• Title/Summary/Keyword: 메시지 21

Search Result 158, Processing Time 0.028 seconds

A study on how to generate notification messages using live and forecast information (실황 및 예측정보를 활용한 알림 메시지 생성방안 연구)

  • Lee, Jae-Young;Shin, Jiyoung;Park, Gi-Yeon;Kim, Junho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.06a
    • /
    • pp.158-160
    • /
    • 2022
  • 최근의 자연 재난의 발생 빈도의 증가는 재난에 대한 정보전달의 중요성이 높아지는 만큼 전달 방법의 중요도도 높아지고 있다. 특히, 2020년의 코로나19(COVID-19)로 인하여 자연 재난에 더해 사회재난에 관한 관심도 증대하고 있으나, 재난정보의 빈도가 매우 높아져, 2000년대 통틀어서 제공된 재난 정보량보다 20년, 21년의 재난 정보량이 더 많아 보인다. 이러한 재난정보의 홍수는 반대급부로 정보의 피로도를 증가시켜 의도적 또는 비의도적 무시 경향을 유발할 수 있다. 이에 본 논문에서는 재난 위험지역을 기반으로 Segment를 생성하고 관리하며, Segment 단위로 재난 위험 메시지를 제공하는 Segment기반 긴급메시지전송 시스템을 연구한다. 목표시스템에서는 재난정보를 실황 정보와 1시간 예측정보를 비교, 위험지역 회피시나리오를 지능화 개선하여 모바일앱 이용자에게 제공함으로써 대피 이동관리와 행동 유도를 이끌어 이용자의 인명피해 저감과 재산손실 감소의 효과를 얻고자 개발하였다.

  • PDF

The Effects of a Hepatitis Education Program according to Message Frames (메시지 유형에 따른 A형 간염 예방교육 프로그램의 효과)

  • Park, Ju-Young;Woo, Chung-Hee
    • Journal of muscle and joint health
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • Purpose: This study was examined the effects of a hepatitis A education on attitude, vaccination intention, and preventive behavior. Methods: Eighty-eight college students at two universities participated in this study. The data were collected from August 29 to September 30 in 2011 and were analyzed using descriptive statistics, t-test, and ${\chi}^2$ test. Results: There were no significant differences of preventive behavior of hepatitis A between the positive and negative message groups (t=1.10, p=.499). However, the negative message group had a significantly higher attitude of preventive behavior (t=0.92, p=.049) and vaccination intention (${\chi}^2$=5.43, p=.039) than the positive message group. Conclusion: This study demonstrates that negatively framed messages are effective on increasing the attitude, vaccination intention, and preventive behavior.

Improving Network Utilization in FlexRay Using Reallocation of Static Message (정적 메시지 재할당을 이용한 FlexRay 네트워크 사용효율 개선 기법)

  • Seo, Byungseok;Jin, Sungho;Lee, Dongik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2013
  • This paper presents a mathematical model to determine the optimal length of static messages that can achieve more efficient use of a FlexRay network. In order to determine the optimal length of static message, the proposed model evaluates the given set of messages with respect to a network utilization index, which is defined in this work. The efficient use of a FlexRay network is achieved by reallocating any static message whose length is equal or greater than the resulting value to the dynamic segment. The effectiveness of the proposed method is investigated by applying to the SAE benchmark data.

Considering Barrier Overhead in Parallelizing AES-CCM (동기화 오버헤드를 고려한 AES-CCM의 병렬 처리)

  • Chung, Yong-Wha;Kim, Sang-Choon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.3-9
    • /
    • 2011
  • In this paper, we propose workload partitioning methods in parallelizing AES-CCM which is proposed as the wireless encryption and message integrity standard IEEE 802.11i. In parallelizing AES-CCM having data dependency, synchronizations among processors are required, and multi-core processors have a very large range of synchronization performance. We propose and compare the performance of various workload partitioning methods by considering both the computational characteristics of AES-CCM and the synchronization overhead.

Multiple Conference Servers Architecture using Extended Control Channel Framework (확장 제어 채널 프레임워크를 사용한 다중 컨퍼런스 서버 구조)

  • Jang, Choonseo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1335-1341
    • /
    • 2017
  • In this paper, a new architecture of multiple conference servers which use extended control channel framework in SIP(session initiation protocol) session has been presented. For this purpose, in this study, a new extended control channel framework architecture which can distribute total conference system loads to multiple servers effectively has been presented. In the implementation, extended control channels have been connected by using SIP sessions that was established between each conference servers, and extended control channel messages which can be transferred through control channels have been designed in this study. These extended control channel messages can distribute system load effectively between multiple conference servers, and conference information data format that can represent extended control channel framework has also been designed. Furthermore, exchange procedures of extended control channel messages have also been presented. The performance of the proposed system has been analysed by simulation. The analysis results show that average SIP messages delay time and average media stream delay time have improved.

Method for Message Processing According to Priority in MQTT Broker (MQTT Broker에서 우선순위에 따른 메시지 처리를 위한 방법에 관한 연구)

  • Kim, Sung-jin;Oh, Chang-heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1320-1326
    • /
    • 2017
  • Recently, IoT has been studying a lightweight protocol to satisfy device communication in a limited network environment. MQTT is a typical lightweight protocol. It supports small fixed headers to minimize overhead, and adopts publish/subscribe structure to guarantee real-time performance. However, MQTT does not support prioritization of important data and can not provide QoS in a specific IoT service. In this paper, we propose a message processing method to consider the priority of various IoT services in MQTT. In the proposed method, the priority flag is added to the fixed header of the MQTT in the node to transmit the message, and the broker confirms the priority of the corresponding message and processes it preferentially. Through experiment and evaluation, we confirmed the reduction of end-to-end delay between nodes according to priority.

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

Log processing using messaging system in SSD Storage Tester (SSD Storage Tester에서 메시징 시스템을 이용한 로그 처리)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1531-1539
    • /
    • 2017
  • The existing SSD storage tester processed logs in a 1-N structure between server and client using TCP and network file system. This method causes some problems for example, an increase in CPU usage and difficulty in exception handling, etc. In this paper, we implement a log processing message layer that can deal with asynchronous distributed processing using open source messaging system such as kafka, RabbitMQ and compare this layer with existing log transmission method. A log simulator was implemented to compare the transmission bandwidth and CPU usage. Test results show that the transmission using the message layer has higher performance than the transmission using the message layer, and the CPU usage does not show any significant difference The message layer can be implemented more easily than the conventional method and the efficiency is higher than that of the conventional method.

Networked Structure and Message Types of Newspaper Advertisements about Universities in Daegu and Gyeongbuk provinces in Korea: A Social Network Analysis (사회연결망 분석을 활용한 대학의 신문광고 게재 구조와 메시지 유형: 대구·경북 지역을 중심으로)

  • Song, Hwa-Young;Kim, Jae-Hun;Park, Han-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.197-206
    • /
    • 2021
  • This study examined the networked structure and message types of newspapers advertisements in which universities have put in Daegu and Gyeongbuk provinces in Korea. Data were collected from July to September in 2020. As a result, universities preferred newspapers located in Daegu and Pohang areas. Next, universities have emphasized their cooperations with industries, basic competency capacities, and specialization programs in the advertising messages. When analyzing the findings in terms of university level, key words related to mid- to long-term development plans often appeared in the four-year schools. On the other hand, two or three-year universities frequently used an appeal that emphasized tangible performances. The findings showed the way in which the direction of university newspaper advertisements have been set in line with the rapidly changing environment.

Public Key Encryption with Equality Test with Designated Tester (고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템)

  • Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.3-13
    • /
    • 2011
  • In 2004, Boneh et.al. proposed a public key encryption with keyword search (PEKS) scheme which enables a server to test whether a keyword used in generating a ciphertext by a sender is identical to a keyword used in generating a query by a receiver or not. Yang et. al. proposed a probabilistic public key encryption with equality test (PEET) scheme which enables to test whether one message of ciphertext generated by one public key is identical to the other message generated by the other public key or not. If the message is replaced to a keyword, PEET is not secure against keyword guessing attacks and does not satisfy IND-CP A security which is generally considered in searchable encryption schemes. In this paper, we propose a public key encryption with equality test with designated tester (dPEET) which is secure against keyword guessing attacks and achieves IND-CPA security.