• Title/Summary/Keyword: Data Message

Search Result 1,503, Processing Time 0.025 seconds

A Feasible Condition for EDF-based Scheduling of Periodic Messages on a Synchronized Switched Ethernet (동기식 스위칭 이더넷에서 주기적 메시지에 대한 마감시간우선 기반 메시지 스케쥴링을 위한 조건)

  • Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.4
    • /
    • pp.403-410
    • /
    • 2010
  • The switched Ethernet has many features for real-time communications such as providing traffic isolation, large bandwidth, and full-duplex links, and so on. The switched Ethernet, however, cannot guarantee the timely delivery of a real-time message because message delay increases when collisions occurs at the output ports and message loss can even occur due to the overflow at the output buffer. Recently, many research efforts have been done to use the switched Ethernet as an industrial control network. In the industrial control network, sensors periodically sense the physical environment and transmit the sensed data to an actuator, and the periodic messages from sensors to actuators have typically real-time requirements such that those messages must be transmitted within their deadlines. This paper first suggests a feasible condition for EDF (Earliest Deadline First)-based scheduling of periodic messages on a synchronized switched Ethernet and a message scheduling algorithm which satisfies the proposed feasible condition. Pedreiras, et al. [10] suggested a feasible condition for message scheduling on the Ethernet (shared media Ethernet), but there has been no research result on the scheduling condition on the switched Ethernet until now. We compared the real-time message scheduling capacity between the Ethernet and the switched Ethernet by simulation. The simulation result shows that the message scheduling capacity of the Ethernet has almost remained constant as the number of nodes on the network increases, but, in the case of the switched Ethernet, the message scheduling capacity has increased linearly according to the number of nodes on the network.

Design and Implementation of HL 7-based Real-time Data Communication for Mobile Clinical Information System

  • Choi Jinwook;Yoo Sooyoung;Chun Jonghoon
    • Journal of Biomedical Engineering Research
    • /
    • v.26 no.2
    • /
    • pp.65-71
    • /
    • 2005
  • The main obstacles for adopting a mobile health information system to existing hospital information system are the redundancy of clinical data and the additional workload for implementing the new system. To obtain a seamless communication and to reduce the workload of implementation, an easy and simple implementation strategy is required. We propose a mobile clinical information system (MobileMed) which is specially designed for the easy implementation. The key elements of MobileMed are a smart interface, an HL7 message server, a central clinical database (CCDB), and a web server. The smart interface module transfers the key information to the HL7 message server as new clinical tests data is recorded in the existing laboratory information system. The HL7 message server generates the HL7 messages and sends them to the CCDS. As a central database the CCDS collects the HL7 messages and presents them to the various mobile devices such as PDA. Through this study we might conclude that the architecture for the mobile system will be efficient for real-time data communication, and the specially designed interface will be an easy tool for implementing the mobile clinical information system.

A Study on Creative Strategy Related to Expression Advertisement for Missy Brand- Focused on ELLe's Advertisement (Missy Brand 의 고아고 크리에이티브 전략에 관한 연구 - ELLE 광고를 중심으로-)

  • 송윤주;정성혜
    • Journal of the Korean Society of Costume
    • /
    • v.50 no.3
    • /
    • pp.161-178
    • /
    • 2000
  • This study intended to provide the visual basic data of efficient fashion advertising for Missy Brands in the 21 th by investigating and analyzing the creative strategy related to expression of fashion advertisement. The Research methdologies were as follow. First, the change of domestic advertising industry, theoretical background of the creative strategy and the condition and problems in the domestic Missy market were studied through the relevant fashion advertisement and periodical publications. Second, the content analysis was done using the advertisement of Missy Brands in Fashion magazine, " ELLE" which were published from 1992 to 1998. (3/6/9/12). The results were summarized as follows: First, the ELLE's analysis results were to increase in number of the advertisements for the teenager Brand fro 1993 and for the I.B.(Imported Brand) or L.B(License Brand) from 1995. As a result of the analyses, we suppose that a number of advertisements are proportional related to the sales of Brands. Second, the re were significant differences between D.B. (Domestic Brand) and I.B(Imported Brand) or L.B.(License Brand ) in the change of creative strategy for Missy Brands advertisements. The creative strategy of D.B. ads was used more importantly in linsuistic message than in visual message. On the contrary, the creative strategy of I.B.(L.B) ads, attached importance to the visual message(photo). Third, the ads of TIME showed ads, effect to have relevance to sales. The creative strategy of TIME ads. appeals to consumer for consistent Brand image, at the same time reflects the distinctive Brand image from the other. This study was suggested the creative strategy change of TIME through the visual data base.data base.

  • PDF

The Effects of Cause-Marketing Messages Delivered on Restaurant Menu (외식기업의 공익연계 메시지의 효과연구)

  • Kim, Byoung Seok;Hwang, Johye
    • Knowledge Management Research
    • /
    • v.15 no.4
    • /
    • pp.127-145
    • /
    • 2014
  • This study aims to examine the effects of message framing of restaurant menus on customers' perceptions (trust and immersion) and their willingness to pay a premium price. The contents of messages focused on a hypothetical restaurant's cause-marketing activity. Four types of message framing were created: The first two types were varied by the presence and absence of the information about the current cause-marketing outcome, and the second two types were varied by positive and negative framing. The results showed that respondents in general had trust in cause-marketing messages and immersion of cause-marketing message by negative framing lead to positive influence of willingness to pay. Furthermore it had a significant effect on willingness to pay depending on cause-marketing message type and negative message framed messages showed an intention to willingness to pay a premium price. This study compared the difference in messages by type as an extension of the studies of cause-marketing messages in the past. The results of this study will be used for establishing effective marketing strategies for today's foodservice companies and serve as objective data for setting differentiated prices under the circumstance where the importance of companies' social responsibilities is growing.

A case study on the implementation and performance evaluation of profibus network in automation systems (자동화 시스템에서 Profibus 네트워크 인터페이스 구현 및 성능 평가)

  • Kim, Ki-Am;Hong, Seung-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.4 no.1
    • /
    • pp.113-122
    • /
    • 1998
  • This paper presents an implementation method of Profibus interface software using FMS(Fieldbus Message Specification). The Profibus interface software is implemented on PC which is widely used as an industrial computer as well as a commercial embedded controller called IUC(Intelligent Universal Controller). In order to enable the Profibus interface software to handle many application tasks and communication services, two kinds of real-time/multi-tasking operating system, OS-9 and CTask, are utilized. We also develop an experimental model of Profibus-based automation system, and evaluate the performance of the Profibus network. Through experiments, the user layer level message latency is measured with respect to the change of message length, message generation interval and TRT(Target Rotation Time). The results of experiment are compared with those of a simulation model which comprises only the physical and data link layers of Profibus. The results of this study shows that the message latency in the user layer level occupies fairly a large part of the total message latency.

  • PDF

The Auto Generation Scheme of Message Frame for Testing of the Information Service Devices (정보 서비스 장치 테스트를 위한 메시지 프레임 자동 생성 기법)

  • Kim, Jung-Sook;Kim, Jaehyeong;Jeong, Junho;Jung, Eunmi
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.4
    • /
    • pp.418-423
    • /
    • 2014
  • Intelligent Transportation Systems (ITS) are advanced applications which, without embodying intelligence as such, aim to provide innovative services relating to different modes of transport and traffic management and enable various users to be better informed and make safer, more coordinated, and 'smarter' use of transport networks. However, ITS has the different size and shapes according to the city environment policy to adjust the city scene and it has to be displayed by different message on the information display device in real-time. And the information service providers must make the information display system which has the different information and data each time. That is very time and workers consuming and auto message frame generation system is necessary. In this paper, we design and develop the message frame generation system which can set several parameters easily for the generation of the message frame automatically on the windows environment and we do not need to go the field to get the test data.

Mobile Computing Algorithm on IEEE 802.11b for Ubiquitous Computing

  • Kim, Wu-Woan
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.1
    • /
    • pp.11-24
    • /
    • 2008
  • In this paper, the patterns of movement used in the mobile communication systems are adopted in the mobile computing environment to reduce handover delay and to support seamless handover for MIPv6 based on IEEE 802.11 networks. That is, RtSolPr message and PrRtAdv message can be treated before handover. As the result, it is possible to assign NCoA to MN and Next Access Router(NAR) before handover starts. This can minimize handover delay and reduce the total handover delay.

  • PDF

The Issues and Characteristics of the Preliminary Draft Convention on International Contracts Concluded or Evidenced by Data Message (전자계약에 관한 국제협약 예비초안의 논점과 특징에 관한 고찰)

  • Choi, Seok-Beom;Park, Jong-Suk
    • International Commerce and Information Review
    • /
    • v.5 no.1
    • /
    • pp.85-100
    • /
    • 2003
  • Legal rules applying to the commerce and international commerce in particular contracts, proper law, jurisdiction and so on, have improved with time and experience. Engaging in e-commerce on the World Wide Web may expose the company to the risk of being sued in any foreign country where Internet user can establish a legal claim. The modem law of contracts is highly sophisticated and difficult to understand. With contracts created in cyberspace, the basic rules are no difference that we can find. However, there are situations in e-commerce that are altogether new and to which the existing rules cannot apply. Here uncertainty and business risk is too high for trading partners to deal with certainty. Therefore existing law must change to e-commerce law so that it provides certainty and enforceability over e-commerce. UNCITRAL Working Group on Electronic Commerce prepared the Preliminary Draft Convention on [International] Contracts Concluded or Evidenced by Data Message from the thirty-ninth session in 2002 which applies to international contracts concluded or evidenced by means of data messages. An electronic contract is concluded when the acceptance of an offer becomes effective, and an offer becomes effective when it is received by the offeree, and an acceptance of an offer becomes effective when the indication of assent is received by the offeror according to this Convention. Electronic contract may be concluded by the interaction of an automated computer system and natural person or by the interaction of automated computer systems, and a contract formed by a natural person that accesses an automated computer system of another person has no legal effect in case the neutral person made a material error in a data message.

  • PDF

Steganographic Model based on Low bit Encoding for VoIP (VoIP 환경을 위한 Low bit Encoding 스테가노그라픽 모델)

  • Kim, Young-Mi
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.141-150
    • /
    • 2007
  • This paper proposes new Steganographic model for VoIP that has very effective method using low bit encoding. Most of Steganographic models using Low bit Encoding have two disadvantages; one is that the existence of hidden secret message can be easily detected by auditory, the other is that the capacity of stego data is low. To solve these problems, this method embed more than one bit in inaudible range, so this method can improve the capacity of the hidden message in cover data. The embedding bit position is determined by using a pseudo random number generator which has seed with remaining message length, so it is hard to detect the stego data produced by the proposed method. This proposed model is able to use not only to communicate wave file with hidden message in VoIP environment but also to hide vary information which is user basic information, authentication system, etc.

  • PDF

Performance Evaluation of Discovery and Message Transmission of DDS (Data Distribution Service) Security (보안 DDS(Data Distribution Service)의 디스커버리 및 메시지 전송 성능 분석)

  • Im, Jinyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.701-708
    • /
    • 2021
  • In this paper, I investigate the performances of the discovery and the message transmission of the DDS (Data Distribution Service) included the security function. The DDS serves the communication protocol, a publication- subscription method, for the real-time communication in the distributed system. The publication-subscription method is used in the various area in terms of defence, traffic and medical due to the strength such as a performance, scailability and availability. Nowadays, many communication standard has included and re-defined the security function to prepare from dramatically increased a threat of the security, the DDS also publishes the standard included the security function. But it had been not researched that the effect of increased a overhead for legacy systems due to the using of the security DDS function. The experimental results show that the comparative performance of legacy DDS and security DDS in terms of the discovery and the message transmission.