• 제목/요약/키워드: Information message

검색결과 3,325건 처리시간 0.027초

A Message Service Handler for ebXML 2.0 (ebXML TRP 2.0을 위한 MSH)

  • 송은정;이호송;권택근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제9권2호
    • /
    • pp.205-212
    • /
    • 2003
  • Recently, as electronic commerce service via the Internet has expanded over the world, the standardization for the e-commerce has been strongly required. Therefore UN/CEFACT and OASIS adopted ebXML standard for the purpose of creating single global electronic marketplace. New e-Business systems should require ebXMl- based messaging system for reliable messaging delivery. In this paper, we have implemented Message Service Handler(MSH) packaging, transporting and managing e-Business messages for supporting ebXML messaging service. The MSH supports various system environments and allows high-level applications running either local or remote hosts with Remote Method Invocation(RMI) interface. In addition, MSH guarantees reliable message delivery on internet since it retransmits message in case of delivery failure and handles duplicated message and applies acknowledgement message for secure message delivery. Nowadays MSH has applied to ebXML registry/repository.

Implementation and Performance Evaluation of Socket and RMI based Java Message Passing Systems (소켓 및 RMI 기반 자바 메시지 전달 시스템의 구현 및 성능평가)

  • Bang, Seung-Jun;Ahn, Jin-Ho
    • Journal of Internet Computing and Services
    • /
    • 제8권5호
    • /
    • pp.11-20
    • /
    • 2007
  • This paper designs and implements a message passing library called JMPI (Java Message Passing Interface) which complies with MPJ (Message Passing in Java), the MPI standard Specification for Java language, This library provides some graphic user interface tools to enable parallel computing environments to be configured very simply by their administrators and JMPI applications to be executed very conveniently. Also in this paper, we implement two versions of systems using Socket and RPC which are both typical distributed system communication mechanisms and with three benchmark applications, compare performance of these systems with that of an existing system JPVM depending on the increasing number of the computers. Experimental results show that our systems outperform JPVM system in terms of various aspects and that the most efficient processing speedup can be obtained by increasing the number of the computers in consideration of network traffic through processing evaluation. Finally, we can see that, as the number of computers increases, using RMI to transmit a message is more effective than using object streams attached to sockets to transmit a message.

  • PDF

A Study on the Transmission Speed Improvement of Sharing Situation Information by Variable Message Protocol

  • Lee, Jeong-Min;Shin, Sang-Heon;Lim, Won-Gi;Kim, Hyeong-Seok;Kim, Yong-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • 제26권1호
    • /
    • pp.135-146
    • /
    • 2021
  • VMP(Variable Message Protocol) is bit-based variable message processing protocol that enables the sharing situation information in real time as a tactical datalink protocol for Korean Army. System A is currently under development and will be operated as an army system when its development is completed. In system A, the VMP processing terminal is mounted and the VMP is utilized for exchanging tactical information. System A can acquire situation information from mounted situation information acquisition system and share situation information with other system A by the VMP. In this paper, we propose a method of sharing situation information with system A and speed improvement methods of sharing situation information using VMP. As speed improvement methods of sharing situation information, this paper studied 'Removing Process of Sending VMP Observation Report', 'Adopting One-time Situation Information Send Button When Sharing A System Situation Information By VMP', 'Combination of Many VMP Messages Using Repeat Function Of Application Header'. And we conducted the experiment, the result was that the transmission speed of equipment to which the research method was applied was improved by 76.8% compared to the existing equipment.

Performance Enhancement of AODV Routing Protocol Based on Interrupt Message and Backup Path Strategy in MANET (MANET환경에서 Interrupt Message와 Backup path 기법에 기반한 AODV의 성능개선)

  • Lee, Yun-kyung;Kim, Ju-gyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제40권7호
    • /
    • pp.1313-1329
    • /
    • 2015
  • In MANET, frequent route breaks lead to repeated route discovery process and this increases control packet overhead and packet drop. AODV-I improves performance of AODV by using the event driven approach which removes periodic Hello message. Unlike the Hello message, Interrupt message which is sent for each event can detect and predict the link failure because it allows node to know the status of the neighbor node. From this characteristics of Interrupt message, performance of AODV-I can be further improved by adding a processing procedures for each type of Interrupt message and it is also possible to improve AODV-I by adding the Backup path scheme because it originally has problems due to a single path of AODV. In this paper, we propose AODV-IB that combines improved Backup path scheme and Interrupt message approach of AODV-I in order to reduce transmission delay and the number of route discoveries. AODV-IB improves AODV-I by adding proper processing procedures for the link failure prediction and detection for each Interrupt message. We also implement improved Backup path strategy in AODV-IB by minimizing delay without additional Control packet. Simulation results, using the simulator QualNet 5.0, indicate that proposed AODV-IB performs better than AODV-I.

A Study on the Impact of Cosmetics Blog Information Characteristics on credibility in the Process of Word of Mouth Acceptance and Word of Mouth Effect (화장품 블로그의 정보특성이 구전수용과정의 신뢰와 구전효과에 미치는 영향)

  • Park, Jeong-Mi;Hwang, Sun-Jin
    • Journal of the Korean Society of Costume
    • /
    • 제62권2호
    • /
    • pp.13-25
    • /
    • 2012
  • The purpose of this research is to study the influence over confidence and Word-Of-Mouth (WOM) effect in the acceptance process of WOM by information characteristics(consensus, vividness, and message neutrality) of individual cosmetic blog, reflecting that it is widely spreading over the public. Online survey for the consumers using such blogs was performed to collect data(N=200), and credibility analysis through Cronbach-${\alpha}$ and Structural Equation Model(SEM) analysis using AMOS 18.0 were performed. The analysis results are as follows; First, vivid information and neutral message increase WOM effect through the improvement of consumers' credibility whereas information consensus doesn't positively influence over credibility. Second, the examination of a moderating effect by type of cosmetics demonstrated that the consumers of basic cosmetics have most confidence in vivid information, and those of color cosmetics do more confidence in neutral message. Therefore, there is a difference in the credibility factor of online WOM depending on the type of cosmetics consumption so that differentiated information provision strategies for cosmetics groups should be established based on it.

A Prediction-based Energy-conserving Approximate Storage and Query Processing Schema in Object-Tracking Sensor Networks

  • Xie, Yi;Xiao, Weidong;Tang, Daquan;Tang, Jiuyang;Tang, Guoming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권5호
    • /
    • pp.909-937
    • /
    • 2011
  • Energy efficiency is one of the most critical issues in the design of wireless sensor networks. In object-tracking sensor networks, the data storage and query processing should be energy-conserving by decreasing the message complexity. In this paper, a Prediction-based Energy-conserving Approximate StoragE schema (P-EASE) is proposed, which can reduce the query error of EASE by changing its approximate area and adopting predicting model without increasing the cost. In addition, focusing on reducing the unnecessary querying messages, P-EASE enables an optimal query algorithm to taking into consideration to query the proper storage node, i.e., the nearer storage node of the centric storage node and local storage node. The theoretical analysis illuminates the correctness and efficiency of the P-EASE. Simulation experiments are conducted under semi-random walk and random waypoint mobility. Compared to EASE, P-EASE performs better at the query error, message complexity, total energy consumption and hotspot energy consumption. Results have shown that P-EASE is more energy-conserving and has higher location precision than EASE.

Authenticated Quantum Secret Sharing using GHZ state swapping (GHZ 상태 교환을 이용한 인증된 양자 비밀 공유)

  • Lee, Duk-Jin;Lee, Hwa-Yean;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제16권6호
    • /
    • pp.123-134
    • /
    • 2006
  • We propose a quantum secret sharing protocol which can authenticate more than half of members using GHZ state swapping. The Trusted Third Party, Trent can authenticate all members using previously shared ID among Trent distributing his message and the members wanting to reconstruct the message. Authenticated members can reconstruct a secret message through GHZ swapping. Moreover, this protocol is efficient to expand the number of members to arbitrary number n, so it is a close quantum secret sharing protocol to classical secret sharing protocol.

The Effects of Cause-Marketing Messages Delivered on Restaurant Menu (외식기업의 공익연계 메시지의 효과연구)

  • Kim, Byoung Seok;Hwang, Johye
    • Knowledge Management Research
    • /
    • 제15권4호
    • /
    • pp.127-145
    • /
    • 2014
  • This study aims to examine the effects of message framing of restaurant menus on customers' perceptions (trust and immersion) and their willingness to pay a premium price. The contents of messages focused on a hypothetical restaurant's cause-marketing activity. Four types of message framing were created: The first two types were varied by the presence and absence of the information about the current cause-marketing outcome, and the second two types were varied by positive and negative framing. The results showed that respondents in general had trust in cause-marketing messages and immersion of cause-marketing message by negative framing lead to positive influence of willingness to pay. Furthermore it had a significant effect on willingness to pay depending on cause-marketing message type and negative message framed messages showed an intention to willingness to pay a premium price. This study compared the difference in messages by type as an extension of the studies of cause-marketing messages in the past. The results of this study will be used for establishing effective marketing strategies for today's foodservice companies and serve as objective data for setting differentiated prices under the circumstance where the importance of companies' social responsibilities is growing.

Spam Message Filtering with Bayesian Approach for Internet Communities (베이지안을 이용한 인터넷 커뮤니티 상의 유해 메시지 차단 기법)

  • Kim, Bum-Bae;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • 제13C권6호
    • /
    • pp.733-740
    • /
    • 2006
  • Spam Message has been Causing widespread damages on the Internet. One source of the problems is rooted from an anonymously posted message in the bulletin board in Internet communities. This type of the Spam messages tries to advertise products, to harm other's reputation, to deliver religious messages and so on. In this paper we present the Spam message filtering using the Bayesian approach. In order to increase usefulness of the Spam filter in the bulletin board in Internet communities, we made the Spam filter which can divide the Spam message into six categories such as advertisement, pornography, abuse, religion and other. The test conducted against messages posted on the popular web sites.

A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security (물리 계층에서 보안 재밍 신호 공유의 한계점과 이진 재밍 메시지 도청의 해결책)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제14권6호
    • /
    • pp.63-67
    • /
    • 2014
  • A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.