• Title/Summary/Keyword: Message Processing

Search Result 859, Processing Time 0.029 seconds

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

Practical Alarm Suppression Rules and their Implementation for Nuclear Power Plants (원자력발전소의 출력감발모드를 위한 경보축약 규칙)

  • Hwang, In-Koo;Kim, Yang-Mo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.10
    • /
    • pp.1804-1810
    • /
    • 2011
  • It is necessary to adopt some logical techniques and methods of alarm processing for a large complex plant such as nuclear power plants in order to present the occurred alarm messages properly and concisely. Among such alarm processing techniques, the alarm suppressing function is a strong tool to avoid alarm flooding during the sudden transients of plant output power such as turbine trips, reactor trips and other incidents. Unless any suppression or representation technologies are used in an alarm message listing system, it cannot provide quick assistance to plant operators or supervisors during plant upsets because too many alarm messages are presented in an alarm list window. This paper presents the key suppression methods and analysis processes developed for implementing a suppressed alarm message listing function of an integrated alarm system called LogACTs which has been applied to a CANDU nuclear power plant. A simulation testing of the suppressing function conducted with the real plant alarm message list data has demonstrated an effective performance of the developed logics with the high suppression rate.

SaaS application mashup based on High Speed Message Processing

  • Chen, Zhiguo;Kim, Myoungjin;Cui, Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1446-1465
    • /
    • 2022
  • Diversified SaaS applications allow users more choices to use, according to their own preferences. However, the diversification of SaaS applications also makes it impossible for users to choose the best one. Furthermore, users can't take advantage of the functionality between SaaS applications. In this paper, we propose a platform that provides an SaaS mashup service, by extracting interoperable service functions from SaaS-based applications that independent vendors deploy and supporting a customized service recommendation function through log data binding in the cloud environment. The proposed SaaS mashup service platform consists of a SaaS aggregation framework and a log data binding framework. Each framework was concreted by using Apache Kafka and rule matrix-based recommendation techniques. We present the theoretical basis of implementing the high-performance message-processing function using Kafka. The SaaS mashup service platform, which provides a new type of mashup service by linking SaaS functions based on the above technology described, allows users to combine the required service functions freely and access the results of a rich service-utilization experience, using the SaaS mashup function. The platform developed through SaaS mashup service technology research will enable various flexible SaaS services, expected to contribute to the development of the smart-contents industry and the open market.

Performance Enhancement of AODV Routing Protocol Based on Interrupt Message and Backup Path Strategy in MANET (MANET환경에서 Interrupt Message와 Backup path 기법에 기반한 AODV의 성능개선)

  • Lee, Yun-kyung;Kim, Ju-gyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.7
    • /
    • pp.1313-1329
    • /
    • 2015
  • In MANET, frequent route breaks lead to repeated route discovery process and this increases control packet overhead and packet drop. AODV-I improves performance of AODV by using the event driven approach which removes periodic Hello message. Unlike the Hello message, Interrupt message which is sent for each event can detect and predict the link failure because it allows node to know the status of the neighbor node. From this characteristics of Interrupt message, performance of AODV-I can be further improved by adding a processing procedures for each type of Interrupt message and it is also possible to improve AODV-I by adding the Backup path scheme because it originally has problems due to a single path of AODV. In this paper, we propose AODV-IB that combines improved Backup path scheme and Interrupt message approach of AODV-I in order to reduce transmission delay and the number of route discoveries. AODV-IB improves AODV-I by adding proper processing procedures for the link failure prediction and detection for each Interrupt message. We also implement improved Backup path strategy in AODV-IB by minimizing delay without additional Control packet. Simulation results, using the simulator QualNet 5.0, indicate that proposed AODV-IB performs better than AODV-I.

The Design and Implementation of the Mutual Message Processing between WME Module and MLME Module for Vehicle Communication Technology (차량 통신 기술을 위한 WME 모듈과 MLME 모듈 간의 상호 메시지 처리과정 설계 및 구현)

  • Jang, Chung Ryong;Lee, Dae Sik;Lee, Yong Kwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.2
    • /
    • pp.63-71
    • /
    • 2013
  • WAVE(Wireless Access for Vehicular Environment) System is a communication technology to monitor system failure and vehicle functions and management services to prevent possible incidents of driving a vehicle. In this paper, we have designed and implemented the mutual message processing through parameter between WME management module that manages WAVE system and MLME that manages the upper layer MAC(Media Access Control) module. Also, in order to verify the validity, we have carried out experiments to compare the speed of data processing by dividing data of 1Mbyte, 2Mbyte, 3Mbyte into the packets of 2KByte and 4KByte. Experiments data processing speed of 2KByte packet were shown about 173.62ms in 1MByte, 2MByte about 352.61ms, 3MByte about 550.13ms and, data processing speed of 4KByte packet, 1MByte approximately 87.56ms, 2MByte about 177.94ms, 3MByte about 277.18ms. Therefore, in WAVE system, the mutual messages processing through the parameters between WME and MLME module can be utilized in the various service of ITS(Intelligent Transportation Systems) depending on the speed of data processing.

Spam Message Filtering with Bayesian Approach for Internet Communities (베이지안을 이용한 인터넷 커뮤니티 상의 유해 메시지 차단 기법)

  • Kim, Bum-Bae;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.13C no.6 s.109
    • /
    • pp.733-740
    • /
    • 2006
  • Spam Message has been Causing widespread damages on the Internet. One source of the problems is rooted from an anonymously posted message in the bulletin board in Internet communities. This type of the Spam messages tries to advertise products, to harm other's reputation, to deliver religious messages and so on. In this paper we present the Spam message filtering using the Bayesian approach. In order to increase usefulness of the Spam filter in the bulletin board in Internet communities, we made the Spam filter which can divide the Spam message into six categories such as advertisement, pornography, abuse, religion and other. The test conducted against messages posted on the popular web sites.

An Approach to Application of Component Based on Message Central Processing change the C2 Architecture (C2 아키텍처를 변형한 메시지 중앙처리 기반의 Component 활용 기법)

  • 정화영
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.1089-1094
    • /
    • 2003
  • Recently, Software development method supported CBD is applied with many concern and is researched with part of application and composition based-on architecture effectively use it. Effectively, C2 architecture has been concern with the point of component composition method based-on message driven for supported GUI. But, In case of classified sequence in component and method call method in server component, component must be modified to apply it. Thus, In this paper, Message handling part with a part of C2 architecture change is locate in the message neither component not connector. So, Although method call method it can be composit and operate component for support Plug-and-Play without modification. Also, it's possible the more flexible message handling with parallel composition of component between message without classified sequence.

Priority-based Message Scheduling for Multi-agent System in Ubiquitous Environment (유비쿼터스 환경에서 멀티 에이전트 시스템을 위한 우선순위 기반 메시지 스케줄링 기법)

  • Yoon, Yang-Seok;Youn, Hee-Yong
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.137-143
    • /
    • 2008
  • In ubiquitous environment the multi-agent system is effective for providing intelligent services. In this paper we introduce a new scheduling service model for improving the communication performance in the multi-agent system. It is achieved by assigning a priority to the message according to the weight of formalized ACL message and the number of messages exchanged between the agents. An experiment reveals that the proposed approach allows smaller processing time per message and turnaround time than the scheduling with the existing JADE platform. Moreover, the proposed scheme allows a scalable messaging system.

  • PDF

Designing of Dynamic Sensor Networks based on Meter-range Swarming Flight Type Air Nodes

  • Kang, Chul-Gyu;Kim, Dae-Hwan
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.625-628
    • /
    • 2011
  • Dynamic sensor network(DSN) technology which is based on swarming flight type air node offers analyzed and acquired information on target data gathered by air nodes in rotation flight or 3 dimension array flight. Efficient operation of dynamic sensor network based on air node is possible when problems of processing time, data transmission reliability, power consumption and intermittent connectivity are solved. Delay tolerant network (DTN) can be a desirable alternative to solve those problems. DTN using store-and-forward message switching technology is a solution to intermittent network connectivity, long and variable delay time, asymmetric data rates, and high error rates. However, all processes are performed at the bundle layer, so high power consumption, long processing time, and repeated reliability technique occur. DSN based on swarming flight type air node need to adopt store-and-forward message switching technique of DTN, the cancelation scheme of repeated reliability technique, fast processing time with simplified layer composition.

Performance comparison of application signalling protocol on B-ISDN bearer connection types (B-ISDN 베어러 연결 형태에 따른 응용 신호 프로토콜의 성능 비교)

  • 이성근;유상신;김덕진
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.5
    • /
    • pp.44-54
    • /
    • 1996
  • Various types of B-ISDN bearer connection can take place according to access types of endpoint equipments in call and number of connectio between endpoints. In this paper, performance of application signalling protocol on three basic facilities of B-ISDN CS-2 signalling system, such as connection of point-to-point, point-to-multipoint and multiconnection call, is evaluated and compared. For performacne evaluation, experimental model of B-ISDN application signalling protocol is implemented and respective message processing time of each process is measured. By applying message processing time to local exchange system, cal processing capacity of application signalling protocol on three basic connection types is evaluated by simulation method. In this paper, local exchange system is considered to have two ATM NNI links and four ATM UNI links.

  • PDF