CBR) or hypertext transfer protocol (HTTP) transmission in an Ad Hoc wireless network but the performance report of video transmission is not much. This study adopts Qualnet (Network Simulator) as a simulation tool for environmental designing and performance testing, and employs an experimental design with eight groups. Our experiment shows that: (1) The performance of AODV (reactive) protocol is better than DSDV, ZRP and DSR when the transmission load has only one video stream; (2) Proactive (DSDV) and Hybrid protocols (ZRP) are better for a smaller Ad Hoc network when it transmits a video stream with some applications (VoIP, FTP and CBR). We conclude that packet loss rate is sensitive to the quality of video transmission and it has negative relationship with Peak Signal-to-Noise Ratio (PSNR) value. In addition, our experiment also shows that PSNR is a simple Metric for the performance evaluation of video transmission.

A Study on Analysis of Novice's Protocol in Solving Physics Problems (물리문제 해결에 관한 초심자의 프로토콜분석 연구)

  • Bak, Hac-Kyoo;Kwon, Jae-Sool
    • Journal of The Korean Association For Science Education
    • /
    • v.10 no.1
    • /
    • pp.57-64
    • /
    • 1990
  • In this study, novices' protocols were investigated on the basis of Mayer's analysis of mathematical problem solving. These protocols were obtained by Jae-Sool Kwon and Seong-Wang Lee(1988) by means of thinking aloud while 20 sophomore students in a department of physics education were solving physics problems on Newton's low of motion. The results of investiqation are as follows; (1) We proposed an effective method in analyzing protocols on physics porblem solving (2) We could find the defective types of knowledge of individuals who got an incorrect solution, through analyzing the cause of failure individually (3) The fact that many students considered first the frictional force as muntiplying the coefficient of friction by perpendicular force rather than as resistance of motion, was found And students' misconception on the coefficient of friction was found. (4) If such analyses of test items and protocols are used in physics education, they will be very useful for finding the faults of problem-solving process, and for setting and scoring subjective problems in physics

  • PDF

Analysis of Several Digital Network Technologies for Hard Real-time Communications in Nuclear Plant

  • Song, Ki-Sang;No, Hee-Cheon;Kim, Dong-Hun;Koo, In-Soo
    • Nuclear Engineering and Technology
    • /
    • v.31 no.2
    • /
    • pp.226-235
    • /
    • 1999
  • Applying digital network technology for advanced nuclear plant requires deterministic communication for tight safety requirements, timely and reliable data delivery for operation-critical and mission-critical characteristics of nuclear plant. Communication protocols, such as IEEE 802/4 Token Bus, IEEE 802/5 Token Ring, FDDI, and ARCnet, which have deterministic communication capability are partially applied to several nuclear power plants. Although digital communication technologies have many advantages, it is necessary to consider the noise immunity from electromagnetic interference (EMI), electrical interference, impulse noise, and heat noise before selecting specific digital network technology for nuclear plant. In this paper, we consider the token frame loss and data frame loss rate due to the link error event, frame size, and link data rate in different protocols, and evaluate the possibility of failure to meet the hard real-time requirement in nuclear plant.

  • PDF

Stress Testing and Imaging Protocols for Myocardial Perfusion Studies (심근관류영상을 위한 심근부하 방법 및 검사 프로토콜)

  • Kim, Seong-Min
    • Nuclear Medicine and Molecular Imaging
    • /
    • v.43 no.3
    • /
    • pp.179-195
    • /
    • 2009
  • Scince $^{201}$TI was introduced as a myocardial perfusion imaging agent in the early 1970s, scintigraphic evaluation of myocardial perfusion for the diagnosis of coronary artery disease is a valuable noninvasive diagnostic imaging modality. Stress radionuclide myocardial perfusion imaging is widely accepted to have high diagnostic and prognostic use in the assessment of patients with known or suspected coronary artery disease. With wise use of this nonivasive imaging technique, more patients are referred for stress perfusion imaging. Until now various protocols for stress testing and myocardial imaging were developed and used in worldwide. This article presented various protocols of stress testing and myocardial imaging for clinical use.

Optical Wireless Access Point Agent Networks

  • Lee, Tae-Gyu
    • Journal of the Optical Society of Korea
    • /
    • v.13 no.1
    • /
    • pp.98-106
    • /
    • 2009
  • This paper proposes an optical wireless transfer agent method which realizes the continuous and swift data transfer of optical wireless terminals in optical wireless networks. The unguided wireless channel generally shows frequent link disconnections and propagation delays due to weak wireless links. Specially speaking, optical wireless channels have more vulnerable links and roaming propagation delays relative to the weakness of the previous RF channels due to their low signal connectivity and small geographic coverage. Conventional optical wireless network protocols did not consider any fault models about physical link faults. Consequently, they have shown data transfer inefficiency for both data link control and physical wireless link control. To overcome these optical wireless environmental problems, this paper suggests a new wireless access point (or base station) agent system, which provides wireless or mobile clients with previous link layer protocols compensated.