• Title/Summary/Keyword: Data Message

Search Result 1,507, Processing Time 0.03 seconds

A Method For Preventing Data Looping in Multi Tactical Datalink Operation (다중 전술데이터링크 운용에 따른 데이터 루핑 방지 방안)

  • Woo, Soon;Lim, Jae-Sung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.314-321
    • /
    • 2013
  • In this paper, we have proposed a method which can prevent data looping in multi tactical data-link operating situation. Because the situation of multi tactical data-link in Korea would be more complex than ever before, data looping is more likely to be happened. To prevent data looping, forwarder has to manage TQ(Track Quality) in forwarded track message by degrading it to enlarge correlation gate. Forwarder also has to discard useless track message which can be determined by minimum TQ value. To decide optimal formula for forwarder to degrade TQ and to determine minimum TQ, a research about track motion, correlation, TQ managing, etc in real system is necessary.

Software structure design for processing various tactical data

  • Kim, Jin Woo;Lee, Woo Sin;Lee, Seung Chan;Kim, Young Don;Jin, So Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.39-47
    • /
    • 2017
  • In this paper, we propose a message transmission processing structure for efficient use of radio resources. Existing tactical data links have more data and accumulate more data than the amount of tactical data planned according to the situation. This may result in delays in operations and additional problems. To prevent this, priority is assigned to the message and transmission is performed according to the priority on a single basis. And we design a processing structure that can update duplicate messages and delete old messages in order to prevent waste of radio resources. Experiments are conducted to verify that these structures can be implemented and applied to data links.

E-mail System Providing Integrated User's View for the Message containing Image and Text (이미지와 텍스트 메시지의 통합 사용자 뷰를 제공하는 전자 우편 시스템)

  • Dok-Go, Se-Jun;Lee, Taek-Gyun;Lee, Hyeong-U;Yun, Seong-Hyeon;Lee, Seong-Hwan;Kim, Chang-Heon;Kim, Tae-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.563-572
    • /
    • 1997
  • E-mail has been eidely used for unformation delivery as an Inernet serive. As multimedia etchnologies are developed rapidly, most of the recent Unternet infornation servies support multimedia data. E-mail system also needs to suport multimedia nesage. But Internet mail servise using simple maiol transfer protocol(SMTP) speci-fied in RFC 821/822 handles only ASCII text messages repressented with 7-bit code. Each line the message has the length limitation as well. Those are why it cannot satisfy the diverse user'w demands. Multipuepose Unternet mail extensions(MIMZE), which is a modification and supplement of RFC 822,was proposed for supporting transportation of multimedia data.It can solve the limitations of sizes and types in contents of a message. In this study the E-mail system has been designed and implemented according to the MIME standard in order to solve the limitations of transpotation of messages regardless of the message content type. Hypertext markup language(HTML)syntax is applied to the mail system, and so it is possible to display a message consisting of differnt media as an intergrated from for the purpose of better understanding a message. No application program is needed for displaying a message including image data,and convenience for user is considered in the system. The futuer work is to improve the E-mail system so that it may support motion pictures and sound information,Thereby tge perfor multimeda E-mail system providing inergrated user's wiew will be developed.

  • PDF

Model-Based Intelligent Framework Interface for UAV Autonomous Mission (무인기 자율임무를 위한 모델 기반 지능형 프레임워크 인터페이스)

  • Son Gun Joon;Lee Jaeho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.3
    • /
    • pp.111-121
    • /
    • 2024
  • Recently, thanks to the development of artificial intelligence technologies such as image recognition, research on unmanned aerial vehicles is being actively conducted. In particular, related research is increasing in the field of military drones, which costs a lot to foster professional pilot personnel, and one of them is the study of an intelligent framework for autonomous mission performance of reconnaissance drones. In this study, we tried to design an intelligent framework for unmanned aerial vehicles using the methodology of designing an intelligent framework for service robots. For the autonomous mission performance of unmanned aerial vehicles, the intelligent framework and unmanned aerial vehicle module must be smoothly linked. However, it was difficult to provide interworking for drones using periodic message protocols with model-based interfaces of intelligent frameworks for existing service robots. First, the message model lacked expressive power for periodic message protocols, followed by the problem that interoperability of asynchronous data exchange methods of periodic message protocols and intelligent frameworks was not provided. To solve this problem, this paper proposes a message model extension method for message periodic description to secure the model's expressive power for the periodic message model, and proposes periodic and asynchronous data exchange methods using the extended model to provide interoperability of different data exchange methods.

Cluster-based Energy-Efficient Routing Protocol using Message Reception Success Rate (메시지 수신 성공률을 이용한 클러스터 기반의 에너지 효율적인 라우팅 프로토콜)

  • Jang, You-Jin;Choi, Young-Ho;Jang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1224-1228
    • /
    • 2010
  • The existing cluster-based routing protocols have some problems. Firstly, because of selecting cluster head at random, they occur a node concentration problem. Secondly, they have a low reliability for data communication due to the less consideration of node communication range. Finally, data communication overhead is greatly increased because of sending all sensor node information to sink node for constructing clusters. To solve these problems, we in this paper, propose a cluster-based routing protocol using message reception success rate. Firstly, to solve the node concentration problem, we design a cluster head selection algorithm based on node connectivity and devise cluster spliting/merging algorithms. Secondly, to guarantee data communication reliability, we use message reception success rate. Finally, to reduce data communication overhead, we use only neighbor nodes information at both cluster construction and cluster head selection.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

Adoption of MFER and HL7 Standard for Shared Electronic Medical Record (공유 전자의무기록을 위한 MFER과 HL7 표준 적용)

  • Kim, Hwa-Sun;Park, Chun-Bok;Hong, Hae-Sook;Cho, Hune
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.501-506
    • /
    • 2008
  • Medical environments incorporate complex and integrated data networks to transfer vast amounts of patient information, such as images, waveforms, and other digital data. To assure interoperability of images, waveforms and patient data, health level seven(HL7) was developed as an international standard to facilitate the communication and storage of medical data. We also adopted medical waveform description format encoding rule(MFER) standard for encoding waveform biosignal such as ECG, EEG and so on. And, the study converted a broad domain of clinical data on patients, including MFER, into a HL7 message, and saved them in a clinical database in hospital. According to results obtained in the test environment, it was possible to acquire the same HL7 message and biosignal data as ones acquired during transmission. Through this study, we might conclude that the proposed system can be a promising model for electronic medical record system in u-healthcare environment.

A Data Sharing Scheme with Security and Flexibility (보안성과 유연성을 갖춘 데이터 공유 방안)

  • Lee, Goo-Yeon;Kim, Hwa-Jong;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.24 no.B
    • /
    • pp.193-198
    • /
    • 2004
  • We propose and analyse a flexible secure file sharing scheme which can be used for data sharing among members in P2P environment. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient memory management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention.

  • PDF

The Effects of Construal Levels to Charity Retailing Communication

  • LEE, Jeonghoon;LEE, Han-Suk
    • Journal of Distribution Science
    • /
    • v.19 no.8
    • /
    • pp.81-89
    • /
    • 2021
  • Purpose: Traditional charity retail needs to change its communication in the online environment. This article examines the effectiveness of communication by online charity organizations in terms of the type of messages being delivered. Research design, data and methodology: Study 1 based on a sample of 120 Korean adults, we investigated whether charity asking messages for domestic people, compared to those for foreign people, prompt more favorable evaluations when framed with low (vs. high) construal levels. In Study 2, with 120 Korean adults sample, we tested whether emotional message appeals prompt a more favorable response than rational messages when framed in a socially close. Results: According to the result of Study 1, for the domestic recipients, donation messages situated in the near, compared to the distant, future induced more favorable reactions from potential donors. Moreover, in Study 2, emotional (vs. rational) message appeals generated more positive donation intentions when they were framed in the socially close situation. Conclusions: This research contributes that differing consumer construal have important implications for how marketing communication might best gain charitable support. This suggests that marketers who design a donation message should consider message's appeal and type to activate the potential donors' willingness to participate in the campaign.

An effective detection method for hiding data in compound-document files (복합문서 파일에 은닉된 데이터 탐지 기법에 대한 연구)

  • Kim, EunKwang;Jeon, SangJun;Han, JaeHyeok;Lee, MinWook;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1485-1494
    • /
    • 2015
  • Traditionally, data hiding has been done mainly in such a way that insert the data into the large-capacity multimedia files. However, the document files of the previous versions of Microsoft Office 2003 have been used as cover files as their structure are so similar to a File System that it is easy to hide data in them. If you open a compound-document file which has a secret message hidden in it with MS Office application, it is hard for users who don't know whether a secret message is hidden in the compound-document file to detect the secret message. This paper presents an analysis of Compound-File Binary Format features exploited in order to hide data and algorithms to detect the data hidden with these exploits. Studying methods used to hide data in unused area, unallocated area, reserved area and inserted streams led us to develop an algorithm to aid in the detection and examination of hidden data.