• Title/Summary/Keyword: network agents

Search Result 483, Processing Time 0.028 seconds

Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device

  • Kim, Sang Kon;Kim, Tae Kon;Koh, Jinhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.991-1013
    • /
    • 2020
  • E-health services have provided interoperability between personal health devices in personal area network, based the ISO/IEEE 11073 standard. In the healthcare system, the manager handles most agents concurrently through wireless communication. However, due to the distance limitation and the increased number of agents, it may be difficult to provide continuous connectivity. Recently, body area devices have been equipped with various applicable agents, which can even handle agents on behalf of the manager. A BAD may act as an intermediary device to increase system efficiency and performance. In this study, a device called "proxy", which can be installed as software on BAD devices, is proposed. The data measured by an agent can be sent to the proxy first, and subsequently be sent to the manager again. Agents and the manager are not aware of the proxy existence and work normally without the proxy. Furthermore, a new smart proxy and modified manager are proposed. The smart proxy acts as one agent handling measurement data from several agents, which can transmit a significant amount of data at once. The proxy and smart proxy maintain compatibility with existing devices that conform to the 20601 standard. The proposed schemes are verified and the complexities of devices are analyzed. The analysis shows no significant difference among the proxy, smart proxy, and manager. Simulations exhibit that the proposed schemes can improve the system performance.

The Networks of the Korean Clean Development Mechanism(CDM) Industry: Agents and Linkages (한국 청정개발체제 산업 네크워크: 행위자와 연계)

  • Lee, Jin-Hyung
    • Journal of the Korean Geographical Society
    • /
    • v.49 no.6
    • /
    • pp.865-883
    • /
    • 2014
  • This study investigated the carbon offset project activities as the activities of producing commodities by a case study on the Korean Clean Development Mechanism(CDM) industry. This study draw the networks of Korean CDM industry by extracting major agents and surrounding agents and by analyzing the characteristics of the linkages. The project participants owning the CDM projects hires CDM consultancies and designated operational entities(DOEs). The technical knowledge for carbon emission reduction made links between project participants and the CDM project operational knowledge made links between project participants and CDM consultancies. Links between project participants and DOEs are affected by social and geographical proximities. The value of the knowledge for CDM industrial activities determined the role of agents and type of linkages. The agents with the irreplaceable knowledge could be a project conducting firms. The agents without it became outsourcing contractors.

  • PDF

Injectable hydrogels delivering therapeutic agents for disease treatment and tissue engineering

  • Lee, Jin Hyun
    • Biomaterials Research
    • /
    • v.22 no.4
    • /
    • pp.235-248
    • /
    • 2018
  • Background: Injectable hydrogels have been extensively researched for the use as scaffolds or as carriers of therapeutic agents such as drugs, cells, proteins, and bioactive molecules in the treatment of diseases and cancers and the repair and regeneration of tissues. It is because they have the injectability with minimal invasiveness and usability for irregularly shaped sites, in addition to typical advantages of conventional hydrogels such as biocompatibility, permeability to oxygen and nutrient, properties similar to the characteristics of the native extracellular matrix, and porous structure allowing therapeutic agents to be loaded. Main body: In this article, recent studies of injectable hydrogel systems applicable for therapeutic agent delivery, disease/cancer therapy, and tissue engineering have reviewed in terms of the various factors physically and chemically contributing to sol-gel transition via which gels have been formed. The various factors are as follows: several different non-covalent interactions resulting in physical crosslinking (the electrostatic interactions (e.g., the ionic and hydrogen bonds), hydrophobic interactions, ${\pi}$-interactions, and van der Waals forces), in-situ chemical reactions inducing chemical crosslinking (the Diels Alder click reactions, Michael reactions, Schiff base reactions, or enzyme-or photo-mediated reactions), and external stimuli (temperatures, pHs, lights, electric/magnetic fields, ultrasounds, or biomolecular species (e.g., enzyme)). Finally, their applications with accompanying therapeutic agents and notable properties used were reviewed as well. Conclusion: Injectable hydrogels, of which network morphology and properties could be tuned, have shown to control the load and release of therapeutic agents, consequently producing significant therapeutic efficacy. Accordingly, they are believed to be successful and promising biomaterials as scaffolds and carriers of therapeutic agents for disease and cancer therapy and tissue engineering.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems (이기종의 침입탐지 시스템과 SDMS-RTIR의 실시간 상호연동을 지원하는 침입탐지 메시지 교환 라이브러리 구현)

  • Yun, Il-Sun;Lee, Dong-Ryun;Oh, Eun-Sook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.565-574
    • /
    • 2003
  • This paper implements an intrusion detection message exchange protocol library (IDMEPL) for SDMS-RTIR, which Korea Information Security Agency (KISA) has developed to hierarchically detect and respond to network vulnerability scan attacks. The IDMEPL, based on the IDMEF and the IAP of the IDWG, enables SDMS-RTIR to interact with other intrusion detection systems (IDS) in realtime, and supports the TLS protocol to prevent security threats in exchanging messages between its server and its agents. Especially, with the protocol selection stage, the IDMEPL can support various protocols such as the IDXP besides the IAP. Furthermore, it can allow for agents to choose an appropriate security protocol for their own network, achieving security stronger than mutual authentication. With the IDMEPL, SDMS-RTIR can receive massive intrusion detection messages from heterogeneous IDSes in large-scale networks and analyze them.

Bayesian Inference driven Behavior-Network Architecture for Intelligent Agent to Avoid Collision with Moving Obstacles (지능형 에이전트의 움직이는 장애물 충돌 회피를 위한 베이지안 추론 주도형 행동 네트워크 구조)

  • 민현정;조성배
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.8
    • /
    • pp.1073-1082
    • /
    • 2004
  • This paper presents a technique for an agent to adaptively behave to unforeseen and dynamic circumstances. Since the traditional methods utilized the information about an environment to control intelligent agents, they were robust but could not behave adaptively in a complex and dynamic world. A behavior-based method is suitable for generating adaptive behaviors within environments, but it is necessary to devise a hybrid control architecture that incorporates the capabilities of inference, learning and planning for high-level abstract behaviors. This Paper proposes a 2-level control architecture for generating adaptive behaviors to perceive and avoid dynamic moving obstacles as well as static obstacles. The first level is behavior-network for generating reflexive and autonomous behaviors, and the second level is to infer dynamic situation of agents. Through simulation, it has been confirmed that the agent reaches a goal point while avoiding static and moving obstacles with the proposed method.

Cooperative Multi-agent Reinforcement Learning on Sparse Reward Battlefield Environment using QMIX and RND in Ray RLlib

  • Minkyoung Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.11-19
    • /
    • 2024
  • Multi-agent systems can be utilized in various real-world cooperative environments such as battlefield engagements and unmanned transport vehicles. In the context of battlefield engagements, where dense reward design faces challenges due to limited domain knowledge, it is crucial to consider situations that are learned through explicit sparse rewards. This paper explores the collaborative potential among allied agents in a battlefield scenario. Utilizing the Multi-Robot Warehouse Environment(RWARE) as a sparse reward environment, we define analogous problems and establish evaluation criteria. Constructing a learning environment with the QMIX algorithm from the reinforcement learning library Ray RLlib, we enhance the Agent Network of QMIX and integrate Random Network Distillation(RND). This enables the extraction of patterns and temporal features from partial observations of agents, confirming the potential for improving the acquisition of sparse reward experiences through intrinsic rewards.

Security Design of Information Security for Wireless Local Area Network (무선 네트워크망의 정보보호를 위한 시스템 설계)

  • Kim, Jung-Tae;Jung, Sung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.729-732
    • /
    • 2003
  • Security and privacy issues complicate wireless local area network deployment. for a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This paper describes security issues related to wireless local area networks and presents a software approach for restricting and controlling wireless access. The system authenticates users on the basis of identity, privileges and access hardware by distributed software agents that implement security policy and restrict unauthorized access.

  • PDF

Enhanced Dynamic Management of Mobile Agent in Location Based Routing

  • Narahara, Yuichiro;Shiokawa, Shigeki
    • Journal of Multimedia Information System
    • /
    • v.3 no.4
    • /
    • pp.129-134
    • /
    • 2016
  • A routing protocol in mobile ad hoc networks is important, and a location based routing has attracted attention. We have proposed a method, in which plural mobile agents (MA) manage location information and construct a route and the number of MA dynamically changes depending on the network situation. However, the area where each MA manages is not always appropriate. This would increase the network load due to unnecessary split and mergence of MAs. To solve this problem, in this paper, we propose an enhanced method. In this method, the MA management area is properly determined based on distribution of nodes. From the performance evaluation, we show that the proposed method outperforms conventional methods in terms of packet delivery rate when network load is high.

The Design of Integrated Intrusion Detection System in Large Networks (대규모 네트워크를 위한 통합 침입탐지시스템 설계)

  • 정연서
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.953-956
    • /
    • 2002
  • The threat to the network is increasing due to explosive increasing use of the Internet. Current IDS(Intrusion Detection System) detects intrusion and does individual response in small area network. It is important that construction of infra to do response in all system environment through sharing information between different network domains. This paper provides a policy-based IDS management architecture enabling management of intrusion detection systems. The IIDS(Integrated Intrusion Detection System) is composed of IDAs(Intrusion Detection Agents). We describe requirements in design and the elements of function.

  • PDF