• Title/Summary/Keyword: CAN message

Search Result 1,912, Processing Time 0.028 seconds

An Analysis of Safety Impacts of Variable Message Signage as Functions of Road Curve Radius (도로곡선반경에 따른 가변전광표지의 교통안전효과 분석)

  • Lee, Sang Hyuk;Cho, Hye-Jin
    • International Journal of Highway Engineering
    • /
    • v.17 no.5
    • /
    • pp.47-56
    • /
    • 2015
  • PURPOSES: The purpose of this study is to estimate the impact of variable message signage (VMS) on traffic safety as a function of road curve radius using statistical methods. METHODS: In order to analyze the impact of VMS installations on traffic safety, travel speed, lateral distance, and geometric data relating to road curvature in each study area was acquired and analyzed for the impact of providing VMS information on driver performance and traffic safety using statistical methods including student t-test, Mann-Whitney test, and the Anderson-Darling test for estimating traffic safety hazard zone in each lane. RESULTS: As a result of analyzing driver performance characteristics before and after providing VMS information, it was determined that by providing VMS information, mean travel speed is deceased and vehicles are driven with increased precision, following the centerline in the first and second lanes. Also the results of analyzing traffic safety impacts of VMS indicate that traffic safety performance factors in the first lane of the Gapyeong section can, on average, increase in the left and right side of the lane by 19.22% and 68.98%, respectively, and in the case of the second lane, safety impacts, on average, can increase in both sides by 100%. For the Hongcheon section, traffic safety impacts in the first lane, on average, can increase along the left and right sides of the lane by 32.31% and 47.18%, and within the second lane, traffic safety can be increased along the left and right side of the lane by 10.97% and -0.01%, respectively. CONCLUSIONS: Based on the results of this study, the impact on traffic safety obtained by providing VMS information for road sections with smaller curve radii is greater than can be obtained for road sections with larger curve radii.

Dynamic Bandwidth Allocation of CAN-based Network using increments of signal applied to Marine Engine Monitoring System (신호 증감 량을 이용한 CAN 기반 선박 엔진 모니터링 시스템의 동적인 대역폭 할당)

  • Lee, Hyun;Lee, Jun-Seok;Lim, Hyun-Seop;Lee, Jang-Myung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.6
    • /
    • pp.838-844
    • /
    • 2012
  • This paper proposes the effective monitoring method for marine engine system, which is implemented based upon Controller Area Network (CAN). As the marine engine monitoring system requires various kind of information, a lot of sensor nodes are distributed to several places. The CAN supports huge numbers of message IDs for the sensor nodes and provides a stable communication channel in a wide area such as a 12,000 TEU container ship. Since the CAN is priority-based communication system, some of hard real-time messages like alarm messages which are time-critical to the operation of the vessel cannot be communicated within the dead-time. Therefore it is desirable to distinguish the bandwidth of the CAN for static state messages and transition-state messages not to be harmful to the engine operations. Using the features of message arbitration ability of the CAN, it is proposed in this paper that the bandwidth allocation is dynamically adjusted to cope with the increment of input signal to improve the performance of monitoring system. Effectiveness and validity of the proposed scheme have been demonstrated through real experiments.

A Study on Notable Points in Mind for the Use of Electronic Convention to be Made under CISG in Connections with Offer (청약과 관련한 CISG규정하에서 이루어지는 전자통신에 유엔전자협약 적용시 유의사항)

  • Oh, Se-Chang
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.38
    • /
    • pp.3-45
    • /
    • 2008
  • A motive and aim of enactment of UN Convention on the Use of Electronic Communication in Int'l Contracts is based on need to eliminate legal obstacles that might arise under existing int'l trade law instruments and promote int'l electronic commercial transaction. But when it is used with related articles, 14, 15, 16, 17 for offer under CISG, one of the most successful conventions which produces substantive law for the unification of int'l trade, questions of practical importance, for example possibilities of withdrawal, revocation, rejection of offer, the extent of its criteria arise from therewith. In conclusion, a effective electronic offer has to assure easily access and confirmation of trade terms besides criteria of offer under CISG. An offer can be withdrawal, if electronic message of withdrawal has entered the offeree's server before or at the same time when the offer has reached the offeree but agreement expressly or impliedly, between the parties about type, format, email address is a prerequisited. Implied consent could be presumed through prior conduct or trade usages between the parties under CISG articles 8, 9. The term "have reached" correspond to the time which is able to retrieve the electronic message of withdrawal. But without express or implied agreement between them about electronic communication of type, format, email address, an offer can be withdrawal before or at the same time when it has entered offeree's other e-mail address and confirmed by his retrieval. In case of the revocation, electronic message of the revocation is effective before the offeree's dispatching an acceptance. A prerequisite for the revocation by electronic communication is came as the above mentioned withdrawal except for concept of a time difference for reach. In case of a rejection of offer, when a rejection by electronic communication has entered the offeror's server, an offer is ended. But a prerequisite for the rejection by electronic message is same as the above mentioned withdrawal and revocation.

  • PDF

A Study on Countermeasure for CCN Interest Flooding Attack (콘텐츠 중심 네트워킹 환경에서의 Interest Packet Flooding 대응 연구)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.8
    • /
    • pp.954-961
    • /
    • 2013
  • To enhance the efficiency of network, content-centric networking (CCN), one of future Internet architectures, allows network nodes to temporally cache transmitted contents and then to directly respond to request messages which are relevant to previously cached contents. Also, since CCN uses a hierarchical content-name, not a host identity like source/destination IP address, for request/response packet routing and CCN request message does not include requester's information for privacy protection, contents-providers/ network nodes can not identify practical requesters sending request messages. So to send back relevant contents, network nodes in CCN records both a request message and its incoming interfaces on Pending Interest Table (PIT). Then the devices refer PIT to return back a response message. If PIT is exhausted, the device can not normally handle request/response messages anymore. Hence, it is needed to detect/react attack to exhaust PIT. Hence, in this paper, we propose improved detection/reaction schemes against attacks to exhaust PIT. In practice, for fine-grained control, this proposal is applied to each incoming interface. Also, we propose the message framework to control attack traffic and evaluate the performance of our proposal.

The Issues and Characteristics of the Preliminary Draft Convention on International Contracts Concluded or Evidenced by Data Message (전자계약에 관한 국제협약 예비초안의 논점과 특징에 관한 고찰)

  • Choi, Seok-Beom;Park, Jong-Suk
    • International Commerce and Information Review
    • /
    • v.5 no.1
    • /
    • pp.85-100
    • /
    • 2003
  • Legal rules applying to the commerce and international commerce in particular contracts, proper law, jurisdiction and so on, have improved with time and experience. Engaging in e-commerce on the World Wide Web may expose the company to the risk of being sued in any foreign country where Internet user can establish a legal claim. The modem law of contracts is highly sophisticated and difficult to understand. With contracts created in cyberspace, the basic rules are no difference that we can find. However, there are situations in e-commerce that are altogether new and to which the existing rules cannot apply. Here uncertainty and business risk is too high for trading partners to deal with certainty. Therefore existing law must change to e-commerce law so that it provides certainty and enforceability over e-commerce. UNCITRAL Working Group on Electronic Commerce prepared the Preliminary Draft Convention on [International] Contracts Concluded or Evidenced by Data Message from the thirty-ninth session in 2002 which applies to international contracts concluded or evidenced by means of data messages. An electronic contract is concluded when the acceptance of an offer becomes effective, and an offer becomes effective when it is received by the offeree, and an acceptance of an offer becomes effective when the indication of assent is received by the offeror according to this Convention. Electronic contract may be concluded by the interaction of an automated computer system and natural person or by the interaction of automated computer systems, and a contract formed by a natural person that accesses an automated computer system of another person has no legal effect in case the neutral person made a material error in a data message.

  • PDF

Steganographic Model based on Low bit Encoding for VoIP (VoIP 환경을 위한 Low bit Encoding 스테가노그라픽 모델)

  • Kim, Young-Mi
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.141-150
    • /
    • 2007
  • This paper proposes new Steganographic model for VoIP that has very effective method using low bit encoding. Most of Steganographic models using Low bit Encoding have two disadvantages; one is that the existence of hidden secret message can be easily detected by auditory, the other is that the capacity of stego data is low. To solve these problems, this method embed more than one bit in inaudible range, so this method can improve the capacity of the hidden message in cover data. The embedding bit position is determined by using a pseudo random number generator which has seed with remaining message length, so it is hard to detect the stego data produced by the proposed method. This proposed model is able to use not only to communicate wave file with hidden message in VoIP environment but also to hide vary information which is user basic information, authentication system, etc.

  • PDF

TAILWIND: Mobility information based Routing for Delay Tolerant Network (이동 방향 정보를 이용한 DTN 라우팅: TAILWIND)

  • Cho, Seoik;Kim, Sunhyun;Moon, Soohoon;Han, Seungjae
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.408-412
    • /
    • 2015
  • In base station based networks, traffic overload at the base station is inevitable. Peer-to-peer DTN which disperses the traffic overhead to each node can relieve the traffic overload at the base station. To increase the message delivery ratio and reduce the message overhead, we present novel routing using mobility information which can be obtained from each node, unlike the existing flooding based routings. In the proposed routing scheme, the routing decision metric, which is defined based on the node mobility information, is computed by using the expected distance between each node to the destination. The message is copied to other nodes that have lower expected distance to the destination than the value for the node willing to copy the message. We conducted simulations by using both a random mobility model and a real mobility trace to compare the performance of the proposed routing scheme to the existing routing scheme that does not utilize the mobility information. The performance evaluation showed the proposed routing successfully delivers messages with 10% to 30% less copies compared to previously proposed routing schemes.

A Range-based Relay Node Selecting Algorithm for Vehicular Ad-hoc Network (차량 애드혹 네트워크를 위한 영역 기반 릴레이 노드 선택 알고리즘)

  • Kim Tae-Hwan;Kim Hie-Cheol;Hong Won-Kee
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.88-98
    • /
    • 2006
  • VANET has several different characteristics from MANET such as high mobility of nodes and frequent change of node density and network topology. Due to these characteristics, the network topology based protocol, often used in MANET, can not be applied to VANET. In this paper, we propose an emergency warning message broadcast protocol using range based relay node selecting algorithm which determines the minimal waiting time spent by a given node before rebroadcasting the received warning message. Because the time is randomly calculated based on the distance between sender node and receiver node, a node chosen as a relay node is assured to have a minimal waiting time, even though it is not located at the border of radio transmission range. The proposed emergency warning message broadcast protocol has low network traffic because it does not need to exchange control messages for message broadcasting. In addition, it can reduce End-to-End delay under circumstances of low node density and short transmission range in VANET.

Hybrid Link State Update Algorithm in QoS Routing (하이브리드 QoS 라우팅 링크 상태 갱신 기법)

  • Cho, Kang Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.55-62
    • /
    • 2014
  • This paper has proposed Hybrid QoS Routing Link State Update(LSU) Algorithm that has had a both advantage of LSU message control in periodic QoS routing LSU algorithm and QoS routing performance in adaptive LSU algorithm. Hybrid LSU algorithm can adapt the threshold based network traffic information and has the mechanism that calculate LSU message transmission priority using the flow of statistical request bandwidth and available bandwidth and determine the transmission of the message according to update rate per a unit of time. We have evaluated the performance of the proposed algorithm and the existing algorithms on MCI simulation network using the performance metric as the QoS routing blocking rate and the mean update rate per link, it thus appears that we have verified the performance of this algorithm that it can diminish to 10% of the LSU message count.

An Attack Origin Traceback Mechanism using ICMP Message on Ad-hoc Network (Ad-hoc 네트워크에서 ICMP메시지를 이용한 공격 근원지 역추적 기법)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.47-54
    • /
    • 2013
  • Ad-hoc network is composed of mobile nodes and has a vulnerability of attack like on conventional wire networks. So, many studies have been conducted to apply the traceback mechanism on wire network to Ad-hoc network. In this paper, a new mechanism that can trace back to IP source of spoofing DDoS packet using iTrace message on Ad-hoc network is proposed. The proposed mechanism implements ICMP Traceback message and the traceback path between agents allocated in local network and a server located in management network. Also the proposed mechanism can trace the position of attacker even after an attack is over and has extendability through standardization by using a mechanism that IETF proposed. Result of performance evaluation shows a great improvement in terms of load, integrity, safety, traceback function as compared with conventional mechanisms.