• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.031 seconds

Estimating the Effect of VMS on Drivers' Legibility and Perception (도로전광표지의 운전자 판독성 및 정보 인지 특성 비교 연구)

  • Jeong, Jun-Hwa;Lee, Suk-Ki
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.944-956
    • /
    • 2013
  • Drivers need lots of information when they drive on the highway, however it is necessary and important to be provided information which is appropriate formation. In order to offer the suitable information, adequate size, quantity, and frequency of provided information are required for the drivers. To evaluate propriety of the expressed message of VMS that provides real-time traffic conditions, first of all, the amount of message about legibility distance and viewing should be estimated. In this research, drivers' characteristics of VMS message design were also reviewed to enhance the efficiency of VMS. And legibility distance, the amount of viewing information, and ratio of viewing information were analyzed on the currently operating VMS. The results of this study proposed that the appropriate size, quantity, and frequency were concluded by the legibility and memory of message on the real driving conditions. Consequently, these design methods of VMS could be expected to improve the transmitting capability of highway information to drivers.

A Design and Implementation of Message Processing Modules for MiTS Communication (MiTS 통신을 위한 메시지 처리 모듈의 설계 및 구현)

  • Kim, Tae-Jong;Hwang, Hun-Gyu;Seo, Jeong-Min;Yoon, Jin-Sik;Lee, Jang-Se;Jang, Kil-Woong;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.360-368
    • /
    • 2010
  • MiTS communication is a protocol for the exchange of various information among shipboard systems. It also specifies more than 30 specialized message formats for the information exchange. To build MiTS systems, therefore, the messages should be processed consistently. This paper proposes the design and implementation of such message processing modules. It also describes the test results of the implemented modules.

Prototype Implementation of a Personalized Warning Notification System based on Geosocial Information (지오소셜 정보 기반 개인 맞춤형 경보 시스템 원형 구현)

  • Tiep, Vu Duc;Quyet, Nguyen Van;Kim, Kyungbaek
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.332-334
    • /
    • 2015
  • Nowadays a disaster event such as a building on fire, an earthquake or typhoon could occur any time, and any where. In such event, a warning notification system is a vital tool to send warning notifications to at-risk people in advance and provide them useful information to escape the dangerous area. Though some systems have been proposed such as emergency alert system using android, SMS or P2P overlay network, these works mainly focus on a reliable message distribution methods. In this work, we introduce a full prototype implementation of a personalized warning notification system based on geosocial information, which generates a personalized warning message for each user and delivers the messages through email or an android application. The system consists of four main modules: a web interface, database, a knowledge-based message generator, and message distributor. An android application is also created for user to receive warning messages on their smart phone. The prototype has been demonstrated successfully with a building-on-fire scenario.

The Design and Implementation of Secure-ReXpis System with Internet Environment (인터넷 환경 하에서의 Secure-ReXpis 시스템 설계 및 구현)

  • 안경림;박상필;백혜경;임병찬;박준홍;고대식
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.3
    • /
    • pp.101-113
    • /
    • 2001
  • Security is very important in EC(Electronic Commerce) environment because exchanged information(that is transaction details, private data, charges data(card-no, accounts), etc) is various and is very sensitive. So, In this paper, we propose Secure-ReXpis(Reliable St excellent Xh3 Processing Infrastructure) System that transfer message and support Message Level Security(Encryption/Decryption and Digital Signature). And we implement Message Confidentiality Service, User Authentication & Message Integrity Service and Non-Repudiation Service among the various Security Services. This system support XML message format and EDI message, WEB Data and Private Format Data, etc.

  • PDF

Method of Format Conversion Between Link-K and KMTF Messages (Link-K와 KMTF 메시지 간 포맷 변환 방법)

  • Kim, Wan-Sik;Lee, Min-Sik;Kim, Sang-Jun;Park, Ji-Hyeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.264-271
    • /
    • 2017
  • Link-K message is the Tactical Data Link message standard developed by the Agency for Defense Development which is optimized for the Joint Operation of ROK Armed Force. KMTF message is the standard message format of Battle Management Information System. Interconversion and propagation between these messages are definitely needed to have efficient warfare such as situation data propagation using network, the convergence of collected situation data, common situational awareness, cooperative engagement. Therefore, this study suggests a way of rule and process for format conversion between Link-K and KMTF messages.

A Reputation System based on Blockchain for Collaborative Message Delivery over VANETs (VANET 환경에서의 협력적 메시지 전달을 위한 블록체인 기반 평판 시스템)

  • Lee, Kyeong Mo;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.12
    • /
    • pp.1448-1458
    • /
    • 2018
  • Vehicular Ad-Hoc Networks (VANETs) have become one of the active areas of research, standardization, and development because they have tremendous potentials to improve vehicle and road safety, traffic efficiency, and convenience as well as comfort to both drivers and passengers. However, message trustfulness is a challenge because the propagation of false message by malicious vehicles induces unreliable and ineffectiveness of VANETs, Therefore, we need a reliable reputation method to ensure message trustfulness. In this paper, we consider a vulnerability against the Sybil attack of the previous reputation systems based on blockchain and suggest a new reputation system which resists against Sybil attack on the previous system. We propose an initial authentication process as a countermeasure against a Sybil attack and provide a reliable reputation with a cooperative message delivery to cope with message omission. In addition, we use Homomorphic Commitment to protect the privacy breaches in VANETs environment.

Query Processing based Branch Node Stream for XML Message Broker

  • Ko, Hye-Kyeong
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.64-72
    • /
    • 2021
  • XML message brokers have a lot of importance because XML has become a practical standard for data exchange in many applications. Message brokers covered in this document store many users. This paper is a study of the processing of twig pattern queries in XML documents using branching node streams in XML message broker structures. This work is about query processing in XML documents, especially for query processing with XML twig patterns in the XML message broker structure and proposed a method to reduce query processing time when parsing documents with XML twig patterns by processing information. In this paper, the twig pattern query processing method of documents using the branching node stream removes the twigging value of the branch node that does not include the labeling value of the branch node stream when it receives a twig query from the client. In this paper, the leaf node discovery time can be reduced by reducing the navigation time of nodes in XML documents that are matched to leaf nodes in twig queries for client twig queries. Overall, the overall processing time to respond to queries is reduced, allowing for rapid question-answer processing.

The Moderate Effectiveness On Regulatory Focus And Prices Discounts Of Scarcity Messages (희소성 메시지의 조절초점 및 가격할인에 대한 조절효과 : 온라인 판촉 메시지를 중심으로)

  • Han, Kwang-Seok
    • Management & Information Systems Review
    • /
    • v.31 no.1
    • /
    • pp.247-272
    • /
    • 2012
  • This study scarcity of recent online message promotion limited quantity of messages and time the message is limited controlled variable message whose regulatory focus and promotional discounts depending on the presence of any differences in attitudes and purchase intention appears, was to verify empirically. The results of this study, first, if limited quantity of messages focus on prevention rather than focusing on messages promoting promotion attitudes and purchase intention was higher. Second, the scarcity message is simply, as well as adjust the focus, such as price discounts and promotional activities can be controlled by a variety of points were identified. If the message is particularly limited quantity discounts are not present, rather than the message, the message is presented when the discount promotional attitudes and purchase intention, except that the amplification has been demonstrated. If the message is limited time, however, these discounts are worth the extra promotion on attitudes and purchase intentions are least likely to affect the thing that was found.

  • PDF

A Study on Security Evaluation for Mobile Web Services Message (모바일 웹서비스 메시지의 보안 평가에 관한 연구)

  • Lee, Seoung-Hyeon;Lee, Jae-Seung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.765-768
    • /
    • 2007
  • In this paper, the security evaluation method about mobile web services message is suggested in the method for improving the safety an reliability about the mobile web services message. In order that the goal of this paper is accomplished, the security threat and the security vulnerability which can be occurred in the mobile web services message are defined. The evaluation method for performing the security evaluation about the mobile web services message is defined. Also, the requirements for the mobile web services message security evaluation are defined. Finally, the evaluation framework for performing the mobile web services message security evaluation is constituted, and the evaluation scenario example is suggested. By using the mobile web services message security evaluation defined in the paper, before the mobile web services is deployed, the security threats and security vulnerability can be verified. Also, the countermeasure for the security threat and security vulnerability discovered in the verification result can be prepared. Therefore, the sorority and reliability about the mobile web services can be improved.

  • PDF

Delay Analysis of a Message based on the Stop-and-Wait ARQ in a Time- Varying Radio Link (시변 패킷 기반 무선 링크에서 정지-대기 ARQ 기반 메시지의 지연 시간 분석)

  • 정명순;박홍성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9A
    • /
    • pp.684-693
    • /
    • 2003
  • This paper analyzes transmissiondelays of a message and a packet in a time-varying and packet-based radio link. The paper assumes that thearrivals of messages have a Bernoulli process and the lengths of the messages a exponential distribution. To reflect the feature of the time-varying radio link, we use a two-state Markov model. From the model the mean transmission delay of and the mean queue length of the packet are analyzed in terms of the packet distribution function, the packet transmission service time, and the PER of the radio link. And the mean message transmission delay time and the mean queue length are derived using the performance indices of the packet. Numerical results show that the message arrival rate and the message length have some bounds to keep the transmission of the message steady and to improve the performance indices of the message. It can be known that the PER of the state influences on the performance indices more than the sojourn time of the state.