• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.027 seconds

The Study on Relationship between Mobile Phone Text Usage and Hand Dexterity

  • Chae, Soo-Gyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.77-86
    • /
    • 2019
  • The purpose of this study was to reveal how the agility of fingers directly involved in the use of mobile phones, a necessity for modern people, is related to the amount of text usage. To find out, 95 people who agreed to the purpose of this research without any limitation on visual and upper-geometry were selected. The research period was from June 27, 2018 to July 31, 2018. The evaluation tool used in this study was Grooved Pegboard, a standardized evaluation tool that measures hand dexterity, and the general characteristics of examinees such as age, text message amount, and a hand that using for text messages were investigated through interviews. Since text input methods vary depending on mobile phone types, unfamiliar methods of typing mobile phone characters can affect the speed of texting. As a result, there were significant differences in hand dexterity between age and gender. The rate of texting and hand dexterity were statistically significantly faster than those in their 20s and 30s (p<0.05), and in gender, women showed significantly faster texting and hand dexterity than men (p<0.05). However, it was not statistically significant to text usage and to the dexterity of the hand.

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

Fault Diagnosis Method of Complex System by Hierarchical Structure Approach (계층구조 접근에 의한 복합시스템 고장진단 기법)

  • Bae, Yong-Hwan;Lee, Seok-Hee
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.11
    • /
    • pp.135-146
    • /
    • 1997
  • This paper describes fault diagnosis method in complex system with hierachical structure similar to human body structure. Complex system is divided into unit, item and component. For diagnosing this hierarchical complex system, it is necessary to implement special neural network. Fault diagnosis system can forecast faults in a system and decide from current machine state signal information. Comparing with other diagnosis system for single fault, the developed system deals with multiple fault diagnosis comprising Hierarchical Neural Network(HNN). HNN consists of four level neural network, first level for item fault symptom classification, second level for item fault diagnosis, third level for component symptom classification, forth level for component fault diagnosis. UNIX IPC(Inter Process Communication) is used for implementing HNN wiht multitasking and message transfer between processes in SUN workstation with X-Windows(Motif). We tested HNN at four units, seven items per unit, seven components per item in a complex system. Each one neural newtork operate as a separate process in HNN. The message queue take charge of information exdhange and cooperation between each neural network.

  • PDF

Design and Evaluation of Multicast Message Delivery Algorithm for Mobile Networks (이동통신망을 위한 멀티캐스트 메시지 전달 알고리즘의 설계 및 평가)

  • Jang, Ik-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.537-545
    • /
    • 2009
  • In this paper, we proposed an effective multicast causal order algorithm with hand-off protocol for mobile networks. Since the size of control informations needed to enforce message transfer order has much influence on the performance of hand-off and message transfer in mobile networks, size of control information need to be minimized. We reduced the size of control information by analyzing all the valid communication patterns and pruning redundant information not required to enforce causal order as early as possible, and used hand-off protocol which requires minimal amount of control information to be transferred. By simulation, we found that the proposed algorithm showed better performance than other existing algorithms.

A Compromise-Resilient Tunneled Packet Filtering Method in Wireless Sensor Networks (무선 센서 네트워크에서 훼손 감내하는 터널된 패킷 여과 기법)

  • Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2008
  • In wireless sensor networks, an adversary can launch the wormhole attacks, where a malicious node captures packets at one location and tunnels them to a colluding node, which retransmits them locally. The wormhole attacks are very dangerous against routing protocols since she might launch these attacks during neighbor discovery phase. A strategic placement of a wormhole can result in a significant breakdown in communication across the network. This paper presents a compromise-resilient tunneled packet filtering method for sensor networks. The proposed method can detect a tunneled message with hop count alteration by a comparison between the hop count of the message and one of the encrypted hop counts attached in the message. Since the proposed method limits the amount of security information assigned to each node, the impact of wormhole attacks using compromised nodes can be reduced.

  • PDF

Tanner Graph Based Low Complexity Cycle Search Algorithm for Design of Block LDPC Codes (블록 저밀도 패리티 검사 부호 설계를 위한 테너 그래프 기반의 저복잡도 순환 주기 탐색 알고리즘)

  • Myung, Se Chang;Jeon, Ki Jun;Ko, Byung Hoon;Lee, Seong Ro;Kim, Kwang Soon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.637-642
    • /
    • 2014
  • In this paper, we propose a efficient shift index searching algorithm for design of the block LDPC codes. It is combined with the message-passing based cycle search algorithm and ACE algorithm. We can determine the shift indices by ordering of priority factors which are effect on the LDPC code performance. Using this algorithm, we can construct the LDPC codes with low complexity compare to trellis-based search algorithm and save the memory for storing the parity check matrix.

Development of a Information Delivery System between School and Parents Using Homepage and Mobile Message Services (홈페이지와 휴대폰 메시지 서비스를 이용한 학교-학부모의 정보전달 시스템 개발)

  • Lee, Wan Kwon
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.4
    • /
    • pp.71-77
    • /
    • 2005
  • Effective information delivery between school and parents is very important in preschool and the lower classes of elementary school. It is because by the fact that the traditional method of information delivery relies on kids to deliver school information but they are not sufficiently matured enough to deliver information correctly. In this point of view, this paper proposes a new information delivery method combining internet homepage and mobile message services and develops a information delivery system to support that method. Proposed method and developed system are able to correctly deliver information within the desired time and they do not increase the burden of communication costs and teacher's works.

  • PDF

Readability of Health Messages and Its Communicative Effect (건강 메시지의 독이성과 소통 효과)

  • You, Myoung Soon;Ju, Young Kee
    • Korean Journal of Health Education and Promotion
    • /
    • v.29 no.5
    • /
    • pp.27-36
    • /
    • 2012
  • Objectives: Developing efficient health messages is important for improving health behaviors at a societal level. This study attempts to test a few variables that could constitute the elements for measuring readability of health message. The number of subject-verb relationships in a sentence, placement of jargon, i.e., explication before or after each jargon, and the number of less familiar Chinese characters were manipulated to hypothetically differentiate readability. Methods: In a $2{\times}2$ mixed factorial experiment, 152 college students read two health messages regarding side effect of health functional food and energy drink. The participants' perceived readability was asked, and eight questions were developed to measure the participants' recognition of the health information. Results: Those who read messages manipulated to have high readability rated the message significantly higher than those who read messages with low readability. Also, the former answered the questions more correctly than the latter, implying the association between readability and knowledge acquisition regarding health. Conclusions: Readability is suggested as a factor determining the effect of health messages in affecting the public's health risk perception and relevant behaviors. Further studies to sophisticate the measurement itself and to examine the effect of actual public messages with different readabilities are suggested.

Android mobile phone information push system based on the XMPP protocol (XMPP 프로토콜기반 안드로이드 휴대폰 정보 푸쉬 시스템)

  • Pyoun, Do-Kil;Hao, Liu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.561-566
    • /
    • 2013
  • In this paper, android phone information push system based on the XMPP protocol is proposed. For this, we implement a XMPP(eXtensible Message and Presence Protocol) based instant message system in C/S network environment by using Java language and eclipse device. This system not only allows sending and receiving messages from the PC server to mobile phone client, but also enables the expansion into the smack package of an android phone. Thus, this system shown, in this paper has the better performance in transmission and transfer speed than those of the basic XMPP protocol system.

A Normalization Method of Distorted Korean SMS Sentences for Spam Message Filtering (스팸 문자 필터링을 위한 변형된 한글 SMS 문장의 정규화 기법)

  • Kang, Seung-Shik
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.7
    • /
    • pp.271-276
    • /
    • 2014
  • Short message service(SMS) in a mobile communication environment is a very convenient method. However, it caused a serious side effect of generating spam messages for advertisement. Those who send spam messages distort or deform SMS sentences to avoid the messages being filtered by automatic filtering system. In order to increase the performance of spam filtering system, we need to recover the distorted sentences into normal sentences. This paper proposes a method of normalizing the various types of distorted sentence and extracting keywords through automatic word spacing and compound noun decomposition.