• Title/Summary/Keyword: Short messages

Search Result 123, Processing Time 0.03 seconds

Advanced Message Storing Method on mobilePOST SMSC (mobilePOST SMSC(Short Message Service Center)에서의 향상된 메시지 저장 기법)

  • Song, Byung-Kwen
    • Journal of the Korean Society for Railway
    • /
    • v.11 no.2
    • /
    • pp.126-138
    • /
    • 2008
  • This paper proposes the preservation method that can effectively process short messages at mobilePOST SMSC(Short Message Service Center) platform on CDMA(Code Division Multiple Access). There are three techniques for the preservation method. First one is shared memory technique where several processes within the system share same memory to process transmission of short messages with maximum performance. Second one is to back-up messages in shared memory to the file system to prevent lost during system initialization or other unstable period. Third technique is that when transmission of short message was completed, finished message is moved from the shared memory to relational database for accounting purposes.

A Tracking System Using Location Prediction and Dynamic Threshold for Minimizing SMS Delivery

  • Lai, Yuan-Cheng;Lin, Jian-Wei;Yeh, Yi-Hsuan;Lai, Ching-Neng;Weng, Hui-Chuan
    • Journal of Communications and Networks
    • /
    • v.15 no.1
    • /
    • pp.54-60
    • /
    • 2013
  • In this paper, a novel method called location-based delivery (LBD), which combines the short message service (SMS) and global position system (GPS), is proposed, and further, a realistic system for tracking a target's movement is developed. LBD reduces the number of short message transmissions while maintaining the location tracking accuracy within the acceptable range. The proposed approach, LBD, consists of three primary features: Short message format, location prediction, and dynamic threshold. The defined short message format is proprietary. Location prediction is performed by using the current location, moving speed, and bearing of the target to predict its next location. When the distance between the predicted location and the actual location exceeds a certain threshold, the target transmits a short message to the tracker to update its current location. The threshold is dynamically adjusted to maintain the location tracking accuracy and the number of short messages on the basis of the moving speed of the target. The experimental results show that LBD, indeed, outperforms other methods because it satisfactorily maintains the location tracking accuracy with relatively fewer messages.

Analysis and Implications of Twitter Data during the 2012 Election

  • Yun, Hongwon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.6
    • /
    • pp.7-13
    • /
    • 2014
  • Twitter is a microblogging service that allows users to post short messages on a variety of topics in real-time. In this work, we analyze Twitter messages posted during the 2012 elections and find those implications. This study uses Twitter messages related to the 2012 South Korean presidential campaign. The three main candidates are represented by the abbreviations A, M, and P. According to the statistical analysis, the number of tweets and re-tweets for candidate P was relatively stable over the entire campaign period. Candidate P had the highest percentage of terms related to elections pledges, and candidates A and M were judged to be a little bit poorer with respect to campaign promises. The positive terms ratio for candidate P was higher than those for the other two candidates. The negative terms ratio in the Twitter messages of P was considerably smaller than those of candidates A and M. After considering all these results, it is suggested cautiously that Twitter messages posted during an election campaign could be correlated with the outcome of the election.

Optimal Interface Design between Short-Range Air Defense Missile System and Dissimilar Combat Systems (단거리 대공방어유도탄체계와 이기종 함정 전투체계간 최적의 연동 설계 기법)

  • Park, Hyeon-Woo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.3
    • /
    • pp.260-266
    • /
    • 2015
  • The warship is run based on the combat system which shares tactical information collected by target detection systems and navigation devices across a network, and conducts the command and control of weapons from target detection to kill assessment. The short-range air defense missile system defends a warship from anti-ship missiles, aircraft, helicopter and other threats in order to contribute to the survival of a warship and the success of missions. The short-range air defense missile system is applied to a various combat systems. In this paper, we have proposed the interface design between the short-range air defense missile and dissimilar combat systems. To employ the short-range air defense missile at dissimilar combat systems, each system is driven by independent processor, and the tasks which are performed by each system are assigned. The information created by them is exchanged through the interface, and the flow of messages is designed.

A Reliable Group Key Management Scheme for Broadcast Encryption

  • Hur, Junbeom;Lee, Younho
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.246-260
    • /
    • 2016
  • A major challenge achieving scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised during transmission over an insecure broadcast channel, or transmitted to receivers while they were off-line. In this study, we propose a novel group key management scheme. It features a mechanism to allow legitimate receivers to recover the current group key, even if they lose key update messages for long-term sessions. The scheme uses short hint messages and member computation. Performance analysis shows that the proposed scheme has the advantages of scalability and efficient rekeying compared to previous reliable group key distribution schemes. The proposed key management scheme targets a conditional access system in a media broadcast in which there is no feedback channel from receivers to the broadcasting station.

Automatically Registering Schedules from SMS Messages on Handheld Devices (휴대전화에서 단문 메시지로부터 일정 자동 등록)

  • Kim, Jae-Hoon;Kim, Hyung-Chul
    • Korean Journal of Cognitive Science
    • /
    • v.22 no.1
    • /
    • pp.1-18
    • /
    • 2011
  • With rapid spread of handheld devices like cellular or smart phones, a short message service (SMS) comes on the public as a communication means. SMS is very cheap and can be easily written down on the storage in order not to forget it, hence it is widely used to inform schedules (time and place). In this paper, we develop a system for automatically registering schedules extracted from SMS text messages. SMS text messages are very short and concise, but include a lot of Internet words like slangs and abbreviations. These have made it difficult to extract information on schedules from them. Also handheld devices have some limitations on computing power and storage and then applying general natural language processing modules like morphological analysis to the devices are somewhat hard. To relax these burdens, we extract schedule informations from SMS messages using machine learning methods like condition random field (CRF) without using any language processing modules and register the informations on the schedule management system of handheld devices. Our proposed automatic schedule registration system has implemented on Samsung Omnia phone for experiments.

  • PDF

An Empirical Study of the Usage Performance of Mobile Emoticons : Applying to the Five Construct Model by Huang et al.

  • Lim, Se-Hun;Kim, Dae-Kil;Watts, Sean
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.21-40
    • /
    • 2011
  • Emoticons perform an important role as an enhancement to written communication, in areas such as Windows Live Messenger instant messaging, e-mails, mobile Short Message Services (SMS), and others. Emoticons are graphic images used in communications to indicate the feelings of people exchanging messages via mobile technology. In this research, the perceived usefulness of the emoticon in mobile phone text messages is verified with consumers using the five construct model of Huang. A K-means clustering technique for separating three groups based on levels of perceived usefulness of mobile emoticons is used with a structural equation model test using Smart PLS 2.0, and the bootstrap re-sampling procedure. We analyzed relationships among use of emoticons, enjoyment, interaction, information richness, and perceived usefulness. The results show there are relationships among use of emoticons, enjoyment, interaction, perceived usefulness, and information richness, however enjoyment of emoticons did not significantly affect the perceived usefulness of messages with emoticons alone. The results suggest emoticons have different affects on emotion in both mobile, and Messenger contexts. Our study did not consider more detailed media properties, and thus more studies are needed. Our research results contribute to mobile communication activation, provides companies with an understanding of key characteristics of consumers who use emoticons, and provides useful implications for improving management and marketing strategies.

Discrimination of SPAM and prevention of smishing by sending personally identified SMS(For financial sector) (개인식별화된 SMS 발송을 통한 스팸식별 및 스미싱 예방(금융권중심))

  • Joo, Choon Kyong;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.645-653
    • /
    • 2014
  • The purpose of this study is to provide low-cost and highly effective methods for customers to pick out SMS(Short Message Service) messages sent by financial institutions among SPAM messages and Smishing, which have rapidly spread recently and have caused critical issues. Above all, the study aims to list problems and limitations of the past efforts and measures to block SPAM messages and provide one method to overcome those limitations. Also, the study aims to verify the effectiveness of the method by implementation of them and conducting surveys of a broad range of customers.

Implementation of ATmega128 based Short Message Transmission Protocol IMCP (ATmega128 기반 단문 메시지 전송 프로토콜 IMCP 구현)

  • Kim, Jeom Go
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.3-11
    • /
    • 2020
  • The social networking service (SNS) is free, but the data usage fee paid to the telecommunications company and the member's information must be provided directly or indirectly. In addition, while SNS' specifications for transmitting and receiving devices such as smart-phones and PCs are increasing day by day, using universal transmission protocols in special environments such as contaminated areas or semiconductor manufacturing plants where work instructions are mainly made using short messages is not easy. It is not free and has a problem of weak security. This paper verified the practicality through the operation test by implementing IMCP, a low-power, low-cost message transmission protocol that aims to be wearable in special environments such as risk, pollution, and clean zone based on ATmega128.

Analysis of ISUP signalling Delay in Common Channel Signaling System (공통선 신호 시스템의 ISDN 사용자부 신호 지연 분석)

  • 박철근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1377-1386
    • /
    • 2000
  • As all delays resulting from the signaling network directly affect the response time of network management activity, all control informations have to be transported most efficiently. It is very important to know the performance of the signaling system not only because of smooth network operation but also because of efficient engineering of signaling networks. In this paper, we analyzed mean queueing delay of signaling link for ISUP signaling messages in common channel signaling system by using M[X]/G/1 and M[X]/D/1 batch arrival queueing system. This is because we modeled arrival process of the signaling messages as batch arrival process considering that many kinds of signaling messages are generated at short intervals when a call requests a connection. Analysis was carried out considering different call processing scenario based on ITU-T specification. We also described the numerical results from the different types of queueing models.

  • PDF