• Title/Summary/Keyword: 메시지변환

Search Result 222, Processing Time 0.029 seconds

Conformity Assessment and Test Method for Implementation of Web Services Compositions based on Choreography (코레어그래피 기반 웹 서비스 조합의 구현 적합성 평가 및 테스트 방법)

  • Kuk, Seung-Hak;Seo, Yong-Jin;Kim, Hyeon-Soo
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.83-98
    • /
    • 2012
  • Recently Web services and SOA(Service Oriented Architecture) is widely used for an effective integration way of distributed applications. The service choreography is a way of service compositions to define workflows and the message exchange protocols among several partner ser-vices in the B2B business process environment. It defines the overall business process from a global perspective. However, it must be transformed into some kind of the executable form to implement service compositions, because it does not support an execution mechanism but is a de-clarative form. Therefore, the transformed executable model must be validated with the original choreography model to guarantee behavior equivalence. In this paper, we propose the conformity assessment with respect to service compositions method between the choreography model and the transformed executable model. And we suggest the test method to show behavior equivalence between them from a viewpoint of the dynamic execution.

A Study on the Call-Setup and Message Mapping for Interworking between H.323 and SIP (H.323과 SIP간의 상호 연동을 위한 호 설정과 메시지 매핑에 관한 연구)

  • Kim, Jeong-Seok;Tae, Won-Kwi;Kim, Jeong-Ho;Ban, Jin-Yang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1017-1024
    • /
    • 2004
  • In this paper, we propose the progressed interworking method between H.323 and SlP, then explain the improved property. The VolP(Voice over Internet Protocol) technology which is able to use a voice service through internet is more cheaper then existing telephone charges, and is easil)· accept the various of multimedia services from internet. Previous connectionmethod of VoIP used H.323 protocol, but it is very complex to connection establishment. so, the SIP(Session Initiation Protocol) protocol that propose in SIP-Working Group is in use recently. Therefore, we need new interworking methodology between H.323 and SIP Products. In this thesis, the progress interworking method between H.323 and SIP are Propose, then interpret unnecessary packet delay for call setup and improved feature of message exchange.

  • PDF

Steganalysis Using Joint Moment of Wavelet Subbands (웨이블렛 부밴드의 조인트 모멘트를 이용한 스테그분석)

  • Park, Tae-Hee;Hyun, Seung-Hwa;Kim, Jae-Ho;Eom, Il-Kyu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.3
    • /
    • pp.71-78
    • /
    • 2011
  • This paper propose image steganalysis scheme based on independence between parent and child subband on the multi-layer wavelet domain. The proposed method decompose cover and stego images into 12 subbands by applying 3-level Haar UWT(Undecimated Wavelet Transform), analyze statistical independency between parent and child subband. Because this independency is appeared more difference in stego image than in cover image, we can use it as feature to differenciate between cover and stego image. Therefore we extract 72D features by calculation first 3 order statistical moments from joint characteristic function between parent and child subband. Multi-layer perceptron(MLP) is applied as classifier to discriminate between cover and stego image. We test the performance of proposed scheme over various embedding rates by the LSB, SS, BSS embedding method. The proposed scheme outperforms the previous schemes in detection rate to existence of hidden message as well as exactness of discrimination.

L2 Learners' Communication Strategies: A Data Convergence Analysis (제 2 언어 학습자의 의사소통 전략: 자료융합 분석)

  • Kang, Su-Ja
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.263-270
    • /
    • 2015
  • L2 learners deal with communication problems encountered during the course of their oral communication by employing what are known as communication strategies(CSs). As CSs play a significant role in communication and language learning, identifying CSs that facilitate communication has become important in L2 research. However, there have been some controversies about how to identify CSs, especially about data sources: conversation data, retrospective interview data, or combining two types of data. Drawing on the advantages of converged data, this study aimed to identify CSs that L2 learners use in their English communication through a convergence analysis of data. In this qualitative case study, the data were collected from Korean L2 learners' conversations and retrospective verbal reports in stimulated recall interviews. Using a data convergence approach, various CSs were identified: definition replacement CSs, message change CSs, time-gaining CSs, and comprehension CSs. This study suggests the effectiveness of CSs in handling L2 communication problems and the usefulness of data convergence in L2 CS research.

WebRSF: A Web-based Rich Communication Service Software Framework for Providing the 1-to-1 Chat Service (WebRSF: 1대 1 대화 서비스 제공을 위한 웹 기반 리치 커뮤니케이션 서비스 소프트웨어 프레임워크)

  • Lee, Dongcheul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.113-119
    • /
    • 2017
  • The Rich Communication Service(RCS) is a next generation mobile messaging service. Since it has been developed and managed by a wireless service provider, 3rd party application developers cannot utilize the RCS features in their apps. A few studies have been proposed to solve this problem, even though they were not viable level of deployment. This paper presents a Web-based Rich Communication Service Software Framework(WebRSF) to help the 3rd party application developers adopt RCS features easily. WebRSF converts complicated RCS protocols to simple web-based protocols for providing the RCS 1-to-1 chat service to the 3rd parties. Communication protocols between WebRSF and its clients are defined in this paper. Also, a network configuration diagram and a message flow diagram are defined. Finally, performance evaluation between the WebRSF client and the RCS client are performed to simulate the load on clients' devices. It shows that the WebRSF client has 17% less loads than the RCS client while initiating sessions, and has 25% more loads after initiating sessions.

Design of a HL7-based Mobile Web Prescription Interface for U-Healthcare (U-Healthcare를 위한 HL7 기반의 모바일 웹 처방 인터페이스의 설계)

  • Ahn, Yoon-Ae;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.8-16
    • /
    • 2013
  • Active studies are under way on telemedicine and medical support based on mobile devices in order to vitalize U-Healthcare. Especially when the medical law is revised to allow a remote prescription system, studies on a mobile prescription system will rapidly increase. And yet since mobile apps have less compatibility due to the nature of mobile platform, there is a restriction that they have to be redeveloped to be compatible with the platform. To compensate this problem, this study designs a mobile web prescription interface by using HLTML5, the standard language of mobile web development and jQuery Mobile, a JavaScript Library. It also adds a feature of converting to a form of standard protocol HL7-based messages to share data with existing hospital information system. This interface makes it possible to be interlocked with the existing hospital information system through the transmission of the HL7 messages. The advantage of the proposed system is that it can be used in various environments since it is independent of mobile platforms and compatible with general computers.

Spatio-temporal Query Processing Systems for Ubiquitous Environments (유비쿼터스 환경을 위한 시공간 질의 처리 시스템)

  • Lee, Ki-Young;Lim, Myung-Jae;Kim, Kyu-Ho;Kim, Joung-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.145-152
    • /
    • 2010
  • With the recent development of the ubiquitous computing technology, there are increasing interest and research in technologies such as sensors and RFID related to information recognition and location positioning in various ubiquitous fields. Especially, RTLS(Real-Time Locating Services) dealing with spatio-temporal data is emerging as a promising technology. For these reasons, the ISO/IEC published the RTLS standard specification for compatibility and interoperability in RTLS. Therefore, in this paper, we designed and implemented Spatio-temporal Query Processing Systems for efficiently managing and searching the incoming Spatio-temporal data stream of moving objects. Spatio-temporal Query Processing Systems's spatio-temporal middleware maintains interoperability among heterogeneous devices and guarantees data integrity in query processing through real time processing of unceasing spatio-temporal data streams and two way synchronization of spatio-temporal DBMSs. Web Server uses the SOAP(Simple Object Access Protocol) message between client and server for interoperability and translates client's SOAP message into CQL(Continuous Query Language) of the spatio-temporal middleware. Finally, this thesis proved the utility of the system by applying the spatio-temporal Query Processing Systems to a real-time Locating Services.

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment (IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘)

  • Lee, Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.

A Design and Implementation of Framework for Interworking between Heterogeneous Vehicle Networks for Intelligent Transportation System (지능형 교통시스템을 위한 이기종 차량 네트워크의 연동 프레임워크 설계 및 구현)

  • Yun, Sang-Du;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.901-908
    • /
    • 2010
  • There are many kinds of networks in vehicle for their purposes. In-vehicle networks, however, are not unified to single network. The networks are composed of several local networks because of communication speed, cost and efficiency. Because the complexity of network design for communication increases, local networks need a framework for interworking between heterogeneous networks. In this paper, a framework interworking between in-vehicle networks for ITS(Intelligent Transportation System) is proposed and implemented. The proposed framework consists of a compatible protocol, message conversion module, message transceiver module and message analysis module. The results obtained by implementation show that the framework efficiently supports the communication of information between heterogeneous in-vehicle networks.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.