• Title/Summary/Keyword: Communication message

Search Result 1,633, Processing Time 0.071 seconds

Implementation of network architecture for a humanoid robot (휴머노이드 로봇의 네트워크 구조 구현)

  • Sung, Yu-Kyoung;Kong, Jung-Shik;Lee, Bo-Hee;Kim, Jin-Geol
    • Proceedings of the KIEE Conference
    • /
    • 2004.07d
    • /
    • pp.2397-2399
    • /
    • 2004
  • This paper deals with the messages scheduling of a CAN (Controller Area Network), based on the distributed control scheme to integrate actuators and sensors in a humanoid robot. In order to supply the distributed processing for a humanoid robot, each control unit should have the efficient control method, fast calculation and valid data exchange. The preliminary study has concluded that the performance of CAN is better and easier to implement than other network such as FIP (Factory Instrumentation Protocol), VAN (Vehicle Area Network), etc. Since humanoid robot has to treat the significant control signals from many actuators and sensors, the communication time limitation could be critical according to the transmission speed and data length of CAN specification. In this paper, the CAN message scheduling in humanoid robot was suggested under the presence of Jitter in the message group, the existence of high load of messages over the network and the presence of transmission errors. In addition, the response time under the worst case is compared with the simulation by using the simulation algorithm. As a result, the suggested messages scheduling can guarantee our CAN limitation, and utilized to generate the walking patterns for the humanoid.

  • PDF

Design of U-Healthcare Monitoring System based on Mobile Device (모바일 디바이스 기반의 U-헬스케어 모니터링 시스템 구현)

  • Park, Joo-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.46-53
    • /
    • 2012
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. It is necessary to develop the WBAN core technology that sensor node device, WBAN middleware and WBAN application service for WBAN environment. In this paper we designed the medical message structure and implemented medical application for purpose of vital information reliability. The message structure was proposed for WBAN environment and application can be check biometric information from BN on smart device through WBAN gateway.

DLMS SCADA System based on TETRA (TETRA 기반 DLMS 원방감시 시스템)

  • Song, Byung-Kwen;Lee, Suk-Hee
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.95-102
    • /
    • 2009
  • TETRA(TErrestrial Trunked RAdio) is wireless communication system generally adopted to public network and backbone network, as the technology of Trunked Radio System specified by ETSI(European Telecommunications Standards Institute) and currently adopted to the Electric Power IT Backbone Network in Korea. DLMS(Device Language Message Specification) is used in order to meter an electric measuring instrument value. In this paper, DLMS Server and Client simulator are used based on Window operating system. The multi-functional gateway, which transforms the communications based on RS-232C between DLMS Server Simulator and Client Simulator to the one based on TETRA PEI(Peripheral Equipment Interface), is developed such that DLMS SCADA(Supervisory Control And Data Acquisition) system is constructed based on TETRA.

  • PDF

Sender Authentication Mechanism based on SW Security Card with PGP for Secure E-mail (SW 형태의 보안카드와 PGP 기반 안전한 E-mail 송신자 인증 기법)

  • Lee, Hyung-Woo
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.3
    • /
    • pp.57-66
    • /
    • 2007
  • E-mail system is considered as a most important communication media, which can be used to transmit personal information by internet. But e-mail attack also has been increased by spoofing e-mail sender address. Therefore, this work proposes sender verification faculty for spam mail protection at sender's MTA by using security card for protection forged sender and also for authenticating legal sender. Sender's mail MT A requests security card's code number to sender. Then sender input code number and generate session key after sender verification. Session key is used to encrypt sender's signature and secure message transmission. This work can provide efficient and secure e-mail sender authentication with sender verification and message encryption.

  • PDF

Mobile Web Service Performance Enhancement by Simplifying Architecture (모바일 웹서비스 성능 향상 처리기 설계)

  • Oh, Soo-Lyul;Ryu, Gab-Sang;Kim, Chul
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.2
    • /
    • pp.287-294
    • /
    • 2011
  • In this paper, we suggest performance enhanced Mobile Web service architecture. Mobile Web Services are new technology that integrates different applications to provide interoperability. SOAP is a lightweight message exchanging protocol and is a principal factor that decides the Web Services performance. When a mobile Web Service is implemented with the Java technology, it should be implemented with both a SOAP message processor like AXIS, and Java Servlet container (e.g. Tomcat). This typical implementation is not efficient because it requires an additional communication port and process. In this paper, we suggest a new method that replaces this typical approach to enhance Web Service performance.

  • PDF

Content analysis in the impact of twitter message type on Receiver Response (트위터 메시지 유형이 메시지 수용자 반응에 미치는 영향에 관한 내용분석 연구)

  • Moon, Sung-kyun;Yoo, Hee-Sook;Kwon, Kon-Woo
    • The Journal of Information Systems
    • /
    • v.23 no.4
    • /
    • pp.1-24
    • /
    • 2014
  • This study is intended to examine two issues related with social media messages. At first, the authors investigate that how they can categorize messages in the social media and how corporate twitters and brand twitters communicate with consumers. Secondly, after dividing messages in the social media into several groups, the authors investigate how each type of messages differ one another in terms of the consumer response. For examining these research issues, the authors gather twitter message data of global top 100 brands and categorize messages into 5 types (i.e., interactivity, diversion, information sharing, promotional, content) based on the motivation of communication and the format of the messages. Especially, the authors use content analysis methodology, which is normally used as the qualitative approach, in order to identify the type of messages. Furthermore, the authors present interactivity type of messages can communicate better with consumers and induce more favorable responses from consumers in the social media than any other type of messages. This research can provide implications in terms of theoretical, methodological, and managerial perspective.

The Persuasive Effects according to Types of Exercise Promotion Advertisements for Obesity Prevention in Elementary School Students (초등학생의 비만예방을 위한 운동증진 광고의 유형별 설득효과)

  • An Gyeong Ju;Choe Myoung-Ae;Kim Byoung Hee
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.5
    • /
    • pp.817-828
    • /
    • 2005
  • Purpose: This study was to identify the persuasive effects of exercise promotion advertisements for obesity prevention according to the source types( ordinary people, experts, celebrity endorsers) and advertising message types(slices of life, testimonials). Method: Gender, height, body weight, BMI, attitude toward obesity(Aob) and exercise(Aex), and intention to exercise(Iex) were collected from 626 elementary school students in a pretest. After 2 months, six advertisements type attached to a questionnaire were provided for 20 minutes and then Aob, Aex, lex, source credibility and attitude toward advertisements(Aad) were collected in posttest. Result: 1) In posttest the lex of 6 the groups increased significantly compared with that of the pretest, 2) Source credibility of the Ordinary+Testimonial group was lower than the Celebrity+Testimonial, Celebrity+Slice of life, Ordinary+Slice of life, and Expert+Testimonial groups, Aad of the Celebrity+Testimonial group was higher than the Ordinary+ Testimonial group. 3) The Main effect and interaction effect of source types and advertising message types were significant in source credibility and Aad, Conclusion: Persuasive effects of exercise promotion advertisements in elementary school students was found to be the most effective in Celebrity+Testimonial. This study suggests that selection of health education advertisements according to demographic characteristics is important to promote persuasive effects.

Implementation of ISO/IEEE 11073-10404 Monitoring System Based on U-Health Service (유헬스 서비스 기반의 ISO/IEEE 11073-10404 모니터링 시스템 구현)

  • Kim, Kyoung-Mok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.625-632
    • /
    • 2014
  • The u-health service is using portable device such as smart device and it consists of small computing device. The u-health service carry out same performance with desktop computer. We designed message structure based on Bluetooth HDP. This message structure is used to transmit patient's biometric data on the smart device of medical team, patient and family over the mobile network environment. ISO/IEEE 11073 PHD standard was defined based on the method of communication between the agent and the manager. And We are confirmed the reliable transmission of biometric data at the smart device by implementing the android OS based patient information monitoring application to check the status of patient for medical team, patient and family.

Deadline Handling in Real-Time Distributed Object Oriented Programming of TMO

  • Kim, Hee-Chul;Na, Sang-Dong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.6
    • /
    • pp.863-872
    • /
    • 2002
  • Real-time(RT) object-oriented(00) distributed computing is a form of RT distributed computing realized with a distributed computer system structured in the form of an object network. Several approached proposed in recent years for extending the conventional object structuring scheme to suit RT applications, are briefly reviewed. Then the approach named the TMO(Time-triggered Message-triggered Object) structuring scheme was formulated with the goal of instigating a quantum productivity jump in the design of distributed time triggered simulation. The TMO scheme is intended to facilitate the pursuit of a new paradigm in designing distributed time triggered simulation which is to realize real-time computing with a common and general design style that does not alienate the main-stream computing industry and yet to allow system engineers to confidently produce certifiable distributed time triggered simulation for safety-critical applications. The TMO structuring scheme is a syntactically simple but semantically powerful extension of the conventional object structuring approached and as such, its support tools can be based on various well-established 00 programming languages such as C++ and on ubiquitous commercial RT operating system kernels. The Scheme enables a great reduction of the designers efforts in guaranteeing timely service capabilities of application systems.

Performance Enhancing of Web service by Simplifying Architecture in Web 2.0 (웹 서비스의 서버 구조 단순화를 통한 웹 2.0 웹서비스 성능향상)

  • Kim, Yong-Tae;Park, Gil-Cheol;Kim, Seok-Soo;Lee, Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.421-426
    • /
    • 2007
  • In this paper, we are to overcome the latency problem of current Web 2.0 Web Services system. To overcome the standard mobile web services implementation, a SOAP message processing system (SMSP) was proposed in which the SOAP request and response messages are directly processed without using Servlet engine. Our system can completely support standard Web Services protocol, reducing communication overhead, message processing time, and server overload.