• Title/Summary/Keyword: Message Form

Search Result 226, Processing Time 0.024 seconds

Implementation of Communication Protocol between Control Centers using ICCP (ICCP를 사용한 전력센터간의 통신 프로토콜 구현)

  • Jang, Kyung-Soo;Chang, Byung-Wook;Hahn, Kyung-Duk;Shin, Dong-Ryeol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3910-3922
    • /
    • 2000
  • Current power systems are distributed geographically and operated in the form of Energy Management System(EMS)/ Supervision Control and Data Acquisition(SCADA) with the aid of computers and communications. Recently a variety of utilities have had interests in using inforrration technology to bring the efficiency and low operational costs. There is also a trend to integrdte the production, transmission, distribution and management/control of power into one and unified distributed system. To this end, Electric Power Hesearch Institute(EPRI) announced a new standard communication protocol called Inter-Control Center Protocol(ICCP).ICCP specifies the use of Manufacturing Message Specification(MMS) for services required by rccr in application layer and supports the communications between heterogeneous control centers. This paper presents the characteristics of MMS,ICCP and their relationship. Futherrnore, we implement the basic functional blocks of ICCP using MMS services under TCI/IP environments. Finally, we model a simple power system and apply the rccp protocol to this system in a window-based scheme, and finally show the operation and validation of this protocol.

  • PDF

Variable Message Sign Operating Strategies Based on Bayesian Games (베이지안 게임이론에 근거한 전략적 VMS 제공에 관한 연구)

  • Kwon, Hyug;Lee, Seung-Jae;Shin, Sung-Whee
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.7 s.78
    • /
    • pp.71-78
    • /
    • 2004
  • This paper presents a game-theoretic model of information transmission for variable message sign(VMS) operations. There are one VMS operator and many drivers as players. Operator wants to minimize the total travel time while the drivers want to minimize their own travel time. The operator who knows the actual traffic situation offers information strategically. The drivers evaluate the information from operator, and then choose the route. We model this situation as a cheap-talk game which is a simplest form of Bayesian game. We show that there is a possibility that the operator can improve the traffic efficiency by manipulating the electric signs at times. Indeed, it is an equilibrium of the game. This suggests that the operator must consider the strategic use of VMS system seriously.

Load-balanced Topology Maintenance with Partial Topology Reconstruction (부분 토폴로지 재구성 기법을 적용한 부하 균형 토폴로지 유지)

  • Hong, Youn-Sik;Lim, Hwa-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1188-1197
    • /
    • 2010
  • A most important thing in a connected dominating set(CDS)-based routing in a wireless ad-hoc network is to select a minimum number of dominating nodes and then build a backbone network which is made of them. Node failure in a CDS is an event of non-negligible probability. For applications where fault tolerance is critical, a traditional dominating-set based routing may not be a desirable form of clustering. It is necessary to minimize the frequency of reconstruction of a CDS to reduce message overhead due to message flooding. The idea is that by finding alternative nodes within a restricted range and locally reconstructing a CDS to include them, instead of totally reconstructing a new CDS. With the proposed algorithm, the resulting number of dominating nodes after partial reconstruction of CDS is not changed and also its execution time is faster than well-known algorithm of construction of CDS by 20~40%. In the case of high mobility situation, the proposed algorithm gives better results for the performance metrics, packet receive ratio and energy consumption.

A Study on the Costume of the Gods in the Ancient Roman Myths (고대 로마 신화에 등장한 신들의 복식 연구)

  • 임상임;추미경
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.5
    • /
    • pp.945-956
    • /
    • 2001
  • The costume for gods in the Ancient Roman myth was studied by examining in the embossed-carving, sculptures, mural-painting and various documents of the period. The clothes item, hairstyle, symbol & ornaments and shoes of the gods in the Roman myths were analyzed to understand the formative process in the religious costumes, and results are as follows. First, the costumes for male gods are the same as those for ordinary men lived in ages, including toga, paludamentum, tebenna, tunica. The costumes for female gods are also the same as those for ordinary women lived in ages, including stola, palla, tunica. Second, the hairstyle of male gods is short curled-hair, twisty roll-up hair and braid long-hair due to the influence of Etrurian in the early days. Another hairstyle is appeared in form of the laurelled-crown. The hairstyle of female gods is curled long-hair, chignon style and braid roll-up hair decorated with hairband. Third, the symbol & ornaments which represent the responsible possession of male gods, are appeared in beard, a stick of the message, arrow-case, offering-dish, antlered-glass, shield, spear-handle, as the superhuman forms, such as the lightning shape. For female gods they are is appeared plastron, a stick of the message, flower. some female gods wear necklace, foot-ring, bracelet. Fourth, male gods wear shoes in forms of sandal, buskin, boots, but all female gods are in barefoot. It could be explained by the fact that a man-centered society in the ancient roman is reflected in the world of gods. As mentioned, Gods costume in Roman myths was very similar to or nothing different from the ordinary peoples in Rome. However, they used corps, sacrifices or sepcific symbols depending on the fields that they were responsible for in order to be distinguished from the ordinary people. This is the result from the peoples expression that they should keep a close relationship with Gods hoping to be protected, and rely on them under whatever circumstances.

  • PDF

A Study on the Realism of Graphic Novel : Focused on Pascal Croci's (리얼리즘적 그래픽 노블: 파스칼 크로시의 『세슘137』)

  • Park, Yoo Shin
    • Cartoon and Animation Studies
    • /
    • s.32
    • /
    • pp.121-140
    • /
    • 2013
  • This study takes a look at diverse artistic strategies is taking as a graphic novel of participation. Pascal Croci has used and combined the forms to convey the message he want as a writer of an inclusive graphic novel, image-text. It is linked with an intrinsic to the graphic novel as well as tradition of realism in a wide variety of genres. This study takes a brief look at the realism art in each genre and confirms in relation to the artistic characteristics of intrinsic to the graphic novel is taking as a graphic novel of participation. is consists of the process of covering a case and the form of a broadcasting report and a fictional format emphasizes the objectivity in contents to highlight the journalistic characteristics of the general narrative. uses various artistic languages of realism. The audience feels a realistic case through the experience and writer's message is convey effectively. shows the generic openness of the graphic novel.

A Handover Algorithm by Buffering at the Home Agent (홈 에이전트의 버퍼링에 의한 핸드오버 알고리즘)

  • Heo, Seong-Jin;Kim, Jeong-Sam;Lee, Yon-Yeol;Han, Ki-Jun
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.7
    • /
    • pp.25-33
    • /
    • 1999
  • This paper proposes a handover algorithm for the mobile host in order to reduce the number of unnecessary retransmissions during handover. In our proposal, the home agent buffers user data after receiving the registration request message form the foreign agent and then transmits them again after a predefined time. We also analyze the packet disordering probability between two user data under an assumption that the home agent generates all user data. One of two user data is the one which has been generated just before the home agent receives the registration request message and the other is generated just after that. Simulation results show that our proposal provides efficient handover for a mobile host by reducing the packet disordering probalility.

  • PDF

DEVS 형식론을 이용한 다중프로세서 운영체제의 모델링 및 성능평가

  • 홍준성
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1994.10a
    • /
    • pp.32-32
    • /
    • 1994
  • In this example, a message passing based multicomputer system with general interdonnedtion network is considered. After multicomputer systems are developed with morm-hole routing network, topologies of interconecting network are not major considertion for process management and resource sharing. Tehre is an independeent operating system kernel oneach node. It communicates with other kernels using message passingmechanism. Based on this architecture, the problem is how mech does performance degradation will occur in the case of processor sharing on multicomputer systems. Processor sharing between application programs is veryimprotant decision on system performance. In almost cases, application programs running on massively parallel computer systems are not so much user-interactive. Thus, the main performance index is system throughput. Each application program has various communication patterns. and the sharing of processors causes serious performance degradation in hte worst case such that one processor is shared by two processes and another processes are waiting the messages from those processes. As a result, considering this problem is improtant since it gives the reason whether the system allows processor sharingor not. Input data has many parameters in this simulation . It contains the number of threads per task , communication patterns between threads, data generation and also defects in random inupt data. Many parallel aplication programs has its specific communication patterns, and there are computation and communication phases. Therefore, this phase informatin cannot be obtained random input data. If we get trace data from some real applications. we can simulate the problem more realistic . On the other hand, simualtion results will be waseteful unless sufficient trace data with varisous communication patterns is gathered. In this project , random input data are used for simulation . Only controllable data are the number of threads of each task and mapping strategy. First, each task runs independently. After that , each task shres one and more processors with other tasks. As more processors are shared , there will be performance degradation . Form this degradation rate , we can know the overhead of processor sharing . Process scheduling policy can affects the results of simulation . For process scheduling, priority queue and FIFO queue are implemented to support round-robin scheduling and priority scheduling.

  • PDF

Development of Real-time Service Primitive in Message Handling System Supporting Desk-top Conferencing System (데스크탑 회의시스템 지원을 위한 메시지 처리 시스템의 실시간 서비스 프리미티브 개발)

  • 강승찬;김영준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.2
    • /
    • pp.169-180
    • /
    • 1998
  • This research presents development of real-time service primitive in MHS(Message Hanling system) supporting desk-top conferencing system. Desk-top conferencing system is one of the real-time GC(Group Communication) services. The complexity of modem society has led to the consequent need for real-time GC between a number of people in order to jointly handle tasks in business, government and other forms of organization. Despite the many different form of desk-top conferencing systems developed to date, there are still few systems in widespred no. One of the biggest hurdle preventing the widespred adoption of real-time GC is the lack of agreement on user-friendly interchange environments. In distributed office environments, the MHS is one of the most widely used service for information interchange. It is a standard of electronic mail system which is concerned mostly with asynchronous exchange of short notes. It is clear that additional functions on MHS are necessary in order to allow users to properly process their real-time group messages and provide them with important facilities as a communication infrastructure for real-time GC.

  • PDF

A Study of Rhetorical Expression in Modern Illustration (현대 일러스트레이션에서 修辭學的 표현 연구)

  • Moon, Chul
    • Archives of design research
    • /
    • v.15 no.2
    • /
    • pp.91-100
    • /
    • 2002
  • Unlike a study related in language alone, rhetorical study of current time, composed with multi-culture, medias, communication, presents its own field that covers from the form of discourse(persuasive) to another form of discourse(not persuasive). If there was a study of making beautiful sentences for story and finding simple method of speech in Greek and roman period of an ancient time, it now a study in which one finds the essence of literary style or terminology in the expression of sentence. The taller case is especially important, given that the importance of what to express visually is on-going active procedure of this stuffy as itself an activity of communication. When a visual object persuades viewers, the activity of communication derives them to react and to understand the intention of an artist. The matter of how to speak is the matter of how to shape message persuasively. This persuasive method or technique is study of rhetoric. The three aspects (figurative, accentuating, mutating) of rhetorical expression of an illustration, the visual image can give fresh feelings to be in intimate relations with public. These rhetorical expressions also vitalize the story that is expressed on illustration with crisp image. It helps to attain expected effects while discovering essential meaning through the corresponding linguistic interpretation of an image. The study aims at the most effective way to communicate by figuring the most strong and direct illustrative message out. One of the method is to patternize illustrative expressions that are established from all kinds of shapes of Rhetoric. Therefore ,an operation of significance and an implication can shape an ultimate goal of this study from acknowledging the mechanism that modern illustration embraces.

  • PDF

An Implementation of Bandwidth Broker Based on COPS for Resource Management in Diffserv Network (차별화 서비스 망에서 COPS 기반 대역 브로커 설계 및 구현)

  • 한태만;김동원;정유현;이준화;김상하
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.518-531
    • /
    • 2004
  • This paper discusses a testbed architecture for implementing scalable service differentiation in the Internet. The differentiated services (DiffServ) testbed architecture is based on a model in which a bandwidth broker (BB) can control network resources, and the ALTQ can reserve resources in a router to guarantee a Quality of Service (QoS) for incoming traffic to the testbed. The reservation and releasemessage for the ALTQ is contingent upon a decision message in the BE. The BB has all the information in advance, which is required for a decision message, in the form of PIB. A signaling protocol between the BB and the routers is the COPS protocol proposed at the IETF. In terms of service differentiation, a user should make an SLA in advance, and reserve required bandwidth through an RAR procedure. The SLA and RAR message between a user and the BB has implemented with the COPS extension which was used between a router and the BB. We evaluates the service differentiation for the video streaming in that the EF class traffic shows superb performance than the BE class traffic where is a network congestion. We also present the differentiated service showing a better packet receiving rate, low packet loss, and low delay for the EF class video service.

  • PDF