• Title/Summary/Keyword: message analysis

Search Result 929, Processing Time 0.034 seconds

Compressed Sensing Techniques for Video Transmission of Multi-Copter (멀티콥터 영상 전송을 위한 압축 센싱 기법)

  • Jung, Kuk Hyun;Lee, Sun Yui;Lee, Sang Hwa;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.63-68
    • /
    • 2014
  • This paper proposed a novel compressed sensing (CS) technique for an efficient video transmission of multi-copter. The proposed scheme is focused on reduction of the amount of data based on CS technology. First, we describe basic principle of Spectrum sensing. And then we compare AMP(Approximate Message Passing) with CoSaMP(Compressive Sampling Matched Pursuit) through mathematical analysis and simulation results. They are evaluated in terms of calculation time and complexity, then the promising algorithm is suggestd for multicopter operation. The result of experiment in this paper shows that AMP algorithm is more efficient than CoSaMP algorithm when it comes to calculation time and image error probability.

SMS Text Messages Filtering using Word Embedding and Deep Learning Techniques (워드 임베딩과 딥러닝 기법을 이용한 SMS 문자 메시지 필터링)

  • Lee, Hyun Young;Kang, Seung Shik
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.24-29
    • /
    • 2018
  • Text analysis technique for natural language processing in deep learning represents words in vector form through word embedding. In this paper, we propose a method of constructing a document vector and classifying it into spam and normal text message, using word embedding and deep learning method. Automatic spacing applied in the preprocessing process ensures that words with similar context are adjacently represented in vector space. Additionally, the intentional word formation errors with non-alphabetic or extraordinary characters are designed to avoid being blocked by spam message filter. Two embedding algorithms, CBOW and skip grams, are used to produce the sentence vector and the performance and the accuracy of deep learning based spam filter model are measured by comparing to those of SVM Light.

Impacts of scarcity message on impulse buying of fashion products in mobile shopping malls (모바일 패션제품 구매에서 희소성 메시지가 충동구매행동에 미치는 영향)

  • Park, Eun Joo
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.22 no.4
    • /
    • pp.25-38
    • /
    • 2020
  • Impulse buying occurs when consumers feel an urge to impulsively buy a product without thoughtful consideration of why and for what reason they need the product. However, few efforts have been made to identify the impacts of perceived scarcity on the impulse buying of fashion products in mobile shopping malls. This study's objectives were to estimate, using structural equation model analysis, the impact of a scarcity message on browsing, feeling the urge to buy, and impulse buying of fashion products on mobile shopping malls. Data was collected from 206 customers who experienced to impulse buying fashion products via objective sampling. Structural equation modeling was used to test the hypotheses developed for the study. Results found evident effects of the scarcity message on the impulse buying of fashion products directly and indirectly. Additionally, consumers felt the urge to buy had a significant impact on the impulse buying of fashion products, whereas browsing had little impact on the impulse buying of fashion products. This is an expanded study to examine structural equation modeling of impulse buying of fashion products on mobile shopping malls. These results will contribute to a better understanding of the mechanisms that underlie the operation of an effective scarcity strategy for fashion products on mobile shopping malls.

Proposal for Analog Signature Scheme Based on RSA Digital Signature Algorithm and Phase-shifting Digital Holography

  • Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.4 no.6
    • /
    • pp.483-499
    • /
    • 2020
  • In this paper, a novel analog signature scheme is proposed by modifying an RSA-based digital signature scheme with optical phase-shifting digital holography. The purpose of the proposed method is generating an analog signature to provide data confidentiality and security during the data transfer, compared to the digital signature. The holographic encryption technique applied to a hash value reveals an analog-type of pseudo-random pattern in the analog signature scheme. The public key and secret key needed to verify the analog signature are computed from public key ciphers which are generated by the same holographic encryption. The proposed analog signature scheme contains a kind of double encryption in the process of generating signature and key, which enhances security level more than the digital signature. The results of performance simulations show the feasibility of the highly secure signature scheme, and security analysis shows high robustness against known-message attacks and chosen-message attacks. In addition, the proposed method can apply to one-time signature schemes which can be used to sign only one message and it can also apply to authentication, e-mails, electronic banking and electronic data interchange.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

A Preliminary Analysis of Observing Classroom Inquiry on a Web-based Discussion Board System

  • LEE, Soo-Young;LEE, Youngmin
    • Educational Technology International
    • /
    • v.12 no.2
    • /
    • pp.19-46
    • /
    • 2011
  • The purpose of the study was to identify the characteristics of classroom inquiry features exhibited on a web-based discussion board, which is called the Message Board. Approximately 4,000 students from 80 schools with 60 on-line scientists were participated in the study. During the study, a total of 639 messages in the selected cluster and several patterns were identified and analyzed. Three main features of the classroom inquiry were analyzed in terms of: 1) learner gives priority to evidence in responding to questions; 2) learner formulates explanations from evidence; 3) learner communicates and justifies explanations. The results are as follow. First, once learners identified and understood the questions posed by the curriculum, they needed to collect evidence or information in responding to the questions. Depending on the question that students were given, types of evidence/data students needed to collect and how to collect the data could vary. Second, students' formulated descriptions, explanations, and predictions after summarizing evidence were observed on the Message Board. However, the extent to which students summarized evidence for descriptions, explanations, and predictions varied. In addition, students were able to make a better use of evidence over time when they formulate descriptions and explanations. Third, the Message Board was designed to allow the great amount of learner self-direction. Classroom teachers and on-line scientists played an important role in providing guidance in developing inquiry. At the same time, development of content understanding also contributed to inquiry development.

Performance Measurement and Analysis of RTI in the HLA-based Real-time Distributed M-SAM Simulation (HLA 기반 실시간 분산 M-SAM 시뮬레이션에서 RTI성능 측정 및 분석)

  • Choi Sang-Yeong;Cho Byung-Kyu;Lee Kil-Sup
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.149-156
    • /
    • 2005
  • The HLA is the simulation architecture standard that the civilian and military simulation communities are deeply interested in. We can find various successful practices applying HLA to constructive simulations such as war games in domestics and overseas. However, any case of real-time distributed simulations has not been reported. The reason is that a message transmission period via RTI in a network layer varies according to computing power, simulation nodes, transmission types, and packet size; further a message processing time in an application layer depends on its processing methods, thus too difficult to set up real-time constraints for the enhancement of a real-time resolution. Hence, in this paper we have studied the real-time constraints of RTI for the development of the M-SAM simulator. Thus we have developed a HLA based pilot simulator using 6 PC's in LAN and then measured and analysed the performance of the RTI. As the results of our work, we could obtain the quantitative values for message delay, RTI overhead and RTI packet transmission ratio by a real operation scenario and loads, which are not shown in the previous works. We also expect that the results can be used as a guideline to set up the number of targets, transmission frequency and message processing method in the development of the M-SAM simulator and similar applications.

Parallelization of Raster GIS Operations Using PC Clusters (PC 클러스터를 이용한 래스터 GIS 연산의 병렬화)

  • 신윤호;박수홍
    • Spatial Information Research
    • /
    • v.11 no.3
    • /
    • pp.213-226
    • /
    • 2003
  • With the increasing demand of processing massive geographic data, conventional GISs based on the single processor architecture appear to be problematic. Especially, performing complex GIS operations on the massive geographic data is very time consuming and even impossible. This is due to the processor speed development does not keep up with the data volume to be processed. In the field of GIS, this PC clustering is one of the emerging technology for handling massive geographic data effectively. In this study, a MPI(Message Passing Interface)-based parallel processing approach was conducted to implement the existing raster GIS operations that typically requires massive geographic data sets in order to improve the processing capabilities and performance. Specially for this research, four types of raster CIS operations that Tomlin(1990) has introduced for systematic analysis of raster GIS operation. A data decomposition method was designed and implemented for selected raster GIS operations.

  • PDF

A Best-Effort Control Scheme on FDDI-Based Real-Time Data Collection Networks (FDDI 기반 실시간 데이타 수집 네트워크에서의 최선노력 오류제어 기법)

  • Lee, Jung-Hoon;Kim, Ho-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.347-354
    • /
    • 2001
  • This paper proposes and analyzes an error control scheme which tries to recover the transmission error within the deadline of a message on FDDI networks. The error control procedure does not interfere other normal message transmissions by delivering retransmission request via asynchronous traffic as well as by delivering retarnsmitted message via overallocated bandwidth which is inevitably produced by the bandwidth allocation scheme for hard real-time guarantee. The receiver counts the number of tokens which it meets, determines the completion of message transmission, and finally sends error report. The analysis results along with simulation performed via SMPL show that the proposed scheme is able to enhance the deadline meet ratio of messages by overcoming the network errors. Using the proposed error control scheme, the hard real-time network can be built at cost lower than, but performacne comparable to the dual link network.

  • PDF

Performance Analysis on Delay- and Disruption-Tolerant Network in Interplanetary Network (행성 간 통신에서의 지연/분열 허용 네트워크 성능 분석)

  • Baek, Jaeuk;Han, Sang Ik;Kim, In-kyu
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.42-49
    • /
    • 2017
  • Delay- and Disruption-Tolerant Network (DTN) has been considered as a key technology to overcome main challenges in interplanetary communications such as an intermittent connectivity and high bit error rates. The lack of end-to-end connectivity between source and destination results in long and variable delays and data loss, hence the Internet Protocols cannot operate properly in such environments because it requires an end-to-end connectivity. The DTN, which utilizes 'store-and-forward' message passing scheme between nodes, can overcome the lack of end-to-end connectivity in Interplanetary Network (IPN). In this paper, DTN is applied to 3-hop relay IPN, where messages are transmitted from Earth ground station to Lunar lander through Earth satellite and Lunar orbiter. ONE simulator is used to reflect the real environment of IPN and an efficient resource management method are analyzed to guarantee the message delivery by optimizing a message TTL (Time to Live), buffer size and message fragmentation.