• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.029 seconds

Development of voice pen-pal application of global communication system by voice message

  • Lau, Shuai
    • Korean Journal of Artificial Intelligence
    • /
    • v.2 no.1
    • /
    • pp.1-3
    • /
    • 2014
  • These days, interest and demand on smart learning has rapidly increased. Video English and mobile system based English speaking service have become popular. This study gave prototype of application to give and take voice message with world people and to give new concept of voice pen-pal beyond exchange of text messages. In modern society having rapidly increasing demand on smart learning, you can study foreign language by smart phone and communicate with foreigners by voice anytime and anywhere. The app allows global exchange to learn conversation. Recruitment of initial users and profit model have problems. We shall develop to improve problems and to solve difficulty.

Study on the Semantics of Communication Protocols in Message Squence Charts (MSC로 작성된 통신 프로토콜 명세의 의미론 연구)

  • 방기석;류광열;오정기;최진영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.451-453
    • /
    • 2000
  • 메시지 순서도(Message Sequence Chart,MSC)는 ITU-T에서 국제적인 표준으로 제안되어 주로 전기 통신 교환 시스템과 같은 실시간 시스템을 위한 통신 행위에 대한 개괄적인 표현 방법으로서 널리 사용되어지고 있으며 요구 명세, 인터페이스 명세, 시뮬레이션 및 검정을 위해 사용되어지고 있다. MSC의 장점이라면 표현된 시스템의 행위를 직관적으로 이해할 수 있게 해주는 그래픽 표현을 제공하는 것이다. 의미론 입장에서 보면 MSC는 폴세스 대수 ACP의 변형인 PA$\varepsilon$에 의해 의미를 부여받고 있긴 하지만 이해하기가 난해한 것이 사실이다. 본 논문에서는 MSC의 동작적 의미를 분석하며 ACSR로 변환하여 그 의미를 보다 쉽게 파악하는 방법론에 대해 다룬다.

  • PDF

Validation of Data Availability in V2V Basic Safety Message (V2V 기본 안전 메시지 데이터의 유효성 검증)

  • Kim, Insu;Park, Jaehong;Lee, Eun-Young;Lee, Eun Dok;Shin, Jaekon;Kim, Daewon
    • Journal of Auto-vehicle Safety Association
    • /
    • v.9 no.2
    • /
    • pp.33-39
    • /
    • 2017
  • In recent days, crash safety system based on vehicle-to-vehicle communication (V2V) has been legislated. This V2V based safety system collects information from nearby vehicles to predict any crash possibility. Thus, it requires accurate and reliable data. Regularly updated features of Basic Safety Message(BSM) will be used to test validity of various elements included in the BSM. Then, the focus was made on whether values of these elements had notable differences compared to previous values. Through this paper, the validation tool was implemented and the result from V2V OBU experiment was used to identify problems in the current model and additional features that need to be implemented in V2V OBU for more accurate BSM.

An Efficient and Flexible Hybrid Conditional Access System for Advanced T-DMB

  • Bae, Byung-Jun;Song, Yun-Jeong;Lee, Soo-In;Seo, Hyung-Yoon;Kim, Jong-Deok
    • ETRI Journal
    • /
    • v.33 no.4
    • /
    • pp.629-632
    • /
    • 2011
  • This letter presents a hybrid conditional access system (CAS) for advanced terrestrial digital multimedia broadcasting (AT-DMB). The proposed architecture is characterized by its use of a unified CAS channel and various communication networks for CAS message transmissions. We implement a prototype CAS based on the hybrid architecture, which improves the CAS message transmission efficiency greatly compared to the existing T-DMB CAS standard and supports various AT-DMB interlayer services more easily and efficiently.

A Secure WLAN Authentication Scheme

  • Singh, Rajeev;Sharma, Teek Parval
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.176-187
    • /
    • 2013
  • Message replay, malicious Access Point (AP) associations and Denial of Service (DoS) attacks are the major threats in Wireless LANs. These threats are possible due to a lack of proper authentication and insecure message communications between wireless devices. Current wireless authentication & key exchange (AKE) schemes and security protocols (WEP, WPA and IEEE 802.11i) are not sufficient against these threats. This paper presents a novel Secure WLAN Authentication Scheme (SWAS). The scheme introduces the delegation concept of mobile authentication in WLANs, and provides mutual authentication to all parties (Wireless Station, Access Point and Authentication Server). The messages involved in the process serve both authentication and key refreshing purposes. The scheme enhances the security by protecting the messages through cryptographic techniques and reduces the DoS impact. The results showed that cryptographic techniques do not result in extra latencies in authentication. The scheme also reduces the communication cost and network overhead.

  • PDF

A Study on Intelligent Railway Level Crossing System for Accident Prevention

  • Cho, Bong-Kwan;Jung, Jae-Il
    • International Journal of Railway
    • /
    • v.3 no.3
    • /
    • pp.106-112
    • /
    • 2010
  • Accidents at level crossing have large portion on train accidents, and causes economical loss by train delay and operational interruption. Various safety equipments are employed to reduce the accident at level crossing, but existing warning device, and crossing barrier are simple train-oriented protection equipments. In this paper, intelligent railway level crossing system is proposed to prevent and reduce accidents. For train driver's prompt action, image of level crossing and obstacle warning message are continuously provided to train driver through wireless communication in level crossing control zone. Obstacle warning messages, which are extracted by computer vision processing of captured image at level crossing, are recognized by train driver through message color, flickering and warning sound. It helps train driver to decide how to take an action. Meanwhile, for vehicle driver's attention, location and speed of approaching train are given to roadside equipments. We identified the effect of proposed system through test installation at Sea train and Airport level crossing of Yeong-dong line.

  • PDF

Detecting Steganographic Contents Using EWM Statistics (EWM 통계량을 이용한 스테가노그래픽 자료 감지 기법)

  • Ji, Seon-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.54-62
    • /
    • 2008
  • For a message hiding technique to be effectual, it needs to have availability, confidentiality and integrity. Steganography is the science of hiding one message within other types of digital contents. In this case, attempt to defeat steganalysis by restoring the statistics of the composite image to resemble that of the cover, these discrepancies expose the fact that hidden communication is happening. In this paper, I present a steganography scheme capable of concealing a piece of secrete information in a host image and base on the technique's OCT, RGB, statistical restoration.

  • PDF

The Design Of Improved Information Security System based on SSL(Secure Socket Layer) For Providing Secure Communication Services (안전한 통신 서비스를 제공하는 향상된 SSL(Secure Socket Layer) 기반 정보보호 시스템의 설계)

  • 유성진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1387-1394
    • /
    • 2000
  • The SSL(Secure Socket Layer) protocol is one of the mechanism widely used in the recent network system. The improved information security mechanism based on the SSL is designed in this paper. There are important four information security services. The first is the authentication service using the Certificate offered from the SSL(Secure Socket Layer), the second is the message confidentiality service using the DES encryption algorithm, the third is the message integrity service using Hash function, and the fourth is Non-repudiation service. Therefore, information could be transferred securely under the information security mechanism including Non-repudiation service especially designed in this paper.

  • PDF

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

Performance Enhancement of Parallel Prime Sieving with Hybrid Programming and Pipeline Scheduling (혼합형 병렬처리 및 파이프라이닝을 활용한 소수 연산 알고리즘)

  • Ryu, Seung-yo;Kim, Dongseung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.10
    • /
    • pp.337-342
    • /
    • 2015
  • We develop a new parallelization method for Sieve of Eratosthenes algorithm, which enhances both computation speed and energy efficiency. A pipeline scheduling is included for better load balancing after proper workload partitioning. They run on multicore CPUs with hybrid parallel programming model which uses both message passing and multithreading computation. Experimental results performed on both small scale clusters and a PC with a mobile processor show significant improvement in execution time and energy consumptions.