• Title/Summary/Keyword: Data Message

Search Result 1,507, Processing Time 0.031 seconds

Improving Flexibility of External Data Exchange in Count-fire Operation System by Adapting Dynamic Parser Software (동적 구문처리기 소프트웨어 적용을 통한 대화력전 수행체계 연동의 유연성 향상 방안)

  • Hong, Won-Eui
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.11 no.1
    • /
    • pp.51-56
    • /
    • 2008
  • The counter-fire operation system performs its mission exchanging information with other related systems such as command & control systems and military information systems. In the process of exchanging information, the counter-fire operation system uses a type of data message which contains exchange data information in the format of KMTF. The requirement of data exchange of count-fire operation will continue to evolve. But the EDX(External Data eXchange) configuration item of the current counter-fire operation system can not effectively cope with the variation of data exchange requirements due to its fixed software structure. In the paper, a solution for improving flexibility of external data exchange in counter-fire operation system is proposed.

The Design and Implementation of Automatic Communication System using Mobile Instant Messenger (모바일 인스턴스 메신저를 활용한 자동화 커뮤니케이션 시스템 설계 및 구현)

  • Kim, Tae Yeol;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.11-21
    • /
    • 2014
  • In this paper, concerning the various advertising and policy advertising of the election with respect to whether to deliver a message to a large number of people, we design and implement an automative system what enables sending the text messages directly from the server to the client and also fast feedback is enabled by utilizing a number of operational programs to connect to the server. Therefore, we design and implement the automative communication system which enables delivering message to each user mobile terminal from a plurality of relay mobile terminals by utilizing the mobile instant messenger, not to deliver a message from the server to the mobile instant messenger user directly. In result of comparative analysis on the number of times of data transmission, this automative communication system utilizing mobile instant messenger shows the result that it enables transmitting five times per minute as it can copy and paste in the automation system regardless of the size of the data loading, otherwise in case of transmitting manually it show the result that the number of times of data transmission is reduced if the size of the data is larger.

Design and Implementation of IEEE Std 1609.2 Message Encoder/Decoder for Vehicular Communication Security (자동차 통신 보안을 위한 IEEE Std 1609.2 메시지 인코더/디코더의 설계 및 구현에 관한 연구)

  • Seo, Hye-In;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.568-577
    • /
    • 2017
  • IEEE Std 1609.2 was defined for the support of communication security functions in the WAVE (Wireless Access in Vehicular Environments) system. IEEE Std 1609.2 defined the message structures of the security services and managements on the vehicular communication by using ASN.1 (Abstract Syntax Notation One). Also, this security message structures shall be encoded using the COER (Canonical Octet Encoding Rules). In this paper, we designed and implemented the IEEE Std 1609.2 message encoder/decoder handling the security messages defined in IEEE Std 1609.2. The designed encoder/decoder consists of three modules as follows : a module generating the message of C language data structures in accord with IEEE Std 1609.2 message structures, a message encoder module, a message decoder module. And the encoder/decoder was implemented on the Linux environment. Also we analyzed the performance by measuring the performance speed of the encoder/decoder implemented.

The Influence of the Suitability of the Chronic Regulatory Focus and the Advertising Message Type on the Evaluation of the Beauty Product (성향조절초점과 광고메시지유형의 적합성이 미용제품평가에 미치는 영향)

  • Ko, Sung-Hyun;Hwang, Sun-Jin
    • Journal of Fashion Business
    • /
    • v.15 no.2
    • /
    • pp.1-11
    • /
    • 2011
  • The purpose of this study is to investigate the influence of the suitability of the chronic regulatory focus and the advertising message type on the evaluation of the beauty product. In addition, feeling right while and individual is reading an advertisement is measured to check the mechanism making the regulatory fit effect. The experimental design was designed with the mixed design of 2(chronic regulatory focus: promotion / prevention, between group) ${\times}$ 2(advertising message type: promotion /prevention, within a group). 100 female university student subjects in their twenties in Seoul and in the metropolitan area were asked to respond to questionnaires in the study. The reliability analysis, T-test, analysis of variance(ANOVA), and analysis of covariance (ANCOVA) on the collected data were done with SPSS WIN 12.0. The results of the study are as follows. First, the regulatory fit effect that when the individual chronic regulatory fit corresponds to the advertising message focus each other in the advertising of a new beauty product, the evaluation on the product is more positive could be checked. The promotion focus message of shampoo, the promotion focus group showed more positive response than the prevention focus group and as for the prevention focus message, the prevention focus group showed more positive results than the promotion focus group so that the effect of regulatory fit appeared. Second, when the regulatory fit effect appeared in the evaluation on the new beauty product, the fit effect on the individual chronic regulatory focus and on the advertising message focus also appeared in the measurement of feeling right. Hence, feeling right could be checked by using the mechanism of the regulatory fit effect.

An Application Implementation for the SECS Protocol Communication between Equipments and a Host in a Semiconductor Process (반도체 제조 공정에서 장비와 호스트간 SECS 프로토콜 통신을 위한 응용 프로그램 구현)

  • 김대원;전정만;이병훈;김홍석;이호길
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.293-293
    • /
    • 2000
  • The SECS(SEMI Equipment Communications Standard) is a standard protocol for communication between equipments and a host in semiconductor processes. This paper proposes the implementation of the HSMS(High-speed SECS Message Services) as an interface for transmission of the SECS messages and SECS-II containing message contents defined as an SEMI standard. The HSMS driver is implemented as a type of the daemon program and several DLL files. The SECS-II composes of the SML(SECS Message Language) file defining the SECS messages, the SML translator being able to interpret and transform the SML, and the data index table being able to refer to SECS messages. We also define the shared parameter to exchange the HSMS header and SECS message between the HSMS and the SECS-II. Eventually, to show the effectiveness of the proposed drivers, we test the SECS communications between equipments and a host using the implemented communication programs.

  • PDF

Improving Network Utilization in FlexRay Using Reallocation of Static Message (정적 메시지 재할당을 이용한 FlexRay 네트워크 사용효율 개선 기법)

  • Seo, Byungseok;Jin, Sungho;Lee, Dongik
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2013
  • This paper presents a mathematical model to determine the optimal length of static messages that can achieve more efficient use of a FlexRay network. In order to determine the optimal length of static message, the proposed model evaluates the given set of messages with respect to a network utilization index, which is defined in this work. The efficient use of a FlexRay network is achieved by reallocating any static message whose length is equal or greater than the resulting value to the dynamic segment. The effectiveness of the proposed method is investigated by applying to the SAE benchmark data.

Stateful Virtual Proxy for SIP Message Flooding Attack Detection

  • Yun, Ha-Na;Hong, Sung-Chan;Lee, Hyung-Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.251-265
    • /
    • 2009
  • VoIP service is the transmission of voice data using SIP protocol on an IP-based network. The SIP protocol has many advantages, such as providing IP-based voice communication and multimedia service with low communication cost. Therefore, the SIP protocol disseminated quickly. However, SIP protocol exposes new forms of vulnerabilities to malicious attacks, such as message flooding attack. It also incurs threats from many existing vulnerabilities as occurs for IP-based protocol. In this paper, we propose a new virtual proxy to cooperate with the existing Proxy Server to provide state monitoring and detect SIP message flooding attack with IP/MAC authentication. Based on a proposed virtual proxy, the proposed system enhances SIP attack detection performance with minimal latency of SIP packet transmission.

Implementing a Virtual Shopping Mall for the Cheapest Price using MOM(Message-Oriented Middleware) based on XML (XML 기반의 MOM(Message-Oriented Middleware)을 이용한 최저 가격 보장을 위한 가상 쇼핑몰 구현)

  • 임종선;주경수
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.1
    • /
    • pp.61-70
    • /
    • 2002
  • There are a lot of shopping malls in Internet and most of consumers want to buy good goods in cheap price through the shopping malls. To support them, many sites for price comparison are constructed. But man or woman search many shopping malls and insert their price informations into database that the price comparison sites own. To overcome this disadvantage, virtual shopping malls are builded. These virtual shopping malls are connected and cooperated a lot of affiliated existing shopping malls for the cheapest price information. But, these virtual shopping mall are connected to those existing shopping malls in synchronous. So If they are connected to many existing shopping malls, we have to wait long time because of searching for many existing shopping malls. In this paper, we designed and implemented a virtual shopping mall that connect to many existing shopping malls in asynchronous. For a asynchronous communication between this virtual shopping mall and many existing shopping malls, we used JMS (Java Message Service) that is a standard Java API for MOM (Message-Oriented Middleware).

  • PDF

A Study on the Implementation of a Message Transfer Protocol with Document Classification (문서의 등급을 고려한 메시지전송 프로토콜 구현에 관한 연구)

  • 신승중;김현수
    • The Journal of Information Technology and Database
    • /
    • v.7 no.1
    • /
    • pp.67-82
    • /
    • 2000
  • In this paper we have developed a message transfer protocol, CMP, which improves MSP's message processing capability. The proposed method has taken into account document classification to improve the efficiency of message processing. The difference between the conventional MSP and CMP has been addressed. The CMP's performance has been shown by various experiments including number, alphabet, Korean letter, Chinese letter, music sound and compression file transmission. And security capability of both protocols has been compared based on the specification of FIPS 140-2. The CMP's overall performance is shown to be superior to that of MSP on the processing speed in the performance perspective and on the function of cryptographic module interface and cryptographic key management in the security perspective respectively.

  • PDF

Importance-Based Security Level Verification in Web Services (웹 서비스에서 중요도 기반 보안수준 검증)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeongyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1279-1280
    • /
    • 2010
  • There are some cases when SOAP message, where WS-Security and WS-Policy elements are included, may consist of a sensitive and important data. In these cases, the message is highly recommended to be secured. The question exists of how to quickly identify that SOAP message satisfies security requirement and security level of a SOAP message. In this paper, we propose a technique called Bit-Stream which depends on the importance of SOAP elements to automatically identify the vulnerabilities and risks while offering advice for higher security.