• Title/Summary/Keyword: CAN message

Search Result 1,896, Processing Time 0.03 seconds

Design Considerations for KPS Navigation Message

  • Noh, Jae Hee;Lim, Deok Won;Heo, Moon Beom;Jo, Gwang Hee;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.9 no.4
    • /
    • pp.305-317
    • /
    • 2020
  • The navigation message is composed of the information contained in the message and the structure for transmitting this information. In order to design a navigation message, considerations in terms of message content and message structure must be elicited. For designing a Korea Positioning System (KPS) navigation message, this paper explains performance indicators in terms of message structure and message content. Most of the performance analysis of GNSS navigation messages already in operation was performed only for Time-to-first-fix-Data (TTFFD). However, in the navigation message, the message content is composed of Clock-Ephemeris Data (CED) and additional information. So, this paper proposes a new performance indicator R_(Non-CED) that can be analyzed from the viewpoint of receiving additional information along with an explanation of TTFFD focusing on the CED reception time. This paper analyze the performance in terms of message structure using these two performance indicators. The message structures used for analysis are the packetized message protocol like GPS CNAV and the packetized and fixed pattern message protocol like GPS CNAV-2. From the results, it is possible to proffer how KPS navigation messages can have better performance than GPS navigation messages. And, these two performance indicators, TTFFD and RNon-CED, can help to design the minimum TTFF required performance of KPS navigation messages.

Mobile Message Platform Supporting Dynamic Services based on Templates (템플릿에 기반한 동적인 서비스를 지원하는 모바일 메시지 플랫폼)

  • Han, Hong-Taek;Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.19-27
    • /
    • 2012
  • Although message services in mobile environments provide real-time transfer of various contents such as text, multimedia and location, they can't provide dynamic message services based on analysis of message contents. This paper proposes "message as a service" concept and presents the design methodology for a message platform. The message in this paper is composed of the data part and template part which is in charge of view and functional logic of contents. In addition, two parts of a message are transferred separately. If a terminal device stores message templates, message platform can transfer data part only and thus network traffic can be reduced. Besides an efficient network utilization, we can dynamically update message view and its functional logic by modifying templates.

The Influence of Message Frame and Appeal on the Effectiveness of Social Media in Dietary Behavior

  • Lee, Eun-Mi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.86-91
    • /
    • 2019
  • The goal of this study is to identify how different types of messages can contribute to the effectiveness of social media in healthier dietary behavior. The sample consisted of 160 participants who use social media and participants were randomly assigned to one of the four experimental conditions. The study shows that a positively framed message paired with a health focused message and a negatively framed message paired with a body image focused message exhibit a positive eWOM and message perception. This research offers direction for development of appropriate message types to improve social media effectiveness. Social media marketers and advertisers can develop social media content on healthier dietary behavior.

The Effect of Message Framing Depending on Psychological Ownership: Focusing on Information Security Behavior in Online Service (심리적 소유감에 따른 메시지 프레이밍 효과: 온라인 서비스에서의 사용자 정보보안 행동을 중심으로)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.1-18
    • /
    • 2018
  • As the online space becomes more active, interest in protecting personal information is increasing. From this point of view, it is important to prevent personal information from being leaked in advance. As a precaution, it is suggested that users change their password periodically to protect their personal information effectively. Currently, various online services provide a request message that prompts users to periodically change their password. These messages are expressed as positive-centric or negative-centric. This message can be seen as a powerful way to trigger users' behavior. In this context, this study suggests that message framing type can be applied to the password change request message, and to investigate the difference between the positive-centric message and the negative-centric message. In addition, this study concluded that the effect of message type may be different depending on the degree of psychological ownership of the individual on the online service. As a result, users with high psychological ownership in online service were more effective when positive-centric message was presented than negative-centric message. On the other hand, users with low psychological ownership in online service were more effective when negative-centric message was presented than positive-centric message.

A Digital Multisignature Scheme Suitable for Transmission to Multi-destination by EDI Message (EDI 메시지 동보 전송에 적합한 디지탈 다중 서명 방법)

  • 윤성현;김태윤
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.6
    • /
    • pp.981-993
    • /
    • 1994
  • As the EDI message is the commercial electronic document having legal binding forces, it is necessary to use the method of digital signature for the message integrity and identification between trading partners. This research proposes a new digital multisignature scheme suitable for transmission to multi-destination of the EDI message. The proposed scheme is based on Fiat-Shamir signature scheme and can perform the message authentication suitable for the EDI message. It can verify the message forged by a hash function attack from intruder or intruder. It also can perform the digital signature using smaller hash value than that of Fiat-Shamir signature scheme. When the EDI message is transmitted to multi-destination, all designated receivers can perform the digital signature faster and safer.

  • PDF

An Efficient Processing of Multimedia Message in SIP-Based Instant Messaging Service (SIP 기반 인스턴트 메시징 서비스에서의 효율적인 멀티미디어 메시지 처리)

  • Jo, Hyun-Gyu;Lee, Ki-Soo;Jang, Choon-Seo
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.152-159
    • /
    • 2008
  • In this paper, we have studied a new method in which multimedia message can be processed effectively in SIP(Session Initiation Protocol)-based Instant Messaging service. Total system is composed of multimedia message server, presence server and user system. To provide effectively message informations such as number of messages stored in the multimedia message server, waiting status and message types to users, we have proposed a new method which can be a substitute for message waiting indication event package. In our proposed method, when changes of messages status informations occur, these informations are sent to the presence server, and can be transferred as a separate tag within notification message. The presence server processes subscription requests and notifications, and efficiency can be improved as it provides both message status informations and several communication status informations such as on-line status to service users. Partial publication is used in our system to improve data transfer efficiency more between user system and the presence server. The performance of our proposed model is evaluated by experiments measuring multimedia message transfer speed and server processing time.

MPIRace-Check V 1.0: A Tool for Detecting Message Races in MPI Parallel Programs (MPIRace-Check V 1.0: MPI 병렬 프로그램의 메시지경합 탐지를 위한 도구)

  • Park, Mi-Young;Chung, Sang-Hwa
    • The KIPS Transactions:PartA
    • /
    • v.15A no.2
    • /
    • pp.87-94
    • /
    • 2008
  • Message races should be detected for debugging effectively message-passing programs because they can cause non-deterministic executions of a program. Previous tools for detecting message races report that message races occur in every receive operation which is expected to receive any messages. However message races might not occur in the receive operation if each of messages is transmitted through a different logical communication channel so that their incorrect detection makes it a difficult task for programmers to debug programs. In this paper we suggest a tool, MPIRace-Check, which can exactly detect message races by checking the concurrency between send/receive operations, and by inspecting the logical communication channels of the messages. To detect message races, this tool uses the vector timestamp to check if send and receive operations are concurrent during an execution of a program and it also uses the message envelop to inspect if the logical communication channels of transmitted messages are the same. In our experiment, we show that our tool can exactly detect message races with efficiency using MPI_RTED and a benchmark program. By detecting message races exactly, therefore, our tool enables programmers to develop reliable parallel programs reducing the burden of debugging.

Variable Length CAN Message Compression Using Bit Rearrangement (비트 재배열을 이용한 가변길이 CAN 메시지 압축)

  • Cho, Kyung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.4
    • /
    • pp.51-56
    • /
    • 2011
  • In this paper, we propose a CAN message compression method using bit rearrangement to reduce the CAN bus load and the error probability during the transmission of CAN messages. In conventional CAN message compression methods, message compression is accomplished by sending only the differences between the previous data and the current data. In the proposed method, the difference bits are rearranged to further increase the compression efficiency. By simulations in car applications, it is shown that the CAN transmission data is further reduced up to 26% by the proposed method, compared with the conventional method.

IP Design of Corrected Block TEA Cipher with Variable-Length Message for Smart IoT

  • Yeo, Hyeopgoo;Sonh, Seungil;Kang, Mingoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.724-737
    • /
    • 2020
  • Corrected Block TEA(or XXTEA) is a block cipher designed to correct security weakness in the original block TEA in 1998. In this paper, XXTEA cipher hardware which can encrypt or decrypt between 64-bit and 256-bit messages using 128-bit master key is implemented. Minimum message block size is 64-bit wide and maximal message block size is 256-bit wide. The designed XXTEA can encrypt and decrypt variable-length message blocks which are some arbitrary multiple of 32 bits in message block sizes. XXTEA core of this paper is described using Verilog-HDL and downloaded on Vertex4. The operation frequency is 177MHz. The maximum throughput for 64-bit message blocks is 174Mbps and that of 256-bit message blocks is 467Mbps. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

A Study on Security Evaluation for Mobile Web Services Message (모바일 웹서비스 메시지의 보안 평가에 관한 연구)

  • Lee, Seoung-Hyeon;Lee, Jae-Seung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.765-768
    • /
    • 2007
  • In this paper, the security evaluation method about mobile web services message is suggested in the method for improving the safety an reliability about the mobile web services message. In order that the goal of this paper is accomplished, the security threat and the security vulnerability which can be occurred in the mobile web services message are defined. The evaluation method for performing the security evaluation about the mobile web services message is defined. Also, the requirements for the mobile web services message security evaluation are defined. Finally, the evaluation framework for performing the mobile web services message security evaluation is constituted, and the evaluation scenario example is suggested. By using the mobile web services message security evaluation defined in the paper, before the mobile web services is deployed, the security threats and security vulnerability can be verified. Also, the countermeasure for the security threat and security vulnerability discovered in the verification result can be prepared. Therefore, the sorority and reliability about the mobile web services can be improved.

  • PDF