• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.028 seconds

A Multipath Establishing Scheme using Pre-search in Ad Hoc Networks (애드혹 망에서 사전탐색을 통한 다중경로 설정)

  • Lee, Kil-Hung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.129-135
    • /
    • 2010
  • This paper suggests a multipath establishing scheme for ad hoc networks. Data paths are established by on-demand manner. Multipath are made as a sequence of route control message exchange at route setup process. Multipath can be used as a backup path or load balancing for data exchange. Proposed scheme uses a one-hop pre-search scheme for establishing multipath between source and destination. When a node selects a next node for route reply, the node finds optimal route by exchanging route information with neighbor nodes. Simulation results show that the proposed multipath scheme has better split characteristics among multipath and higher route survivability at the environment where nodes are moving.

Android-based Implementation of Remote Monitoring System for Industrial Gas Turbines (안드로이드 기반 산업용 가스터빈 원격 모니터링 시스템 구현)

  • Choi, Joon-Hyuck;Lee, Dong-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.369-376
    • /
    • 2018
  • This paper presents an android-based implementation of real-time remote monitoring system for industrial gas turbines. The use of remote monitoring techniques can be beneficial in terms of not only the reduction of monitoring cost but also the earlier detection of abnormal status. In order to achieve the ability of protecting sensitive information from unauthorized persons, the proposed system supports secure transmissions using the RSA(Rivest Shamir Adleman) algorithm. In the event of abnormal situation on the gas turbine, the remote monitoring system generates an alarm to attract the user's attention by exploiting a push-message technique. The proposed system has been verified through a series of experiments with an experimental setup including a virtual data generator.

A Study on Digital Device Advertising using Semiotics Analysis (지털 디바이스 광고의 기호학적 분석 연구)

  • Jeong, Bong-Keum;Lee, Bu-Hyoung
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.351-355
    • /
    • 2006
  • 1990년대 후반 이후 등장한 N세대 N generation라는 신조어는 넓게는 '10대 후반과 20대 초반의 새로운 세대'라는 'new'의 개념에서의 N세대 new generation를, 좁게는 '네트워크 network를 자유자재로 다루는 세대' 또는 '네트워크 속에서 생활하는 세대' 라는 '디지털 유저 digital user'의 개념에서의 N세대 network generation를 의미한다. 다시 말해, N세대는 디지털 디바이스의 정보와 지식을 바탕으로 자유롭게 디지털 세상을 넘나드는 젊은 디지털 유저 층이다. 본 연구의 목적은 디지털 디바이스 프로덕트 광고의 한 사례를 기호학적으로 분석하여 '"디지털 디바이스+ N세대=디지털 코드"라는 광고공식'과 '외연과 내연이 합해져 "기술적 시니피앙과 감성적 시니피에"의 상호작용적 조합 interaction'을 찾아보는 것에 있다. 여기서는 광고 분석의 사례로써 삼성 KENOX V4 광고를 이용한다. KENOX V4 는 N세대를 겨냥한 디지털 디바이스 프로덕트이며, 이 광고는 '외국 브랜드를 제압하는 의미의 V'라는 코드를 사용하고 있다. 자기만의 주장을 당당하게 할 줄 아는 N세대가 소년기에 가졌던 한국이라는 자부심이 그가 성인기에 들어선 이후에도 V라는 승리의 표상으로 나타나고 있는 것이다. V4 광고의 이미지는 N세대를 상징하는 강력한 '디지털 코드digital code'를 담아내고 있으며, 그 V4의 메시지는 '4백만 화소'라는 '기술적 시니피앙 technological significant'과 '4가지 승리'라는 '감성적 시니피에 emotional signifie'의 상호작용적 조합을 구성하고 있다.

  • PDF

Performance Analysis on Adaptive Modulation Systems with Multislot Allocation for Multimedia Communications (멀티미디어 통신에 있어서 멀티슬롯 할당을 이용한 적응변조방식에 관한 성능해석)

  • 강희조;이말례;박경열
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.625-632
    • /
    • 2000
  • This paper proposes an adaptive multislot allocation algorithm in order to achieve large system capacity and higher throughput data transmissions. The proposed system is the combination of the slow adaptive modulation system, in which the base station dynamically a signs optimum modulation parameters measuring the CNR(carrier to noise power ratio) of each transmission terminal, and the multislot allocation scheme, in which the base station flexibly allocates an appropriate number of TDMA data slots according to the instantaneous load conditions. Computer simulations confirm that the proposed system can tremendously improve average message delay characteristics in comparison with the conventional fixed slot allocation method.

  • PDF

Migration of Web Services in a Mobile Environment (모바일 환경에서 웹 서비스의 이동)

  • Park, Myung-Woo;Kim, Yeon-Seok;Lee, Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1179-1193
    • /
    • 2008
  • Recently, mobile devices enabled with Web services are being considered as equal participants of the Web services environment. The frequent mobility of devices and the intermittent disconnection of wireless network require migrating or replicating Web services onto adjacent devices appropriately. This paper proposes an efficient method for migrating and replicating Web services among mobile devices through code splitting. Specifically, the proposed method split the source code of a Web service into sub-codes based on users' preference to its constituent operations. The sub-code with higher preference is migrated earlier than others. The proposed method also replicates a Web service to other devices to enhance its performance by considering context information such as network traffic or the parameter size of its operations.

  • PDF

Intelligent Dust Chamber Bag Control System using Case-Based Reasoning (사례기반 추론을 이용한 지능형 집진기 bag 제어 시스템)

  • Kim, Jung-Sook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.48-53
    • /
    • 2010
  • In this paper, we develop the intelligent remote dust chamber bag control system which is combination of the advanced IT and traditional dust chamber based on event. At first, the message format is defined for the efficient dust chamber bag information transmission using power line communication. Also, we define the data types to logically model the dust chamber and the dust chamber bag, and they are logically modeled using XML and object-oriented modeling method. In addition to, we apply the case-based reasoning for showing the dust chamber bag exchange time intelligently to user at real-time using casebase, that is collected by case or case-based reasoning result, and that is described using XML.

The Effect of Message Framing Depending on Psychological Ownership: Focusing on Information Security Behavior in Online Service (심리적 소유감에 따른 메시지 프레이밍 효과: 온라인 서비스에서의 사용자 정보보안 행동을 중심으로)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.1-18
    • /
    • 2018
  • As the online space becomes more active, interest in protecting personal information is increasing. From this point of view, it is important to prevent personal information from being leaked in advance. As a precaution, it is suggested that users change their password periodically to protect their personal information effectively. Currently, various online services provide a request message that prompts users to periodically change their password. These messages are expressed as positive-centric or negative-centric. This message can be seen as a powerful way to trigger users' behavior. In this context, this study suggests that message framing type can be applied to the password change request message, and to investigate the difference between the positive-centric message and the negative-centric message. In addition, this study concluded that the effect of message type may be different depending on the degree of psychological ownership of the individual on the online service. As a result, users with high psychological ownership in online service were more effective when positive-centric message was presented than negative-centric message. On the other hand, users with low psychological ownership in online service were more effective when negative-centric message was presented than positive-centric message.

Path Prediction-based Dynamic Data Sharing in Network Virtual Environment (네트워크 가상환경에서 경로예측에 의한 동적 데이터 공유)

  • Song, Sun-Hee;Ra, Sang-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10C
    • /
    • pp.956-963
    • /
    • 2006
  • This research studies multi participant consistency and dynamic data shared through 3D scenes in virtual network environments. In a distributed virtual environment of client-server structure, consistency is maintained by the static information exchange; as jerks occur by packet delay when updating messages of dynamic data exchanges are broadcasted frequence, the network bottleneck is reduced by predicting the movement path by using the Dead-reckoning algorithm. In Dynamic data path prediction, the tests the location prediction error between Dead-reckoning convergence interval and error of prediction and actual condition one time above threshold it interpolates a previously location. The shared dynamic data of the 3D virtual environment is implementation using the VRML EAI.

A Study on the Formative Artistry of Comic Strip Books (컷 분할 그림책의 예술성에 대한 연구)

  • 이선경;이경임
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.339-347
    • /
    • 2002
  • Comic strip is a narrative sequence of cartoon panels. Comic strip book as a visual medium of communication is very effective for grasping objects visually as well as for developing creative thinking and culturing aesthetic sentiments. These aesthetic experiences awaken us to formative sentiments, The purpose of present paper is to study the visual streaming of the illustrated comic strips. The typical comic strip books are analyzed and the characteristic of visual communication is studied. The narrative illustrations in the form of comic strips encourage us to have a prosperous experience and to understand new formative artistry and the remarkable effect of visual experience.

  • PDF

User Authentication Method on VANET Environment (VANET 환경에서의 사용자 인증 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7C
    • /
    • pp.576-583
    • /
    • 2012
  • Security over VANET among vehicles and between vehicles and infrastructures has been studied. Through the research, ensuring the message authentication and confidentiality was possible. However, authentication on drivers and vehicles were not actively covered. Once, malicious user using illegal vehicle joins VANET and then generates mistaken information, other drivers' safety will be driven to crisis. For this reason, in the paper, we present a novel authentication method between drivers and vehicles and then only right vehicles and users can participate in VANET. As a result of this, drivers can enjoy their safe and comfortable trip.