• Title/Summary/Keyword: Communication message

Search Result 1,629, Processing Time 0.027 seconds

The Implementation of Real-Time Vital Sign Information Transmission Monitoring System using TMO (TMO를 이용한 실시간 생체정보 전송 모니터링 시스템 구현)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.3
    • /
    • pp.33-40
    • /
    • 2008
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems. It is able to apply to remote medical examination and treatment. Through the proper data exchange and management of patient vital sign information, real time vital sign information management will offer better workflow to all hospital employee.

  • PDF

Design of A-GBSR Protocol Using Beacon Message in 802.11p WAVE (802.11p WAVE에서 비콘메시지를 이용한 A-GBSR 프로토콜 설계)

  • Jeong, Seon-Mi;Kim, Hyun-Ju;Kim, Chang-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.7
    • /
    • pp.1554-1560
    • /
    • 2015
  • 802.11p WAVE is the next-generation wireless communication that can make Ad-hoc network communication possible for Vehicle-to-Vehicle. GBSR protocol, one of the 802.11p WAVE protocols, mainly focuses on improvements in networks that have a tendency to disconnect. However, it does not consider the transmission time and velocity of a packet thus, there is a disadvantage of there being a delay in the transmission velocity, in urgent situations like car accidents, emergency patients transportation and crimes. In this paper, we proposed A-GBSR protocol for transmission of a packet to mobile node which has a high speed through the improved beacon message and Adaptive Neighbor list Management that are considering of the GBSR protocol transmission velocity.

Implementation of the Disaster Monitering System with PLC/CDMA Environments (PLC/CDMA 환경에서의 재난 감시 시스템 구현)

  • Park, Sang-Hwan;Kim, In-Min;Yoon, Seon-Tae;Park, Ki-Won;Go, Bong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.824-830
    • /
    • 2010
  • PLC_Zigbee system, implemented in a previous study, uses ZigBee Node based on PLC (Power Line Communication). The weak point of the system is that the long distance powerline communication and PLC is impossible to use in the areas where the powerline is not installed. In this paper, we added CDMA (Code Division Multiple Access) module using a data transfer method of SMS (Short Message Service) and XBee of WSN (Wireless Sensor Network) module to the previous system, and got around the restriction of place and environment of PLC system through the interfacing of each communication media. We, thus, implemented a wide range of real monitoring system.

An Approach of Hiding Hangul Secret Message in Image using XNOR-XOR and Fibonacci Technique (XNOR-XOR과 피보나치 기법을 이용하여 이미지에서 한글 비밀 메시 지를 은닉하는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.109-114
    • /
    • 2021
  • As various users increase in a network environment, it is difficult to protect sensitive and confidential information transmitted and received from attackers. Concealing bitwise secret data in an image using the LSB technique can be very vulnerable to attack. To solve this problem, a hybrid method that combines encryption and information hiding is used. Therefore, an effective method for users to securely protect secret messages and implement secret communication is required. A new approach is needed to improve security and imperceptibility to ensure image quality. In this paper, I propose an LSB steganography technique that hides Hangul messages in a cover image based on MSB and LSB. At this time, after separating Hangul into chosung, jungsung and jongsung, the secret message is applied with Exclusive-OR or Exclusive-NOR operation depending on the selected MSB. In addition, the calculated secret data is hidden in the LSB n bits of the cover image converted by Fibonacci technique. PSNR was used to confirm the effectiveness of the applied results. It was confirmed 41.517(dB) which is suitable as an acceptable result.

Attendance-Absence Management System based Mutual Cooperation using Smart Device (스마트기기를 이용한 상호협력기반 전자출결 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.1
    • /
    • pp.19-27
    • /
    • 2021
  • With the development of information and communication technology and the increasing use of smart devices, universities are using an electronic attendance-absence management system using smart devices to facilitate efficient attendance management. Currently, the electronic attendance-absence management system has the disadvantage of causing an error in attendance when the Wi-Fi connection is not well established because the student's smartphone independently conducts electronic attendance, and it is difficult to manage attendance because the real-time push message transmission function is excluded. In this paper, we propose an electronic attendance-absence management system to prevent irregular attendance, provide real-time attendance results, and solve delays in attendance processing due to Wi-Fi connection problems. The proposed system can prevent delays in attendance processing as a result of irregular attendance because the instructor's smartphone processes proposed system using the Bluetooth communication function of the instructor's smartphone and the students' smartphone. In addition, it has the advantage of being able to notice management result in real time with the push message server.

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

A Study on the Educational methods of Communication through Chinese classics -- focused on the concept of "Goodness" in Daehak-- (중국 고전을 활용한 커뮤니케이션 교육방안 연구 --대학(大學)속 선(善)을 중심으로 --)

  • Jung, In-Suk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.461-468
    • /
    • 2021
  • The Chinese classic 'The Great Learning' presents a guideline in which direction we should go for the character education and the realization of a just society. It conveys the message, 'Everyone must remain at the level of goodness for our community based on training our own mind and body.' Goodness is a generic concept that means universal truth in the right direction. This study aims to present the direction of communication education for how everyone should stay in goodness. Communication education about goodness could be conducted as follows. Based on the theory of interpersonal communication and persuasive communication, first the abstract concept of goodness is understood, brainstorming and schema activity for the good are performed for true communication, and then the teaching and learning method combining debate, flipped learning, and writing could be utilized. It is difficult to provide communication education with the message of goodness with students who have grown up on the basis of comparatively cramming education. However, through communication using discussion, a paradigm shift in education will take place, and it will not only help form human relationships, but also recognize the importance of the meaning of the community in the society in which we live, and ultimately it will help foster character.

Secure and Efficient V2V Message Authentication Scheme in Dense Vehicular Communication Networks (차량 밀집환경에서 안전하고 효율적인 V2V 메시지 인증기법)

  • Jung, Seock-Jae;Yoo, Young-Jun;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.41-52
    • /
    • 2010
  • Message authentication is an essential security element in vehicular ad-hoc network(VANET). For a secure message authentication, integrity, availability, privacy preserving skill, and also efficiency in various environment should be provided. RAISE scheme has been proposed to provide efficient message authentication in the environment crowded with lots of vehicles and generally considered to be hard to provide efficiency. However, as the number of vehicles communicating in the area increases, the overhead is also incurred in proportion to the number of vehicles so that it still needs to be reduced, and the scheme is vulnerable to some attacks. In this paper, to make up for the vulnerabilities in dense vehicular communication network, we propose a more secure and efficient scheme using a process that RSU(Road Side Unit) transmits the messages of neighbor vehicles at once with Bloom Filter, and timestamp to protect against replay attack. Moreover, by adding a handover function to the scheme, we simplify the authentication process as omitting the unnecessary key-exchange process when a vehicle moves to other area. And we confirm the safety and efficiency of the scheme by simulating the false positive probability and calculating the traffic.

A Study on the Optimal Message Length of File Transfer Protocol via Satellite and Terrestrial Links (위성과 지상 회선에서 파일 전송 프로토콜의 최적 메세지 길이에 대한 연구)

  • Park, Jin-Yang;Lee, Yong-Hun;Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.215-223
    • /
    • 1997
  • The advantages of service in satellite links are representatively a long distance and large capacity transfer and simultaneous communication. And terrestrial links are of high speed and high quality data transfer Therefore a combined form of characteristics of satellite and terrestrial links is desirable to furnish a good quality service to subscribers. And in satellite links an analysis method and a simulation method of file transfer are conducted to evaluate the efficiency of file transfer. The parameters are used the message length and transmission time, and the number of chain record and transmission time. From the results of evaluation, in satellite links, it is found that when the message length is shorter than 512 bytes, the file transmission time becomes extremely long and when the message length is set at 1024 bytes, the file transmission time abruptly increase from 2048 bytes. Also it is confirmed that when the number of chain record is under 15, the file transmission time becomes extremely long and if the number increase up to 90,the time becomes gradually short and over 90,it becomes constant.Therefore,from the result of file transmission in th case of utilizing satelite links,it is confirmed that the optimum message length in the minmum transmission time is present closely at 1024 bytes.Also it is confirmed that when the satelite transmission sped becoms smaller from 24kbps to2400bps,the optimum message length also becomes smaller from 640 bytes to 256bytes.

  • PDF

The Effect of Corporate Social Responsibility on Corporate Image: The Role of Spillover Effect and Negativity Effect based on CSR dimensions (기업의 사회적 책임이 기업 이미지에 미치는 영향 - 차원별 파급효과와 메시지 유형을 중심으로 -)

  • Kim, Seongjin;Kim, Jongkeun
    • Asia Marketing Journal
    • /
    • v.11 no.4
    • /
    • pp.49-67
    • /
    • 2010
  • Previous researches have proven that corporate social responsibility(adhere CSR) is positively related to corporate performance. But Most of CSR related researches have several limitations. One of limitations is that those researches treated CSR as unidimensional construct. Almost researchers in the area of CSR concepts insisted that CSR is consist of multi dimensions. Carroll's four dimensions of CSR have been utilized by numerous academicians. Carroll asserted that CSR is composed of four dimensions: economic, legal, ethical, and philanthropic responsibility. But Carroll's dimensions were revised as three dimensions by Schwartz and Carroll, because ethical and philanthropic responsibility are not mutually exclusive. If CSR construct is composed of multiple dimensions, a message related to one of dimensions changes beliefs or evaluations about other dimensions that are not mentioned in the message. This phenomenon is called as "spillover effect". According to Ahluwalia, Unnava, and Burnkrant, negative information spills over to attributes that are associated with the target attributes but not mentioned in the message. Like this, this preponderant effect of negative information over positive information has been termed the "negativity effect". In this paper, authors try to prove the spillover effect and negativity effect among Schwartz and Carroll's three dimensions(economic, legal, and ethical responsibility) of CSR. The results of this study show that messages related to legal and ethical responsibility cause spillover effect and influence consumers' evaluation to other dimensions. Moreover, when negativity effect is added on spillover effect, spillover effect is more increased. It means that negative messages related to legal and ethical responsibility is more harmful to corporate image than negative message related to economic responsibility. The results of this study will help companies to manage corporate image using CSR messages as marketing communication tools. Companies should manage messages related to legal and ethical responsibility for more efficiently managing corporate image. Specially, because negative messages related to legal and ethical responsibility are more harmful to corporate image, companies must take care not to spread out negative message related to legal and ethical responsibility. Finally, we discuss the implications of the findings and limitations.

  • PDF