• Title/Summary/Keyword: Message Communication

Search Result 1,627, Processing Time 0.032 seconds

Analysis of Influences due to Navigation Message Error of GPS Signals on Receiver (GPS 항법메시지 이상이 수신기에 미치는 영향 분석)

  • Kang, Hee-Won;Cho, Deuk-Jae;Park, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2223-2229
    • /
    • 2010
  • The integrity monitoring of anomalous GPS signal have been researched because of the degradation of GPS satellite performance. It is known that anomalous GPS signal can occur by failure of GPS satellite, sudden increase of ionosphere delay error, SA, wrong modeling for navigation parameters from control segment, and an electromagnetic wave interference, etc. In case of GPS anomaly by satellites can arise from carrier frequency, code and navigation message. In this paper, the scenarios with navigation message errors were made by using GPS simulator, and the influences of GPS navigation message error to receiver were analysed. The anomalies of preamble, bits related TOW count message, subframe ID in HOW, bits related satellite healthy, and the other navigation message errors were described and simulated. Also, the number of satellites, DOP and pseudorange are analyzed to know how the anomalous signal can affect on GPS receiver.

An LV-CAST algorithm for emergency message dissemination in vehicular networks (차량 망에서 긴급 메시지 전파를 위한 LV-CAST 알고리즘)

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1297-1307
    • /
    • 2013
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or disseminate useful traffic information to othet vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collision at the link layer due to an excessive number of broadcast packets. To solve broadcast storm problem, we propose an RPB-MACn-based LV-CAST that is a vehicular broadcast algorithm for disseminating safety-related emergency message. The proposed LV-CAST identifies the last node within transmission range by computing the distance extending on 1 hop from the sending node of an emergency message to the next node of receiving node of the emergency message, and the last node only re-broadcasts the emergency message. The performance of LV-CAST is evaluated through simulation and compared with other message dissemination algorithms.

Effective Emergency-Warning Message Transmission in the Vehicle-to-Vehicle Communication Environment (차량 간 통신 환경에서 효과적인 위험 경고 메시지 전송 방안)

  • Byun, Jae-Uk;Kwon, Sung-Oh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1B
    • /
    • pp.1-8
    • /
    • 2012
  • In this paper, we propose an algorithm to improve collision avoidance in Vehicle-to-Vehicle (V2V) networks based on IEEE 802.11p. Since IEEE 802.11p adopts CSMA/CA as a multiple access scheme and an emergency warning message (EWM) is delivered to behind vehicles in a multi-hop manner, due to transmission collision, the more vehicles in the vehicle chain results in a longer delay. The longer delay increases the possibility of a rear-end collision. In order to ensure message reception with low latency, we consider implicit acknowledgement of a broadcasted EWM message and propose an algorithm to reduce redundant message transactions, called Two-Way Implicit Acknowledgement (TWIA). By simulations, we show that our proposed algorithm can reduce the latency until the last car receives the message by 9% and the success rate every car receives the message within 0.7sec by 12% at 100 fixed-number-of-car environment.

Message Delivery Techniques using Group Intimacy Information among Nodes in Opportunistic Networks (기회주의적 네트워크에서 노드의 그룹 친밀성 정보를 이용한 메시지 전달 기법)

  • Kim, Seohyang;Oh, Hayoung;Kim, Chongkwon
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.929-938
    • /
    • 2015
  • In opportunistic networks, each message is delivered to the destination by repeating, storing, carrying, and forwarding the message. Recently, with the vitalization of social networks, a large number of existing articles have shown performance improvement when delivering the message and considering its social relational networks. However, these works only deliver messages when they find nodes, assuming that every node cooperates with each other unconditionally. Moreover, they only consider the number of short-term contacts and local social relations, but have not considered each node's average relation with the destination node. In this paper, we propose novel message sending techniques for opportunistic networks using nodes' social network characteristics. In this scheme, each message is delivered to the destination node with fewer copies by delivering it mostly through nodes that have high intimacy with the destination node. We are showing that our proposed scheme presents a 20% performance increase compared to existing schemes.

Difference analysis of importance perception and ability of communication among dental hygienists (치과위생사의 의사소통에 관한 중요도 인식과 능력 차이분석)

  • Lee, Sun-Mi;Jun, Mi-Kyoung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.20 no.4
    • /
    • pp.491-503
    • /
    • 2020
  • Objectives: The purpose of this study is to identify the importance of perception and communication ability among dental hygienists and provide evidence for the activation of communication education necessary to improve communication ability required in the actual dental field. Methods: A questionnaire survey was conducted on 227 members attending conservative education in 2020. Results: The following are mean scores of each area of communication according to importance: message conversion ability, 3.82 points; interpretation ability, 3.74 points; goal setting ability, 3.51 points; self-expression ability, 3.48 points; and role performance ability, 3.46 points. The ability was interpreted in the following order: interpretation ability, 3.61 points; message conversion ability, 3.56 points; role performance ability, 3.43 points; self-expression ability, 3.32 points; and goal setting ability, 3.10 points. The highest score in terms of importance of awareness was 4.27 points, the highest among interpretive abilities, that is, to 'listen carefully to know what the other person intends to say.' When it comes to communication skills, the highest score was 4.12 points for 'a nod or a facial expression of understanding while listening to each other.' Conclusions: In devel oping a training program related to communication for dental hygienists at the clinical site, the curriculum reflecting seven items that needs improvement should be revised; and through this, it is expected that dental hygienists' communication skills will be improved.

Security of Image Information using Steganography and QR Code in IoT (IoT에서 스테가노그라피와 QR 코드를 이용한 영상 정보의 보안)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.31-37
    • /
    • 2015
  • The security of the image information is very important in many areas of the IoT(Internet of Things), and study a number of ways to display the security (copyright, etc.). In this paper, information of image that is used by the IoT is converted to a DCT(Discrete Cosine Transform) and QC(Quantization Coefficient). And watermark (message) is to create a new encoded message(WMQR) through a QR Code. QC and WMQR applies LSB steganography techniques, can get the security (copyright, etc.) of image information. LSB steganographic techniques may be inserted according to a message (Watermark) to determine the location (Secret Key). The encoded image is sent to the recipient via the Internet. The reverse process can be obtained image and a QR code, a watermark (Message). A method for extracting a watermark from the security of the image information is coded using only the image and Secret Key, through the DCT and quantization process, so obtained by separating the watermark (Message) for the image. In this paper, we were able to improve the security of the method of image information, the image quality of the image by the simulations (PSNR), in turn, benefits were also normalized correlation (NC) and security.

Design and Implementation of the ATM Handoff Subsystem Supporting Soft-Handoffs between Mobile Switching Centers

  • Yun Sung-Hyun;Cho Kwang-Moon
    • International Journal of Contents
    • /
    • v.1 no.1
    • /
    • pp.45-49
    • /
    • 2005
  • If the service provider provides mobile service with mobile switching centers that use different handoff message format, the soft-handoff between mobile switching centers is not available and the hard-handoff scheme is used instead. When this occurs, calls are often disconnected or there is an interruption of service. This can be very annoying to a mobile user. We propose the handoff subsystem of the ATM switch which provides the soft-handoff between wireless cells under the control of different MSCs. The proposed handoff subsystem transforms the handoff message format of the source MSC to that of the destination MSC. It also provides efficient routing scheme that distributes handoff packets to balance the traffic load.

  • PDF

Node Monitoring Algorithm with Piecewise Linear Function Approximation for Efficient LDPC Decoding (Node Monitoring 알고리듬과 NP 방법을 사용한 효율적인 LDPC 복호방법)

  • Suh, Hee-Jong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.1
    • /
    • pp.20-26
    • /
    • 2011
  • In this paper, we propose an efficient algorithm for reducing the complexity of LDPC code decoding by using node monitoring (NM) and Piecewise Linear Function Approximation (NP). This NM algorithm is based on a new node-threshold method, and the message passing algorithm. Piecewise linear function approximation is used to reduce the complexity for more. This algorithm was simulated in order to verify its efficiency. Simulation results show that the complexity of our NM algorithm is reduced to about 20%, compared with thoes of well-known method.

A Study on Non-verbal Communication of korean Shaman Clothing (한국 무복(巫服)의 비언어적 커뮤니케이션에 관한 연구 - 진도 씻김굿을 중심으로 -)

  • 양미경
    • Journal of the Korean Society of Costume
    • /
    • v.31
    • /
    • pp.5-16
    • /
    • 1997
  • This paper studies in terms of nonverbal communication the roles of Gut-clothinbgs used in Jin-Do Sit-gim Gut are classified as follows: 1) The message communicated through the ordinary clothings of a shaman is that he or she is waiting to serve as a presider of a Gut ceremony actiong as a mediator between the spirtual and the human world. 2) The shaman clothings representing many kinds of spirits are visualized figures which are closely related to the common wishes of most people in society e. g. physical and material well-being longevity fertility. 3) The clothings serve as a body figure in the Gut are classified into 5 groups. (1) Laid-on clothings give the message that the body is standing still. (2) Wrapped clothings serve as an incarnated body of the dead. (3) Spread clothings represent a lying body. (4) Oscillated clothings are the symbols of a spirit which moves from this world to another. (5) Burned clothings mean that the spirit has attained a complete seperation from this world.

  • PDF

Differentiated impacts of SNSs on Participatory Social Capital in Korea

  • Hwang, Dukyun;Paek, Mi Yon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.1-11
    • /
    • 2016
  • This study investigates whether different SNS with different characteristics have different impacts on participatory social capital in Korea. At least in Korea, SNS are categorized into five types (community, blog, micro-blog, profile-based service and instant message service), and participatory social capital is specified by three types (off-line political participation, on-line political participation, on-line civic engagement). Using Nielsen KoreanClick's web-based survey data, our regression analysis shows that SNS which are more open and focused on information sharing contribute more to participatory social capital.