• Title/Summary/Keyword: Message 21

Search Result 198, Processing Time 0.027 seconds

Message Analysis and Development Situation on the Tactical Data Link of Combat Management System in Naval (함정 전투체계 전술데이터링크 개발현황 및 메시지 분석)

  • You, Hojeong;Choi, Byeonggon
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.2
    • /
    • pp.21-27
    • /
    • 2017
  • The combat systems in Korea navy have been operating some kinds of tactical data link systems such as Link-11, ISDL and JTDLS. Each tactical data link system has the ability to transmit and receive tactical information like track, engagement, weapon information by using unique message of theirs. And each unique message has their own format. But a number of tactical data link system make combat effectiveness worse because their major functions are duplicated unnecessarily. So, many advanced countries are trying to make united data link system. Similarly, the combat systems in Korea navy will operate C4I data link system, and it is combined version current ISDL, KNCCS and JTDLS data link system. In this paper, we consider the development current tactical data link systems in Korea navy. Also, compare the characteristics between I-message used in ISDL and Host-Interface message used in C4I. From these results, we analyze advanced points about C4I data link system.

A Study on Creative Strategy Related to Expression Advertisement for Missy Brand- Focused on ELLe's Advertisement (Missy Brand 의 고아고 크리에이티브 전략에 관한 연구 - ELLE 광고를 중심으로-)

  • 송윤주;정성혜
    • Journal of the Korean Society of Costume
    • /
    • v.50 no.3
    • /
    • pp.161-178
    • /
    • 2000
  • This study intended to provide the visual basic data of efficient fashion advertising for Missy Brands in the 21 th by investigating and analyzing the creative strategy related to expression of fashion advertisement. The Research methdologies were as follow. First, the change of domestic advertising industry, theoretical background of the creative strategy and the condition and problems in the domestic Missy market were studied through the relevant fashion advertisement and periodical publications. Second, the content analysis was done using the advertisement of Missy Brands in Fashion magazine, " ELLE" which were published from 1992 to 1998. (3/6/9/12). The results were summarized as follows: First, the ELLE's analysis results were to increase in number of the advertisements for the teenager Brand fro 1993 and for the I.B.(Imported Brand) or L.B(License Brand) from 1995. As a result of the analyses, we suppose that a number of advertisements are proportional related to the sales of Brands. Second, the re were significant differences between D.B. (Domestic Brand) and I.B(Imported Brand) or L.B.(License Brand ) in the change of creative strategy for Missy Brands advertisements. The creative strategy of D.B. ads was used more importantly in linsuistic message than in visual message. On the contrary, the creative strategy of I.B.(L.B) ads, attached importance to the visual message(photo). Third, the ads of TIME showed ads, effect to have relevance to sales. The creative strategy of TIME ads. appeals to consumer for consistent Brand image, at the same time reflects the distinctive Brand image from the other. This study was suggested the creative strategy change of TIME through the visual data base.data base.

  • PDF

21 Century Video Image Fashion Communication - Focusing on Prada Fashion Animation - (21세기 영상 패션 커뮤니케이션 - 프라다 패션 애니메이션을 중심으로 -)

  • Jang, Ra-Yoon;Yang, Sook-Hi
    • The Research Journal of the Costume Culture
    • /
    • v.18 no.6
    • /
    • pp.1318-1330
    • /
    • 2010
  • The 21st century is the age when a sensational image has more explanatory power and can deliver a more powerful message than a message consisting of logical thinking. Powerful visual images create a big impact on many people throughout the world, overcoming linguistic barriers and even replacing language as a means of communication. In the fashion field, the concept and power of visual images within the new multimedia of the 21st century are becoming increasingly important. In recent years, other than the above methods, videos, movies and animation features have been produced directly to enhance visual effects and attempts are increasing to use these new tools as communication methods. This study focuses on animation contents that have been used in the fashion industry to overcome prejudice of luxury international brands that feature images that emphasize value, quality and heritage. The purpose of this study is to focus on the specific character of fashion animation in order to overview the concept of 21st video fashion communication and to show how the collection concept that includes color and detail places an emphasis on visual images. Analysis of previous research, theoretical research through literature and case study on Prada fashion animation led to the following conclusion. The common features of two different Prada fashion animation show that both animation have the following features in common : realism, dramatic impact and convergence for expression methods, and creativeness, hybrid and a happy ending for contents. Beginning with this study, I believe that various angles of interest and concern about communication in the fashion world, which is a social and cultural phenomenon that changes rapidly, can be will be looked at and learned from.

Design and implementation of outbound traffic controller for the prevention of ICMP attacks (ICMP 공격 방지를 위한 outbound traffic controller의 설계 및 구현)

  • Yoo, Kwon-jeong;Kim, Eun-gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.549-557
    • /
    • 2017
  • ICMP(Internet Control Message Protocol) is a main protocol in TCP/IP protocol stack. ICMP compensates the disadvantages of the IP that does not support error reporting. If any transmission problem occurred, a router or receiving host sends ICMP message containing the error cause to sending host. However, in this process, an attacker sends a fake ICMP messages to the host so that the communication can be terminated abnormally. An attacker host can paralyzes system of victim host by sending a large number of messages to the victim host at a high rate of speed. To solve this problem, we have designed and implemented outbound traffic controller that prevents various ICMP attacks. By preventing the transmission of attack messages in different ways according to each case, various network attacks can be prevented. In addition, unnecessary network traffic can be filtered before transmitted.

Suggestion on the SBAS Augmentation Message Providing System for the the Low-cost GPS Receiver of Drone Operation (드론의 저가형 GPS 수신기용 SBAS 보강 정보 전송 시스템 제안)

  • Seok, Hyo-jeong;Yoon, Dong-hwan;Lim, Cheol-soon;Park, Byung-woon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.272-278
    • /
    • 2017
  • In order to meet performance requirements specified by the ICAO in drone operation, a system that provides augmentation information such as SBAS is needed. However, the operating range of the drone is limited in situation where the drone can not received the SBAS message continuously. In this paper, we propose a system to transmit SBAS augmentation message using a separate communication channel assuming the SBAS satellite signal to the drone has been shielded. We implemented the proposed system and verified its performance in the static environment. The DGPS positioning results showed that the accuracy difference is about 10cm, which means the accuracy performance was very similar. In addition, the protection level calculated by the system also shows the difference within 2m from the value calculated by the airborne receiver.

The Extention and Implementation of User-defined AIS AtoN for Marine Safety Information Service (해양안전정보서비스를 위한 사용자정의 AIS AtoN확장 및 실험)

  • Park, In-Hwan;Hwang, Seung-Wook;Lee, Seo-Jeong
    • Journal of Navigation and Port Research
    • /
    • v.33 no.6
    • /
    • pp.423-428
    • /
    • 2009
  • Recently, the marine traffics have been increased along with enlargement of overseas commerce. Increasing the marine traffic may make higher the risk of marine accidents. Especially, the rate of accidents on costal area are more frequently. As if the marine safety information can be afforded to vessel and shore, the accident rate would be down. AIS AtoN is the navigational safety support device which is subject to functional requirements of IALA and technical standards of ITU. In this paper, we extend and implement the user-defined specification of AIS AtoN with message 21 for AIS basic information, messsage 6 for status report and message 12/14 for safety management.

A Lightweight HL7 Message Strategy for Real-Time ECG Monitoring (실시간 심전도 모니터링을 위한 HL7 메시지 간소화 전략)

  • Lee, Kuyeon;Kang, Kyungtae;Lee, Jaemyoun;Park, Juyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.183-191
    • /
    • 2015
  • Recent developments in IT have made real-time ECG monitoring possible, and this represents a promising application for the emerging HL7 standard for the exchange of clinical information. However, applying the HL7 standard directly to real-time ECG monitoring causes problems, because the partial duplication of data within an HL7 message increases the amount of data to be transmitted, and the time taken to process it. We reduce these overheads by Feature Scaling, by standardizing the range of independent variables or features of data, while nevertheless generating HL7-compliant messages. We also use a De-Duplication algorithm to eliminate the partial repetition of the OBX field in an HL7 ORU message. Our strategy shortens the time required to create messages by 51%, and reduces the size of messages by 1/8, compared to naive HL7 coding.

Analysis of Homomorphic Authenticated Encryption (Encrypt with Authenticate Construction) (결합 준동형 인증 암호의 안전성 분석)

  • Kim, Jinsu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.33-44
    • /
    • 2021
  • Data outsourcing utilizing the Cloud faces a problem of the third-party exposure, modulation, and reliability for the provided computational delegation results. In order to solve those problematic security issues, homomorphic encryption(HE) which executes calculation and analysis on encrypted data becomes popular. By extension, a new type of HE with a authentication functionality, homomorphic authenticated encryption(HAE) is suggested. However, a research on the HAE is on the initial stage. Furthermore, based on a message authenticated scheme with HE, the method and analysis to design is still absent. This paper aims to analyze an HAE, with a generic combination of a message authenticated scheme and a HE, known as "Encrypt with Authentication". Following a series of analysis, we show that by adopting a unforgeable message authenticated scheme, the generically constructed HAE demonstrated an unforgeability as well. Though, a strong unforgeability is not the case. This paper concludes that although indistinguishable HE can be applied to design the HAE, a security issue on the possibility of indistinguishability is still not satisfied.

Public Key Encryption with Equality Test with Designated Tester (고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템)

  • Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.3-13
    • /
    • 2011
  • In 2004, Boneh et.al. proposed a public key encryption with keyword search (PEKS) scheme which enables a server to test whether a keyword used in generating a ciphertext by a sender is identical to a keyword used in generating a query by a receiver or not. Yang et. al. proposed a probabilistic public key encryption with equality test (PEET) scheme which enables to test whether one message of ciphertext generated by one public key is identical to the other message generated by the other public key or not. If the message is replaced to a keyword, PEET is not secure against keyword guessing attacks and does not satisfy IND-CP A security which is generally considered in searchable encryption schemes. In this paper, we propose a public key encryption with equality test with designated tester (dPEET) which is secure against keyword guessing attacks and achieves IND-CPA security.

The Design and Implementation of Automatic Communication System using Mobile Instant Messenger (모바일 인스턴스 메신저를 활용한 자동화 커뮤니케이션 시스템 설계 및 구현)

  • Kim, Tae Yeol;Lee, Dae Sik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.11-21
    • /
    • 2014
  • In this paper, concerning the various advertising and policy advertising of the election with respect to whether to deliver a message to a large number of people, we design and implement an automative system what enables sending the text messages directly from the server to the client and also fast feedback is enabled by utilizing a number of operational programs to connect to the server. Therefore, we design and implement the automative communication system which enables delivering message to each user mobile terminal from a plurality of relay mobile terminals by utilizing the mobile instant messenger, not to deliver a message from the server to the mobile instant messenger user directly. In result of comparative analysis on the number of times of data transmission, this automative communication system utilizing mobile instant messenger shows the result that it enables transmitting five times per minute as it can copy and paste in the automation system regardless of the size of the data loading, otherwise in case of transmitting manually it show the result that the number of times of data transmission is reduced if the size of the data is larger.