• Title/Summary/Keyword: message rate

Search Result 325, Processing Time 0.029 seconds

An approach to define variable length messages using ASN.1 (ASN.1을 이용한 가변 길이 메시지 표현 방법)

  • Baek, Haeun;Kang, Sungwon;Kim, Jingyu;Kim, Jungmin;Kwon, Koohyung;Kim, Sangsoo
    • Journal of Software Engineering Society
    • /
    • v.25 no.2
    • /
    • pp.35-47
    • /
    • 2012
  • Variable Message Format(VMF) is a communications protocol that allows computers to exchange tactical military information over low-data-rate bearers. VMF is designed to define message length and structure variably in order to allow the user to transmit only the relevant information by using indicators. However, flexibility of messages makes it difficult to analyze messages structure and figure out meanings. Furthermore, whenever messages are added or modified, message processing software should be updated and distributed to systems. In this paper, we propose a systematic approach to defining VMF messages that uses the international standard notation ASN.1. By describing VMF messages in ASN.1, protocol architects can deal with VMF messages accurately and conveniently, and use various ASN.1 tool. This paper develops ASN.1 description templates for VMF message segments, and presents an approach to describing VMF messages in ASN.1 by combining the templates.

  • PDF

Analysis of the Effectiveness of Providing National Highway Detour Information via Variable Message Signs on Expressway Operations - Case of Yeongdong Expressway - (도로전광표지를 이용한 국도우회정보 제공이 고속도로 운영에 미치는 효과 분석 -영동고속도로를 중심으로-)

  • Yang, Sun-Pil;Choi, Yun-Taik;Lee, Kang-Hoon;Han, Eum;Yun, Ilsoo
    • International Journal of Highway Engineering
    • /
    • v.17 no.6
    • /
    • pp.97-104
    • /
    • 2015
  • PURPOSES : Expressways experience chronic and recurring congestion, especially during weekends and holidays, because of the increased demands for leisure-related travel. The alternatives to solve chronic and recurring congestion may be three-fold: (1) physical expansion of expressway capacities, (2) road pricing, and (3) temporal and spatial distribution of traffic demands. Among these, the third alternative may be the most cost-effective method for the Korea Expressway Corporation (KEC) that can be achieved by using the existing ITS infrastructure. METHODS : KEC initiated a pilot study in which the traffic on congested expressways was managed by providing traffic condition information (i.e., travel times) of neighboring national highways for taking detours via variable message signs (VMS). This study aimed to estimate the detour rate, and the two pilot studies on Seohaean and Yeongdong expressways yielded many benefits. RESULTS : It was revealed that the total length of congestion segments decreased by 7.8 km, and the average travel speed increased by 5.3 km/h. CONCLUSIONS : Based on these findings, it was concluded that the propagation of detour information via VMSs during congestion hours can help reduce congestion on expressways and increase the benefits of the entire network.

Study on High Speed Routers(II)-Performance Analysis on Various Network Topology of STC104 (고속 라우터에 대한 고찰(II)-STC104의 망 구성에 따른 성능분석)

  • Lee, Hyo-Jong
    • The KIPS Transactions:PartA
    • /
    • v.8A no.2
    • /
    • pp.157-166
    • /
    • 2001
  • A simulation package has been developed as an event-driven system that can handle the hardware configuration of STC104 and algorithm proposed in the sister paper of ‘Study on High Speed Routers(II).’After various STC104 topology of meshes, torus, and hypercubes are constructed using up to 512 switches, the performance of each topology has been analyzed under different message generation rate in terms of throughputs, latency, and packet blocking time. Modified multicast algorithms for STC104 have been proposed for STC104 after U-mesh and U-torus in order to overcome the multicasting difficulty because of the point-to-point communication method found in STC104. The performance of the multicast algorithms have been analyzed over meshes and torus configuration. Throughput gets higher in the order of mesh, torus, and hypercube. Throughput difference among topology were distinctive in the zone of high message generation rate. Latency and blocking time increased in the order of hypercube, torus, and mesh. U-mesh and U-torus of software multicast showed similar throughput, however, U-mesh peformed slightly better result. These algorithms showed eight to ten times better results compared to individual message pass for 90 destination nodes. Multi-link environment also showed better performance than single-link environment because multi-link network used the extra links for communication.

  • PDF

CDMA Digital Mobile Communications and Message Security

  • Rhee, Man-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.3-38
    • /
    • 1996
  • The mobile station shall convolutionally encode the data transmitted on the reverse traffic channel and the access channel prior to interleaving. Code symbols output from the convolutional encoder are repeated before being interleaved except the 9600 bps data rate. All the symbols are then interleaved, 64-ary orthogonal modulation, direct-sequence spreading, quadrature spreading, baseband filtering and QPSK transmission. The sync, paging, and forward traffic channel except the pilot channel in the forward CDMA channel are convolutionally encoded, block interleaved, spread with Walsh function at a fixed chip rate of 1.2288 Mcps to provide orthogonal channelization among all code channels. Following the spreading operation, the I and Q impulses are applied to respective baseband filters. After that, these impulses shall be transmitted by QPSK. Authentication in the CDMA system is the process for confirming the identity of the mobile station by exchanging information between a mobile station and the base station. The authentication scheme is to generate a 18-bit hash code from the 152-bit message length appended with 24-bit or 40-bit padding. Several techniques are proposed for the authentication data computation in this paper. To protect sensitive subscriber information, it shall be required enciphering ceratin fields of selected traffic channel signaling messages. The message encryption can be accomplished in two ways, i.e., external encryption and internal encryption.

COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES

  • Kim, Myungsun;Kim, Jihye;Cheon, Jung Hee
    • Journal of the Korean Mathematical Society
    • /
    • v.50 no.2
    • /
    • pp.361-377
    • /
    • 2013
  • In this work we deal with the problem of how to squeeze multiple ciphertexts without losing original message information. To do so, we formalize the notion of decomposability for public-key encryption and investigate why adding decomposability is challenging. We construct an ElGamal encryption scheme over extension fields, and show that it supports the efficient decomposition. We then analyze security of our scheme under the standard DDH assumption, and evaluate the performance of our construction.

A Secure Steganographic Scheme against Statistical analyses (통계 분석에 강인한 심층 암호)

  • 유정재;이광수;이상진;박일환
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.23-26
    • /
    • 2003
  • Westfeld[1] analyzed a sequential LSB embedding steganography effectively through the $\chi$$^2$-statistical test which measures the frequencies of PoVs(pairs of values). Fridrich also proposed another statistical analysis, so-called RS steganalysis by which the embedding message rate can be estimated. In this paper, we propose a new steganographic scheme which preserves the above two statistics. The proposed scheme embeds the secret message in the innocent image by randomly adding one to real pixel value or subtracting one from it, then adjusts the statistical measures to equal those of the original image.

  • PDF

Message Strategy to Promote Colorectal Cancer Screening Behavior (대장암 검진 행동 촉진을 위한 메시지 전략)

  • Lee, Ji Sun;Oh, Eui Geum;Lee, Hyang Kyu;Kim, Sang Hee
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.12
    • /
    • pp.357-367
    • /
    • 2017
  • The study investigated information about the effects of message framing on colorectal cancer(CRC) screening related health beliefs and compliance with the CRC screening test within the theoretical framework of the prospect theory and the Health belief model (HBM). This study was using a non-randomized controlled quasi-experimental design. One hundred and sixty-four in the industrial workers who were currently nonadherent to guidelines for receiving screening were assigned to one of three experimental conditions: (a) gain-framed message, (b) loss-framed message, and (c) general-framed message. CRC screening-related health beliefs was self-reported after the intervention. And the immunoassay Fecal Occult Blood Test (iFOBT) kit was collected at 1 week. The research finding were analyzed by $x^2$ test and one-way ANOVA using SPSS 21.0. The loss-framed message group had higher perceived susceptibility, severity and benefit than the gain-framed message and general message. The participation rate for the immunoassay Fecal Occult Blood Test(iFOBT) was highest in the loss-framed message group. The loss framed messages more effective to enhance screening behavior. The present results provide a theoretical basis for developing educational guidelines for CRC testing and could be used for performing comprehensive approach by predicting and suggesting the practical effects according to message type in advance.

Performance Evaluation of WSP with Capability Extension using Compression Techniques (압축 기법을 이용한 WSP의 기능 확장과 성능 평가)

  • Kim, Ki-Jo;Lee, Dong-Gun;Lim, Kyung-Shik
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.543-552
    • /
    • 2002
  • Wireless Session Protocol(WSP) which was updated and supplemented based on HyperText Transfer Protocol(HTTP) was designed by Wireless Application Protocol(WAP) forum regarding the characteristics of wireless environment. WSP improved the performance in wireless network, and introduced various facilities considering wireless environment. In this paper, we more improve the performance of WSP adding protocol message compression capability; we cail improved WSP protocol as WSP+. And, we analysis the performance of each protocol with WSP and WSP+ implementation. As a result of experiment, the capability which proposed in this paper reduced a response traffic about 45%. In $10^{-4}$ bit error rate, we also found the packet loss rate and time delay per transaction of WSP+ was improved over 40%. Finally, we found that the protocol message compression capability reduces message retransmission count in transaction layer and shorten the delay time per transaction by reducing a message size.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

A Traffic Hazard Prediction Algorithm for Vehicle Safety Communications on a highway (고속도로에서 차량 안전 통신을 위한 교통사고 위험 예측 알고리즘)

  • Oh, Sang Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.319-324
    • /
    • 2012
  • Vehicle safety communications is one among the important technologies in order to protect a car accident. For this, many protocols forwarding a safe message have studied to protect a chain-reaction collision when a car accident occurs. most of these protocols assume that the time of generating a safe message is the same as an accident's. If a node predicts some traffic hazard and forwards a safe message, a driver can response some action quickly. So, In this paper, we proposes a traffic hazard prediction algorithm using the communication technique. As a result, we show that the frame reception success rate of using our algorithm to the previous protocol improved about 4~5%.