• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.025 seconds

MA(Mesh Adaptive)-CBRP Algorithm for Wireless Mesh Network (Wireless Mesh Network를 위한 MA(Mesh Adaptive)-CBRP 알고리즘의 제안)

  • Kim, Sung-Joon;Cho, Gyu-Seob
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1607-1617
    • /
    • 2010
  • In this paper we propose MA-CBRP, mesh adaptive algorithm for wireless mesh networks. MA-CBRP is a hybrid algorithm based on ad-hoc CBRP protocol. In MA-CBRP, the mesh router periodically sends the ANN message as like Hello-message in CBRP. ANN message allows to all clients periodically store a route towards the mesh-router and renewal information in their routing cache. While CBRP periodically reply Hello-message, MA-CBRP does not reply to achieve less overhead. After receiving ANN message, mesh client send JOIN message to mesh router when the route towards mesh router changed. at the same time Register the entry to mesh router, it can achieve to reduce overhead of control the route and shorten the time to find route. consequently, MA-CBRP shows 7% reduced overhead and shortened time to find route than CBRP with regardless of clients number.

Cell Based Emergency Message Broadcast Scheme for Inter-Vehicle Communication (차량간 통신을 위한 셀 기반의 응급 메시지 브로드캐스트 기법)

  • Joo, Heon-Sik;Kim, Jong-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.7
    • /
    • pp.41-47
    • /
    • 2010
  • The emergency between vehicles on the superhighway should be transmitted quickly to the following vehicles for safety of people. The message between them has been transmitted by broadcast method in an wireless environment of 802.11, so far. That causes the broadcast storm and a waste of the bandwidth of Wireless network owing to unnecessary process of sending messages to even vehicles that do not have to receive the information. The message collision is a main cause of the increase of message delay. In order to overcome the existing problem, this paper proposed a message broadcast scheme based on cell (MBC), which is the way to divide cars into different groups by cell unit and transmit messages to the members of the groups through the cell primary (cp) vehicles. This paper shows the proposed broadcast's performance in the same environment is much superior to other conventional broadcast schems for inter-vehicle communication, since the receiving ratio among the following vehicles is improved.

Routing Control Algorithm for SS7 Signaling Traffic with Distributed Message Handling Processors (분산 메시지처리기 구조에서의 공통선 신호 트래픽루팅 제어 기법)

  • Cho, Young-So;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1797-1803
    • /
    • 1997
  • Message handling function of the SS7(Signaling System N0.7) provides signaling traffic routing capabilities to transfer the signaling traffic to the destination nodes in the signaling network. This message handling function should be handled without any transfer delay for real time processing of large amount of signaling traffic for data communication service, and visual information service. In this paper, we suggest two routing algorithms working on the distributed message handling processors which were specially designed for message handling function. The one is an internal distributing algorithm for equal distribution of signaling traffic among the distributed message handling processors and the other is a distributing algorithm for distribution of signaling traffic in the multiple signaling routes. Both of algorithms are using signaling link selection codes labled in each signaling messages. It is shown that the suggested algorithms are very efficient for routing signaling traffic at the fault condition of signaling routes and the restoration of unavailable signaling routes.

  • PDF

Message Analysis and Development Situation on the Tactical Data Link of Combat Management System in Naval (함정 전투체계 전술데이터링크 개발현황 및 메시지 분석)

  • You, Hojeong;Choi, Byeonggon
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.2
    • /
    • pp.21-27
    • /
    • 2017
  • The combat systems in Korea navy have been operating some kinds of tactical data link systems such as Link-11, ISDL and JTDLS. Each tactical data link system has the ability to transmit and receive tactical information like track, engagement, weapon information by using unique message of theirs. And each unique message has their own format. But a number of tactical data link system make combat effectiveness worse because their major functions are duplicated unnecessarily. So, many advanced countries are trying to make united data link system. Similarly, the combat systems in Korea navy will operate C4I data link system, and it is combined version current ISDL, KNCCS and JTDLS data link system. In this paper, we consider the development current tactical data link systems in Korea navy. Also, compare the characteristics between I-message used in ISDL and Host-Interface message used in C4I. From these results, we analyze advanced points about C4I data link system.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

Message Routing Algorithm on an Injured Hypercube (손상된 하이퍼큐브상의 메세지 라우팅 알고리즘)

  • Gong, Heon-Taek;U, Ji-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.2
    • /
    • pp.242-250
    • /
    • 1996
  • Communications on hypercube nodes are done by explicit message routing. So efficient message routing is very important for the performance of hypercube multicomputers. However, hypercube nodes can be faulty due to hardware and/o r software problems, which is called an injured hypercube. A reliable hypercube system should tolerate the problems. One of the methods to enhance reliability on injured hypercube is to use fault-tolerant message routing algorithms. In this paper, we propose a message routing algorithm with possible shortest distance using disjoint paths. To analyze the performance, the algorithm is simulated and evaluated.

  • PDF

Social curation as an advertising tool - Message strategy of fashion brand images on vertical SNS - (소셜큐레이션과 광고 - 버티컬 SNS에서 표현된 패션브랜드 이미지의 메시지 전략 -)

  • Shin, In Jun;Lee, Kyu-Hye
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.3
    • /
    • pp.498-511
    • /
    • 2015
  • This paper examines advertising images of fashion brands in vertical social network site (SNS) from the viewpoints of message strategies. Vertical social network sites are types of social curation systems applied to social networking, where information is selected, organized, and maintained. Fashion brands communicate with consumers by presenting images on vertical SNSs, anticipating improvements in brand image, popularity, and loyalty. Those images portray content for particular brands and seasonal concepts, thus creating paths for product sales information. Marketing via SNSs corresponds to relationship marketing, which refers to long-term interrelationship and value augmentation between the company and consumer, and viral advertising, which relies on word of mouth distribution via social network platforms. Taylor's six-segment message strategy wheel, often used for analyzing viral ads, was applied to conduct a content analysis of the images. A total of 2,656 images of fashion brands advertised on Instagram were selected and analyzed. Results indicated that brand values were somewhat related to the number of followers. Follower rankings and comment rankings were also correlated. In general, fashion brands projected sensory messages most often. Acute need and rational messages were less common than other messages. Sports brands and luxury brands presented sensory messages, whereas fast fashion brands projected routine images most often. Fashion brands promoted on vertical SNSs should portray advertising images that combine message strategies

An study on the common message design of Korean message format(KMTF) and direction of management procedure & tool (한국형 메시지포맷(KMTF)의 공통메시지 설계 및 관리 절차/도구 개발 방향 연구)

  • Ju, Jin-Chun;Kang, Suk-Jung;Lim, Dae-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.349-352
    • /
    • 2010
  • 인터넷의 등장은 세계를 초단위 정보 소통 영역으로 묶어 정보가 사회를 주도하는 형태로 발전시켰듯이, 미래 전쟁 양상도 정보가 전쟁의 승패를 결정하는 네트워크중심전(NCW)으로 발전되고 있으며, NCW의 핵심은 무기체계간 상호운용성이다. 무기체계간 상호운용성을 확보하기 위해서는 표준화된 정보를 활용해서 연동하는 중요하며, 우리 군은 무기체계간 연동을 위해 연동메시지인 KMTF를 활용하고 있다. 그러나 현 KMTF 표준은 메시지구조(message frame)만을 제시하고 세부적인 메시지는 정의하지 않아 각 체계 개발자가 나름대로 메시지를 정의함으로써 중복된 메시지를 각 체계별로 관리하고 있고, 동일한 메시지를 다른 방식으로 적용하는 부작용이 발생할 수 있으며, 체계간 연동을 위해 별도의 변환기를 개발해야 하는 문제점이 발생하고 있다. 이를 위해 본 논문에서는 첫째, 미군 메시지포맷인 USMTF를 벤치마킹하여 무기체계에 공통 적용이 가능한 공통메시지 설계방안을 제시하며, 둘째, 메시지 생명주기 관리 및 메시지 추가등록 절차 관리를 위한 KMTF 표준 관리 절차를 제시하고, 셋째, 개정된 메시지 규격에 맞는 KMTF 관리도구 개발의 방향을 제시한다.

  • PDF

Messaging System Analysis for Effective Embedded Tester Log Processing (효과적인 Embedded Tester Log 처리를 위한 Messaging System 분석)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.645-648
    • /
    • 2017
  • The existing embedded tester used TCP and shared file system for log processing. In addition, the existing processing method was treated as 1-N structure. This method wastes resources of the tester for exception handling. We implemented a log processing message layer that can be distributed by messaging system. And we compare the transmission method using the message layer and the transmission method using TCP and the shared file system. As a result of comparison, transmission using the message layer showed higher transmission bandwidth than TCP. In the CPU usage, the message layer showed lower efficiency than TCP, but showed no significant difference. It can be seen that the log processing using the message layer shows higher efficiency.

  • PDF