• Title/Summary/Keyword: error message

Search Result 232, Processing Time 0.024 seconds

The Issues and Characteristics of the Preliminary Draft Convention on International Contracts Concluded or Evidenced by Data Message (전자계약에 관한 국제협약 예비초안의 논점과 특징에 관한 고찰)

  • Choi, Seok-Beom;Park, Jong-Suk
    • International Commerce and Information Review
    • /
    • v.5 no.1
    • /
    • pp.85-100
    • /
    • 2003
  • Legal rules applying to the commerce and international commerce in particular contracts, proper law, jurisdiction and so on, have improved with time and experience. Engaging in e-commerce on the World Wide Web may expose the company to the risk of being sued in any foreign country where Internet user can establish a legal claim. The modem law of contracts is highly sophisticated and difficult to understand. With contracts created in cyberspace, the basic rules are no difference that we can find. However, there are situations in e-commerce that are altogether new and to which the existing rules cannot apply. Here uncertainty and business risk is too high for trading partners to deal with certainty. Therefore existing law must change to e-commerce law so that it provides certainty and enforceability over e-commerce. UNCITRAL Working Group on Electronic Commerce prepared the Preliminary Draft Convention on [International] Contracts Concluded or Evidenced by Data Message from the thirty-ninth session in 2002 which applies to international contracts concluded or evidenced by means of data messages. An electronic contract is concluded when the acceptance of an offer becomes effective, and an offer becomes effective when it is received by the offeree, and an acceptance of an offer becomes effective when the indication of assent is received by the offeror according to this Convention. Electronic contract may be concluded by the interaction of an automated computer system and natural person or by the interaction of automated computer systems, and a contract formed by a natural person that accesses an automated computer system of another person has no legal effect in case the neutral person made a material error in a data message.

  • PDF

Performance Analysis on Delay- and Disruption-Tolerant Network in Interplanetary Network (행성 간 통신에서의 지연/분열 허용 네트워크 성능 분석)

  • Baek, Jaeuk;Han, Sang Ik;Kim, In-kyu
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.42-49
    • /
    • 2017
  • Delay- and Disruption-Tolerant Network (DTN) has been considered as a key technology to overcome main challenges in interplanetary communications such as an intermittent connectivity and high bit error rates. The lack of end-to-end connectivity between source and destination results in long and variable delays and data loss, hence the Internet Protocols cannot operate properly in such environments because it requires an end-to-end connectivity. The DTN, which utilizes 'store-and-forward' message passing scheme between nodes, can overcome the lack of end-to-end connectivity in Interplanetary Network (IPN). In this paper, DTN is applied to 3-hop relay IPN, where messages are transmitted from Earth ground station to Lunar lander through Earth satellite and Lunar orbiter. ONE simulator is used to reflect the real environment of IPN and an efficient resource management method are analyzed to guarantee the message delivery by optimizing a message TTL (Time to Live), buffer size and message fragmentation.

Performance Evaluation of WSP with Capability Extension using Compression Techniques (압축 기법을 이용한 WSP의 기능 확장과 성능 평가)

  • Kim, Ki-Jo;Lee, Dong-Gun;Lim, Kyung-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.543-552
    • /
    • 2002
  • Wireless Session Protocol(WSP) which was updated and supplemented based on HyperText Transfer Protocol(HTTP) was designed by Wireless Application Protocol(WAP) forum regarding the characteristics of wireless environment. WSP improved the performance in wireless network, and introduced various facilities considering wireless environment. In this paper, we more improve the performance of WSP adding protocol message compression capability; we cail improved WSP protocol as WSP+. And, we analysis the performance of each protocol with WSP and WSP+ implementation. As a result of experiment, the capability which proposed in this paper reduced a response traffic about 45%. In $10^{-4}$ bit error rate, we also found the packet loss rate and time delay per transaction of WSP+ was improved over 40%. Finally, we found that the protocol message compression capability reduces message retransmission count in transaction layer and shorten the delay time per transaction by reducing a message size.

Security Analysis of MAC Algorithm using Block Cipher (블록 암호 알고리즘을 애용한 MAC 분석)

  • Seo Chang-Ho;Yun Bo-Hyun;Maeng Sung-Reol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.39-47
    • /
    • 2005
  • This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message. The MAC algorithm uses the DES algorithm which has 64-bit block and 56-bit key and we compare the security according to 64-bit and 32-bit length of MAC value. Moreover, we use the SEED algorithm which has 128-bit block and 128-bit key and compare the security according to 128-bit and 64-bit length of MAC value. We analyze the security the forgery attack according to length of message and length of MAC value. this paper, a coarse-to-fine optical flow detection method is proposed. Provided that optical flow gives reliable approximation to two-dimensional image motion, it can be used to recover the three-dimensional motion. but usually to get the reliable optical flows are difficult. The proposed algorithm uses Horn's algorithm (or detecting initial optical flow, then Thin Plate Spline is introduced to warp a image frame of the initial optical flow to the next image frame. The optical flow for the warped image frame is again used iteratively until the mean square error between two image sequence frames is lowered. The proposed method is experimented for the real moving Picture image sequence. The proposed algorithm gives dense optical flow vectors.

  • PDF

Detection of Anomaly VMS Messages Using Bi-Directional GPT Networks (양방향 GPT 네트워크를 이용한 VMS 메시지 이상 탐지)

  • Choi, Hyo Rim;Park, Seungyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.125-144
    • /
    • 2022
  • When a variable message signs (VMS) system displays false information related to traffic safety caused by malicious attacks, it could pose a serious risk to drivers. If the normal message patterns displayed on the VMS system are learned, it would be possible to detect and respond to the anomalous messages quickly. This paper proposes a method for detecting anomalous messages by learning the normal patterns of messages using a bi-directional generative pre-trained transformer (GPT) network. In particular, the proposed method was trained using the normal messages and their system parameters to minimize the corresponding negative log-likelihood (NLL) values. After adequate training, the proposed method could detect an anomalous message when its NLL value was larger than a pre-specified threshold value. The experiment results showed that the proposed method could detect malicious messages and cases when the system error occurs.

A Fast Algorithm of the Belief Propagation Stereo Method (신뢰전파 스테레오 기법의 고속 알고리즘)

  • Choi, Young-Seok;Kang, Hyun-Soo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.5
    • /
    • pp.1-8
    • /
    • 2008
  • The belief propagation method that has been studied recently yields good performance in disparity extraction. The method in which a target function is modeled as an energy function based on Markov random field(MRF), solves the stereo matching problem by finding the disparity to minimize the energy function. MRF models provide robust and unified framework for vision problem such as stereo and image restoration. the belief propagation method produces quite correct results, but it has difficulty in real time implementation because of higher computational complexity than other stereo methods. To relieve this problem, in this paper, we propose a fast algorithm of the belief propagation method. Energy function consists of a data term and a smoothness tern. The data term usually corresponds to the difference in brightness between correspondences, and smoothness term indicates the continuity of adjacent pixels. Smoothness information is created from messages, which are assigned using four different message arrays for the pixel positions adjacent in four directions. The processing time for four message arrays dominates 80 percent of the whole program execution time. In the proposed method, we propose an algorithm that dramatically reduces the processing time require in message calculation, since the message.; are not produced in four arrays but in a single array. Tn the last step of disparity extraction process, the messages are called in the single integrated array and this algorithm requires 1/4 computational complexity of the conventional method. Our method is evaluated by comparing the disparity error rates of our method and the conventional method. Experimental results show that the proposed method remarkably reduces the execution time while it rarely increases disparity error.

Analysis of transmission performance of communication security bit synchronization Information in VMF system (가변메시지형식체계에서 COMSEC 비트동기 정보의 전송영향 분석)

  • Hong, Jin-Keun;Park, Sun-Chun;Kim, Ki-Hong;Kim, Seong-Jo;Park, Jong-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.272-274
    • /
    • 2005
  • In this paper, we analyses transmission performance of communication security(COMSEC) bit synchronization information over the single channel found and airborne radion system in variable message format system. Experimental results demonstrate the robust characteristics of the COMSEC bit synchronization information in $10^{-1}\sim10^{-5}$ of bit error channel and the relationship of time duration of bit synchronization and probability of synchronization detection.

  • PDF

Development of a Computer Program to Calculate Thermodynamic Properties of Nitrogen (질소의 열역학 상태량 계산을 위한 전산 프로그램 개발)

  • Park, Kyoung-Kyhn
    • Proceedings of the KSME Conference
    • /
    • 2003.04a
    • /
    • pp.1667-1671
    • /
    • 2003
  • A computer program to calculate properties of nitrogen is developed. Procedures for the calculation is briefly discussed. The program calculates unknown thermodynamic properties fixing the state with two independent input properties. If input value by user is inappropriate, it displays an error message and replaces the input value with an appropriate one. In addition user can change units with easy. The program developed in this work can be utilized to calculate parameters required for the simulation and design of an equipment using nitrogen.

  • PDF

Eye Gaze Interface in Wearable System (웨어러블 시스템에서 눈동자의 움직임을 이용한 인터페이스)

  • 권기문;이정준;박강령;김재희
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2124-2127
    • /
    • 2003
  • This paper suggests user interface method with wearable computer by means of detecting gaze under HMD, head mounted display, environment. System is derived as follows; firstly, calibrate a camera in HMD, which determines geometrical relationship between monitor and captured image. Second, detect the center of pupil using ellipse fitting algorithm and represent a gazing position on the computer screen. If user blinks or stares at a certain position for a while, message is sent to wearable computer. Experimental results show ellipse fitting is robust against glint effects, and detecting error was 6.5%, and 4.25% in vertical and horizontal direction, respectively.

  • PDF

Development of a Computer Program to Calculate Thermodynamic Properties of Oxygen (산소의 열역학 상태량 계산을 위한 전산 프로그램 개발)

  • Park, Kyoung-Kuhn
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.256-260
    • /
    • 2003
  • A computer program to calculate thermodynamic properties of oxygen is developed. Procedures for the calculation is briefly discussed. The program calculates unknown thermodynamic properties fixing the state with two independent input properties. If input value by user is inappropriate, it displays an error message. In addition user can change units with easy. The program developed in this work can be utilized to calculate parameters required for the simulation and design of an equipment using oxygen.

  • PDF