• Title/Summary/Keyword: Message Structure

Search Result 375, Processing Time 0.025 seconds

Extend DEVS Modeling and Simulation Methodology for Variable Structure Modeling (가변구조 모델링을 위한 확장된 DEVS 모델링 및 시뮬레이션 방법론)

  • 정기찬;이종근;이장세;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.4
    • /
    • pp.109-124
    • /
    • 1999
  • The major objective of this research is to design and build the variable structure DEVS modeling & simulation framework. To do this, we have proposed the direct message passing mechanism between the model and its simulator to deal with the structural demand from the model during the simulation. In this approach, four types of basic messages are introduced for the vertical(creation/deletion of the child) and horizontal(creation/deletion of the brother) structural changes. Proposed methodology has been successfully applied to the multi-processor system and the forest fire information system.

  • PDF

ICU Real-Time Sign Information Transmission System using TMO in Distributed Network Systems (분산 네트워크 시스템에서 TMO를 이용한 ICU 실시간 생체정보 전송 시스템)

  • Oh, Seung-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.230-235
    • /
    • 2009
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. We have to design to obtain useful vital sign information, which is generated at parsing data receiver modulor of HIS with TMO structure, that is offered by the central monitor of ICU. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems.

  • PDF

A Real-Time Message System of Wireless Sensor Network Using Rich Internet Application (RIA를 적용한 무선 센서네트워크의 실시간 메시지 시스템)

  • Kim, Hun;Jeon, Yeong-Jun;Sin, Seung-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.654-659
    • /
    • 2009
  • As web based software has developed recently, service via web has increased gradually. For this, many research organizations and reports call web is the platform of software. While web based technologies have developed, middleware of WSN and its application service has been developed from desktop based operation system. So WSN's technology reached uppermost limit of desktop application. There's difficulty in integrating, distributing and maintaining & repairing for WSN due to a tightly-coupled structure which's related closely to the hardware of sensor nod. Unlike this, web has a loosely-coupled structure and an opened system, so web service or Rich internet application (RIA) is helpful to solve the above limits. Especially, RIA is web application but can be the platform of WSN' application because it gives us various methods to communicate with user interface similar to desktop application. In this study, I suggest Message System for WSN Using RIA, expanding WSN's interconnectedness and accessibility to internet.

  • PDF

The Gaurantee of Real-Time Vital Sign Information Service Message of Patient Monitoring System in Distributed Network Systems (분산 네트워크 시스템에서 환자 모니터링 시스템의 실시간 생체정보 서비스 메시지 보장)

  • Lim, Se-Jung;Kim, Gwang-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.2
    • /
    • pp.162-167
    • /
    • 2009
  • In this paper, we present a patient real-time vital sign information transmission system to effectively support developing real-time communication service by using a real-time object model named TMO (Time-Triggered Message-Triggered Object). Also, we describes the application environment as the PMS(Patient Monitoing System) to guarantee real-time service message with TMO structure in distributed network systems. We have to design to obtain useful vital sign information, which is generated at parsing data receiver modulor of HIS with TMO structure, that is offered by the central monitor of PMS. Vital sign informations of central monitor is composed of the raw data of several bedsite patient monitors. We are willing to maintain vital sign information of real time and continuity that is generated from the bedsite patient monitor. In the real time simulation techniques based on TMO object modeling, we have observed several advantages to the TMO structuring scheme. TMO object modeling has a strong traceability between requirement specification and design.

  • PDF

Implementation of Middleware Security System for Home Networking (홈 네트워킹을 위한 미들웨어 보안시스템 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.863-869
    • /
    • 2008
  • In this paper, a system with sensor network security mechanism which can be applied to home network structure is designed and it is implemented on a virtual network of a home network middleware. The basic structure of home networking middleware supports one-to-one (unicast) or broadcast communication mode between the lookup server and service nodes on the network. Confidentiality and authentication are key security factors of the one-to-one communication and user authentication is crucial for broadcasting mode. One of the sensor network's security techniques SPINS consists of SNEP and ${\mu}TESLA$. The SNEP ensures confidentiality and authentication, and ${\mu}TESLA$ provides broadcast authentication. We propose a SPIN based home network middleware and it is implemented by using the CBC-MAC for MAC generation, the counter mode (CTR) for message freshness, the pseudo random function (PRF) and RC5 as encryption algorithm. The implementation result shows that an attacker cannot decrypt the message though he gets the secure key because of CTR mode. In addition, we confirmed that a received message of the server is authenticated using MAC.

Mobile Web Server Performance Improvement with Enhancing SOAP Message Transaction and NBTM (SOAP 메시지 처리 개선과 NBTM을 사용한 모바일 웹 서버의 성능 향상)

  • Kim, Young-Tae;Jeong, Yoon-Su;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.135-142
    • /
    • 2008
  • Recently, the mobile Internet is rapidly changing environment in a user's web server performance requires frequent connection is difficult because the proper response is needed to improve the performance of web services engine. Therefore, the goal of this paper is to improve the performance of web services for the installation of additional access to users regardless of tomcat servlet container and process the request and to shorten processing time of SOAP (Simple Object Access Protocol) message of the server structure to of for web mobile services. The web-sever structure is consists of user demand receiver, web document processor, SOAP protocol processor, NBTM(Non-Blocking and Thread Manager) manager, session manager. The system fully supports a standard web-service protocol, reduces the message processing time and communication overhead of mobile web-service system in Web 2.0 and overhead of server, and confirms the improvement of capability by comparing and evaluating Web 2.0 standard mobile web-service system through delaying achievement evaluation by the experiment of realization in Web 2.0 environment.

  • PDF

Performance Evaluation of ISDN Subscriber Subsystem in TDX-1B/ISDN Switching System (EDX-1B/ISDN 교환기의 ISDN 가입자 모듈 성능 평가)

  • 조성래;노승환;김성조;한운영;차균현;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.7
    • /
    • pp.1018-1027
    • /
    • 1993
  • In this thesis, we evaluate the performance of the TDX-IB/ISDN Switching System ISS (ISDN Subscriber Subsystem) which is the ISDN user-network interface module. For this evaluation, performance indices are established and major performance parameters which influence message processing are extracted by studying the ISS structure and mechanism. To reflect these parameters, simulation model is developed and simulated. From the result of maximum throughput, message delay time, etc. , ISS message processing capability is evaluated and several method to enhance the system performance is proposed, by analyzing the system bottleneck element.

  • PDF

Implementation of Emergency Alerting Broadcasting System Based on DGPS (DGPS 정보를 이용한 재난 경보 방송 시스템 구현)

  • Kwon, Seong-Geun
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.58-62
    • /
    • 2012
  • Emergency alerting broadcasting of T-DMB is being serviced to deliver the event of a disaster to the people quickly and effectively through a T-DMB network. DGPS has been developed in order to improve the accuracy of the GPS receiving data and transmitting of DGPS information through the T-DMB network is being studied for a wide range of usage. Because DGPS information and AEAS message are sent through the same T-DMB network, if DGPS information is applied to AEAS message disaster area can be specified more precisely and the exact location of the disaster can be measured in the terminal. In this paper, a implementation method of T-DMB emergency alerting broadcasting system based on a DGPS including a new structure of AEAS message was proposed to identify the location of disaster accurately.

The Study on HL7 Message Improvement for Supporting of Efficient Healthcare Service (효율적인 헬스케어서비스 제공을 위한 HL7 메시지 개선에 관한 연구)

  • Heo, Sung-Uk;Choi, Sung-Wook;Kim, Gwan-Hyung;Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1388-1394
    • /
    • 2014
  • Recently, medical expenses are increasing because of the accelerated aging phenomenon, thus study for the medical service of high quality and reduction of medical expenses should be continued as yet. Especially, U-health is performed by intelligent medical service which is derived by smart devices, wireless network, sensing technology and it could be more extensible in the medical fields as time goes on. On this study, we analyze message transmission structure of HL7 standard and will suggest improved processing methodology of HL7 message.

Performance Analysis of Authentication Protocols of GPS, Galileo and BeiDou

  • Jeon, Da-Yeon;Gaybullaev, Turabek;Noh, Jae Hee;Joo, Jung-Min;Lee, Sang Jeong;Lee, Mun-Kyu
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.1
    • /
    • pp.1-9
    • /
    • 2022
  • Global Navigation Satellite System (GNSS) provides location information using signals from multiple satellites. However, a spoofing attack that forges signals or retransmits delayed signals may cause errors in the location information. To prevent such attacks, authentication protocols considering the navigation message structure of each GNSS can be used. In this paper, we analyze the authentication protocols of Global Positioning System (GPS), Galileo, and BeiDou, and compare the performance of Navigation Message Authentication (NMA) of the above systems, using several performance indicators. According to our analysis, authentication protocols are similar in terms of performing NMA and using Elliptic Curve Digital Signature Algorithm (ECDSA). On the other hand, they are different in several ways, for example, whether to perform Spreading Code Authentication (SCA), whether to use digital certificates and whether to use Timed Efficient Stream Loss-tolerant Authentication (TESLA). According to our quantitative analysis, the authentication protocol of Galileo has the shortest time between authentications and time to first authenticated fix. We also show that the larger the sum of the navigation message bits and authentication bits, the more severely affected are the time between authentications and the time to first authenticated fix.