• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.028 seconds

Study on Event Reporting Service for Digital Contents on the Convergence Network of Broadcasting and Communication (방송${\cdot}$통신 융합망에서의 디지털 콘텐츠 서비스를 위한 이벤트 리포팅 시스템 연구)

  • Ji Kyunghee;Moon Nammee;Kim Jaegon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.2
    • /
    • pp.190-201
    • /
    • 2005
  • MPEG-21 has identified the need fur Event Reporting in its vision for an interoperable multimedia framework. Event Reporting is required within the MPEG-21 multimedia framework in order to provide a standardized means for sharing information about Events amongst Peers and Users. Such Events relate to Digital Items and/or Peers that interact with them. Arising from an each Event, there is the opportunity to describe what occurred. However, there are a number of difficulties in providing an accurate report about an Event. Different observers of the Event may have vastly different perspectives, needs, and focuses. They may emphasize certain elements to the detriment of others, or they may describe an Event in a way that others may find confusing. In this paper, we design how to express Event Reporting message structure and system architecture in compliance with ISO/IEC 21000-15. And we implement the system for MPEG-21 Event Reporting service.

A Study of Dementia Patient Care Monitoring System Based on Indoor Location Using Bluetooth Beacon (블루투스 비콘을 활용한 실내위치기반 치매환자 모니터링 시스템에 관한 연구)

  • Kwon, Dae-Won
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.217-225
    • /
    • 2016
  • In this study, a dementia patient care monitoring system is suggested that uses a wearable type bluetooth beacon to prevent them from going missing. This system shows whether the patients stay within the manageable area and sends a warning message to their monitoring managers' or guardians' smart devices when they leave it. The feature of the system is that it provides the service based on indoor location that makes the beacon worn by dementia patients continuously transmit their location information to the managing server through the smart terminal installed indoors or in hospitals and that enables the monitoring managers or the guardians to receive messages sent from the server that tell the patients' whereabouts through their smart devices. The system suggested in this paper is believed to be a system that effectively contributes to the prevention of the dementia patients' going astray from the hospitals and facilities where they are taking care.

A Vision Disabled-Aid using the Context of Internet of Things (사물인터넷을 이용한 시각 장애자 보조 방법)

  • Sahu, Nevadita;Jeong, Min Hyuk;Chun, Jonghoon;Kim, Sang-Kyun
    • Journal of Broadcast Engineering
    • /
    • v.22 no.1
    • /
    • pp.78-86
    • /
    • 2017
  • The Internet of Things can offer disabled people the assistance and support, which is essential to achieve a good quality of life. The visually impaired people need assistance in finding locations, detecting obstacles on the way, and getting directions while moving around to reach their destination. Based on this persistent need, this paper proposes a navigation system for blind people using Internet of Things. The technologies used in our proposed system are: a smart cane containing an RFID reader and an ultrasonic sensor, a smart phone and Internet. The sensed data from the ultrasonic sensor for detecting obstacle is converted to International Standard format from ISO/IEC 23005-5 (MPEG-V Part 5). The system detects the blind person's location using the RFID tags implemented on the way. The system uses voice message in the smart phone to communicate with the blind person to lead him to his destination. The proposed system has been tested to navigate successfully in the campus.

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

An Implementation of the Dual Packet Seamless Transfer Protocol for Safety-related Railway Signaling System Network (철도 신호시스템의 Fail-Safe 네트워크를 위한 DPST(Dual Packet Seamless Transfer) 프로토콜의 구현)

  • Kim, Kyung-Shik;Ryu, Shin-Hyung;Kwon, Cheol;Lee, Jong-Seong
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.396-405
    • /
    • 2009
  • An interlocking equipment of railway signalling systems should have very high functional safety and reliability properties because of its vital railway protection functionality. In order to achieve the required safety and reliability level, an engineer, in general, designs and implements the interlocking equipment to operate under RTOS(Realtime Operating System) environment, and the control hardware architecture redundant to cope with the random failures of system or subsystem. In such an architecture, it's very difficult to implement the interlocking equipment to communicate with various interface systems including the signal operator's terminal. In this paper, we propose a dual ethernet network topology and dual packet seamless transfer protocol algorithm for railway signaling system such as the interlocking equipment. We verify in this paper that the proposed DPST protocol algorithm has the evidence of its robust properties against the random hardware faults and communication errors. The proposed communication structure and algorithm is implemented in the electronic interlocking equipment for the private railway system of Hyundai Steel Company and its performance and properties are validated on the guideline of European Railway Standard EN50159.

  • PDF

DEVS Simulation of Spam Voice Signal Detection in VoIP Service (VoIP 스팸 콜 탐지를 위한 음성신호의 DEVS 모델링 및 시뮬레이션)

  • Kim, Ji-Yeon;Kim, Hyung-Jong;Cho, Young-Duk;Kim, Hwan-Kuk;Won, Yoo-Jae;Kim, Myuhng-Joo
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.3
    • /
    • pp.75-87
    • /
    • 2007
  • As the VoIP service quality is getting better and many shortcomings are being overcome, users are getting interested in this service. Also, there are several additional features that provide a convenience to users such as presence service, instant messaging service and so on. But, as there are always two sides of rein, some security issues have users hesitate to make use of it. This paper deals with one of the issues, the VoIP spam problem. We took into account the signal pattern of voice message in spam call and we have constructed voice signal models of normal call, normal call with noise and spam call. Each voice signal case is inserted into our spam decision algorithm which detects the spam calls based on the amount of information in the call signal. We made use of the DEVS-$Java^{TM}$ for our modeling and simulation. The contribution of this work is in suggestion of a way to detect voice spam call signal and testing of the method using modeling and simulation methodology.

  • PDF

USN Security Enhancement Using System IDs (시스템 ID를 이용한 USN의 보안 취약성 개선)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.73-80
    • /
    • 2009
  • Security is critically important for ubiquitous sensor networks that are usually used for the military and serveillance in environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for ubiquitous sensor networks. ZigBee is used for low data rate and low power wireless sensor network applications. To deploy ubiquitous sensor networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Design the Time-Interval Based Fairness Partitioning Method in DVE (DVE에서 시간 기반 균등 부하 분산 방식 설계)

  • Won, Dong-Kee;An, Dong-Un;Chung, Seung-Jong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.1
    • /
    • pp.48-54
    • /
    • 2008
  • MMORPGs may involve a great number of concurrent players, and those servers usually have to manage hundred, or even thousands of avatars co-existing in the same virtual world. So if failing to send a command or an event message, or sending it too late may cause damages to the avatar evolution(death, injury, loss of resources), and may result in unjustified penalties for the player. Many policies could be defined to realize a ranking evaluation of available servers. Unfortunately, due to the highly dynamic characteristics of server loads and network performances, any optimal allocation would soon become sub-optimal. In order to solve those problems we propose the "time-interval based fairness partitioning method"(TIP). TIP will distribute the avatar to the game server equally with time-interval in order to avoid the problems form the unfairness of game servers load.

Gist-based Message Design Principles for Health Promotion and Public Health Education: Explication of Fuzzy Trace Theory (핵심정보 중심의 건강증진 및 보건교육 메시지 구성 원리: Fuzzy Trace Theory의 함의)

  • Shim, Min Sun;Cho, Young Hoan;Choi, Hyo Seon;Son, Hee Jeong;Ju, Young Kee;You, Myoung Soon
    • Korean Journal of Health Education and Promotion
    • /
    • v.30 no.5
    • /
    • pp.189-199
    • /
    • 2013
  • Objectives: This paper aims to explain principles of gist-based health message design and discuss their implications for health promotion and public health education. Methods: After reviewing Reyna and Brainerd's Fuzzy Trace Theory(FTT), the authors explicate how to transform FTT into a practical guidance of health message design. Our explication is based upon FTT's reasoning that human intuition, rather than analysis, takes a primary role in message recall and comprehension, followed by judgment and decision making. We expect gist-based message design to be appropriate to serve such intuition. Results: Four principles of gist-based message design are offered: (1) provision of qualitative, as well as quantitative, information of gist, (2) inclusion of visual images corresponding to gist, (3) use of effective message formats to emphasize the gist (4) inclusion of relevant reasons and contextutal information. Conclusions: Gist-based message design has theoretical and practical implications for health promotion, specifically in the field of public health education, the press and governmental communication toward the public, and provider-patient communication in medical settings.

Location-based Multicast Routing Algorithms for Wireless Sensor Networks in Presence of Interferences (무선 센서네트워크상에서 간섭영향을 고려한 위치정보기반 멀티캐스트 라우팅 알고리즘)

  • Cha, Jae-Young;Kong, Young-Bae;Choi, Jeung-Won;Ko, Jong-Hwan;Kwon, Young-Goo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.219-226
    • /
    • 2012
  • In wireless sensor networks (WSNs), location-based multicast routing (LMR) technique can increase the network life time and the channel capacity by reducing the number of duplicated data transmissions and control messages. However, previous LMR techniques can suffer from significant performance degradation due to concrete walls or other interfering objects deployed in the real environment, since they transmit the packets by using only the locations of the sensor nodes. To solve this problem, we propose an interference-aware location based multicast algorithm for WSNs. In the proposed algorithm, each node adjusts the energy cost for each link adaptively considering the interference effect and uses it for multicast decision in order to minimize the interference impact. Experimental results show that the proposed algorithm improves the delivery and energy performance when the network is affected by interference.