• Title/Summary/Keyword: message

Search Result 4,951, Processing Time 0.04 seconds

Message Delivery Techniques using Group Intimacy Information among Nodes in Opportunistic Networks (기회주의적 네트워크에서 노드의 그룹 친밀성 정보를 이용한 메시지 전달 기법)

  • Kim, Seohyang;Oh, Hayoung;Kim, Chongkwon
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.929-938
    • /
    • 2015
  • In opportunistic networks, each message is delivered to the destination by repeating, storing, carrying, and forwarding the message. Recently, with the vitalization of social networks, a large number of existing articles have shown performance improvement when delivering the message and considering its social relational networks. However, these works only deliver messages when they find nodes, assuming that every node cooperates with each other unconditionally. Moreover, they only consider the number of short-term contacts and local social relations, but have not considered each node's average relation with the destination node. In this paper, we propose novel message sending techniques for opportunistic networks using nodes' social network characteristics. In this scheme, each message is delivered to the destination node with fewer copies by delivering it mostly through nodes that have high intimacy with the destination node. We are showing that our proposed scheme presents a 20% performance increase compared to existing schemes.

A Multi-Agent Message Transfer Architecture based on the Messaging Middleware ZeroMQ (메시지 지향 미들웨어 ZeroMQ 기반의 다중 에이전트 메시지 전송 구조)

  • Chang, Hai Jin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.290-298
    • /
    • 2015
  • This paper suggests a multi-agent message transport architecture based on the message-oriented middleware ZeroMQ. Compared with the other middlewares such as CORBA, Ice, and Thrift, ZeroMQ receives a good score in the evaluation of performance, QoS (Quality of Service), patterns, user friendliness, and resources. The suggested message transfer architecture borrowed many basic concepts like agent platform, AMS (Agent Management System), and MTS (Message Transfer System) from FIPA (Foundation for Intelligent Physical Agents) standard multi-agent specifications, and the architecture inherited the strength of the architecture from the multi-agent framework SMAF (Smart Multi-Agent Framework). The architecture suggested in this paper is a novel peer-to-peer architecture which is not known to the ZeroMQ community. In the suggested architecture, every MTS agent uses only one ZeroMQ router socket to support peer-to-peer communication among MTS agents. The suggested architecture can support closely collaborating software areas such as intelligent robots as well as the traditional application areas of multi-agent architecture. The suggested architecture has interoperability and scalability with the ZeroMQ devices and patterns.

Efficient Algorithms for Causal Message Logging and Revoery (인과적 메시지 로그 및 복구를 위한 효율적인 알고리즘)

  • Lee, Byeong-Ju;Park, Tae-Sun;Yeom, Heon-Yeong;Jo, Yu-Geun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.767-777
    • /
    • 1999
  • 인과적 메시지 로깅 기법은 정상프로세스를 역전(roll-back)시키거나 메시지의 저장을 위해 프로세스의 수행을 중단시키지 않는 장점을 지니고 있지만, 메시지의 크기가 지나치게 커진다는 단점을 지니고 있다. 본 논문에서는 인과적 메시지 로깅 기법의 이러한 문제점을 해결하기 위하여 로그 상속의 개념을 정의하고 로그 연혁을 이용하여 로그 비용, 특히 로그 크기 면에서 효율적인 로깅 기법을 제안한다. 또한 이 로깅 알고리즘을 이용하여 복구시 메시지의 수와 크기를 줄여 복구시간을 줄이는 효율적인 복구 알고리즘을 제안하고, 제안한 알고리즘이 메시지 로그 크기 면에서 효율적임을 증명한다. 또 제안한 알고리즘의 성능을 검증하기 위하여 두 가지 종류의 모의 실험을 수행하여 기존의 로깅 프로토콜과 메시지 크기 면에서의 성능을 비교한 결과를 제시하였다.Abstract Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algorithm based on the new message log structure, LogOn, which represents the causal inter-process dependency relation with much smaller overhead compared to the existing algorithms. The proposed algorithm is efficient in the sense that it entails no additional information other than LogOn to be carried in each message, while other existing algorithms require extra information other than the message logs. This paper also presents an efficient recovery algorithm to solve the problem of a large amount of data exchanges during the recovery. To verify the performance of our algorithm, we give an analysis of the algorithm and perform two simulations and compare the log size with other causal logging protocols.

Analysis for Characteristics of Driver's Legibility Performance Using Portable Variable Message Sign (PVMS) (운전자 인적요인을 고려한 PVMS 메시지 판독특성 분석)

  • Song, Tai-Jin;Oh, Cheol;Kim, Tae-Hyung;Yeon, Ji-Yoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.25-35
    • /
    • 2008
  • Variable Message Sign(VMS) is one of the subsystem of Intelligent Transportation Systems (ITS), which is useful for providing real-time information on weather, traffic and highway conditions. However, there are various situations such as incidents/accidents, constructions, special events, etc., which would be occurred on segments, it is unable to control traffic with only the VMS. Thus, it is essential to use of PVMS(Portable Variable Message Signs), which can move to the location needed traffic control and provide more active traffic information than VMS. This study developed a legibility distance model for PVMS messages using in-vehicle Differential Global Positioning Data(DGPS). Traffic conditions, drivers' characteristics, weather conditions and characteristics of PVMS message were investigated for establishing the legibility model based on multiple linear regression analysis. The factors such as height of PVMS characters, spot speed, age, gender and day and night were identified as dominants affecting the variation of legibility distances. It is expected that the proposed model would play a significant role in designing PVMS messages for providing more effective real-time traffic information.

  • PDF

Design of Electrostatic Monitoring System (정전기 모니터링 시스템 설계)

  • Kim, Kang-Chul;Byon, Chi-Nam;Lim, Chang-Gyoon;Han, Seok-Bung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2069-2076
    • /
    • 2008
  • In this paper, we develop an electrostatic monitoring system which is composed of an electrostatic prediction system and a warning message transmission system. The electrostatic prediction system in a factory receives the value of electrostatic charge from the electrostatic sensor and predicts the next value by using past data and sends the value to the warning message transmission system through the bluetooth communication. The warning message transmission system gets a warning signal and transmits the warning message to the worker's cellphone through a commercial SMS web by a socket program running on Windows PC in a control room. We propose electrostatic forecasting algorithms based on LSR(least square regression) using weight factors in an electrostatic prediction system. Simulation results show that the algorithm with dynamically variable weight factors is best with 64.69V standard deviation and a warning message transmitted by the warning message transmission system is displayed on cellphone after about 5 seconds.

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

The Study on Receptive Attitude of Advertising Message Forms and Information Sources According to SNS' Type and Use Intensity (SNS 유형과 이용강도에 따른 광고 메시지 형태 및 정보원별 수용태도에 관한 연구)

  • Kim, Hwa-Dong
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.255-265
    • /
    • 2018
  • This study investigated what kind of message forms and information sources more effect according to SNS' type and use intensity. To this end, this study did experimental analysis using collected data by survey which manufactured message forms and situational contents of information sources. According to analysis results, the effect of message forms showed difference according to SNS' type and use intensity. Realistic message showed greater effect in interest-based SNS and high use intensity. Evaluative message showed greater effect in relation-based SNS regardless of use intensity. The effect of information sources showed difference according to SNS' type. Friend or college and knower showed greater effect in relation- based SNS, and company showed greater effect in interest-based SNS. In the case of use intensity, friend or college showed the greatest effect without difference. Such results can provide a practical contribution in planning SNS advertising strategy. Future Studies need to expand survey variously into SNS and subject.

Security Analysis of ElGamal-Type Signature Scheme Using Integer Decomposition (정수의 분해를 이용한 ElGamal형 서명기법의 안전성 분석)

  • 이익권;김동렬
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.15-22
    • /
    • 2004
  • For an ElGamal-type signature scheme using a generate g of order q, it has been well-known that the message nonce should be chosen randomly in the interval (0, q-1) for each message to be signed. In (2), H. Kuwakado and H. Tanaka proposed a polynomial time algorithm that gives the private key of the signer if two signatures with message nonces 0<$k_1$, $k_2$$\leq$Ο(equation omitted) are available. Recently, R. Gallant, R. Lambert, and S. Vanstone suggested a method to improve the efficiency of elliptic curve crytosystem using integer decomposition. In this paper, by applying the integer decomposition method to the algorithm proposed by Kuwakado and Tanaka, we extend the algorithm to work in the case when |$k_1$ |,|$k_2$, |$\leq$Ο(equation mitted) and improve the efficiency and completeness of the algorithm.

Development of Mobile Alarm System using Message Tree for Personal Information Management (개인정보관리를 위한 메시지 트리 기반의 모바일 알람 시스템 구축)

  • Jang, Eun-Young;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.153-162
    • /
    • 2009
  • When a private information security incident occurs, the people who own the information are not acknowledged about their information leakage until those affairs appear in public media. This research aims at developing a mobile alarm system for acknowledging suspicious events to the information owners. The mobile alarm system was designed considering the limited user interface of mobile terminal and concept of "personal information leakage message tree" is deployed. The message tree contains every possible situation about personal information leakage and the leaves of the tree has several choices that the information owner can select. This message tree concept enables each information owner to manager his or her information leakage situation by just pushing a few buttons of mobile device. The contribution of this paper is in design of a comprehensive alarm message tree and development of mobile alarm system containing the message tree concept.

Development of MATLAB GUI-based Software for Performance Analysis of RNSS Navigation Message and WAD-RNSS Correction (지역 위성항법시스템 항법메시지 및 광역 보정정보 성능 분석을 위한 MATLAB GUI 기반 소프트웨어 개발)

  • Jaeuk Park;Bu-Gyeom Kim;Changdon Kee;Donguk Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.510-518
    • /
    • 2023
  • This paper introduces a MATLAB graphical user interface (GUI) based software for performance analysis of navigation message and wide area differential correction of regional navigation satellite system (RNSS). This software was developed to analyze satellite orbit/clock-related performance of navigation message and wide area differential correction simulating RNSS for regions near Korea based on different distributions of monitor and reference stations. As a result of software operation, navigation message and wide area differential correction are given as output in MATLAB file format. From the analysis of output, it was confirmed that valid navigation message and wide area differential correction could be generated from the results about statistical feature of orbit and clock prediction errors, cm-level fitting errors for navigation message parameters, and 81.9% enhancement in range error for wide area differential correction.