• Title/Summary/Keyword: message

Search Result 4,953, Processing Time 0.027 seconds

Analysis of Application Message Protocol for Control Network in Green Power Systems (차세대 그린 에너지 발전 시설을 위한 응용 메시지 프로토콜의 분석 및 응용)

  • Kwon, Ki-Hyup;Kim, Dong-Sung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.12
    • /
    • pp.1209-1215
    • /
    • 2009
  • This paper discusses a common message protocol for green power systems such as tidal, wind, photovoltaic, and solar systems. For this investigations and analysis, existing protocols such as ELCOM-90, TASE.1, ICCP/TASE.2 and SCADA were analyzed for the application of green power systems in view of real-time property and reliability. For the analysis, the practical example of green power system using SACADA and ICCP are investigated and discussed. As a future direction of this investigations, the feasibility analysis of manufacturing message specification(ISO-9560) for green power system is discussed.

The Design and Implementation of XConverter System With Java (Java를 이용한 XConverter 시스템 설계 및 구현)

  • 안경림;백혜경;임병찬;이영교
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.2
    • /
    • pp.1-12
    • /
    • 2001
  • AS EC is expanded and activated, many message standards, EDI, XML, UDF, etc are defined and is used at various business part. But the existed translator supports only one mapping translation, for example, EDI-to-UDF, UDF-to-EDI. So many user must be introduced a new translation when new business(message standard) is beginning, To solve this problem, we propose XConverter System as registering mapping information which is able to transform to user requested format using same translator even though it is transferred any formatted message in this paper. Also, We design and implement this system which is capable to integrate with existed legacy system, including DB transformation functionality. The .XConverter System supports changing the business message format to the common user used message format. And this system easily migrates with existed legacy system because DB transform module is component. Therefore, The proposed System is more various and flexible than the other translation system that provide just one mapping transformation.

  • PDF

High Quality perceptual Steganographic Techiques (지각적으로 고화질을 보장하는 심층암층기술)

  • 장기식;정창호;이상진;양일우
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.157-160
    • /
    • 2003
  • Recently, several steganographic algorithms for two-color binary images have been proposed. In this paper, we propose a steganographic algorithm which embeds a secret message into bitmap images and palette-based images. To embed a message, the suggested algorithm divides a bitmap image into bit-plane images from LSB-plane to MSB-plane for each pixel, and considers each bit-plane image as a binary one. The algorithm splits each bit-plane image into m$\times$n blocks. and embeds a r-bit(r=[log$_2$(mn+1]-1) message into the block. And our schemes embed a message to every bit-plane from LSB to MSB to maximize the amount of embedded message and to minimize the degradation. The schemes change at most two pixels in each block. Therefore, the maximal color changes of the new algorithm are much smaller than other bit-plane embedding schemes' such as the substantial substitution schemes.

  • PDF

Connection Frequency Buffer Aware Routing Protocol for Delay Tolerant Network

  • Ayub, Qaisar;Mohd Zahid, M. Soperi;Abdullah, Abdul Hanan;Rashid, Sulma
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.649-657
    • /
    • 2013
  • DTN flooding based routing protocol replicate the message copy to increase the delivery like hood that overloads the network resources. The probabilistic routing protocols reduce replication cost by forwarding the message to a node that holds high predictability value to meet its destination. However, the network traffic converges to high probable nodes and produce congestion that triggers the drop of previously stored messages. In this paper, we have proposed a routing protocol called as Connection frequency Buffer Aware Routing Protocol (CFBARP) that uses an adaptive method to maintain the information about the available buffer space at the receiver before message transmission. Furthermore, a frequency based method has been employed to determine the connection recurrence among nodes. The proposed strategy has performed well in terms of reducing message drop, message relay while increases the delivery probability.

Designing and Implementing Message Broker System based on SOAP (SOAP 기반의 메시지 Broker 시스템 설계 및 구현)

  • 김용수;주경수
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1071-1078
    • /
    • 2003
  • SOAP is a protocol used for information exchange in distributed computing environment and SOAP defines mechanisms for message transferring between distributed system and remote procedure call/response process. This SOAP is able to be used independently on operating systems and program languages because it uses only a text-based XML for protocol. Therefor ebXML that is a standard for E-Commerce adopts SOAP for message exchange. In this paper, we developed Message Broker System based on SOAP. By this Message Broker System we can more easily exchange messages for B2B. Accordingly we can manage and integrate a lots of business partners.

  • PDF

Implementation of Message Service for TCN Protocol (전동차용 네트웍 프로토콜의 메세지 서비스의 구현)

  • Park, Hong-Sung;Jin, Chang-Ki;Park, Geun-Pyo;Kim, Hyung-Yuk;Yoon, Gun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.133-133
    • /
    • 2000
  • This paper implements Message Service of TCN or IEC 61375-1. TCN is divided into two services, Variable and Message Service. Variable Service uses the broadcasting method with Source Address, but Message Service uses peer-to-peer method with Destination Address and has OSI 7 Layer. In TCN, interface between Transport and Network Layer has not been defined and Meaning of Packet Pool has not been defined exactly. Therefore, this paper proposes the Implementation method for both the interface between Transport and Network Layer and the packet pool for Message Service of TCN.

  • PDF

The Effects of a Hepatitis Education Program according to Message Frames (메시지 유형에 따른 A형 간염 예방교육 프로그램의 효과)

  • Park, Ju-Young;Woo, Chung-Hee
    • Journal of muscle and joint health
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • Purpose: This study was examined the effects of a hepatitis A education on attitude, vaccination intention, and preventive behavior. Methods: Eighty-eight college students at two universities participated in this study. The data were collected from August 29 to September 30 in 2011 and were analyzed using descriptive statistics, t-test, and ${\chi}^2$ test. Results: There were no significant differences of preventive behavior of hepatitis A between the positive and negative message groups (t=1.10, p=.499). However, the negative message group had a significantly higher attitude of preventive behavior (t=0.92, p=.049) and vaccination intention (${\chi}^2$=5.43, p=.039) than the positive message group. Conclusion: This study demonstrates that negatively framed messages are effective on increasing the attitude, vaccination intention, and preventive behavior.

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

CAN-Based Networked Control Systems: A Co-Design of Time Delay Compensation and Message Scheduling

  • Cac, Nguyen Trong;Hung, Nguyen Xuan;Khang, Nguyen Van
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.10
    • /
    • pp.629-644
    • /
    • 2014
  • The goal of this paper is to consider a co-design approach between time delay compensation and the message scheduling for CAN-Based Networked Control Systems (NCS). First we propose a hybrid priority scheme for the message scheduling in order to improve the Quality of Service (QoS). Second we present the way to calculate the closed-loop communication time delay and then compensate this time delay using the pole placement design method in order to improve the Quality of Control (QoC). The final objective is the implementation of a co-design which is the combination of the compensation for communication time delays and the message scheduling in order to have a more efficient NCS design.

Delay of a Message in a Time-Varying Bluetooth Link (시변 블루투스 링크에서 메시지의 지연시간)

  • Jong, Myoung-Soon;Park, Hong-Seong
    • Journal of Industrial Technology
    • /
    • v.23 no.A
    • /
    • pp.41-46
    • /
    • 2003
  • Because the quality of a radio link in real environment is generally varied with time, there is a difference between the delay in the real environment and one obtained from the analytic model where a time-varying link model is not used as a link model for a Bluetooth. This paper analyzes the transmission delay of a message in the time-varying radio link model for the Bluetooth. The time-varying radio link is modeled with a two-state Markov model. The mean transmission delay of the message is analytically obtained in terms of the arrival rate of the message, the state transition probability in the Markov model, and the packet error rate.

  • PDF