• Title/Summary/Keyword: CAN message

Search Result 1,896, Processing Time 0.027 seconds

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks

  • Liu, Chang;Chung, Sang-Hwa;Jeong, Han-You;Jung, Ik-Joo
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.465-482
    • /
    • 2015
  • IEEE 802.11p is a standard MAC protocol for wireless access in vehicular environments (WAVEs). If a packet collision happens when a safety message is sent out, IEEE 802.11p chooses a random back-off counter value in a fixed-size contention window. However, depending on the random choice of back-off counter value, it is still possible that less important messages are sent out first while more important messages are delayed longer until sent out. In this paper, we present a new scheme for safety message scheduling, called the enhanced message priority mechanism (EMPM). It consists of the following two components: the benefit-value algorithm, which calculates the priority of the messages depending on the speed, deceleration, and message lifetime; and the back-off counter selection algorithm, which chooses the non-uniform back-off counter value in order to reduce the collision probability and to enhance the throughput of the highly beneficial messages. Numerical results show that the EMPM can significantly improve the throughput and delay of messages with high benefits when compared with existing MAC protocols. Consequently, the EMPM can provide better QoS support for the more important and urgent messages.

An Effective Emergency Message Delivery Mechanism for VANET (VANET에서의 효율적인 긴급 메시지 전송 기법)

  • Hwang, Jeong-Hee;Choe, Jong-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.86-94
    • /
    • 2012
  • VANETs can provide traffic warring service to help drivers drive safely based on the information of the traffic condition. The driver can drive safely through the warning service information provided by the VANET and know the traffic condition exactly more than through only the sight of driver. In this paper we suggest a new mechanism of updating the table to broadcast the message more rapidly based on the table driven method as the way of sending the emergency message in the VANETs. When updating the table, nodes sends only based on the message transmission success rate. In the result of simulation we could find that the suggested mechanism would reduce the delay time of the emergency message broadcast compared to the existing mechanism.

Reliable Message Routing Protocol for Periodic Messages on Wireless Sensor Networks (무선센서 네트워크에서 주기적 메시지에 대해 신뢰성 있는 메시지 전송을 위한 라우팅 프로토콜)

  • Ngo, Hoai Phong;Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.2
    • /
    • pp.190-197
    • /
    • 2011
  • In industrial distributed control systems, sensors collect data from the physical environment periodically and transmit them to the actuators, which process the control operations based on the received data. For the effective operation of the control systems, the data transmitted by the sensors has to be delivered to the actuators reliably within the deadline, and if the message reception rate of the actuators becomes lower than a threshold, then the performance of the control systems drops greatly. This paper suggests a message routing protocol to transmit periodic messages reliably in a distributed control system based on wireless sensor networks. For reliable message transmission, the proposed protocol selects a routing path whose end-to-end message reception rate is the highest before transmitting data messages. The proposed protocol has the capability of maintaining a target message reception rate for each flow. To maintain the required target reception rate, each destination monitors the actual message reception rate periodically and transmits a feedback message to the source if it drops below the target reception rate. On receiving the feedback message, the source tries to find a new path which can satisfy the target rate. The performance of the proposed protocol has been evaluated using simulation and compared with other protocols in terms of the message reception rate, the message delay and delay jitter, and so on. The simulation results show that the proposed protocol has a higher message reception rate and comparable message delay and delay jitter to other protocols. The simulation results also show that the proposed protocol has an ability to adapt well to the dynamic network traffic change.

Analysis of Influences due to Navigation Message Error of GPS Signals on Receiver (GPS 항법메시지 이상이 수신기에 미치는 영향 분석)

  • Kang, Hee-Won;Cho, Deuk-Jae;Park, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2223-2229
    • /
    • 2010
  • The integrity monitoring of anomalous GPS signal have been researched because of the degradation of GPS satellite performance. It is known that anomalous GPS signal can occur by failure of GPS satellite, sudden increase of ionosphere delay error, SA, wrong modeling for navigation parameters from control segment, and an electromagnetic wave interference, etc. In case of GPS anomaly by satellites can arise from carrier frequency, code and navigation message. In this paper, the scenarios with navigation message errors were made by using GPS simulator, and the influences of GPS navigation message error to receiver were analysed. The anomalies of preamble, bits related TOW count message, subframe ID in HOW, bits related satellite healthy, and the other navigation message errors were described and simulated. Also, the number of satellites, DOP and pseudorange are analyzed to know how the anomalous signal can affect on GPS receiver.

A Study on the Dependence of Mobile Instant Messenger (모바일 인스턴트 메신저 의존도에 관한 연구)

  • Kim, Jae-Jon;Lee, Yunhee;Nho, Hee-Ock;Park, Kyung-Ja
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.225-246
    • /
    • 2014
  • With the recent establishment of a ubiquitous environment and the paradigm shift to a smart society, the use of mobile devices, such as smart phones and tablet PCs, has become widespread. Thus, the trend is gradually shifting from using Web-based Instant Messenger to using Mobile-based Instant Messenger. Mobile Instant Messenger refers to a service that allows instant messaging as well as data sending and receiving between individuals with exclusive application programs(mobile Apps), which can be used in portable devices-such as smart phones-with wireless Internet access. Korea's portal sites, telecommunication companies, and even big companies have all rushed into the MIM market to join the competition. The reason so many companies are showing interest in the MIM business is because it is rising as a core platform to substitute portal sites in the mobile society, and MIM is perceived as the best means to attract and secure users. The intention to reuse or use continually was considered an important factor in maintaining a dominant position amidst such fierce competition, and consequently, most research thus far has reflected such thought. However, the frequent or long-term use of a system alone cannot indicate the definite success of the system, nor guarantee its dominant position in the market. On the contrary, MIM dependence, which goes beyond simple repetitive use and indicates a state where users actually or emotionally depend on a specific system, can better explain the user action. However, not much research has been conducted on dependence. The research results showed that lively message, concise message, message responsiveness, and social belonging significantly affected perceived usefulness. Message responsiveness, Link, and social belonging significantly affected flow. Flow significantly affected MIM dependence, and perceived usefulness did not affect MIM dependence. This study has proven that lively message, concise message, message responsiveness, Link, social belonging and perceived usefulness are important antecedents and mediating factors of MIM dependence. Moreover, this study is significant in that it explains the overall process of MIM dependence, and expands on the variety and scope of research that can be applied to MIM-related studies.

A Study on the Construal Level and Intention of Autonomous Driving Taxi According to Message Framing (해석수준과 메시지 프레이밍에 따른 자율주행택시의 사용의도에 관한 연구)

  • Yoon, Seong Jeong;Kim, Min Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.135-155
    • /
    • 2018
  • The purpose of this study is to analyze the difference of interpretation level and intention to use message framing when autonomous vehicle, which is emerging as the product of 4th industrial revolution, is used as taxi, Interpretation level refers to the interpretation of a product or service, assuming that it will happen in the near future or in the distant future. Message framing refers to the formation of positive or negative expressions or messages at the extremes of benefits and losses. In other words, previous studies interpret the value of a product or service differently according to these two concepts. The purpose of this study is to investigate whether there are differences in intention to use when two concepts are applied when an autonomous vehicle is launched as a taxi. The results are summarized as follows: First, the message format explaining the gain and why should be used when using the autonomous taxi in the message framing configuration, and the loss and how when the autonomous taxi is not used. Messages were constructed and compared. The two message framing differed (t = 3.063), and the message type describing the benefits and reasons showed a higher intention to use. In addition, the results according to interpretation level are summarized as follows. There was a difference in intentions to use when assuming that it would occur in the near future and in the near future with respect to the gain and loss, Respectively. In summary, in order to increase the intention of using autonomous taxis, it is concluded that messages should be given to people assuming positive messages (Gain) and what can happen in the distant future. In addition, this study will be able to utilize the research method in studying intention to use new technology. However, this study has the following limitations. First, it assumes message framing and time without user experience of autonomous taxi. This will be different from the actual experience of using an autonomous taxi in the future. Second, self-driving cars should technical progress is continuing, but laws and institutions must be established in order to commercialize it and build the infrastructure to operate the autonomous car. Considering this fact, the results of this study can not reflect a more realistic aspect. However, there is a practical limit to search for users with sufficient experience in new technologies such as autonomous vehicles. In fact, although the autonomous car to take advantage of the public transportation by taxi is now ready for the road infrastructure, and technical and legal public may not be willing to choose to not have enough knowledge to use the Autonomous cab. Therefore, the main purpose of this study is that by assuming that autonomous cars will be commercialized by taxi you can do to take advantage of the autonomous car, it is necessary to frame the message, why can most effectively be used to find how to deliver. In addition, the research methodology should be improved and future research should be done as follows. First, most students responded in this study. It is also true that it is difficult to generalize the hypotheses to be tested in this study. Therefore, in future studies, it would be reasonable to investigate the population of various distribution considering the age, area, occupation, education level, etc. Where autonomous taxi can be used rather than those who can drive. Second, it is desirable to construct various message framing of the questionnaire, but it is necessary to learn various message framing in advance and to prevent errors in response to the next message framing. Therefore, it is desirable to measure the message framing with a certain amount of time when the questionnaire is designed.

CMS: Application Layer Cooperative Congestion Control for Safety Messages in Vehicular Networks

  • Lee, Kyu-haeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1152-1167
    • /
    • 2018
  • In this paper, I propose an application layer cooperative congestion control scheme for safety message broadcast in vehicular networks, called CMS, that adaptively controls a vehicle's safety message rate and transmit timing based on the channel congestion state. Motivated by the fact that all vehicles should transmit and receive an application layer safety message in a periodic manner, I directly exploit the message itself as a means of estimating the channel congestion state. In particular, vehicles can determine wider network conditions by appending their local channel estimation result onto safety message transmissions and sharing them with each other. In result CMS realizes cooperative congestion control without any modification of the existing MAC protocol. I present extensive NS-3 simulation results which show that CMS outperforms conventional congestion control schemes in terms of the packet collision rate and throughput, especially in a high-density traffic environment.

A Study on the Development of Message Gathering System for Digital Electronic Switching System (전자교환기용 Message Gathering System 개발에 관한 연구)

  • 신승식;정찬수
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.2
    • /
    • pp.94-102
    • /
    • 2004
  • The digital electronic switching system has some problems, when this system processes OAM(Operation, Administration And Maintenance) messages about the fault, the traffic, the account, and the performance, etc., at the present. One of these problems is that each the module processing these messages in the digital electronic switching system can not process OAM messages out of another digital electronic switching system. Each the module processing these OAM messages, that is, has been programmed in order to process only the OAM message out of the digital electronic switching system mounting itself, not to process the message out of the digital electronic switching system based on another platform. Therefore, we studied on methods that could process OAM messages out of all digital electronic switching systems and, first of all, developed the MGS(Message Gathering System) to be able to accept and process the fault message of OAM messages out of all digital electronic switching systems in real time.

Query Processing based Branch Node Stream for XML Message Broker

  • Ko, Hye-Kyeong
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.64-72
    • /
    • 2021
  • XML message brokers have a lot of importance because XML has become a practical standard for data exchange in many applications. Message brokers covered in this document store many users. This paper is a study of the processing of twig pattern queries in XML documents using branching node streams in XML message broker structures. This work is about query processing in XML documents, especially for query processing with XML twig patterns in the XML message broker structure and proposed a method to reduce query processing time when parsing documents with XML twig patterns by processing information. In this paper, the twig pattern query processing method of documents using the branching node stream removes the twigging value of the branch node that does not include the labeling value of the branch node stream when it receives a twig query from the client. In this paper, the leaf node discovery time can be reduced by reducing the navigation time of nodes in XML documents that are matched to leaf nodes in twig queries for client twig queries. Overall, the overall processing time to respond to queries is reduced, allowing for rapid question-answer processing.

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.