• Title/Summary/Keyword: MESSAGE model

Search Result 652, Processing Time 0.027 seconds

A Study on the Improved Post-Analysis Development System in the Naval Combat System

  • Seo, Chang-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.197-207
    • /
    • 2022
  • The Naval Combat System operates in multiple software components for efficient functional processing. Data transmission and reception between components is performed in real time using DDS(Data Distribution Service). Reliable Post-Analysis requires the collection of all DDS messages. However, Software workload and development costs increase because common functions for all messages must be developed directly. In the paper, We propose an improved Post-Analysis based on the Feature Model and a new development system using it. Functions for the modified message were applied as variable domains of the Feature Model. When Build Center updates Post-Analysis, it automatically processes all software tasks associated with Post-Analysis. The proposed development system simplified the overall work procedure, and work time was significantly reduced compared to the existing development system.

The Parallelization Effectiveness Analysis of K-DRUM Model (분포형 강우유출모형(K-DRUM)의 병렬화 효과 분석)

  • Chung, Sung-Young;Park, Jin-Hyeog;Hur, Young-Teck;Jung, Kwan-Sue
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.4
    • /
    • pp.21-30
    • /
    • 2010
  • In this paper, the parallel distributed rainfall runoff model(K-DRUM) using MPI(Message Passing Interface) technique was developed to solve the problem of calculation time as it is one of the demerits of the distributed model for performing physical and complicated numerical calculations for large scale watersheds. The K-DRUM model which is based on GIS can simulate temporal and spatial distribution of surface flow and sub-surface flow during flood period, and input parameters of ASCII format as pre-process can be extracted using ArcView. The comparison studies were performed with various domain divisions in Namgang Dam watershed in case of typoon 'Ewiniar' at 2006. The numerical simulation using the cluster system was performed to check a parallelization effectiveness increasing the domain divisions from 1 to 25. As a result, the computer memory size reduced and the calculation time was decreased with increase of divided domains. And also, the tool was suggested in order to decreasing the discharge error on each domain connections. The result shows that the calculation and communication times in each domain have to repeats three times at each time steps in order to minimization of discharge error.

Design of T-DMB Automatic Emergency Alert Service Standard: Part 2 Service Model, Transport Channel, and Service Signaling (지상파 DMB 자동재난경보방송표준 설계: 제2부 서비스 모델, 전송 채널, 서비스 시그널링)

  • Choi, Seong-Jong;Kwon, Dae-Bok;Kim, Jae-Yeon;Oh, Keon-Sik;Chang, Tae-Uk;Hahm, Young-Kwon
    • Journal of Broadcast Engineering
    • /
    • v.12 no.6
    • /
    • pp.630-640
    • /
    • 2007
  • This paper presents the design of service model, transport channel, and service signaling for the Terrestrial DMB Automatic Emergency Alert Service (AEAS) Standard. The paper begins with the analysis of technical backgrounds related to the design topics. Next, the raper presents the design of service model for the AEAS. Since, unlike the regular T-DMB services, the AEAS is event-driven and common to all services, some problems have been identified to design a service model conforming to the T-DMB standard. So, the paper proposes a new concept, called the common service, and the AEAS is modeled using the common service. Next, in order to decide the transport channel for the alert information, the paper proposes to divide the alert information into the message which contains code/text-based essential information, and the supplemental multimedia information. Then, the paper tries to find the most efficient transport channels. Emergency Warning Service (EWS) which uses FIG 5/2 is selected for the delivery of the message. The paper proposes no constraints on delivery of supplemental information except that it shall use the MSC. Finally, it proposes the service signaling for the common service and transport channel. Due to the problems of conventional signaling using the MCI, it proposes a new signaling method. The paper will contribute as a guideline to the development for emergency alert service standards fur other broadcasting media.

Application of MPI Technique for Distributed Rainfall-Runoff Model (분포형 강우유출모형 병렬화 처리기법 적용)

  • Chung, Sung-Young;Park, Jin-Hyeog;Hur, Young-Teck;Jung, Kwan-Sue
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.8
    • /
    • pp.747-755
    • /
    • 2010
  • Distributed Models have relative weak points due to the amount of computer memory and calculation time required for calculating water flow using a numerical analysis based on kinematic wave theory when compared to the conceptual models used so far. Typically, the distributed models have been mainly applied to small basins. It was necessary to decrease the resolution of the grid to make it applicable for large scale watersheds, and because it would take up too much time to calculate using a higher resolution. That has been one of the more difficult factors in applying the model for actual work. In this paper, MPI (Message Passing Interface) technique was applied to solve the problem of calculation time as it is one of the demerits of the distributed model for performing physical and complicated numerical calculations for large scale watersheds. The comparison studies were performed a single domain and a divided small domain in Yongdam Dam watershed in case of typoon 'Ewiniar' at 2006. They were compared to analyze the application effects of parallelization technique. As a result, a maximum of 10 times the amount of calculation time was saved but keeping the level of quality for discharge by using parallelization code rather than a single processor.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

A Study on the Mapping Method of IEEE 11073 DIM/HL7 v3 RIM for Smart health-care (스마트폰 헬스케어를 위한 IEEE 11073 DIM/HL7 v3 RIM 매핑 방법에 대한 연구)

  • Kim, Jong-Pan;Jeon, Jae-Hwan;Oh, Am-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.842-845
    • /
    • 2012
  • 의료기기는 헬스케어 서비스를 위한 필수요소로 최근 의료와 관련된 스마트폰 애플리케이션의 증가와 함께 스마트폰과 연결되는 의료기기를 활용한 스마트 헬스케어가 대두되고 있다. 이러한 스마트 헬스케어는 현재 ISO/IEEE 11073 표준을 통해 의료기기와 게이트웨이를 연결하여 임상정보를 전송하고 게이트웨이는 HL7 CDA 표준 문서를 통해 전자 건강 기록 및 개인 건강 기록 시스템, 임상 워크플로우 및 임상 의사 결정 지원 시스템과 같은 유형의 의료 서비스 시스템과 연동하는 솔루션이다. ISO/IEEE 11073은 DIM(Domain Information Model)이라는 정보 모델을 기반으로 하며 HL7 v3인 CDA는 RIM(Reference Information Model)이 있기 때문에 상이한 인터페이스간의 매핑 매커니즘을 필요로 한다. 이에 본 논문에서는 스마트폰 환경에서 의료 응용 애플리케이션에서의 효율적인 의료기기 데이터 운용을 위해 RMIM(Refined Message Information Model) 기반의 IEEE 11073 DIM/HL7 v3 RIM 표준 인터페이스 변환 방법을 제안한다.

  • PDF

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

A New Fine-grain SMS Corpus and Its Corresponding Classifier Using Probabilistic Topic Model

  • Ma, Jialin;Zhang, Yongjun;Wang, Zhijian;Chen, Bolun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.604-625
    • /
    • 2018
  • Nowadays, SMS spam has been overflowing in many countries. In fact, the standards of filtering SMS spam are different from country to country. However, the current technologies and researches about SMS spam filtering all focus on dividing SMS message into two classes: legitimate and illegitimate. It does not conform to the actual situation and need. Furthermore, they are facing several difficulties, such as: (1) High quality and large-scale SMS spam corpus is very scarce, fine categorized SMS spam corpus is even none at all. This seriously handicaps the researchers' studies. (2) The limited length of SMS messages lead to lack of enough features. These factors seriously degrade the performance of the traditional classifiers (such as SVM, K-NN, and Bayes). In this paper, we present a new fine categorized SMS spam corpus which is unique and the largest one as far as we know. In addition, we propose a classifier, which is based on the probability topic model. The classifier can alleviate feature sparse problem in the task of SMS spam filtering. Moreover, we compare the approach with three typical classifiers on the new SMS spam corpus. The experimental results show that the proposed approach is more effective for the task of SMS spam filtering.

Mobile Junk Message Filter Reflecting User Preference

  • Lee, Kyoung-Ju;Choi, Deok-Jai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2849-2865
    • /
    • 2012
  • In order to block mobile junk messages automatically, many studies on spam filters have applied machine learning algorithms. Most previous research focused only on the accuracy rate of spam filters from the view point of the algorithm used, not on individual user's preferences. In terms of individual taste, the spam filters implemented on a mobile device have the advantage over spam filters on a network node, because it deals with only incoming messages on the users' phone and generates no additional traffic during the filtering process. However, a spam filter on a mobile phone has to consider the consumption of resources, because energy, memory and computing ability are limited. Moreover, as time passes an increasing number of feature words are likely to exhaust mobile resources. In this paper we propose a spam filter model distributed between a users' computer and smart phone. We expect the model to follow personal decision boundaries and use the uniform resources of smart phones. An authorized user's computer takes on the more complex and time consuming jobs, such as feature selection and training, while the smart phone performs only the minimum amount of work for filtering and utilizes the results of the information calculated on the desktop. Our experiments show that the accuracy of our method is more than 95% with Na$\ddot{i}$ve Bayes and Support Vector Machine, and our model that uses uniform memory does not affect other applications that run on the smart phone.

Perofrmance Analysis of Mobility Support Protocol in Each Layer (계층간 이동성 지원 프로토콜들의 성능 분석)

  • Lee, Hyo-Beom;Kim, Kwang-Ryoul;Hwang, Seung-Hee;Min, Sung-Gi
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.2
    • /
    • pp.134-142
    • /
    • 2007
  • Several mobility supporting protocols have been proposed across OSI reference layers. Each protocol has similar or different characteristics based on its operating layer which affect a handover latency. In this paper, we analyze handover performance of most representative protocols in each layer. For analysis, we use SUBNET model based Markovian model and movement model. In result, difference of protocol handover latency is not occurred by DAD but also by security, movement detection, message processing time.