• Title/Summary/Keyword: MESSAGE model

Search Result 654, Processing Time 0.026 seconds

Evaluation of In-vehicle Warning Information Modalities by Kansei Engineering (감성공학을 이용한 차내 경고정보 제공방식 평가)

  • Park, Jun-Yeong;O, Cheol;Kim, Myeong-Ju;Jang, Myeong-Sun
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.3
    • /
    • pp.39-49
    • /
    • 2010
  • Provision of in-vehicle warning information is of keen interest since it can be effectively used to prevent traffic accident on the road. This study evaluates the effectiveness of information provision modalities based on kansei engineering. Various warning information scenarios using different modalities are devised for the evaluation. Statistical data analysis techniques including factor analysis, correlation analysis, and the general linear model are used to assess the user's affect for information modalities. The evaluation result shows that the provision of visual information consisted of 'text and pictogram' leads to higher understandability. The combination of beep sound and voice message' was identified as a more effective modality for auditory warning. In addition, the red color for the blinking warning signal was preferred by users.

T-DMB Automatic Emergency Alerting Service by Estimating the Location of Receiver (단말기 위치 자동 인식을 이용한 T-DMB 자동재난경보서비스)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Kim, Kang-Wook;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.5
    • /
    • pp.615-623
    • /
    • 2012
  • This paper presents T-DMB AEAS (automatic emergency alerting service) receiver model considering emergency region. The proposed receiver model determines the geographical location of the terminal by analysing the received T-DMB signal and displays the AEAS messages only if the location of terminal is similar to the emergency site. First, to determine the geographical location of the terminal, we extract the TII value from the null symbol of the SC and, based on it, calculate the location of transmitter by analysing FIG 0/22 delivering the TII-related data. The proposed algorithm sets the location of transmitter as that of receiver and displays the emergency message only in the case of the similar region. The experiment was conducted in the test environment of low power T-DMB generator based on the T-DMB AEAS messages.

The Distributed Transport Platform for Real-Time Multimedia Stream (실시간 멀티미디어 스트림을 위한 분산 전송 플랫폼)

  • 송병훈;정광수;정형석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.260-269
    • /
    • 2003
  • The traditional distributed object middleware platform is not suitable for the transmission of stream data, because RPC(Remote Procedure Call)-based message transmission have a great overhead. Therefore, the OMG(Object Management Group) proposes the AV(Audio and Video) stream reference model for streaming on the distributed object middleware platform. But, this reference model has not a detail of implementation. Particularly it also has not congestion control scheme for improvement of network efficiency on the real network environment. It is a very important and difficult technical issue to provide the stream transmission platform with advanced congestion control scheme. In this paper, we propose an architecture of a distributed stream transport platform and deal with the design and implementation concept of our proposed platform. Also, we present a mechanism to improve streaming utilization by SRTP(Smart RTP). SRTP is our proposed TCP-Friendly scheme.

Modeling and Implementation of the Affordance-based Human-Machine Collaborative System (어포던스 기반의 인간-기계 협업 모델을 이용한 제조 시스템 구현 연구)

  • Oh, Yeong Gwang;Ju, Ikchan;Lee, Wooyeol;Kim, Namhun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.1
    • /
    • pp.34-42
    • /
    • 2015
  • Modeling and control of human-involved manufacturing systems poses a huge challenge on how to model all possible interactions among system components within the time and space dimensions. As the manufacturing environment are getting complicated, the importance of human in the manufacturing system is getting more and more spotlighted to incorporate the manufacturing flexibility. This paper presents a formal modeling methodology of affordance-based MPSG (Message-based Part State Graph) for a human-machine collaboration system incorporating supervisory control scheme for flexible manufacturing systems in automotive industry. Basically, we intend to extend the existing model of affordance-based MPSG to the real industrial application of humanmachine cooperative environments. The suggested extension with the real industrial example is illustrated in three steps; first, the manufacturing process and relevant data are analyzed in perspectives of MABA-MABA and the supervisory control; second, the manufacturing processes and task allocation between human and machine are mapped onto the concept of MABA-MABA; and the last, the affordance-based MPSG of humanmachine collaboration for the manufacturing process is presented with UMLs for verification.

Chatting Pattern Based Game BOT Detection: Do They Talk Like Us?

  • Kang, Ah Reum;Kim, Huy Kang;Woo, Jiyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2866-2879
    • /
    • 2012
  • Among the various security threats in online games, the use of game bots is the most serious problem. Previous studies on game bot detection have proposed many methods to find out discriminable behaviors of bots from humans based on the fact that a bot's playing pattern is different from that of a human. In this paper, we look at the chatting data that reflects gamers' communication patterns and propose a communication pattern analysis framework for online game bot detection. In massive multi-user online role playing games (MMORPGs), game bots use chatting message in a different way from normal users. We derive four features; a network feature, a descriptive feature, a diversity feature and a text feature. To measure the diversity of communication patterns, we propose lightly summarized indices, which are computationally inexpensive and intuitive. For text features, we derive lexical, syntactic and semantic features from chatting contents using text mining techniques. To build the learning model for game bot detection, we test and compare three classification models: the random forest, logistic regression and lazy learning. We apply the proposed framework to AION operated by NCsoft, a leading online game company in Korea. As a result of our experiments, we found that the random forest outperforms the logistic regression and lazy learning. The model that employs the entire feature sets gives the highest performance with a precision value of 0.893 and a recall value of 0.965.

Modeling and Simulation of the Efficient Certificate Status Validation System on Public Key Infrastructure (공개키 기반 구조에서의 효율적인 인증서 상태 검증 방법의 모델링 및 시뮬레이션)

  • Seo, Hee-Suk;Kim, Tae-Kyoung;Kim, Hee-Wan
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.5
    • /
    • pp.721-728
    • /
    • 2004
  • OCSP (Online Certificate Status Protocol) server which checks the certificate status provides the real time status verification in the PKI (Public Key Infrastructure) system which is the essential system of certificate. However, OCSP server need the message authentication with the server and client, so it has some shortcomings that has slow response time for the demands of many clients concurrently and has complexity of the mathematical process in the public encryption system. In this research, simulation model of the certificate status vertification server is constructed of the DEVS (Discrete EVent system Specification) formalism. This sever model is constructed to practice the authentication with hash function when certificate is checked. Simulation results shows the results of increase of the certificate status verification speed and decrease of the response time to the client.

  • PDF

A Secure Multiagent Engine Based on Public Key Infrastructure (공개키 기반 구조 기반의 보안 다중 에이전트 엔진)

  • 장혜진
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.4
    • /
    • pp.313-318
    • /
    • 2002
  • The Integration of agent technology and security technology is needed to many application areas like electronic commerce. This paper suggests a model of extended multi-agent engine which supports privacy, integrity, authentication and non-repudiation on agent communication. Each agent which is developed with the agent engine is composed of agent engine layer and agent application layer. We describe and use the concepts self-to-self messages, secure communication channel, and distinction of KQML messages in agent application layer and messages in agent engine layer. The suggested agent engine provides an agent communication language which is extended to enable secure communication between agents without any modifications or restrictions to content layer and message layer of KQML. Also, in the model of our multi-agent engine, secure communication is expressed and processed transparently on the agent communication language.

  • PDF

Public Broadcasting or Publicity Broadcasting? An Analysis of KBS News Coverage of the Korean Housing Market (KBS의 공보 방송 모형적 성격에 관한 연구 부동산 뉴스 생산 과정을 중심으로)

  • Kim, Soo Young;Park, Sung Gwan
    • Korean journal of communication and information
    • /
    • v.81
    • /
    • pp.225-271
    • /
    • 2017
  • What is the basic nature of Korean public broadcasting system? This research explores this question through an analysis of KBS news coverage of the Korean housing market. This study spotlights the internal news production processes. In detail, this study investigates newsroom routines, such as news selection, news gatherings, and news production. As a result, this study reveals KBS can be classified as "Publicity Model" following reasons. First, KBS news selection process stresses higher viewer ratings for competitive market share and belittles public interests of serving the citizen. This caused KBS news to provide fragmented and truncated news information and to constrict high quality news of significant information for citizen. Second, KBS newsroom operates under the minimum staff resource to produce news programmes and has developed official source dependency as a routine for news gathering. Third, under the limits of report format, KBS news worked as a neutral deliverer of government message and failed to provide more detailed information and diverse viewpoints.

  • PDF

Adaptive Admission Control Mechanism in Differentiated Services Network (인터넷 차별 서비스 망에서 적응적 연결 수락 제어 메커니즘)

  • 이준화;양미정;이우섭;김상하
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.12
    • /
    • pp.83-93
    • /
    • 2003
  • Differentiated service networks, based on bandwidth broker, perform the control and management of QoS provisioning for the QoS guaranteed services, However, the centralized bandwidth broker model has a scalability problem since it has centralized resource management for the admission control function of all call attempts, Therefore, in this paper, we proposea novel adaptive admission control mechanism according to the attempted call status for enhancing the scalability under the centralized bandwidth broker model in IP differentiated service networks, The proposed mechanism decouples the function of admission control from the bandwidth broker, So, the ingress edge node performs the admission control and the bandwidth broker performs the resource management and QoS provisioning, We also introduce an edge-to-edge path concepts and the ingress edge node performs the admission control under the allocated bandwidth to eachpath. The allocated bandwidth per path adaptively varies according to the status of the attempted calls, This mechanism can significantly reduce the number of communication message between the bandwidth broker and each edge node in the network and increase the bandwidth utilization via adaptable resource allocation, In this paper we study the adaptive admission control operation and show the efficient and extensive improvement through the performance evaluation.

Group Key Management with Low Cost Rekey (저비용 rekey를 갖는 그룹키 관리)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • The Internet today provides group communication model, multicast service. It is important to keep security for multicast communication. Member leaving is associated with scalability problem for group key management. If one member of the group is removed, new group key has to be changed and communicated to all remaining members of group. Modification and distribution of new group keys for rekeying is an expensive operation. Minimizing the number of messages and operation cost for generation of the composite keys are important evaluating criteria of multicast key management scheme. Periodic rekey helps reducing these important parameters rather than removing members sequentially in fashion one after another. In this paper, Hamming distance is calculated between every members to be removed. The members with Hamming distance less than threshold are selected for rekeying procedure. With running the round assignment algorithm, our model has advantages of reducing the number of message and operation cost for generation of the composite keys for rekeying.

  • PDF