• Title/Summary/Keyword: message

Search Result 4,968, Processing Time 0.031 seconds

Development of real-time embedded systems for reducing the transmission delay latency in IEC 61850 communication (IEC 61850 통신에서의 전송 지연시간 개선을 위한 실시간 임베디드 시스템 개발)

  • Cho, Chang-Doo;Kang, Seung-Hwa;Kang, Sang-Hee;Nam, Soon-Ryul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.11
    • /
    • pp.1590-1594
    • /
    • 2012
  • Depend on delay latency rule for message transmission defined in IEC 61850 standard, the fastest message has to be transferred within 3us. This paper suggests how to structure the real time message transmit test environment of IEC 61850 and develope how to securing IEC 61850 communication performance based on IEC 61850 by measuring delay latency of message transfer on embeded linux system.

An Implementation of KVMF(Korean Variable Message Format) in the Battlefield Management System of Ground Fighting Vehicles (지상전투차량의 전장관리체계상에서 KVMF(Korean Variable Message Format) 구현)

  • Choi, Il-Ho;Kim, Dae-Young;Kwon, Chul-Hee;Lee, Sang-Myung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.663-671
    • /
    • 2014
  • The Battlefield Management System(BMS) of Ground Fighting Vehicles has employed its own message format but there have been requirements of using the standard message format, KVMF. To meet these requirements, we analyzed BMS and KVMF and incorporated KVMF into BMS. In this paper, we would like to introduce our implementation of KVMF in BMS.

A COUNTER-BASED MAC REVISITED: WEAKENING THE UNDERLYING ASSUMPTION

  • Lee, Eon-Kyung;Lee, Sang-Jin
    • Journal of applied mathematics & informatics
    • /
    • v.24 no.1_2
    • /
    • pp.461-470
    • /
    • 2007
  • In CRYPTO 1995, Bellare, $Gu\'{e}rin$, and Rogaway proposed a very efficient message authentication scheme. This scheme is secure against adaptive chosen message attacks, under the assumption that its underlying primitive is a pseudorandom function. This article studies how to weaken that assumption. For an adaptive chosen message attack, we take into account two scenarios. On the one hand, the adversary intercepts the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier does not receive them. On the other hand, the adversary can only eavesdrop the authenticated messages corresponding to messages chosen adaptively by herself, so the verifier receives them. We modify the original scheme. In the first scenario, our scheme is secure if the underlying primitive is a pseudorandom function. In the second scenario, our scheme is still secure under a weaker assumption that the underlying primitive is an indistinguishable-uniform function.

A Technique of Statistical Message Filtering for Blocking Spam Message (통계적 기법을 이용한 스팸메시지 필터링 기법)

  • Kim, Seongyoon;Cha, Taesoo;Park, Jeawon;Choi, Jaehyun;Lee, Namyong
    • Journal of Information Technology Services
    • /
    • v.13 no.3
    • /
    • pp.299-308
    • /
    • 2014
  • Due to indiscriminately received spam messages on information society, spam messages cause damages not only to person but also to our community. Nowadays a lot of spam filtering techniques, such as blocking characters, are studied actively. Most of these studies are content-based spam filtering technologies through machine learning.. Because of a spam message transmission techniques are being developed, spammers have to send spam messages using term spamming techniques. Spam messages tend to include number of nouns, using repeated words and inserting special characters between words in a sentence. In this paper, considering three features, SPSS statistical program were used in parameterization and we derive the equation. And then, based on this equation we measured the performance of classification of spam messages. The study compared with previous studies FP-rate in terms of further minimizing the cost of product was confirmed to show an excellent performance.

An Application Implementation for the SECS Protocol Communication between Equipments and a Host in a Semiconductor Process (반도체 제조 공정에서 장비와 호스트간 SECS 프로토콜 통신을 위한 응용 프로그램 구현)

  • 김대원;전정만;이병훈;김홍석;이호길
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.293-293
    • /
    • 2000
  • The SECS(SEMI Equipment Communications Standard) is a standard protocol for communication between equipments and a host in semiconductor processes. This paper proposes the implementation of the HSMS(High-speed SECS Message Services) as an interface for transmission of the SECS messages and SECS-II containing message contents defined as an SEMI standard. The HSMS driver is implemented as a type of the daemon program and several DLL files. The SECS-II composes of the SML(SECS Message Language) file defining the SECS messages, the SML translator being able to interpret and transform the SML, and the data index table being able to refer to SECS messages. We also define the shared parameter to exchange the HSMS header and SECS message between the HSMS and the SECS-II. Eventually, to show the effectiveness of the proposed drivers, we test the SECS communications between equipments and a host using the implemented communication programs.

  • PDF

A Heterogeneous Mobile Data Synchronization Technique Using the Tuple Based Message Digest (튜플 단위 메시지 다이제스트를 이용한 이기종 모바일 데이터 동기화 기법)

  • Park, Seong-Jin
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.1-12
    • /
    • 2006
  • In mobile database environments, the efficient synchronization technique is required to maintain the consistency of replicated data because the same data can be replicated between so many different databases, In this paper, we propose a message digest based synchronization technique to maintain the consistency of replicated data between client databases and a server database in mobile environments. The proposed data synchronization technique has the advantage of generality aspect and extensibility aspect by using the tuple-based message digest output to detect the data conflicts.

  • PDF

A Study on Message-Driven POJO(MDP) by Developing an Asynchronous Logging Service (비동기식 로그서비스 구현을 통한 Message-Driven POJO(MDP) 기술연구)

  • Jang Eui-Jin;Baeg Jong Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.982-984
    • /
    • 2005
  • 효과적인 어플리케이션 로그처리는 어플리케이션 개발 및 운영 시에 매우 중요한 요소 중에 하나이다. 파일이나 콘솔을 이용하여 동기식으로 처리되는 일반적인 로그 서비스는 동시에 대량의 로그를 처리해야 할 경우 시스템에 많은 부하를 주게 되는 문제점이 있다. 이를 해결하기 위해서는 클라이언트가 지연 없이 로그를 남길 수 있는 비동기식 로그서비스가 필요하다. 이 논문에서는 비동기식 로그서비스 구현을 통해서 Message-Driven POJO(MDP) 구현 기술을 소개하고 최근에 소개된 EJB 3.0 Message Driven Bean(MDB) 기술과 비교 분석해 보도록 한다.

  • PDF

Improving Network Utilization in FlexRay Using Reallocation of Static Message (정적 메시지 재할당을 이용한 FlexRay 네트워크 사용효율 개선 기법)

  • Seo, Byungseok;Jin, Sungho;Lee, Dongik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2013
  • This paper presents a mathematical model to determine the optimal length of static messages that can achieve more efficient use of a FlexRay network. In order to determine the optimal length of static message, the proposed model evaluates the given set of messages with respect to a network utilization index, which is defined in this work. The efficient use of a FlexRay network is achieved by reallocating any static message whose length is equal or greater than the resulting value to the dynamic segment. The effectiveness of the proposed method is investigated by applying to the SAE benchmark data.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

The Message Scheduling Algorithm of Connector in the Software Composition (컴포넌트 합성에서 커넥터의 메시지 스케쥴링 알고리즘)

  • Jeong, Hwa-Young
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.87-93
    • /
    • 2007
  • In the component based software development, it is very important to interface between modules of component. Almost of existing method, Connectors are deal with all communication channels between two or more components/interfaces by RPC(Remote procedure call) and event call. But these process has limits when component send a lot of request call to other component through connector. That is, we need more efficient interface method that connector can process multi request call. In this paper, I propose interaction scheduling algorithm using message queue in the connector. For this purpose, I use message buffer which operate to save and load message temporarily.

  • PDF