• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.036 seconds

Design of Electrostatic Monitoring System (정전기 모니터링 시스템 설계)

  • Kim, Kang-Chul;Byon, Chi-Nam;Lim, Chang-Gyoon;Han, Seok-Bung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2069-2076
    • /
    • 2008
  • In this paper, we develop an electrostatic monitoring system which is composed of an electrostatic prediction system and a warning message transmission system. The electrostatic prediction system in a factory receives the value of electrostatic charge from the electrostatic sensor and predicts the next value by using past data and sends the value to the warning message transmission system through the bluetooth communication. The warning message transmission system gets a warning signal and transmits the warning message to the worker's cellphone through a commercial SMS web by a socket program running on Windows PC in a control room. We propose electrostatic forecasting algorithms based on LSR(least square regression) using weight factors in an electrostatic prediction system. Simulation results show that the algorithm with dynamically variable weight factors is best with 64.69V standard deviation and a warning message transmitted by the warning message transmission system is displayed on cellphone after about 5 seconds.

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

Security Analysis of ElGamal-Type Signature Scheme Using Integer Decomposition (정수의 분해를 이용한 ElGamal형 서명기법의 안전성 분석)

  • 이익권;김동렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.15-22
    • /
    • 2004
  • For an ElGamal-type signature scheme using a generate g of order q, it has been well-known that the message nonce should be chosen randomly in the interval (0, q-1) for each message to be signed. In (2), H. Kuwakado and H. Tanaka proposed a polynomial time algorithm that gives the private key of the signer if two signatures with message nonces 0<$k_1$, $k_2$$\leq$Ο(equation omitted) are available. Recently, R. Gallant, R. Lambert, and S. Vanstone suggested a method to improve the efficiency of elliptic curve crytosystem using integer decomposition. In this paper, by applying the integer decomposition method to the algorithm proposed by Kuwakado and Tanaka, we extend the algorithm to work in the case when |$k_1$ |,|$k_2$, |$\leq$Ο(equation mitted) and improve the efficiency and completeness of the algorithm.

A Study on Non-participating TDL Message Analyzer (비가입형 TDL 메시지 분석기에 관한 연구)

  • Hwang, Byoung-Han;Lee, Jung-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.290-294
    • /
    • 2018
  • Modern warfare exhibit a NCW (Network Centric Warfare) aspect through quick situation awareness and Command and Control. And Tactical messages operate on various tactical data links (TDLs). For monitoring TDL messages processed by data link processor(DLP), message analysers are generally developed as a component during system development. In addition, in order to forward TDL messages processed by DLP to the message anayzer, the interface messages between DLP and message analysers should be defined interface control document(ICD). We propose the methods using UDP or TCP packets provided by TDL layers that are delivered to DLP without communicating directly with DLP. Depending on TDL message standards and Interface Control Documents(ICDs), we design the message analyzer which communicates with data link processor using internal messages. Using known header field information from the TDL application standard such as JREAP-C, we can quickly filter candidate packets against collected packets and use the full data size information contained in the headers to verify the completed message. Because the methods proposed in this paper do not communicate directly with DLP, the methods proposed in this paper are enable to analyze the TDL application messages such as JREAP-C or Link-K without constraints in existing methods that should be reflected in the system configuration and ICD.

A Study on Message Set of VMS on Express way and Evaluation of Driver's Preference (고속도로 VMS Message Set 연구 및 이용자 선호도 평가)

  • Kim, Nam-Sun;Jee, Dong-Mok;Oh, Young-Tae;Lee, Hwan-Pil;Kim, Sang-Bok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.1-13
    • /
    • 2009
  • VMS(Variable Message Sign) which makes the traffic flow smooth by providing traffic information to road users in real-time has been being installed or operated on the road as part of the detailed ITS system. However, some problems were found as a result of survey on express way currently. In the part of the phase operation, the message interpretation time wasn't defined so that the phase operation was difficult. In the part of the information service, not considering characteristic of the VMS section caused the confusion to drivers. In the part of the message exposure, font, alignment, conversion and composition of the information were not consistent and use of superfluous words and inconsistent use of word having the same meaning brought about the problem on information communication This study established the detailed exposure method based on instructions relative to VMS operation. The method established by defining the number of appropriate phase and setting required function of each individual VMS installation location. The method is as follow. the font type is the GULIM, the message conversion method is simple conversion method, the alignment method is centering alignment method and the color is defined according to each situation. In this study, the preference survey was performed to review the validity of the proposed improvement through the common driver. The results were similar with the pre-study except for the font type. This study established the detailed exposure method based on instructions relative to VMS operation. The method established by defining the number of appropriate phase and setting required function of individual VMS installation location. For the evaluation of status and improvement, preference survey of ordinary drivers and statistics analysis was carried.

  • PDF

A New Instant Messaging System using Extended CPL in SIP Environment (SIP 환경에서의 확장 CPL을 사용한 새로운 인스턴트 메시징 시스템)

  • Jang, Choon-Seo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.9
    • /
    • pp.67-74
    • /
    • 2009
  • The presence informations of users of Instant Messaging System In SIP(Session Initiation Protocol) environment are obtained by presence server, and message waiting indication event package is used to provide various message informations stored in the message server. In this paper, I have proposed a new method in which Extended CPL(Call Processing Language) has been applied to presence service to provide various functions to the users. A user of Instant Messaging System subscribes presence information and CPL scripts which describe his requirements, and presence server executes CPL scripts when instant messaging service is subscribed and notifies presence informations. Several CPL operation tags are added, and therefore various services which combine presence service and call processing can be provided in this system. Furthermore a new method has been proposed in which message server and presence server correlate in Instant Messaging System. When changes of message status informations occur, message server send these informations to the presence server, and presence server provides both presence informations and message status informations in extended format. As this method can be a substitute for message waiting indication event package, the system operating efficiency can be increased. The performance of this proposed system is evaluated by experiments.

Performance Improvement of Message Transmission over TCN(Train Communication Network) (TCN을 통한 메시지 전송 능력 향상에 관한 연구)

  • Cho Myung-ho;Moon Chong-chun;Park Jaehyun
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.10
    • /
    • pp.720-726
    • /
    • 2004
  • The data transmission over MVB(Multifunction Vehicle Bus) of TCN(Train Communication Network) is divided into the periodic transmission phase and the sporadic transmission phase. TCN standard recommends the event-polling method as the message transfer in the sporadic phase. However, since the event-polling method does not use pre-scheduling to the priority of the messages, it is inefficient for the real-time systems. To schedule message transmission, a master node should know the priority of message to be transmitted by a slave node prior to the sporadic phase, but the existing TCN standard does not support any protocol for this. This paper proposes the slave frame bit-stuffing algorithm, with which a master node gets the necessary information for scheduling and includes the simulation results of the event-polling method and the proposed algorithm.

The Design and Implementation of XConverter System With Java (Java를 이용한 XConverter 시스템 설계 및 구현)

  • 안경림;백혜경;임병찬;이영교
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.1-12
    • /
    • 2001
  • AS EC is expanded and activated, many message standards, EDI, XML, UDF, etc are defined and is used at various business part. But the existed translator supports only one mapping translation, for example, EDI-to-UDF, UDF-to-EDI. So many user must be introduced a new translation when new business(message standard) is beginning, To solve this problem, we propose XConverter System as registering mapping information which is able to transform to user requested format using same translator even though it is transferred any formatted message in this paper. Also, We design and implement this system which is capable to integrate with existed legacy system, including DB transformation functionality. The .XConverter System supports changing the business message format to the common user used message format. And this system easily migrates with existed legacy system because DB transform module is component. Therefore, The proposed System is more various and flexible than the other translation system that provide just one mapping transformation.

  • PDF

High Quality perceptual Steganographic Techiques (지각적으로 고화질을 보장하는 심층암층기술)

  • 장기식;정창호;이상진;양일우
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.157-160
    • /
    • 2003
  • Recently, several steganographic algorithms for two-color binary images have been proposed. In this paper, we propose a steganographic algorithm which embeds a secret message into bitmap images and palette-based images. To embed a message, the suggested algorithm divides a bitmap image into bit-plane images from LSB-plane to MSB-plane for each pixel, and considers each bit-plane image as a binary one. The algorithm splits each bit-plane image into m$\times$n blocks. and embeds a r-bit(r=[log$_2$(mn+1]-1) message into the block. And our schemes embed a message to every bit-plane from LSB to MSB to maximize the amount of embedded message and to minimize the degradation. The schemes change at most two pixels in each block. Therefore, the maximal color changes of the new algorithm are much smaller than other bit-plane embedding schemes' such as the substantial substitution schemes.

  • PDF

Designing and Implementing Message Broker System based on SOAP (SOAP 기반의 메시지 Broker 시스템 설계 및 구현)

  • 김용수;주경수
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1071-1078
    • /
    • 2003
  • SOAP is a protocol used for information exchange in distributed computing environment and SOAP defines mechanisms for message transferring between distributed system and remote procedure call/response process. This SOAP is able to be used independently on operating systems and program languages because it uses only a text-based XML for protocol. Therefor ebXML that is a standard for E-Commerce adopts SOAP for message exchange. In this paper, we developed Message Broker System based on SOAP. By this Message Broker System we can more easily exchange messages for B2B. Accordingly we can manage and integrate a lots of business partners.

  • PDF