• Title/Summary/Keyword: Application Specific Message

Search Result 31, Processing Time 0.044 seconds

Design and experiment of the protocol using ASM2.0 : focusing on marine officers' mandatory reporting items (차세대 해상디지털통신기술 ASM2.0을 이용한 프로토콜 설계 및 실험 : 항해사의 의무보고 사항을 중심으로)

  • Kim, Kilyong;Kim, Do-yeon;Lee, Seojeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.43-44
    • /
    • 2015
  • AIS-ASM is a one of the study to provide a variety of maritime safety information as well as ship's position and navigational information that is their own function since 2004. This study aims to reduce the marine officer's workload through automating marine officer's mandatory reporting items using the one of the next maritime digital communication technology (ASM2.0). For this purpose, we designed and experimented of the ASM2.0 protocol through analyzing a domestic regulation about passenger flight and AIS-ASM message.

  • PDF

Architectural Approach Identification and Evaluation of Message System Using Design Pattern (설계 패턴을 활용한 라시지 시스템의 소프트웨어 아키텍처 접근법 식별 및 평가)

  • Koh, Hyon-Hee;Kung, Sang-Hwan;Park, Tae-Nyon
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.9-20
    • /
    • 2005
  • To design a software system in success, architectural approaches which are in basis of architectural design, must be primarily selected. What to chose among various architecture styles as specific as architectural approaches, varies along with the system status of what kind of functional or non-functional quality requirements should satisfy. In this study, we propose the evaluation model for making a selection of architectural approaches, and select an architectural approach for message system actively using in diversified internet utilization and enterprise application integration, In other words, if there may be possibly existed several architectural approaches, we present the most suitable method of architectural approach out of them through an evaluation of analyzing the system requirements satisfaction level. In addition, when it performs specific design and implementation utilizing design patterns based on thread, developers would be able to link up the architecture design directly.

  • PDF

Design and Implementation of a Linux-based Message Processor to Minimize the Response-time Delay of Non-real-time Messages in Multi-core Environments (멀티코어 환경에서 비실시간 메시지의 응답시간 지연을 최소화하는 리눅스 기반 메시지 처리기의 설계 및 구현)

  • Wang, Sangho;Park, Younghun;Park, Sungyong;Kim, Seungchun;Kim, Cheolhoe;Kim, Sangjun;Jin, Cheol
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.115-123
    • /
    • 2017
  • A message processor is server software that receives non-realtime messages as well as realtime messages from clients that need to be processed within a deadline. With the recent advances of micro-processor technologies and Linux, the message processor is often implemented in Linux-based multi-core servers and it is important to use cores efficiently to maximize the performance of system in multi-core environments. Numerous research efforts on a real-time scheduler for the efficient utilization of the multi-core environments have been conducted. Typically, though, they have been conducted theoretically or via simulation, making a subsequent real-system application difficult. Moreover, many Linux-based real-time schedulers can only be used in a specific Linux version, or the Linux source code needs to be modified. This paper presents the design of a Linux-based message processor for multi-core environments that maps the threads to the cores at user level. The message processor is implemented through a modification of the traditional RM algorithm that consolidates the real-time messages into certain cores using a first-fit-based bin-packing algorithm; this minimizes the response-time delay of the non-real-time messages, while guaranteeing the violation rate of the real-time messages. To compare the performances, the message processor was implemented using the two multi-core-scheduling algorithms GSN-EDF and P-FP, which are provided by the LITMUS framework. The benchmarking results show that the response-time delay of non-real-time messages in the proposed system was improved up to a maximum of 17% to 18%.

Design and realization of the passenger ship's MSP service system using ASM2.0 : focusing on captain's mandatory reporting items (차세대 해상디지털통신기술 ASM2.0을 이용한 여객선 MSP서비스 시스템 설계 및 구현)

  • Kim, Kilyong;Kim, Do-yeon;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.871-882
    • /
    • 2015
  • AIS-ASM is one of the studies to provide a variety of maritime safety information as well as the information on a ship's position that is their own function, and AIS-ASM has been implemented with adjustment of the relevant regulations since 2004. However, it was reported that the increased use of ASM message on the existing AIS channel affects the part of the existing AIS own function such as the transmission of the ship's position and safe-related information. Also, seamless MSP service is difficult to provide at a low transmission rate of the existing AIS channel. This study aims to reduce the marine officer's workload through automating captain's mandatory reporting items using the one of the next maritime digital communication technology (ASM2.0). For this purpose, we designed and realized the ASM2.0 protocol through analyzing domestic regulations about passenger flight and AIS-ASM message.

A design of LED pannel control ASCI (LED 전광판 제어 ASIC 의 설계)

  • 이수범;남상길;조경연;김종진
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.839-842
    • /
    • 1998
  • The wide spread of multimedia system demands a large viewin gdesply device which can inform a message to many peoples in open area. This paper is about the design, simulating and testing of a large viewing LED pannel control ASIC(application specific integrated circuit). This LED pannel control ASIC runs on 16 bit microprocessor MC68EC000 and has following functions:16 line interlaced LED pannel controller, memory controller, 16 channel priority inerrupt controller, 2 channel direct memory access controller, 2 channel 12 bit clock and timer, 2 channel infrared remocon receiver, 2 channel RS-232C with 16byte FIFO, IBM PC/AT compatible keyboard interface, battery backuped real time clock, ISA bus controller, battery backuped 256 byte SRAM and watech dog timer. The 0.6micron CMOS sea of gate is used to design the ASIC in amount of about 39,000 gates.

  • PDF

Data hiding in partially encrypted HEVC video

  • Xu, Dawen
    • ETRI Journal
    • /
    • v.42 no.3
    • /
    • pp.446-458
    • /
    • 2020
  • In this study, an efficient scheme for hiding data directly in partially encrypted versions of high efficiency video coding (HEVC) videos is proposed. The content owner uses stream cipher to selectively encrypt some HEVC-CABAC bin strings in a format-compliant manner. Then, the data hider embeds the secret message into the encrypted HEVC videos using the specific coefficient modification technique. Consequently, it can be used in third-party computing environments (more generally, cloud computing). For security and privacy purposes, service providers cannot access the visual content of the host video. As the coefficient is only slightly modified, the quality of the decrypted video is satisfactory. The encrypted and marked bitstreams meet the requirements of format compatibility, and have the same bit rate. At the receiving end, data extraction can be performed in the encrypted domain or decrypted domain that can be adapted to different application scenarios. Several standard video sequences with different resolutions and contents have been used for experimental evaluation.

해상 교통 안전 실현을 위한 ASM활용에 관한 연구

  • Choe, Jung-Yong;Kim, Ju-Yeong;Lee, Sang-Jae;Lee, Byeong-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.06a
    • /
    • pp.193-194
    • /
    • 2013
  • 최근 국내의 해양사고 원인은 인적 오류에 의한 사고가 약 80% 이상으로 제시되고 있다. 이 중 가장 높은 사고 원인은 '경계 소홀'(43.0%)로 전체 사고의 절반에 이르고 있다. 따라서 관제 및 항해 업무에 대한 집중력 향상과 점유적 관리에 대한 연구가 필수적으로 요구된다. 이에 본 논문에서는 선박이 관제 영역 내에 있을 경우 관제사에게 통보하여 관제 집중도를 향상시키고, ASM (Application Specific Message) 서비스와 연계하여 VHF음성통신으로 인한 정보 부재의 취약성을 보완하여, 안전한 항해 및 관제의 효율성을 제공하는 방식을 제안하고자 한다.

  • PDF

A Study on Automatic Generation Method of Proxy Client Code to Quality Information Collection (품질 정보 수집을 위한 프록시 클라이언트 코드의 자동 생성 방안에 관한 연구)

  • Seo, young-jun;Han, jung-soo;Song, young-jae
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.121-125
    • /
    • 2007
  • This paper proposes automatic generation method of proxy client code to automation of web service selection process through a monitoring agent. The technique of this paper help service consumer to provide source code of proxy client as it bring an attribute value of specific element of WSDL document using template rule. Namely, a XSLT script file provide code frame of dynamic invocation interface model. The automatic code generation technique need to solving starvation status of selection architecture. It is required to creating request HTTP message for every service on the result of search. The created proxy client program code generate dummy message about services. The proposed client code generation method show us a possibility of application in the automatic generation programming domain.

  • PDF

Automatic Generation Method of Proxy Client Code to Autonomic Quality Information (자율적인 웹 서비스 품질 정보 수집을 위한 프록시 클라이언트 코드의 자동 생성 방안)

  • Seo, Young-Jun;Han, Jung-Soo;Song, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.228-235
    • /
    • 2008
  • This paper proposes automatic generation method of proxy client code to automation of web service selection process through a monitoring agent. The technique of this paper help service consumer to provide source code of proxy client as it bring an attribute value of specific element of WSDL document using template rule. Namely, a XSLT script file provide code frame of dynamic invocation interface model. The automatic code generation technique need to solving starvation status of selection architecture. It is required to creating request HTTP message for every service on the result of search. The created proxy client program code generate dummy message about services. The proposed client code generation method show us a possibility of application in the automatic generation programming domain.

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.