• Title/Summary/Keyword: Communication message

Search Result 1,633, Processing Time 0.027 seconds

Timing Data Optimize of Traffic Intersection C-ITS Message Set for LTE-based V2X in-vehicle Devices (LTE 기반 차량용 V2X 통신단말에 대한 신호 교차로 C-ITS 메시지의 타이밍 데이터 최적화 기법)

  • Park, Su-In;Seo, Woo-Chang;Yang, Eun-Ju;Seo, Dae-Wha
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.1
    • /
    • pp.45-54
    • /
    • 2022
  • Recently, the introduction of Cooperative Intelligent Transport Systems (C-ITS) has been attempted to solve the limitation of only the sensor of the vehicle itself. For example, vehicles traveling at intersections can drive more safely through C-ITS. By using V2X communication of WAVE and LTE, the driver can receive the status and time of traffic lights. However, LTE has a larger transmission delay time than WAVE, so timimg data may not match in real time. In this paper, using the SPaT message, it was confirmed that LTE has a larger C-ITS service transmission delay time than WAVE. Finally, it was confirmed that the timing data of SPaT provided by LTE corrected by the algorithm is similar to SPaT provided by WAVE. It was confirmed that safer intersection driving is possible based on real-time.

Development of Smart Platform based on MQTT (MQTT 기반 스마트 플랫폼 개발)

  • Kim, Gwan-hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.283-284
    • /
    • 2021
  • The domestic and overseas IoT (Internet of Things)-based automation industry is developing remarkably, and the development of this automation technology is further accelerated by the development of sensor technology. In recent years, the smart farm industry for the purpose of growing crops based on various sensor technologies is rapidly developing. In the case of smart farms, real-time monitoring and mobile services are provided by measuring representative environmental data such as temperature, humidity, and CO2 required for crop cultivation. Most of these environmental monitoring and control operations use the RS-485-based Modbus (RTU) communication method. In this paper, we intend to test the performance of sensor data and actuator information required for smart farm construction by building a platform for controlling sensor data and actuators based on LabView using MQTT (Message Queuing Telemetry Transport), an IoT standard protocol.

  • PDF

Examining Interaction Patterns in Online Discussion through Multiple Lenses

  • HAN, Seungyeon
    • Educational Technology International
    • /
    • v.15 no.2
    • /
    • pp.117-141
    • /
    • 2014
  • This qualitative study investigated different interaction patterns in an online discussion. The data was collected from asynchronous discussion occurred in a graduate course. The data analysis methods include inductive analysis and mapping strategy. The results of the study suggest three layers of interaction: response sequences, interaction amongst participants, and concept map of messages. The visualization of response sequences enabled the researcher to discover complex and dynamic interaction patterns amongst participants. The many-to-many communication feature of online discussion does not always enable direct one-on-one interaction between two participants. Rather, one message contributed to multiple threads in the stream of conversation. In terms of interaction amongst participants, the interaction amongst participants, as indicated in the data, the messages also bind each participant and consequently a group(s) of participants together. It appears that the contribution of one message may not only enable a response to one participant, but also connect many participants to each other. The concept map of messages proposes that response sequences and interaction amongst participants can also be viewed between concepts within messages in the discussion. On the surface, the messages posted by individuals are linked by the system in a linear fashion as they are posted. However, the interaction extends to collaborative conversation amongst participants. Ultimately, a conceptual network of interrelated ideas including multiple perspectives is built in asynchronous discussion.

Development of a Communication Unified AAC System (통신 융합형 보완·대체 의사소통 시스템 개발)

  • Kwak, S.W.;Kim, C.G.;Song, B.S.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.5 no.1
    • /
    • pp.65-70
    • /
    • 2011
  • A communication is one of the most important factors for the human beings. Therefore, people who have some problems in communication need an Augmentative & Alternative Communication (AAC) intervention to live in the human societies and several AAC systems have been developed to help the people. Lately, smart-phone is widely used to people as a communication device which can connect between persons. It can provide many useful methods and Apps to the user. If the AAC system is unified to the smart-phone, it is very effective device to the people with disabled because they can reduce the excessive expense and easily accommodate themselves to the AAC system. In this paper, an AAC program which is installed in the smart-phone or tablet PC is introduced. It has basic AAC solutions and can send SMS message to other people. We expect that the developed device can help the communication of the people with disabled and solve the social isolation of the disabled person.

Design and Implementation of E-Mail System for Sea (해상용 전자메일 시스템의 설계 및 구현)

  • 윤희철;임채홍
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.8
    • /
    • pp.1241-1250
    • /
    • 2002
  • The communication between Ship and Land have bad communication environment and high cost comparing with land situation. In case of data communication for I-mail, the primary used speed is from 4800 bps to 9600bps. even this low speed user has difficulty to use data communication because of high cost. and this kind of data communication software is all imported from foreign country. In this paper we designed and implemented this communication server and client using Inmarsat A/B/miniM/M4/GAN(F77) by benchmarking of foreign product like Netverk, Marinet, Amosmail. the focus of this product is like next 1) communication cost down 2) Link between Ship Application and Land Office Application 3) Convenient of usage in Ship 4) perfect management of message to from ship.

Design of Communication Middleware for HACCP Automation System using Lightweight Devices (경량 단말기를 사용하는 HACCP 자동화 시스템의 통신 미들웨어 설계)

  • Hyun, Sung-Young;Cha, Kyung-Ae;Hong, Won-Kee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.4
    • /
    • pp.11-23
    • /
    • 2015
  • In this paper, we propose a communication middleware for development of HACCP(Hazard Analysis and Critical Control Point) automation system, which is composed of lightweight devices and a server, to support effective HACCP data management. To provide the proper HACCP data to lightweight devices, we design the communication message protocol based on HACCP management regulation model. Moreover, we develop the communication middleware that performs various functions, such as processing of communication protocols for HACCP data, analyzing of messages between devices and a server, and providing database managements tools. In addition, it takes a role to guarantee sharing consistent data among the devices and server, through the active updates for information on devices. Actually, the proposed communication middleware can be a part of critical system to develop a HACCP automation system with lightweight devices, because it implements the HACCP communication protocols making lightweight devices execute every HACCP task.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

A Study on the Visual Image and Verbal Texts in Television Public Service Advertising (TV공익광고에 나타난 영상이미지와 언어에 관한 연구)

  • Shin, In-Sik
    • Archives of design research
    • /
    • v.18 no.2 s.60
    • /
    • pp.111-122
    • /
    • 2005
  • Public Service Advertising(PSA) is the integrated marketing concept including strategy and technology in all its aspects that pursue the changes of community to seek an agreement of its members by the intentional and the target oriented way. PSA to the exclusion of commercial intention reflects the current social flow and subject since it is focused to the social issue. PSA plays an important role in creating the further cultural value, and also affects present cultural value to advertising message. In this aspect, this study is very valuable to design the plan for further effective management of advertisement and to analyze communication strategy of PSA. This study is to make dear the nature of PSA by the analysis of contents of visual image and linguistics' factors in actual produced and broadcasted TV advertising, called 'Protection of environment' In the results, PSA related the environment is working to linguistic-centered persuading message corresponding to visual factor, this intends to educate and instruct the consumers in 1980's. PSA, therefore, shows a non-description nature without story line and a hero(heroin) on it. In contrast, after 1990's, PSA was made up image-centered and maximized the effectiveness public campaign through the activating consumer's judgement and intervention. We are able to know that it contributes to considering and persuading the consumer to suggest the story format through the visual way to deliver the message. This study of relationship between visual image and linguistics is a common trend appeared in all media including today's advertising, and may be a remarkable result to present proper direction of PSA campaign.

  • PDF

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Design of Dynamic Buffer Assignment and Message model for Large-scale Process Monitoring of Personalized Health Data (개인화된 건강 데이터의 대량 처리 모니터링을 위한 메시지 모델 및 동적 버퍼 할당 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.187-193
    • /
    • 2015
  • The ICT healing platform sets a couple of goals including preventing chronic diseases and sending out early disease warnings based on personal information such as bio-signals and life habits. The 2-step open system(TOS) had a relay designed between the healing platform and the storage of personal health data. It also took into account a publish/subscribe(pub/sub) service based on large-scale connections to transmit(monitor) the data processing process in real time. In the early design of TOS pub/sub, however, the same buffers were allocated regardless of connection idling and type of message in order to encode connection messages into a deflate algorithm. Proposed in this study, the dynamic buffer allocation was performed as follows: the message transmission type of each connection was first put to queuing; each queue was extracted for its feature, computed, and converted into vector through tf-idf, then being entered into a k-means cluster and forming a cluster; connections categorized under a certain cluster would re-allocate the resources according to the resource table of the cluster; the centroid of each cluster would select a queuing pattern to represent the cluster in advance and present it as a resource reference table(encoding efficiency by the buffer sizes); and the proposed design would perform trade-off between the calculation resources and the network bandwidth for cluster and feature calculations to efficiently allocate the encoding buffer resources of TOS to the network connections, thus contributing to the increased tps(number of real-time data processing and monitoring connections per unit hour) of TOS.