• Title/Summary/Keyword: network agents

Search Result 478, Processing Time 0.046 seconds

Performance Comparison of Security System with Various Collaboration Architecture (다양한 연동 구조를 통한 보안 시스템의 성능 비교)

  • 김희완;서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.235-242
    • /
    • 2004
  • As e-business being rapidly developed the importance of security is on the rise in network. Intrusion detection systems which are a core security system detect the network intrusion trial. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network and the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) and CNP (Contract Net Protocol) for detecting intrusions. In this paper, we propose the effective method comparing the blackboard architecture to contract net protocol.

  • PDF

Interventions for anesthetic success in symptomatic irreversible pulpitis: A network meta-analysis of randomized controlled trials

  • Sivaramakrishnan, Gowri;Alsobaiei, Muneera;Sridharan, Kannan
    • Journal of Dental Anesthesia and Pain Medicine
    • /
    • v.19 no.6
    • /
    • pp.323-341
    • /
    • 2019
  • Background: Local anesthetics alone or in combination with adjuncts, such as oral medications, have routinely been used for pain control during endodontic treatment. The best clinical choice amongst the vast numbers of agents and techniques available for pain control for irreversible pulpitis is unclear. This network meta-analysis combined the available evidence on agents and techniques for pulpal anesthesia in the maxilla and mandible, in order to identify the best amongst these approaches statistically, as a basis for future clinical trials. Methods: Randomized trials in MEDLINE, DARE, and COCHRANE databases were screened based on inclusion criteria and data were extracted. Heterogeneity was assessed and odds ratios were used to estimate effects. Inconsistencies between direct and indirect pooled estimates were evaluated by H-statistics. The Grading of Recommendation, Assessment, Development, and Evaluation working group approach was used to assess evidence quality. Results: Sixty-two studies (nine studies in the maxilla and 53 studies in the mandible) were included in the meta-analysis. Increased mandibular pulpal anesthesia success was observed on premedication with aceclofenac + paracetamol or supplemental 4% articaine buccal infiltration or ibuprofen+paracetamol premedication, all the above mentioned with 2% lignocaine inferior alveolar nerve block (IANB). No significant difference was noted for any of the agents investigated in terms of the success rate of maxillary pulpal anesthesia. Conclusion: Direct and indirect comparisons indicated that some combinations of IANB with premedication and/or supplemental infiltration had a greater chance of producing successful mandibular pulpal anesthesia. No ideal technique for maxillary anesthesia emerged. Randomized clinical trials with increased sample size may be needed to provide more conclusive data. Our findings suggest that further high-quality studies are required in order to provide definitive direction to clinicians regarding the best agents and techniques to use for mandibular and maxillary anesthesia for irreversible pulpitis.

Integrity Guarantee Scheme of Mobile Agents through Authentication of Digital Signature with TTS (TTS기반에서 디지털 서명의 실행 인증을 통한 에이전트의 무결성 보장 기법)

  • Jung Chang-Ryul;Yoon Hong-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.651-657
    • /
    • 2006
  • This paper propose the technique for the execution authentication of digital signature with TTS(traceable trust server) to guarantee the safe execution of mobile agents. That is to say, it is focused on improving the processing speed of systems and the traffic of network which are problems in the existing studies. The digital signature is used to guarantee the efficient and safe execution and the integrity of mobile agents. The certificate of it is chained with synthesis function, cryptographic algorithm based on public key, and hash function. And white hosts can be protected against the threat of being used maliciously. Then, we prove the efficiency of system overhead and the traffic of network by the analysis. In case the certificate chain of a digital signature is used, the safe execution of mobile agents can be protected against attackers that wish to insert a newly created certificate after cutting off the chain after striking space key 2 times.

Integrated Network Management Agents of IMT-2000 based on ASIB Component

  • Park, Soo-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1382-1385
    • /
    • 2002
  • By managing various communication networks collectively, Telecommunication Management Network (TMN) has appeared as a concept to aim for the unified and effective communication network operation and maintenance. IMT-2000 and other network such as PSTN, cellular networks and packet witching network that are integrated with IMT-2000 have been developed in different platforms - hardware and operating system, and a same circumstance will happen in the maintenance in the future. Also, it is difficult to approach to the standard for Q3 interface implementation of the agent in TMN system that may occur in the development or the maintenance for the different platform of IMT-2000 and other networks that are integrated with IMT-2000. In order to solve this kind of Problems, this Paper suggests integrated network management agent of IMT-2000 based on the NTS model and Advanced Intelligent Network(AIN).

  • PDF

Adolescents' Social Network and their Self-Perceived Competence (청소년의 사회적 관계망과 역량지각)

  • 최은희;공인숙
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.11
    • /
    • pp.63-72
    • /
    • 2001
  • The purpose of this study was to examine the relationship of adolescents'social network and their self-perceived competence. In this study 207 seventh and ninth grade adolescents completed Social Network of Relationships Inventory(NRI) and Self-Perception Profile For Children(SPPC). The data were analyzed by Frequencies, Percentiles, t-test, Cronbach's $\alpha$, Pearson's correlation. Major findings were as follows: 1) Social network of relationships with various social agents made different contributions to the prediction of adolescents'self-perceived competence. 2) In social network of relationships, boys perceived significantly higher than girls for the social support from teacher. In Competence, boys perceived significantly higher than girls for the social acceptance and athletic competence. 3) In social network of relationships, the seventh grader perceived significantly higher than the ninth grader for the social support from mother, father and teacher. In scholastic competence, athletic competence, physical appearance and global self-worth, the seventh grader perceived significantly higher than the ninth grader.

  • PDF

Design of Automatic Warehouse and Inventory control under HMS concept

  • Suesut, Taweepol;Intajag, Sathit;Roengruen, Prapas
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1001-1005
    • /
    • 2004
  • The objective of this paper is to develop the flexible manufacturing system (FMS), which is cooperated with the automatic warehouse and inventory control under holonic manufacturing system (HMS). The HMS is a next wave of manufacturing revolution to deal with dynamic changing. The architecture of HMS is developed for cooperation system between the automatic warehouse agents and the manufacturing agents. This research applies the concept of HMS to develop a distributed control system for automatic warehouse and FMS by industrial network. The parts of prototype manufacturing agents consist of the conveyer system and 3-axises robot that provide the variety patterns in order to work as punch process. Each order of productions depends on the reorder points(RP) of inventory levels. The computation results indicate an improvement by comparing with traditional centralized control.

  • PDF

Design and Implementation of a Traceback System based on a Traceback Agent (역추적 에이전트를 이용한 역추적 시스템 설계 및 구현)

  • Jeong, Jong-Min;Lee, Ji-Yul;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.22 no.B
    • /
    • pp.147-153
    • /
    • 2002
  • It is very important to detect and remove original sources of DOS (Denial of Service) attacks or connection oriented/connectionless attacks. In this paper, we implement a traceback system that does not require the reaction of routers and administrators and does not need log data. We bring in a traceback server and traceback agents in each network and use sniffing and spoofing schemes. Finally, the traceback server detects attacking hosts using information transmitted from traceback agents.

  • PDF

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

A Hybrid A, pp.oach to Multiple Neural Networks and Genetic Programming : A Perspective of Engineering Design A, pp.ication (다중 인공 신경망과 유전적 프로그래밍의 복합적 접근에 의한 공학설계 시스템의 개발)

  • 이경호;연윤석
    • Journal of Intelligence and Information Systems
    • /
    • v.4 no.1
    • /
    • pp.25-40
    • /
    • 1998
  • 본 논문에서는 경사진 의사결정 트리(oblique decision tree)에 의해 몇 개의 영역으로 분할된 입력공간(input space)에서 우수한 성능을 발휘할 수 있도록 유전적 프로그래밍 트리들(genetic programming trees)과 연합된 다중 인공신경망 시스템을 개발하였다. 다중 인공신경망인 지역 에이전트들(local agents)은 불할된 영역을 책임지며, 유전적 프로그래밍 트리들로 구성된 경계 에이전트들 (boundary agents)은 불할된 영역의 경계부분만을 담당하게 된다. 본 연방 에이전트 시스템을 이용하여 설계 초기단계의 정보 제한성을 극복하고, 선박 초기설계 단계에서 선박 중앙부 형상설계를 수행하여 범용 설계 시스템으로서의 유용성을 검증하였다.

  • PDF

Development on Intrusion Detection, Based on Blackboard Architecture (Blackboard 기반의 침입탐지 시스템 개발)

  • Shin, Woo-Chul;Choi, Jong-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.454-460
    • /
    • 2000
  • In this paper, an architecture is suggested which efficiently detects intrusions in network environments. In the architecture, the Blackboardbased agent coordinates opinions of several independent agents which are performing unique functions, by resolving conflicts and reconfirming notices of intrusion. In the simulation, it was found that conventional agents judge simple resource access activities as 'intrusion' while blakcboard-based agent reserves the judgement until additional information confirms notices of independent agents. Reconfirmation process based on additional questioning will roduce positive errors.

  • PDF