• Title/Summary/Keyword: national protocols

Search Result 812, Processing Time 0.026 seconds

Design and implementation of an integrated network management agent (통합 망 관리 에이전트 설계 및 구현)

  • Park, Sang-Cheol;Kim, Tae-Su;Lee, Gwang-Hwi
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.683-692
    • /
    • 2001
  • In this paper, an integrated network management agent has been proposed and implemented to support different network management protocols, SNMP (Simple Network Management Protocol) for Internet and CMIP (Common Management Information Protocol) for OSI networks. We used MOVI (Managed Object View Interface) concept to integrate the different network management systems. We reviewed three models to design the integrated network management agent and then selected a suitable model among them. The logical structure of an agent, the implementation method and the operation of each module have been shown in this paper. The osimis and ucd-snmp network management system have been used as the reference systems for implementing our system. The integrated network management agent can support the internetworking between Internet and OSI networks in the aspect of network management. Using MOVI concept, if a new management system is introduced, internetworking with this can be achieved by adding the new interface on the view interface of managed object.

  • PDF

Intelligence Health Care Terminal Interface Design and Implementation for Continua International Certification (컨티뉴아 국제 인증용 지능형 헬스케어 단말기 인터페이스 설계 및 구현)

  • Lee, Jeong-Gi;Kim, Kuk-Se;Ahn, Seong-Su;Lee, Ho-Young;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1839-1846
    • /
    • 2012
  • With increasing chronic patients due to population aging, many needs for pro-active health and medical treatment services are rising and desire for health care service is also rising due to national standard of living Especially population aging of Korea is faster than America, France and many other advanced nations, and a study states that arrival time of elderly population rates; 14%(aged society) to 20%(transcendental aged society)l only takes 8 years. In these reasons, health care industry for the next engine industry is reinforced. Many health care terminals are coming out and Continua Health Alliance is founded and working steadily based on Philips in 2006. In this paper, we suggest Gateway interface system for Continua accreditation to control vary communication by designing intelligent health care interface suitable for Continua international accreditation because there are many types of terminals and communication protocols.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

Systematic Review of Chuna Manipulative Treatment for Ankle Sprain

  • Kwak, Min Kyung;Kim, Min Wook;Jeong, Sang Jun;Kim, Shin Ae;Jeong, Mi Young;Kim, Jae Hong
    • Journal of Acupuncture Research
    • /
    • v.35 no.2
    • /
    • pp.61-68
    • /
    • 2018
  • Background: This study was performed to review the efficacy of national and international randomized controlled trials (RCT) investigating Chuna manipulative treatment for ankle sprains. Methods: Online databases (PubMed, Cochrane, EMBASE, CNKI, NDSL, OASIS), were searched for studies where Chuna treatment was performed for ankle sprains up to October 12th, 2017. Only RCT were selected that fulfilled the inclusion/exclusion criteria. Data were analyzed using the Cochrane risk of bias tool. Results: There were 676 studies retrieved from the databases, resulting in analysis of 24 RCT. There was an average of 7 treatment visits over a 7 day period and the most frequent evaluation tool used was efficacy rate, with drug therapy being the most common control used in the trials. In 15 RCT, several Chuna methods were used in combination, amongst which, the osteopathic technique was most common. Statistically significant improvement in evaluation indices was reported in 19 RCT, and in 3 RCT, statistically significant improvement was reported, but not for all indices. In the remaining 2 RCT, there were no significant differences in any of the evaluation indices. No adverse reactions were reported in any of the RCT, although it was unknown whether all the trial protocols indicated that adverse reactions should be monitored, and for this reason, the risk of bias was unclear. Conclusion: The review of 24 studies suggest that Chuna manipulative treatment for ankle sprains was effective in most cases, although, potential bias in these studies was difficult to evaluate.

A Study on the Feasibility of Developing a Nationwide Cyber Risk Management System utilizing Social-Science Analytic Theories (사회과학적 위기관리이론을 활용한 국가사이버안보 평가체계 구축 가능성 고찰)

  • 이상호
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.259-265
    • /
    • 2004
  • Since the 2003.1.25 Internet Crisis, the government has been looking at a number of options to strengthen national cyber-security/crisis management capability to guard against ever increasing threat of cyber-war and terror. Thus, the focus of this study was to explorer new ways of developing a comprehensive cyber-security/crisis management system, in particular by combining modern social-science analytic theories. As a result, although there has to be more in-depth researches into incorporating advanced techniques to generate more detailed and object-specific indexes and protocols, the use of 'event data system,' which has been widely utilized in many recent social science researches to assess a wide-range of socio-political risks and crises, could be adopted as a basis for a comprehensive nationwide cyber-risk management system.

  • PDF

A New Approach to the Science Education Assessment Using Partial Credits to Different Science Inquiry Problem Solving Process Types

  • Lee, Hang-Ro;Lim, Cheong-Hwan
    • Journal of the Korean earth science society
    • /
    • v.23 no.2
    • /
    • pp.147-153
    • /
    • 2002
  • Reasonable and reliable assessment method is one of the most important issues in science education, Partial credits method is an effective tool for assessing students' science inquiry problem solving. The purposes of this study were to classify the Problem solving types based on the analysis of the thinking Process, and how much the related science concept and the science process skills were used in solving science inquiry problems, and to describe the possibility and rationality of the assessment method that gives partial credit 128 high school seniors were selected and their answers were analyzed to identify science concepts they used to solve each problem, and the result was used as the criterion in the scientific concept test development. Also, to study the science inquiry problem solving type, 152 high school seniors were selected, and protocols were made from audio-taped data of their problem solving process through a think-aloud method and retrospective interviews. In order to get a raw data needed in statistical comparison of reliability, discrimination and the difficulty of the test and the production of the regression equation that determines the ratio of partial credit, 640 students were selected and they were given a science inquiry problem test, a science process skills test, and a scientific concept test. Research result suggested it is more reasonable and reliable to switch to the assessment method that applies partial credit to different problem solving types based on the analysis of the thinking process in problem solving process, instead of the dichotomous credit method.

Evaluation of a Fall Risk Assessment Tool to Establish Continuous Quality Improvement Process for Inpatients' Falls (낙상예방 활동의 지속적 질 관리 프로세스 확립을 위한 위험 사정도구 평가)

  • Park, Ihn-Sook;Cho, In-Sook;Kim, Eun-Man;Kim, Min-Kyung
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.17 no.4
    • /
    • pp.484-492
    • /
    • 2011
  • Purpose: The aims of study were; (1) to evaluate the validity and sensitivity of a fall-risk assessment tool, and (2) to establish continuous quality improvement (CQI) methods to monitor the effective use of the risk assessment tool. Methods: A retrospective case-control cohort design was used. Analysis was conducted for 90 admissions as cases and 3,716 as controls during the 2006 and 2007 calendar years was conducted. Fallers were identified from the hospital’s Accident Reporting System, and non-fallers were selected by randomized selection. Accuracy estimates, sensitivity analysis and logistic regression were used. Results: At the lower cutoff score of one, sensitivity, specificity, and positive and negative predictive values were 82.2%, 19.3%, 0.03%, and 96.9%, respectively. The area under the ROC was 0.60 implying poor prediction. Logistic regression analysis showed that five out of nine constitutional items; age, history of falls, gait problems, and confusion were significantly associated with falls. Based on these results, we suggested a tailored falls CQI process with specific indexes. Conclusion: The fall-risk assessment tool was found to need considerable reviews for its validity and usage problems in practice. It is also necessary to develop protocols for use and identify strategies that reflect changes in patient conditions during hospital stay.

Practice Preferences on Dabigatran and Rivaroxaban for Stroke Prevention in Patients with Non-valvular Atrial Fibrillation (비판막성 심방세동 환자의 뇌졸중 예방에서 dabigatran과 rivaroxaban의 임상적용의 현황)

  • Park, You Kyung;Kang, Ji Eun;Kim, Seong Joon;La, Hyen O;Rhie, Sandy Jeong
    • Korean Journal of Clinical Pharmacy
    • /
    • v.26 no.3
    • /
    • pp.207-212
    • /
    • 2016
  • Objective: Prescription rate of dabigatran and rivaroxaban, which are the direct oral anticoagulants (DOAC), has increased. We have analyzed the prescription trend and medication use of dabigatran and rivaroxaban in patients with non-valvular atrial fibrillation (NVAF). Methods: It was retrospectively studied from September 2012 to April 2014 using the electronic medical records and the progress notes. Patients with NVAF (n=424) were evaluated on the medication use, prescribing preferences, adverse drug reactions (ADRs) and the availability of prescription reimbursement of dabigatran (n=210) and rivaroxaban (n=214). Results: Dabigatran was prescribed higher than rivaroxaban (23.3% versus 7.5%, p<0.001) in the neurology department, but rivaroxaban was prescribed higher compared to dabigatran in the cardiology department (87.4% versus 74.3%, p<0.001). Dabigatran was prescribed more than rivaroxaban in high risk patients with CHADS2 score ${\geq}3$ (44.3% versus 31.3%, p=0.006). Dabigatran patients seemed to have more ADRs than patients with rivaroxaban (25.2% versus 11.2%, p<0.001), but no serious thrombotic events and bleeding were found. Only 35.6% (n=151) were eligible for prescription reimbursement by the National Health Insurance (NHI). Bridging therapy (86, 31.5%) and direct-current cardioversion (57, 20.2%) were main reasons of ineligibility for reimbursement. Conclusion: Prescription preferences were present in choosing either dabigatran or rivaroxaban for patients with NVAF. Inpatient protocols and procedures considering patient-factors in NVAF need to be developed.

Low-Cost AES Implementation for Wireless Embedded Systems (무선 내장형 시스템을 위한 제비용 AES의 구현)

  • LEE Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.12
    • /
    • pp.67-74
    • /
    • 2004
  • AES is frequently used as a symmetric cryptography algorithm for the Internet. Wireless embedded systems increasingly use more conventional wired network protocols. Hence, it is important to have low-cost implementations of AES for thor The basic architecture of AES unrolls oかy one full cipher round which uses 20 S-boxes together with the key scheduler and the algorithm repeatedly executes it. To reduce the implementation cost further, the folded architecture which uses only eight S-box units was studied in the recent years. In this paper, we will study a low-cost AES implementation for wireless communication technology based on the folded architecture. We first improve the folded architecture to avoid the sixteen bytes of additional state memory. Then, we implemented a single byte architecture where only one S-box unit is used for data encryption and key scheduling. It takes 352 clocks to finish a complete encryption. We found that the maximum clock frequency of its FPGA implementation reaches about 40 MHz. It can achieve about 13 Mbps which is enough for 3G wireless communication technology.

Inter-device Mutual Authentication and Formal Verification in Vehicular Security System (자동차 보안시스템에서 장치간 상호인증 및 정형검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.205-210
    • /
    • 2015
  • The auto industry has significantly evolved to the extent that much attention is paid to M2M (Machine-to-Machine) communication. In M2M communication which was first used in meteorology, environment, logistics, national defense, agriculture and stockbreeding, devices automatically communicate and operate in accordance with varying situations. M2M system is applied to vehicles, specifically to device-to-device communication inside cars, vehicle-to-vehicle communication, communication between vehicles and traffic facilities and that between vehicles and surroundings. However, communication systems are characterized by potential intruders' attacks in transmission sections, which may cause serious safety problems if vehicles' operating system, control system and engine control parts are attacked. Thus, device-to-device secure communication has been actively researched. With a view to secure communication between vehicular devices, the present study drew on hash functions and complex mathematical formulae to design a protocol, which was then tested with Casper/FDR, a tool for formal verification of protocols. In brief, the proposed protocol proved to operate safely against a range of attacks and be effective in practical application.