• Title/Summary/Keyword: MESSAGE model

Search Result 652, Processing Time 0.028 seconds

Media Characteristics of Internet Live Broadcasting in the SMCRE Model (SMCRE 모델로 본 인터넷 라이브 방송의 매체적 특성)

  • ZHANG, XIANJING
    • Trans-
    • /
    • v.10
    • /
    • pp.51-72
    • /
    • 2021
  • This study focused on the media characteristics of internet live broadcasting in the New Media Age. To this end, analyzed the media characteristics of internet live broadcasting through SMCRE models consisting of source, message, channel, receiver, and effect. In addition, considered the unique feedback of internet live broadcasting that prior studies overlooked. It also presented problems with internet live broadcasting and prospects for future development of internet live broadcasting.

Design of a Software-Based RNSS Signal Simulator for a New Signal

  • Jo, Gwang Hee;Noh, Jae Hee;Bu, Sung Chun;Ko, Yo Han;Park, Chansik;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.4
    • /
    • pp.381-388
    • /
    • 2022
  • In 2021, development of a regional satellite navigation system called KPS was approved. In this regard, various studies are in progress, but there is no published signal model. So, in relation to the user segment, it is necessary to design a user receiver, but there is no information. Therefore, in this paper, we assume a signal model that can be a candidate signal for KPS based on related studies. This signal uses CNAV-2 structure navigation message, truncated Gold code and BPSK modulation. Based on this signal, a simulator is designed that can be used for receiver design later. The simulator consists of a signal generator and a signal transmitter, and is verified using a software receiver and spectrum analyzer.

A Study on Automatic Test Case Extraction Mechanism from UML State Diagrams Based on M2M Transformation (M2M 모델변환 기반의 UML 스테이트 다이어그램을 통한 테스트케이스 자동추출 메커니즘에 관한 연구)

  • Kim, Dong-Ho;Kim, R. Youngchul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.129-134
    • /
    • 2013
  • Previous research is focus on testcase generation automation using message sequence diagram based on metamodel. but that research is not enough for testcase genaeration automation using state diagram based metamodel. so in this paper is adopt Model Driven Architecture (MDA) mechanism for using metamodel and model transformation. and we suggest testcase automation mechanism using state diagram in UML. we will decrease cost of embedded software design and testcase genaration and increase quality of embedded software using metamodel mechanism.

DOORAE : A Concurrent Computation Model for Distributed Systems (두레 : 분산시스템을 위한 병행연산모델)

  • Kim, Dae-Gwon;Park, Choong-Shik;Lee, Im-Geun;Lee, Yong-Surk;Park, Kyu-Tae
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.11
    • /
    • pp.1-10
    • /
    • 1994
  • A concurrent computation model Doorae and its description language DL are developed to model problems of parallel and distributed systems. Doorae model has simple and uniform concepts of object and message passing for problem modeling and computation. A method for detecting parallelism implicitly. with no exact description of parallelism in program. is proposed. Furthermore, the method assures the maximum parallelism in dynamic environment by creating concurrent objects. Also a concept of Waiting Variable to insure maximum computation efficiency of objects is proposed.

  • PDF

An Exponential Smoothing Adaptive Failure Detector in the Dual Model of Heartbeat and Interaction

  • Yang, Zhiyong;Li, Chunlin;Liu, Yanpei;Liu, Yunchang;Xu, Lijun
    • Journal of Computing Science and Engineering
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2014
  • In this paper, we propose a new implementation of a failure detector. The implementation uses a dual model of heartbeat and interaction. First, the heartbeat model is adopted to shorten the detection time, if the detection process does not receive the heartbeat message in the expected time. The interaction model is then used to check the process further. The expected time is calculated using the exponential smoothing method. Exponential smoothing can be used to estimate the next arrival time not only in the random data, but also in the data of linear trends. It is proven that the new detector in the paper can eventually be a perfect detector.

The Insights of Localization through Mobile Anchor Nodes in Wireless Sensor Networks with Irregular Radio

  • Han, Guangjie;Xu, Huihui;Jiang, Jinfang;Shu, Lei;Chilamkurti, Naveen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2992-3007
    • /
    • 2012
  • Recently there has been an increasing interest in exploring the radio irregularity research problem in Wireless Sensor Networks (WSNs). Measurements on real test-beds provide insights and fundamental information for a radio irregularity model. In our previous work "LMAT", we solved the path planning problem of the mobile anchor node without taking into account the radio irregularity model. This paper further studies how the localization performance is affected by radio irregularity. There is high probability that unknown nodes cannot receive sufficient location messages under the radio irregularity model. Therefore, we dynamically adjust the anchor node's radio range to guarantee that all the unknown nodes can receive sufficient localization information. In order to improve localization accuracy, we propose a new 2-hop localization scheme. Furthermore, we point out the relationship between degree of irregularity (DOI) and communication distance, and the impact of radio irregularity on message receiving probability. Finally, simulations show that, compared with 1-hop localization scheme, the 2-hop localization scheme with the radio irregularity model reduces the average localization error by about 20.51%.

Developing a Simulator of the Capture Process in Towed Fishing Gears by Chaotic Fish Behavior Model and Parallel Computing

  • Kim Yong-Hae;Ha Seok-Wun;Jun Yong-Kee
    • Fisheries and Aquatic Sciences
    • /
    • v.7 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • A fishing simulator for towed fishing gear was investigated in order to mimic the fish behavior in capture process and investigate fishing selectivity. A fish behavior model using a psycho-hydraulic wheel activated by stimuli is established to introduce Lorenz chaos equations and a neural network system and to generate the components of realistic fish capture processes. The fish positions within the specified gear geometry are calculated from normalized intensities of the stimuli of the fishing gear components or neighboring fish and then these are related to the sensitivities and the abilities of the fish. This study is applied to four different towed gears i.e. a bottom trawl, a midwater trawl, a two-boat seine, and an anchovy boat seine and for 17 fish species as mainly caught. The Alpha cluster computer system and Fortran MPI (Message-Passing Interface) parallel programming were used for rapid calculation and mass data processing in this chaotic behavior model. The results of the simulation can be represented as animation of fish movements in relation to fishing gear using Open-GL and C graphic programming and catch data as well as selectivity analysis. The results of this simulator mimicked closely the field studies of the same gears and can therefore be used in further study of fishing gear design, predicting selectivity and indoor training systems.

A Study on Timing Modeling and Response Time Analysis in LIN Based Network System (LIN 프로토콜 시간 모델링 및 메시지 응답 시간 해석에 관한 연구)

  • Youn, Jea-Myoung;Sunwoo, Myoung-Ho;Lee, Woo-Taik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.6
    • /
    • pp.48-55
    • /
    • 2005
  • In this paper, a mathematical model and a simulation method for the response time analysis of Local Interconnect Network(LIN) based network systems are proposed. Network-induced delays in a network based control system can vary widely according to the transmission time of message and the overhead time of transmission. Therefore, in order to design a distributed control system using LIN network, a method to predict and verify the timing behavior of LIN protocol is required at the network design phase. Furthermore, a simulation environment based on a timing model of LIN protocol is beneficial to predict the timing behavior of LIN. The model equation is formulated with six timing parameters deduced from timing properties of LIN specification. Additionally, LIN conformance test equations to verify LIN device driver are derived with timing constraints of the parameters. The proposed model equation and simulation method are validated with a result that is measured at real LIN based network system.

Node Incentive Mechanism in Selfish Opportunistic Network

  • WANG, Hao-tian;Chen, Zhi-gang;WU, Jia;WANG, Lei-lei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1481-1501
    • /
    • 2019
  • In opportunistic network, the behavior of a node is autonomous and has social attributes such as selfishness.If a node wants to forward information to another node, it is bound to be limited by the node's own resources such as cache, power, and energy.Therefore, in the process of communication, some nodes do not help to forward information of other nodes because of their selfish behavior. This will lead to the inability to complete cooperation, greatly reduce the success rate of message transmission, increase network delay, and affect the overall network performance. This article proposes a hybrid incentive mechanism (Mim) based on the Reputation mechanism and the Credit mechanism.The selfishness model, energy model (The energy in the article exists in the form of electricity) and transaction model constitute our Mim mechanism. The Mim classifies the selfishness of nodes and constantly pay attention to changes in node energy, and manage the wealth of both sides of the node by introducing the Central Money Management Center. By calculating the selfishness of the node, the currency trading model is used to differentiate pricing of the node's services. Simulation results show that by using the Mim, the information delivery rate in the network and the fairness of node transactions are improved. At the same time, it also greatly increases the average life of the network.

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

  • Goo, Young-Hoon;Shim, Kyu-Seok;Baek, Ui-Jun;Kim, Myung-Sup
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4310-4330
    • /
    • 2020
  • With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command-oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.