• Title/Summary/Keyword: MESSAGE model

Search Result 652, Processing Time 0.046 seconds

A Synchronization Technique of Mobile XML Documents using the Message Digest Tables (메시지다이제스트 테이블 기반의 모바일 XML 문서 동기화 기법)

  • Park, Seong-Jin
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.157-171
    • /
    • 2009
  • In mobile XML environments, the efficient synchronization technique is required to maintain the consistency of replicated XML data because the same data can be replicated between so many different XML documents. In this paper, we propose a message digest based synchronization technique to maintain the consistency of replicated data between client XML documents and a server XML database in mobile XML environments. The proposed an XML data synchronization technique(XSA) has the advantage of model generality aspect and storage space aspect by using the tuple-based message digest table to detect the data conflicts. The proposed technique can be applicable to the application requiring the consistency of replicated XML data without any restrictions in the heterogeneous(between hierarchical XML documents and relational XML databases) mobile environments.

Priority-based Message Scheduling for Multi-agent System in Ubiquitous Environment (유비쿼터스 환경에서 멀티 에이전트 시스템을 위한 우선순위 기반 메시지 스케줄링 기법)

  • Yoon, Yang-Seok;Youn, Hee-Yong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.137-143
    • /
    • 2008
  • In ubiquitous environment the multi-agent system is effective for providing intelligent services. In this paper we introduce a new scheduling service model for improving the communication performance in the multi-agent system. It is achieved by assigning a priority to the message according to the weight of formalized ACL message and the number of messages exchanged between the agents. An experiment reveals that the proposed approach allows smaller processing time per message and turnaround time than the scheduling with the existing JADE platform. Moreover, the proposed scheme allows a scalable messaging system.

  • PDF

Retained Message Delivery Scheme utilizing Reinforcement Learning in MQTT-based IoT Networks (MQTT 기반 IoT 네트워크에서 강화학습을 활용한 Retained 메시지 전송 방법)

  • Yeunwoong Kyung;Tae-Kook Kim;Youngjun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.131-135
    • /
    • 2024
  • In the MQTT protocol, if the retained flag of a message published by a publisher is set, the message is stored in the broker as a retained message. When a new subscriber performs a subscribe, the broker immediately sends the retained message. This allows the new subscriber to perform updates on the current state via the retained message without waiting for new messages from the publisher. However, sending retained messages can become a traffic overhead if new messages are frequently published by the publisher. This situation could be considered an overhead when new subscribers frequently subscribe. Therefore, in this paper, we propose a retained message delivery scheme by considering the characteristics of the published messages. We model the delivery and waiting actions to new subscribers from the perspective of the broker using reinforcement learning, and determine the optimal policy through Q learning algorithm. Through performance analysis, we confirm that the proposed method shows improved performance compared to existing methods.

A Fault-Tolerant Scheme Based on Message Passing for Mission-Critical Computers (임무지향 컴퓨터를 위한 메시지패싱 고장감내 기법)

  • Kim, Taehyon;Bae, Jungil;Shin, Jinbeom;Cho, Kilseok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.762-770
    • /
    • 2015
  • Fault tolerance is a crucial design for a mission-critical computer such as engagement control computer that has to maintain its operation for long mission time. In recent years, software fault-tolerant design is becoming important in terms of cost-effectiveness and high-efficiency. In this paper, we propose MPCMCC which is a model-based software component to implement fault tolerance in mission-critical computers. MPCMCC is a fault tolerance design that synchronizes shared data between two computers by using the one-way message-passing scheme which is easy to use and more stable than the shared memory scheme. In addition, MPCMCC can be easily reused for future work by employing the model based development methodology. We verified the functions of the software component and analyzed its performance in the simulation environment by using two mission-critical computers. The results show that MPCMCC is a suitable software component for fault tolerance in mission-critical computers.

A hybrid-vehicular communication systems using a gaussian model for sending a safe message (안전 메시지 전달을 위해 가우시안 모델을 적용한 하이브리드 차량 통신 시스템)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.161-166
    • /
    • 2012
  • When a car accident happened on a highway, the accident vehicle should broadcast a safe message to its neighbors in order to prevent a chain-reaction collision. Also, there is a problem that the estimation accuracy is low because of the memory limit from increasing the sampling count. In this paper, we proposes a HVC systems using a back-off algorithm applied to a gaussian model. And we proposes a MAC protocol preventing the communication delay by separating the neighbor count collection channel, data channel, and RSU communication channel. As a result, we show the frame reception success rate of our protocol improved about 10% than the previous protocol.

A Model-Based Image Steganography Method Using Watson's Visual Model

  • Fakhredanesh, Mohammad;Safabakhsh, Reza;Rahmati, Mohammad
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.479-489
    • /
    • 2014
  • This paper presents a model-based image steganography method based on Watson's visual model. Model-based steganography assumes a model for cover image statistics. This approach, however, has some weaknesses, including perceptual detectability. We propose to use Watson's visual model to improve perceptual undetectability of model-based steganography. The proposed method prevents visually perceptible changes during embedding. First, the maximum acceptable change in each discrete cosine transform coefficient is extracted based on Watson's visual model. Then, a model is fitted to a low-precision histogram of such coefficients and the message bits are encoded to this model. Finally, the encoded message bits are embedded in those coefficients whose maximum possible changes are visually imperceptible. Experimental results show that changes resulting from the proposed method are perceptually undetectable, whereas model-based steganography retains perceptually detectable changes. This perceptual undetectability is achieved while the perceptual quality - based on the structural similarity measure - and the security - based on two steganalysis methods - do not show any significant changes.

Maximizing the capacity of the IoT-based WSNs by employing the MIM capability (MIM 적용을 통한 IoT 기반 무선 센서 네트워크 성능 최대화 방안)

  • Kang, Young-myoung
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.9-15
    • /
    • 2020
  • Wireless sensor nodes adopting the advanced preamble detection function, Message-In-Mesage (MIM), maximize the concurrent transmission opportunities due to the capture effect, result in improving the system performance significantly compared to the legacy IEEE 802.15.4 based sensor devices. In this paper, we propose an MIM capture probability model to analyze the performance gains by applying the MIM function to the wireless sensor nodes. We implemented the IEEE 802.15.4 and MIM by Python and performed extensive simulations to verify the performance gains through MIM capture effects. The evaluation results show that the MIM sensors achieve 34% system throughput gains and 31% transmission delay gains over the legacy IEEE 802.15.4-based sensors, which confirm that it was consistent with the analysis result of the proposed MIM capture probability model.

Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment (자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN)

  • Nam, Hye-min;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.859-870
    • /
    • 2020
  • The MQTT-SN (Message Queuing Telemetry Transport-Sensor Network) protocol is a message transmission protocol used in a sensor-based Internet of Things (IoT) environment. This MQTT-SN protocol is a publish-subscribe model with a broker in the middle of message transmission, and each IoT device sends and receives messages through an intermediary when delivering messages. However, the MQTT-SN protocol does not provide security-related functions such as message security, mutual authentication, access control, and broker security. Accordingly, various security problems have recently occurred, and a situation in which security is required has emerged. In this paper, we review the security requirements of MQTT-SN once again, and propose a modified protocol that improves security while satisfying the constraints in the environment where the resource of IoT to which this protocol is applied is limited. Unlike the existing protocol, the security field and authentication server have been added to satisfy the security requirements. In addition, the proposed protocol is actually implemented and tested, and the proposed protocol is evaluated for practical use in terms of energy consumption.

The Impact of Regulatory Focus and Self-Construal on Guilt versus Shame Arousals in Health Communications: An Empirical Study from Vietnam

  • NGUYEN, Hoang Sinh;DOAN, Thi Thu Thao
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.1
    • /
    • pp.387-397
    • /
    • 2022
  • The purpose of this study is to examine the effects of emotional arousals of guilt versus shame on health message compliance. The study also investigates the moderation impact of two individual factors that have not been studied much in health communications, including regulatory focus and self-construal. This study employs a 2 (guilt versus shame appeals/arousals) between-subjects experiment and a survey to test the conceptual model. The context of the study is binge drinking, and the survey respondents (n = 330) are male university students in Ho Chi Minh City, Vietnam. The results confirm the positive effects of guilt and shame arousals on health message compliance. In addition, the results show moderating effects of the two individual characteristics of regulatory focus and self-construal on the relationships between guilt/shame arousals and health message compliance. The findings of this study have not only theoretical implications but also practical implications in the field of health communications. The insights could help health marketers, policymakers, and health promotion agencies to effectively develop health communications campaigns with more appealing message content (guilt versus shame) and relevant media selection (regulatory focus and self-construal).

Steganographic Model based on Low bit Encoding for VoIP (VoIP 환경을 위한 Low bit Encoding 스테가노그라픽 모델)

  • Kim, Young-Mi
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.141-150
    • /
    • 2007
  • This paper proposes new Steganographic model for VoIP that has very effective method using low bit encoding. Most of Steganographic models using Low bit Encoding have two disadvantages; one is that the existence of hidden secret message can be easily detected by auditory, the other is that the capacity of stego data is low. To solve these problems, this method embed more than one bit in inaudible range, so this method can improve the capacity of the hidden message in cover data. The embedding bit position is determined by using a pseudo random number generator which has seed with remaining message length, so it is hard to detect the stego data produced by the proposed method. This proposed model is able to use not only to communicate wave file with hidden message in VoIP environment but also to hide vary information which is user basic information, authentication system, etc.

  • PDF