• Title/Summary/Keyword: Message 21

Search Result 198, Processing Time 0.026 seconds

A MAC Protocol Using Delay Information Feedback for High-Speed MAN (지연정보 되먹임을 이용하는 고속 MAN용 MAC 프로토콜)

  • 김성원;정동근;최종호
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.5
    • /
    • pp.21-29
    • /
    • 1992
  • This paper proposes a new MAC propocol for high-speed MAN. The proposed protocol is based on the P$_1$-persistent tranmission scheme and each node calculates the transmission probability periodically by using delay information(DI). A window mechanism for the calculation of message delay in each node is proposed to improve the adaptability of the proposed protocol to traffic changes. The capactiy of the proposed protocol is analyzed. The simulation results show that the proposed protocol gives fair message delay under heavy load conditions and, when the transmission speed or distance is increased, the message delay variation of the proposed protocol is less than that of IEEE 802.6 DQDB.

  • PDF

A multicast algorithm in overlapped process group environments (중첩된 프로세스 그룹 환경에서의 멀티캐스트 알고리즘)

  • 권봉경;정광수;현동환;함진호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.4
    • /
    • pp.926-938
    • /
    • 1996
  • In this paper, we proposed a new multicast algorithm which is efficiently applicable to overlapped process group environments where one process may be involved in several process groups. Unlike the esisting algorithms, the proposed one provides an efficient group communication mechanism by generating the processgroup information in two-level tree. Using this algorithm, we improved the shortcoming of the existing algorithms by reducing the overhead in passing through unnecessary processes for message ordering. We have provided the causal ordering method as well as the total ordering method in group communication environments. As a result, we allow one process to deliver message to other processes with a short delay time, and reduced the overhead required for the message ordering. Also, we logically proved the proposed causal ordering method, and compared the performance of the proposed algorithm with ones of other existing algorithms by computer simulation.

  • PDF

Design and Implementation of Platform for Monitoring of Notification System in Firebase Message

  • Oh, Am-Suk
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.1
    • /
    • pp.16-21
    • /
    • 2021
  • In this paper, to prevent accidents of school vehicles used by students, which have emerged as a continuous social problem, a boarding and leaving notification system using Bluetooth beacons is proposed. The platform structure uses Bluetooth, a smartphone, and an application, and provides real-time message reception between parents and teachers. It is not simply a system with Bluetooth capability alone, but also an IcT technology that is closely related to real life using two-way communication. The purpose is to provide user-friendly ICT technology as an integrated system for more practical effects. Two-way exchange of information between parents and teachers using cloud servers is made possible. By using this Bluetooth beacon notification system, safety accidents in student vehicles are reduced, which brings confidence from traffic accidents to schoolchildren of parents and teachers. Therefore, it is expected that parents and teachers are expected to improve their mental stability and quality of life from traffic accidents.

An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security (모바일 보안용 병합 TEA 블록 암호의 면적 효율적인 설계)

  • Sonh, Seungil;Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • In this paper, a merged TEA block cipher processor which unifies Tiny Encryption Algorithm(TEA), extended Tiny Encryption Algorithm(XTEA) and corrected block TEA(XXTEA) is designed. After TEA cipher algorithm was first designed, XTEA and XXTEA cipher algorithms were designed to correct security weakness. Three types of cipher algorithm uses a 128-bit master key. The designed cipher processor can encrypt or decrypt 64-bit message block for TEA/XTEA and variable-length message blocks up to 256-bit for XXTEA. The maximum throughput for 64-bit message blocks is 137Mbps and that of 256-bit message blocks is 369Mbps. The merged TEA block cipher designed in this paper has a 16% gain on the area side compared to a lightweight LEA cipher. The cryptographic IP of this paper is applicable in security module of the mobile areas such as smart card, internet banking, and e-commerce.

Method for Message Processing According to Priority in MQTT Broker (MQTT Broker에서 우선순위에 따른 메시지 처리를 위한 방법에 관한 연구)

  • Kim, Sung-jin;Oh, Chang-heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1320-1326
    • /
    • 2017
  • Recently, IoT has been studying a lightweight protocol to satisfy device communication in a limited network environment. MQTT is a typical lightweight protocol. It supports small fixed headers to minimize overhead, and adopts publish/subscribe structure to guarantee real-time performance. However, MQTT does not support prioritization of important data and can not provide QoS in a specific IoT service. In this paper, we propose a message processing method to consider the priority of various IoT services in MQTT. In the proposed method, the priority flag is added to the fixed header of the MQTT in the node to transmit the message, and the broker confirms the priority of the corresponding message and processes it preferentially. Through experiment and evaluation, we confirmed the reduction of end-to-end delay between nodes according to priority.

Measures to Improve the Efficacy of Road User-Centered VMS Traffic Information Offering (도로이용자 중심의 VMS 교통정보 제공 효용성 향상 방안)

  • Yoon, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.190-201
    • /
    • 2021
  • The variable message sign (VMS) is equipment to improve the efficiency of traffic flow and safety of travel by providing real-time information to road users on traffic, road, weather situation, and traffic control due to construction. The information messages of the letter-based VMS taking up most of the VMS on the general national highways consist of section, travel time in sections, and road control situation. This study devised an improvement plan centered on road users, not road managers-centered existing message-based VMS through an analysis of road users' preference targeting the letter-based VMS operated in the general national highways in the Seoul Metropolitan Area. By presenting the measure for system improvement through which information on unexpected situations that road users prefer the most can be quickly and efficiently provided, this study aims to improve the efficiency of road user-centered VMS traffic information.

Detection of Anomaly VMS Messages Using Bi-Directional GPT Networks (양방향 GPT 네트워크를 이용한 VMS 메시지 이상 탐지)

  • Choi, Hyo Rim;Park, Seungyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.4
    • /
    • pp.125-144
    • /
    • 2022
  • When a variable message signs (VMS) system displays false information related to traffic safety caused by malicious attacks, it could pose a serious risk to drivers. If the normal message patterns displayed on the VMS system are learned, it would be possible to detect and respond to the anomalous messages quickly. This paper proposes a method for detecting anomalous messages by learning the normal patterns of messages using a bi-directional generative pre-trained transformer (GPT) network. In particular, the proposed method was trained using the normal messages and their system parameters to minimize the corresponding negative log-likelihood (NLL) values. After adequate training, the proposed method could detect an anomalous message when its NLL value was larger than a pre-specified threshold value. The experiment results showed that the proposed method could detect malicious messages and cases when the system error occurs.

Fuzzy Based Multi-Hop Broadcasting in High-Mobility VANETs

  • Basha, S. Karimulla;Shankar, T.N.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.165-171
    • /
    • 2021
  • Vehicular Ad hoc Network (VANET) is an extension paradigm of moving vehicles to communicate with wireless transmission devices within a certain geographical limit without any fixed infrastructure. The vehicles have most important participation in this model is usually positioned quite dimly within the certain radio range. Fuzzy based multi-hop broadcast protocol is better than conventional message dissemination techniques in high-mobility VANETs, is proposed in this research work. Generally, in a transmission range the existing number of nodes is obstacle for rebroadcasting that can be improved by reducing number of intermediate forwarding points. The proposed protocol stresses on transmission of emergency message projection by utilization subset of surrounding nodes with consideration of three metrics: inter-vehicle distance, node density and signal strength. The proposed protocol is fuzzy MHB. The method assessment is accomplished in OMNeT++, SUMO and MATLAB environment to prove the efficiency of it.

Social Identity and Regulatory Focus: Can Collective Orientation Influences Consumers' Message Evaluation?

  • Park, Sangwoo;Heo, Dakyeong;Shin, Dongwoo
    • Asia Marketing Journal
    • /
    • v.21 no.1
    • /
    • pp.89-112
    • /
    • 2019
  • To investigate the interplay between individual and collective self-regulations, the authors propose a dialectic process that describes the changes in the locus of self-regulations between individual self and collective self. The results from three studies display a strong support for the two sets of hypotheses drawn from the proposed process. Our findings demonstrate that consumers can move the locus of self-regulation from individual-self to collective-self when a social identity is activated (preliminary study and study1). Further examination of regulatory swing between individual and collective regulatory orientations revealed group identification as a key variable in determining the locus of self-regulation (study2). While a consumer with a high level of group identification changes her locus of self-regulation from an individual to a collective (a regulatory shift) and evaluated messages and products framed consistent with their group orientation, a consumer with low level of group identification maintains her locus of self-regulation in her personal level of self (a regulatory preservation) and evaluated messages and products framed consistent with their personal regulatory focus.

MPEG-21 Event Reporting Message Structure based on digital data broadcasting use case scenarios (디지털 데이터 방송 유즈케이스 시나리오에 기반한 MPEG-21 이벤트 리포팅 구조 설계)

  • 송영주;홍진우;문남미;지경희
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.399-409
    • /
    • 2003
  • In this paper, we present an Event Reporting which is one of the major items of MPEG-21 and exemplify two digital data broadcasting use case scenarios, and according1y we propose the Event Reporting message structure for MPEG-21 broadcasting contents that is based on these use case scenarios. Every interaction with a Digital Item in the multimedia framework can be called an Event. The need to standardize Event Reporting within the Multimedia Framework arise from the need to monitor and communicate amongst Peers and Users the Events relating to Digital Items and/or the programs and devices that operate on them at any given time. However, there are a number of difficulties in providing an accurate report about an Event. Different observers of the Event may have vastly different perspectives. In this paper, we describe a structure and vision of the Event Reporting. Besides we show the activities on MPEG-21 Event Reporting standardization.