• Title/Summary/Keyword: Communication message

Search Result 1,643, Processing Time 0.028 seconds

A Study on the Estimation of Required Communication Capacity for Link-16 Based Tactical Networks (Link-16 기반 전술 네트워크를 위한 요구통신용량 산출에 관한 연구)

  • Kim, Young-Beom
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.1
    • /
    • pp.105-111
    • /
    • 2012
  • In this paper, we investigate the most commonly adopted networking technology for Network Centric Warfar (NCW), namely Link-16 in the perspectives of physical, data link, and network layers (specifically, strategic message exchanges) and derive its merits with some constraints therein. Furthermore, we perform a quantitative evaluation on its communication capacity, focusing on whether Link-16 can indeed meet the capacity requirements for major operations, based on the time slot structure, NPG, and multi-netting concepts.

Implementation of an Efficient Service Discovery Protocol for Directory Facilitator Based on CALM Agent (CLAM 에이전트 기반 Directory Facilitator를 위한 효율적인 서비스 디스커버리 프로토콜 구현)

  • Lee, Seung-Hyun;Shin, Dong-Ryeol;Jang, Kyung-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.275-282
    • /
    • 2011
  • Current service discovery protocols such as UPnP, Jini, SLP provide the basic function which is message exchange pattern, service representation and description, in service discovery. They does not guarantee service interoperability among service discovery. Therefore, in this paper, we design and implement CLAM (Component-based Autonomic Layered Middleware) agent platform to enable an efficient service discovery through extension of DF agent function in FIPA-compliant specification. Also, we propose an efficient service discovery mechanism using DHT-Chord algorithm to guarantee scalability and interoperability in DF agent.

Design and Implementation of Marketing Advisement System through the Concern Degree Analysis of Customers Based on Twitter (트위터 기반 고객의 관심도 분석을 통한 마케팅 조언 시스템의 설계 및 구현)

  • Lee, Ki-Young;Kim, Hye-Young;Kim, Aluem;Kim, Sung-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.185-190
    • /
    • 2014
  • With the fast increment of smart phone users and extension of wireless internet the number of SNS user is also increasing. Twitter among lots of SNS takes the lead in SNS market. Twiter users express their thinking and feelings. In this paper, by analyzing twitts near the distribution enterprise using opinion mining. And by analyzing concern degree using the number of twitts and positive, neutral, negative degree we deliver marketing message to marketer. As the result, we propose that marketing and management of this distribution enterprise can reflect the demand of customer who is near there.

Design and Implementation of Finger Keyboard with Video Camera (비디오 카메라를 이용한 핑거 키보드의 설계 및 구현)

  • Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.157-163
    • /
    • 2016
  • This paper presents Finger Keyboard which detects the user's key types on a keyboard drawn on the paper using a video camera. The Finger Keyboard software was written in standard C/C++ language and thus easy to port to other computing environments. We installed a popular USB-type web camera on a Windows PC and implemented the Finger Keyboard as a Windows application which detects key typing and then injects the key code into the message queue of the Windows operating system. Also we implemented the Finger Keyboard on the Raspberry Pi 2 embedded computer with a dedicated camera and connected it to the Android device as an external keyboard through the Bluetooth. The result of experiments showed that the average ratio of recognition success is around 80% at the typing speed of 120 characters per minute.

An Efficient Log Data Processing Architecture for Internet Cloud Environments

  • Kim, Julie;Bahn, Hyokyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.33-41
    • /
    • 2016
  • Big data management is becoming an increasingly important issue in both industry and academia of information science community today. One of the important categories of big data generated from software systems is log data. Log data is generally used for better services in various service providers and can also be used to improve system reliability. In this paper, we propose a novel big data management architecture specialized for log data. The proposed architecture provides a scalable log management system that consists of client and server side modules for efficient handling of log data. To support large and simultaneous log data from multiple clients, we adopt the Hadoop infrastructure in the server-side file system for storing and managing log data efficiently. We implement the proposed architecture to support various client environments and validate the efficiency through measurement studies. The results show that the proposed architecture performs better than the existing logging architecture by 42.8% on average. All components of the proposed architecture are implemented based on open source software and the developed prototypes are now publicly available.

Development of a Hybrid Recognition System Using Biometrics to Manage Smart Devices based on Internet of Things

  • Ban, Ilhak;Jo, Seonghun;Park, Haneum;Um, Junho;Kim, Se-Jin
    • Journal of Integrative Natural Science
    • /
    • v.11 no.3
    • /
    • pp.148-153
    • /
    • 2018
  • In this paper, we propose a hybrid-recognition system to obtain the state information and control the Internet of Things (IoT) based smart devices using two recognitions. First, we use a facial recognition for checking the owner of the mobile devices, i.e., smartphones, tablet PCs, and so on, and obtaining the state information of the IoT based smart devices, i.e., smart cars, smart appliance, and so on, and then we use a fingerprint recognition to control them. Further, in the conventional system, the message of the state and control information between the mobile devices and smart devices is only exchanged through the cellar mobile network. Thus, we also propose a direct communication to reduce the total transmission time. In addition, we develop a testbed of the proposed system using smartphones, desktop computers, and Arduino vehicle as one of the smart devices. We evaluate the total transmission time between the conventional and direct communications and show that the direct communication with the proposed system has better performance.

RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks

  • Yang, Lijun;Ding, Chao;Wu, Meng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5189-5208
    • /
    • 2015
  • To address the contradiction between data aggregation and data security in wireless sensor networks, a Recoverable Privacy-preserving Integrity-assured Data Aggregation (RPIDA) scheme is proposed based on privacy homomorphism and aggregate message authentication code. The proposed scheme provides both end-to-end privacy and data integrity for data aggregation in WSNs. In our scheme, the base station can recover each sensing data collected by all sensors even if these data have been aggregated by aggregators, thus can verify the integrity of all sensing data. Besides, with these individual sensing data, base station is able to perform any further operations on them, which means RPIDA is not limited in types of aggregation functions. The security analysis indicates that our proposal is resilient against typical security attacks; besides, it can detect and locate the malicious nodes in a certain range. The performance analysis shows that the proposed scheme has remarkable advantage over other asymmetric schemes in terms of computation and communication overhead. In order to evaluate the performance and the feasibility of our proposal, the prototype implementation is presented based on the TinyOS platform. The experiment results demonstrate that RPIDA is feasible and efficient for resource-constrained sensor nodes.

Android-based Implementation of Remote Monitoring System for Industrial Gas Turbines (안드로이드 기반 산업용 가스터빈 원격 모니터링 시스템 구현)

  • Choi, Joon-Hyuck;Lee, Dong-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.369-376
    • /
    • 2018
  • This paper presents an android-based implementation of real-time remote monitoring system for industrial gas turbines. The use of remote monitoring techniques can be beneficial in terms of not only the reduction of monitoring cost but also the earlier detection of abnormal status. In order to achieve the ability of protecting sensitive information from unauthorized persons, the proposed system supports secure transmissions using the RSA(Rivest Shamir Adleman) algorithm. In the event of abnormal situation on the gas turbine, the remote monitoring system generates an alarm to attract the user's attention by exploiting a push-message technique. The proposed system has been verified through a series of experiments with an experimental setup including a virtual data generator.

A Study on the Relationship of Use of Clothing Advertisements in Magazines as an Information Source to Clothing Involvement (잡지 의류광고의 정보원 이용과 의복관여도에 관한 연구)

  • Choo, Tae-Gue;Seo, Kyung-Hee
    • Fashion & Textile Research Journal
    • /
    • v.3 no.2
    • /
    • pp.156-161
    • /
    • 2001
  • The purpose of this study was to investigate the relationship of use of clothing advertisements in magazines as an information source to clothing involvement. Questionnaires were administered to 131 women living in Sangju City during April of 2000. Data were analyzed by using factor analysis, t-test, ANOVA and Scheffe test. Attitude toward clothing advertisements in magazines was factor analyzed resulting three factors such as quality information & degree of use, fashion & brand information, and communication. Clothing advertisement was not considered as a useful information source and was not understood the message of advertisement clearly. There were significant differences between high involvement group and low involvement group in attitude toward clothing advertisements as information sources. High involvement group considered clothing advertisements as information sources more positively and used advertisements to search information about fashion and product quality. Also, significant differences were shown according to marriage state, age, and education level.

  • PDF

Intelligent Dust Chamber Bag Control System using Case-Based Reasoning (사례기반 추론을 이용한 지능형 집진기 bag 제어 시스템)

  • Kim, Jung-Sook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.48-53
    • /
    • 2010
  • In this paper, we develop the intelligent remote dust chamber bag control system which is combination of the advanced IT and traditional dust chamber based on event. At first, the message format is defined for the efficient dust chamber bag information transmission using power line communication. Also, we define the data types to logically model the dust chamber and the dust chamber bag, and they are logically modeled using XML and object-oriented modeling method. In addition to, we apply the case-based reasoning for showing the dust chamber bag exchange time intelligently to user at real-time using casebase, that is collected by case or case-based reasoning result, and that is described using XML.