• Title/Summary/Keyword: Message Structure

Search Result 375, Processing Time 0.029 seconds

Design of U-Healthcare Monitoring System based on Mobile Device (모바일 디바이스 기반의 U-헬스케어 모니터링 시스템 구현)

  • Park, Joo-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.46-53
    • /
    • 2012
  • The WBAN technology means a short distance wireless network which provides each device's interactive communication by connecting devices inside and outside of body located within 3 meters. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. It is necessary to develop the WBAN core technology that sensor node device, WBAN middleware and WBAN application service for WBAN environment. In this paper we designed the medical message structure and implemented medical application for purpose of vital information reliability. The message structure was proposed for WBAN environment and application can be check biometric information from BN on smart device through WBAN gateway.

Implementation of ISO/IEEE 11073-10404 Monitoring System Based on U-Health Service (유헬스 서비스 기반의 ISO/IEEE 11073-10404 모니터링 시스템 구현)

  • Kim, Kyoung-Mok
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.6
    • /
    • pp.625-632
    • /
    • 2014
  • The u-health service is using portable device such as smart device and it consists of small computing device. The u-health service carry out same performance with desktop computer. We designed message structure based on Bluetooth HDP. This message structure is used to transmit patient's biometric data on the smart device of medical team, patient and family over the mobile network environment. ISO/IEEE 11073 PHD standard was defined based on the method of communication between the agent and the manager. And We are confirmed the reliable transmission of biometric data at the smart device by implementing the android OS based patient information monitoring application to check the status of patient for medical team, patient and family.

Development of Intelligent Fault Diagnosis System for CIM (CIM 구축을 위한 지능형 고장진단 시스템 개발)

  • Bae, Yong-Hwan;Oh, Sang-Yeob
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.7 no.2
    • /
    • pp.199-205
    • /
    • 2004
  • This paper describes the fault diagnosis method to order to construct CIM in complex system with hierarchical structure similar to human body structure. Complex system is divided into unit, item and component. For diagnosing this hierarchical complex system, it is necessary to implement a special neural network. Fault diagnosis system can forecast faults in a system and decide from the signal information of current machine state. Comparing with other diagnosis system for a single fault, the developed system deals with multiple fault diagnosis, comprising hierarchical neural network (HNN). HNN consists of four level neural network, i.e. first is fault symptom classification and second fault diagnosis for item, third is symptom classification and forth fault diagnosis for component. UNIX IPC is used for implementing HNN with multitasking and message transfer between processes in SUN workstation with X-Windows (Motif). We tested HNN at four units, seven items per unit, seven components per item in a complex system. Each one neural network represents a separate process in UNIX operating system, information exchanging and cooperating between each neural network was done by message queue.

  • PDF

Security Elevation of XML Document Using DTD Digital Signature (DTD 전자서명을 이용한 XML문서의 보안성 향상)

  • 김형균;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.592-596
    • /
    • 2002
  • Can speak that DTD is meta data that define meaning of expressed data on XML document. Therefore, In case DTD information is damaged this information to base security of XML document dangerous. Not that attach digital signature on XML document at send-receive process of XML document in this research, proposed method to attach digital signature to DTD. As reading DTD file to end first, do parsing, and store abstracted element or attribute entitys in hash table. Read hash table and achieve message digest if parsing is ended. Compose and create digital signature with individual key after achievement. When sign digital, problem that create entirely other digest cost because do not examine about order that change at message digest process is happened. This solved by method to create DTD's digital signature using DOM that can embody tree structure for standard structure and document.

  • PDF

A Method of Data Transmission for Performance Improvement of Real Time GNSS Data Processing in Multi-Reference Network Station (다중 수신국 실시간 위성항법데이터 처리 성능향상을 위한 데이터 송·수신 설계)

  • Kim, Gue-Heon;Son, Minhyuk;Lee, Eunsung;Heo, Moon-Beom
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.20 no.4
    • /
    • pp.39-44
    • /
    • 2012
  • This paper propose a transmission method for "Transportation system" that can decide precise position under wide area road traffic environment. For precise position detecting, central station collect multiple receiver station's satellite navigation data and generate correction information. In this process, we need efficient real time transmission method for satellite navigation message that has variable data size. We propose real time data transmission method. This real time transmission method offer efficient processing structure for multiple receiver station's satellite navigation message. This paper explains proposed real time transmission method and proofs this transmission method.

A Content-Name Encoding Scheme for CCN (콘텐츠 중심 네트워킹의 콘텐츠 이름 인코딩 기법)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.6
    • /
    • pp.697-705
    • /
    • 2014
  • For enhancing network efficiency, content-centric networking (CCN) allows network nodes to temporally cache a transmitted response message(Data) and then to directly respond to a request message (Interest) for previously cached contents. Also, CCN is designed to utilize a hierarchical content-name for transmitting Interest/Data instead of a host identity like IP address. This content-name included in Interest/Data reveals both content information itself and the structure of network domain of a content source which is needed for transmitting Interest/Data. To make matters worse, This content-name is human-readable like URL. Hence, through analyzing the content-name in Interest/Data, it is possible to analyze the creator of the requested contents. Also, hosts around the requester can analyze contents which are asked by the requester. Hence, for securely implementing CCN, it is essentially needed to make the content-name illegible. In this paper, we propose content-name encoding schemes for CCN so as to make the content-name illegible and evaluate the performance of our proposal.

Improving Flexibility of External Data Exchange in Count-fire Operation System by Adapting Dynamic Parser Software (동적 구문처리기 소프트웨어 적용을 통한 대화력전 수행체계 연동의 유연성 향상 방안)

  • Hong, Won-Eui
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.51-56
    • /
    • 2008
  • The counter-fire operation system performs its mission exchanging information with other related systems such as command & control systems and military information systems. In the process of exchanging information, the counter-fire operation system uses a type of data message which contains exchange data information in the format of KMTF. The requirement of data exchange of count-fire operation will continue to evolve. But the EDX(External Data eXchange) configuration item of the current counter-fire operation system can not effectively cope with the variation of data exchange requirements due to its fixed software structure. In the paper, a solution for improving flexibility of external data exchange in counter-fire operation system is proposed.

Analysis and Design of IP Traceback System (IP 역추적 시스템 분석 및 설계)

  • 황영철;최병선;이성현;이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.307-310
    • /
    • 2004
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But current firewall and IDS(Intrusion Detection System) of the network level suffers from many vulnerabilities in internal computing informations and resources. In this paper, we design of ICMP-based Traceback System using a ICMP Traceback Message for efficiently traceback without change structure of routers. ICMP-based Traceback System.

  • PDF

An Ontology Based Security Protection of SOAP Messages

  • Nasridinov, Aziz;Byun, Jeong-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.131-134
    • /
    • 2011
  • Several Web Service security standards are widely utilized aiming at securing exchanges of SOAP messages among partners in a collaborative environment. Although such standards are suitable for ensuring end-to-end message level security, certain attacks such as XML rewriting may still occur and lead to significant security vulnerabilities. This paper explores the security vulnerabilities of SOAP messages and proposes an ontology-based approach that can successfully combat the security threats. We develop ontology-based schema to include SOAP structure information in outgoing SOAP message and validate this information in the receiving end. Thus, allow to detect XML rewriting attacks early in the validating process.

The Fast Signal Acquisition Scheme for a GPS Ll/L2C Correlator (GPS Ll/L2C 상관기를 위한 빠른 신호 획득 기법)

  • Lim Deok-Won;Moon Sung-Wook;Park Chan-Sik;Lee Sang-Jeong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.8
    • /
    • pp.765-772
    • /
    • 2006
  • The L2 Civil Signal (L2CS) will be transmitted by modernized IIR(IIR-M), IIF and all subsequent GPS satellites. It contains two codes of different length; CM code contains 10,230chips, repeats every 20milliseconds and is modulated with message data, and CL code contains 767,250chips, repeats every 1.5second Z-count and has no data modulation. And the message data is encoded for Forward Error Correction(FEC). The long code length is useful for weak signal, but it also requires very long acquisition time. Therefore, the structure of GPS Ll/L2C Correlator and the fast acquisition scheme are proposed in this paper.