• Title/Summary/Keyword: Message Communication

Search Result 1,629, Processing Time 0.092 seconds

Perfomance Analysis for the IPC Interface Part in a Distributed ATM Switching Control System (분산 ATM 교환제어시스템에서 프로세서간 통신 정합부에 대한 성능 분석)

  • Yeo, Hwan-Geun;Song, Kwang-Suk;Ro, Soong-Hwan;Ki, Jang-Geun
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.6
    • /
    • pp.25-35
    • /
    • 1998
  • The control system architecture in switching systems have undergone numerous changes to provide various call processing capability needed in telecommunication services. During call processing in a distributed switching control environment, the delay effect due to communication among main processors or peripheral controllers is one of the limiting factors which affect the system performance. In this paper, we propose a performance model for an IPC(Inter Processor Communication) interface hardware block which is required on the ATM cell-based message processing in a distributed ATM exchange system, and analyze the primary causes which affect the processor performance through the simulation. Consequently, It can be shown that the local CPU of the several components(resources) related to the IPC scheme is a bottleneck factor in achieving the maximum system performance from the simulation results, such as the utilization of each processing component according to the change of the input message rate, and the queue length and processing delay according to input message rate. And we also give some useful results such as the maximum message processing capacity according to the change of the performance of local CPU, and the local CPU maximum throughput according to the change of average message length, which is applicable as a reference data for the improvement or expansion of the ATM control system.

  • PDF

Message Quality, Structural Positions in Discussion Network, and Opinion Leadership: A Case Analysis of 'Free-Lunch Debate' in Online Political Discussion (메시지 품질과 토론 연결망의 구조적 위치, 그리고 여론지도력: 서울시 '무상급식 논란'의 온라인 정치토론 사례 분석)

  • Kim, Kyung-Mo;Song, Hyun-Jin
    • Korean journal of communication and information
    • /
    • v.56
    • /
    • pp.194-218
    • /
    • 2011
  • Focusing on the individuals' structural positions and roles in the internet discussion network, this research explores whether and how the opinion leaders' network characteristics are associated with the message quality and interpersonal influence in terms of attention-drawing and response-generation, which prior studies often failed to fully explicate. Findings suggest that discussion participants with high message quality occupy more central positions in the discussion network, thus enjoy more attention and responses of other following participants. However, opinion leader's network centralities, which tap the structural positions and unique roles in the online discussion network, systematically mediate the effect of the message quality on interpersonal influence. Moreover, significant interaction between opinion perception and network centrality was found only on the majority opinion group, rendering the entire discussion structure toward more enclaved deliberation and group polarization. Taken together, the results imply that the influence of the online opinion leader can only be substantiated with participant's central positions in the discussion network, which has been ignored by the prior opinion leadership research.

  • PDF

A Rule-based JMS Message Routing System for Dynamic Message Communication in based Distributed Systems (분산환경에서 동적 메시지 교환을 위한 룰 기반 JMS 메시지 라우팅 시스템)

  • Cho, Poong-Youn;Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.3
    • /
    • pp.1-20
    • /
    • 2008
  • Today's computing environment which is getting distributed to communicate with various systems needs dynamic inter-connectivity of the systems. MOM(Message Oriented Middleware) is popularly used for transmitting XML messages among the distributed systems for the inter-connectivity. But, they do not support event-based message routing functionalities with XML transformation for processing effective message routing, which is essential to inter-connectivity, and there is no integrated platform to cope with these requirements. Although event-based message routing and XML transformation have been studied in a wide range of computer science areas, development of message routing systems is considered as a tough job due to the technological difficulties. In order to address these requirements, we proposed a novel system, named RMRS(Rule-based Message Routing System), which supports event-based message routing as well as XML message transformation. To make the proposed system easy to use, we also redesigned ECA(Event- Condition-Action) rule to fit in our system and developed a tool to map source XML structure into target XML structure.

  • PDF

A Study on Non-participating TDL Message Analyzer (비가입형 TDL 메시지 분석기에 관한 연구)

  • Hwang, Byoung-Han;Lee, Jung-Woong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.290-294
    • /
    • 2018
  • Modern warfare exhibit a NCW (Network Centric Warfare) aspect through quick situation awareness and Command and Control. And Tactical messages operate on various tactical data links (TDLs). For monitoring TDL messages processed by data link processor(DLP), message analysers are generally developed as a component during system development. In addition, in order to forward TDL messages processed by DLP to the message anayzer, the interface messages between DLP and message analysers should be defined interface control document(ICD). We propose the methods using UDP or TCP packets provided by TDL layers that are delivered to DLP without communicating directly with DLP. Depending on TDL message standards and Interface Control Documents(ICDs), we design the message analyzer which communicates with data link processor using internal messages. Using known header field information from the TDL application standard such as JREAP-C, we can quickly filter candidate packets against collected packets and use the full data size information contained in the headers to verify the completed message. Because the methods proposed in this paper do not communicate directly with DLP, the methods proposed in this paper are enable to analyze the TDL application messages such as JREAP-C or Link-K without constraints in existing methods that should be reflected in the system configuration and ICD.

A Study on Consumers' Responses to Shopping Chatbot: The Effects of Agent and Message Types (쇼핑 챗봇에 대한 소비자 반응 연구: 에이전트와 메시지 유형 효과를 중심으로)

  • Song, YuJin;Kim, MinHee;Choi, Sejung Marina
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.71-81
    • /
    • 2019
  • As AI technology develops, its application has been extended to diverse fields. In particular, AI-enabled Chatbot services have garnered growing attention and such services are more important as a tool of communication in mobile shopping. However, research on chatbots is in its early stage and the understanding of chatbots in the context of mobile commerce is very limited. The purpose of this study is to empirically investigate consumer responses to a shopping chatbot with a focus on the effects of chatbot agent types and message types. Specifically, a $2{\times}2$ between-subjects experimental design, with the agent type (secretary/friend) and the message type (factual/evaluative) as the independent variables, was employed. The results show that although main effects of chatbot agent and message types are not found, interaction effects between chatbot agents and message types on consumer responses are significant. Specifically, when the agent type was a secretary, consumer responses to product recommendation with a factual message were more positive. On the other hand, in the case of the friend agent, the evaluative message led to more positive responses. The findings suggest that communication elements are important in the understanding of consumer responses to chatbots in mobile shopping and effective strategies for utilizing chatbots for mobile commerce should be considered.

A Session-based Instant Message System by Distributed Architecture (분산 구조에 의한 세션 기반 인스턴트 메시지 시스템)

  • Jang, Choonseo;Lee, Ki-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2169-2175
    • /
    • 2014
  • In this paper we have proposed a new distributed architecture of session-based instant message system, in which multiple servers can distribute loads effectively to improve system extendability. The server of session-based instant message system should manage SIP sessions to transfer instant message with multimedia data to each users, and it should process large amount of presence informations from each users. Therefore load of the server should be distributed as the number of users increases. In our system, when server load increases according to large user numbers, the load are distributed by selecting a server with the lowest load value, or new server is created to allocate the message processing. Therefore the overall load of instant message system can be dynamically distributed. A new presence information data format with added elements for controlling server load has been designed for this purpose, and SIP messages exchanging procedure between servers and users has been also suggested. The performance of our proposed system has been analysed by simulation, and showed improvement of performance.

A Method of Automatic Code Generation for UML Sequence Diagrams Based on Message Patterns (메시지 패턴에 기반한 UML 시퀀스 다이어그램의 자동 코드 생성 방법)

  • Kim, Yun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.857-865
    • /
    • 2020
  • This paper presents a method for code generation of UML sequence diagrams based on message patterns. In the sequence diagrams, it is shown that messages are some types of forms typically. This paper classifies according to type as three patterns, and construct meta-information for code generation analysing structural infomation for each patterns. The meta-message of structural information (MetaMessage) is stored in the MetaMessage datastore and the meta-method information from the MetaMessage is stored in the MetaMethod datastore. And then, the structural information of MetaClass and MetaObject is constructed in each datastore too. For each pattern, this paper presents a method for code generation based on the meta information of message patterns and the syntax of target progamming language. Also, branching and looping that has been seldom handled integratedly in the previous works are handled as same as the basic patterns by classifying the branching pattern and the looping pattern for code generation integratedly.

Retained Message Delivery Scheme utilizing Reinforcement Learning in MQTT-based IoT Networks (MQTT 기반 IoT 네트워크에서 강화학습을 활용한 Retained 메시지 전송 방법)

  • Yeunwoong Kyung;Tae-Kook Kim;Youngjun Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.131-135
    • /
    • 2024
  • In the MQTT protocol, if the retained flag of a message published by a publisher is set, the message is stored in the broker as a retained message. When a new subscriber performs a subscribe, the broker immediately sends the retained message. This allows the new subscriber to perform updates on the current state via the retained message without waiting for new messages from the publisher. However, sending retained messages can become a traffic overhead if new messages are frequently published by the publisher. This situation could be considered an overhead when new subscribers frequently subscribe. Therefore, in this paper, we propose a retained message delivery scheme by considering the characteristics of the published messages. We model the delivery and waiting actions to new subscribers from the perspective of the broker using reinforcement learning, and determine the optimal policy through Q learning algorithm. Through performance analysis, we confirm that the proposed method shows improved performance compared to existing methods.

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • Bulletin of the Korean Mathematical Society
    • /
    • v.53 no.4
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.