• 제목/요약/키워드: Data Message

검색결과 1,513건 처리시간 0.023초

An Energy-Efficient Periodic Data Collection using Dynamic Cluster Management Method in Wireless Sensor Network (무선 센서 네트워크에서 동적 클러스터 유지 관리 방법을 이용한 에너지 효율적인 주기적 데이터 수집)

  • Yun, SangHun;Cho, Haengrae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • 제5권4호
    • /
    • pp.206-216
    • /
    • 2010
  • Wireless sensor networks (WSNs) are used to collect various data in environment monitoring applications. A spatial clustering may reduce energy consumption of data collection by partitioning the WSN into a set of spatial clusters with similar sensing data. For each cluster, only a few sensor nodes (samplers) report their sensing data to a base station (BS). The BS may predict the missed data of non-samplers using the spatial correlations between sensor nodes. ASAP is a representative data collection algorithm using the spatial clustering. It periodically reconstructs the entire network into new clusters to accommodate to the change of spatial correlations, which results in high message overhead. In this paper, we propose a new data collection algorithm, name EPDC (Energy-efficient Periodic Data Collection). Unlike ASAP, EPDC identifies a specific cluster consisting of many dissimilar sensor nodes. Then it reconstructs only the cluster into subclusters each of which includes strongly correlated sensor nodes. EPDC also tries to reduce the message overhead by incorporating a judicious probabilistic model transfer method. We evaluate the performance of EPDC and ASAP using a simulation model. The experiment results show that the performance improvement of EPDC is up to 84% compared to ASAP.

A Distributed Instant Message System Architecture using Media Control Channel (미디어 제어 채널을 사용한 분산 인스턴트 메시지 시스템 구조)

  • Kim, Byung Chul;Jang, Choonseo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제20권5호
    • /
    • pp.979-985
    • /
    • 2016
  • In this paper, a distributed instant message system with multiple servers architecture which can distribute system load effectively using an extended media control channel has been presented. A media control channel provides establishing a reliable control channel and also keeping a reliable control channel between SIP server and client in the field of real-time media transport area. In this study, a new instant message system architecture which can distribute massive instant message including multimedia data to multiple servers has been presented. The presented instant message system architecture can distribute system load by extending media control channel. For this purpose, media control channel messages, which distribute system load to multiple servers dynamically according to increasing number of users, have been designed in our presented system. And, in our research, an exchanging procedures of media control channel messages between servers have also been presented. The performance of the proposed system has been analysed by simulation.

The Influence of Message Types of Comparative Advertising on Advertising Effect (비교광고의 메시지 유형에 따른 광고효과 분석)

  • Moon, Jae-Hak
    • Management & Information Systems Review
    • /
    • 제31권4호
    • /
    • pp.639-661
    • /
    • 2012
  • The purpose of the paper is to examine sidedness effects of comparative advertising and moderating roles of the emotions of customer and product type. To test the research hypotheses, this study conducted experimental designs. One hundred ninety-two undergraduate students were assigned to one of the four experimental groups. Comparative Advertising message type and product type were manipulated as between-subject factors. There was a surprising event situation(free gift event) when participants came to laboratory for experiment, which is for the emotion manipulation. If a participant in a positive emotion group, he or she gets a free gift. The data demonstrate that comparative message type have a significant effect on both attitude toward the advertising and acceptance intention. In addition, consumers' emotion and product type play a significant moderating role between the message types and the dependent variables. The results of this study contribute to the literature as a new attempt to examine the sidedness effect of the comparative advertising message. We suggested that message types and consumer's emotion is one of very important aspects for a comparative advertising and marketers should consider people's emotion when they release a comparative advertising, which can help when marketers make their strategy for a comparative advertising.

  • PDF

Routing Control Algorithm for SS7 Signaling Traffic with Distributed Message Handling Processors (분산 메시지처리기 구조에서의 공통선 신호 트래픽루팅 제어 기법)

  • Cho, Young-So;Ryu, Keun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • 제4권7호
    • /
    • pp.1797-1803
    • /
    • 1997
  • Message handling function of the SS7(Signaling System N0.7) provides signaling traffic routing capabilities to transfer the signaling traffic to the destination nodes in the signaling network. This message handling function should be handled without any transfer delay for real time processing of large amount of signaling traffic for data communication service, and visual information service. In this paper, we suggest two routing algorithms working on the distributed message handling processors which were specially designed for message handling function. The one is an internal distributing algorithm for equal distribution of signaling traffic among the distributed message handling processors and the other is a distributing algorithm for distribution of signaling traffic in the multiple signaling routes. Both of algorithms are using signaling link selection codes labled in each signaling messages. It is shown that the suggested algorithms are very efficient for routing signaling traffic at the fault condition of signaling routes and the restoration of unavailable signaling routes.

  • PDF

Design and Implementation of the Conversion Rule between XML and MTF Messages (MTF 메시지와 XML간 상호변환 규칙 설계 및 구현)

  • Park, In-Soo;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • 제12D권5호
    • /
    • pp.781-788
    • /
    • 2005
  • MTF message is the normalized and standardized format which is used in the time when it tries to transmit data to other systems or exchanges needed information in defense message systems. XML can support variety of search functionality and is estimated to be the best way from the view of efficient presentation and exchange in internet based environment, based on advantage which is independent of hardware and software. US army brought in XML-MTF combining with XML based technology, but we do not contain such a MTF system, and necessity of MTF is increasing for combined operation between ROK and US as a lot of C4I system were transferred to Web based systems. In this paper, we make analysis of fundamental structure, organization of paragraph, witting regulation of MTF message. We present the rule of naming element and fundamental mapping rule for transformation of its XML based on it. Also, we prove that MTF message can be transformed to XML document by trying to transforming sample documents to XML document applying presented mapping rule, creating MTF message based on it and implement program which can automatically transform them to XML-MTF.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권1호
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

Proposed Message Transit Buffer Management Model for Nodes in Vehicular Delay-Tolerant Network

  • Gballou Yao, Theophile;Kimou Kouadio, Prosper;Tiecoura, Yves;Toure Kidjegbo, Augustin
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.153-163
    • /
    • 2023
  • This study is situated in the context of intelligent transport systems, where in-vehicle devices assist drivers to avoid accidents and therefore improve road safety. The vehicles present in a given area form an ad' hoc network of vehicles called vehicular ad' hoc network. In this type of network, the nodes are mobile vehicles and the messages exchanged are messages to warn about obstacles that may hinder the correct driving. Node mobilities make it impossible for inter-node communication to be end-to-end. Recognizing this characteristic has led to delay-tolerant vehicular networks. Embedded devices have small buffers (memory) to hold messages that a node needs to transmit when no other node is within its visibility range for transmission. The performance of a vehicular delay-tolerant network is closely tied to the successful management of the nodes' transit buffer. In this paper, we propose a message transit buffer management model for nodes in vehicular delay tolerant networks. This model consists in setting up, on the one hand, a policy of dropping messages from the buffer when the buffer is full and must receive a new message. This drop policy is based on the concept of intermediate node to destination, queues and priority class of service. It is also based on the properties of the message (size, weight, number of hops, number of replications, remaining time-to-live, etc.). On the other hand, the model defines the policy for selecting the message to be transmitted. The proposed model was evaluated with the ONE opportunistic network simulator based on a 4000m x 4000m area of downtown Bouaké in Côte d'Ivoire. The map data were imported using the Open Street Map tool. The results obtained show that our model improves the delivery ratio of security alert messages, reduces their delivery delay and network overload compared to the existing model. This improvement in communication within a network of vehicles can contribute to the improvement of road safety.

MHS용 팩시밀리 접속장치의 개발에 관한 연구

  • 이인행;양해권
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제15권9호
    • /
    • pp.715-721
    • /
    • 1990
  • This paper describes the development of a Facsimile Interface Unit(FIU), which performs message switching between a DTE(Data Terminal Equipment), such as PC, TTY, and Telex, subscribed to PSPDN's message handing system, and a Group 3 facsimile terminal connected to Public Switched Telephone Network.

  • PDF

A FAST ASYMMETRIC KEY ENCRYPTION ALGORITHM FOR BULK DATA

  • Shin, Sang-Uk;Rhee, Kyung-Hyune
    • Journal of applied mathematics & informatics
    • /
    • 제8권3호
    • /
    • pp.943-957
    • /
    • 2001
  • In this paper, we propose an efficient encryption algorithm, without exchanging session keys of a symmetric cryptosystem. The proposed scheme, called as the FAKE(Fast Asymmetric Key Encryption), first scrambles an entire input message and then encrypts small parts of the scrambled message using an asymmetric key encryption scheme. We use the all-or-nothing transform based on the hash function as a scrambling function, which was proposed by Shin, et al. Furthermore, the proposed scheme can additionally provide a digital signature service with only small overhead.

The Security on UN/EDIFACT message level (UN/EDIFACT 레벨에서의 정보보호)

  • 염용섭
    • The Journal of Society for e-Business Studies
    • /
    • 제3권2호
    • /
    • pp.125-140
    • /
    • 1998
  • 컴퓨터 통신망을 통한 자료교환이 증가되고 있는 요즘 정보보호 위협요소 역시 비례하여 증가되고 있다. 거래 상대방과 중요한 상역 거래문서를 전자문서 형태로 주고받는 EDI(Electronic Data Interchange) 는 부당한 행위자에 의한 불법적인 전자문서의 내용 변조 및 누출 그리고 송수신사실에 대한 부인(Repudiation) 등의 여러 위협들에 대항할 수 있는 정보보호 기능을 필수 서비스로 제공해야 한다. 본 고에서는 KT-EDI 시스템의 실제 운영환경을 기반으로 하여 시스템이 제공하는 정보보호 서비스 중에서 기본적인 메세지출처인증(Message Origin Authentication) 서비스와 내용 기밀성(Content Confidentiality) 서비스를 중심으로 UN/EDIFACT 전자문서 레벨에서의 구현에 관하여 다룬다.

  • PDF