• Title/Summary/Keyword: Message Flow

Search Result 158, Processing Time 0.027 seconds

Flow Holding Time based Advanced Hybrid QoS Routing Link State Update in QoS Routing

  • Cho, Kang Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • In this paper, we propose a AH LSU(Advanced Hybrid QoS Routing Link State Update) Algorithm that improves the performance of Hybrid LSU(Hybrid QoS Link State State Update) Algorithm with statistical information of flow holding time in network. AH LSU algorithm has had both advantages of LSU message control in periodic QoS routing LSU algorithm and QoS routing performance in adaptive LSU algorithm. It has the mechanism that calculate LSU message transmission priority using the flow of statistical request bandwidth and available bandwidth and include MLMR(Meaningless LSU Message Removal) mechanism. MLMR mechanism can remove the meaningless LSU message generating repeatedly in short time. We have evaluated the performance of the MLMR mechanism, the proposed algorithm and the existing algorithms on MCI simulation network. We use the performance metric as the QoS routing blocking rate and the mean update rate per link, it thus appears that we have verified the performance of this algorithm.

The Practical Use of Un Standard Message for cargo flow EDI (물류EDI 표준메세지 이용 방안)

  • 박남규;이태우
    • Journal of the Korean Institute of Navigation
    • /
    • v.17 no.2
    • /
    • pp.57-73
    • /
    • 1993
  • Subject : The Practical Use of UN Standard Message for cargo flow EDI Writer : Park, Nam Kyu and Lee, Tae Woo It's necessary to prepare standard message which is agreed on among trading partners for EDI in container transport industry. Now KMPA is carrying out the EDI Project for establishing Korea Logistics Network. It is important to make standard message of documents using in transport industry to succesfully accomodate EDI. The objective of this study is to find out the method of UN standard message utility in Korea. For this study, the UN message guideline is primarily reviewed, and the process that Shipping Request being used in Hanjin Shipping Co. Ltd. is applied to UNSMs as case study. Generally the data format of EDIFACT is so complex and broad for inter-industry standard that the abstract of data format is usually used. Therefore, it is necessary to make the subset of standard message for Shipping Request in ocean industry. In the result of this study, that the ocean industry can use the subset of IFTMBF for Shipping Request is proved, and the subset is suggested. This thesis will contribute toward showing the practical way of standardrization of 350 documents using in trade, customs and transport sectors.

  • PDF

A Study on the Dependence of Mobile Instant Messenger (모바일 인스턴트 메신저 의존도에 관한 연구)

  • Kim, Jae-Jon;Lee, Yunhee;Nho, Hee-Ock;Park, Kyung-Ja
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.225-246
    • /
    • 2014
  • With the recent establishment of a ubiquitous environment and the paradigm shift to a smart society, the use of mobile devices, such as smart phones and tablet PCs, has become widespread. Thus, the trend is gradually shifting from using Web-based Instant Messenger to using Mobile-based Instant Messenger. Mobile Instant Messenger refers to a service that allows instant messaging as well as data sending and receiving between individuals with exclusive application programs(mobile Apps), which can be used in portable devices-such as smart phones-with wireless Internet access. Korea's portal sites, telecommunication companies, and even big companies have all rushed into the MIM market to join the competition. The reason so many companies are showing interest in the MIM business is because it is rising as a core platform to substitute portal sites in the mobile society, and MIM is perceived as the best means to attract and secure users. The intention to reuse or use continually was considered an important factor in maintaining a dominant position amidst such fierce competition, and consequently, most research thus far has reflected such thought. However, the frequent or long-term use of a system alone cannot indicate the definite success of the system, nor guarantee its dominant position in the market. On the contrary, MIM dependence, which goes beyond simple repetitive use and indicates a state where users actually or emotionally depend on a specific system, can better explain the user action. However, not much research has been conducted on dependence. The research results showed that lively message, concise message, message responsiveness, and social belonging significantly affected perceived usefulness. Message responsiveness, Link, and social belonging significantly affected flow. Flow significantly affected MIM dependence, and perceived usefulness did not affect MIM dependence. This study has proven that lively message, concise message, message responsiveness, Link, social belonging and perceived usefulness are important antecedents and mediating factors of MIM dependence. Moreover, this study is significant in that it explains the overall process of MIM dependence, and expands on the variety and scope of research that can be applied to MIM-related studies.

Security Analysis of MAC Algorithm using Block Cipher (블록 암호 알고리즘을 애용한 MAC 분석)

  • Seo Chang-Ho;Yun Bo-Hyun;Maeng Sung-Reol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.39-47
    • /
    • 2005
  • This paper proposes and analyzes the MAC(Message Authentication Code) algorithm that is used for the transition integrity and the entity authentication of message. The MAC algorithm uses the DES algorithm which has 64-bit block and 56-bit key and we compare the security according to 64-bit and 32-bit length of MAC value. Moreover, we use the SEED algorithm which has 128-bit block and 128-bit key and compare the security according to 128-bit and 64-bit length of MAC value. We analyze the security the forgery attack according to length of message and length of MAC value. this paper, a coarse-to-fine optical flow detection method is proposed. Provided that optical flow gives reliable approximation to two-dimensional image motion, it can be used to recover the three-dimensional motion. but usually to get the reliable optical flows are difficult. The proposed algorithm uses Horn's algorithm (or detecting initial optical flow, then Thin Plate Spline is introduced to warp a image frame of the initial optical flow to the next image frame. The optical flow for the warped image frame is again used iteratively until the mean square error between two image sequence frames is lowered. The proposed method is experimented for the real moving Picture image sequence. The proposed algorithm gives dense optical flow vectors.

  • PDF

A Study for Aerodynamic Drag Reduction on Variable Message Sign using Flow Analysis (유동해석 기반 도로전광표지 공기저항 저감 구조 연구)

  • Lim, Se-Mi;Song, Dae-Young;Park, Kyeung-U;Park, Jun-Seok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.6
    • /
    • pp.140-146
    • /
    • 2011
  • As the demand of Variable Message Sign(VMS) has become pervasive in fulfilling the ITS policy, the costs of maintaining the Variable Message Sign operation have also increased. This paper proposes the U-curved figure, the C-curved figure and the ventilated figure type for aerodynamic drag reduction on Variable Message Sign and shows the analysis of aerodynamic drag effects using Flow Analysis. As a results of the flow analysis for right-angled, 45 degrees from side to side and 45 degrees from up or down, the C-curved figure and the ventilated figure type show about 30% aerodynamic drag reduction in all direction. And the U-curved figure type shows vivid aerodynamic drag reduction for right-angled and 45 degree from side to side, but trivial aerodynamic drag reduction for 45 degree from up or down. It is possible to reduce not only the damage on Variable Message Sign due to typhoon because of the aerodynamic drag reduction, but also installation constraints because of lighter Variable Message Sign support structure by appling the proposed structure and analysis in this paper.

An Adaptive Message-Passing System for ATM-Based Wide-Area Clusters

  • Park, Sung-Yong
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.403-407
    • /
    • 1999
  • In this paper we present an architecture, implementation, and performance evaluation of an adaptive communication system (ACS) for wide-area ATM clusters. Our approach capitalizes on thread-based programming model to overlap computation and communication and develop a dynamic message-passing environment with separate data and control paths. This leads to a flexible and adaptive message-passing environment that can support multiple flow control, error control, and multicasting algorithms. We show the performance of ACS applications and compare them with p4, PVM, and MPI applications.

  • PDF

Reliable Message Routing Protocol for Periodic Messages on Wireless Sensor Networks (무선센서 네트워크에서 주기적 메시지에 대해 신뢰성 있는 메시지 전송을 위한 라우팅 프로토콜)

  • Ngo, Hoai Phong;Kim, Myung-Kyun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.2
    • /
    • pp.190-197
    • /
    • 2011
  • In industrial distributed control systems, sensors collect data from the physical environment periodically and transmit them to the actuators, which process the control operations based on the received data. For the effective operation of the control systems, the data transmitted by the sensors has to be delivered to the actuators reliably within the deadline, and if the message reception rate of the actuators becomes lower than a threshold, then the performance of the control systems drops greatly. This paper suggests a message routing protocol to transmit periodic messages reliably in a distributed control system based on wireless sensor networks. For reliable message transmission, the proposed protocol selects a routing path whose end-to-end message reception rate is the highest before transmitting data messages. The proposed protocol has the capability of maintaining a target message reception rate for each flow. To maintain the required target reception rate, each destination monitors the actual message reception rate periodically and transmits a feedback message to the source if it drops below the target reception rate. On receiving the feedback message, the source tries to find a new path which can satisfy the target rate. The performance of the proposed protocol has been evaluated using simulation and compared with other protocols in terms of the message reception rate, the message delay and delay jitter, and so on. The simulation results show that the proposed protocol has a higher message reception rate and comparable message delay and delay jitter to other protocols. The simulation results also show that the proposed protocol has an ability to adapt well to the dynamic network traffic change.

NUMERICAL ANALYSIS OF THREE-DIMENSIONAL SUBSONIC TURBULENT CAVITY FLOWS (3차원 아음속 난류 공동 유동에 대한 수치적 연구)

  • Choi, Hong-Il;Kim, Jae-Soo
    • Journal of computational fluids engineering
    • /
    • v.13 no.1
    • /
    • pp.35-40
    • /
    • 2008
  • Generally flight vehicles have many cavities such as wheel wells, bomb bays and windows on their external surfaces and the flow around these cavities makes separation, vortex, shock and expansion waves, reattachment and other complex flow phenomenon. The flow around the cavity makes abnormal and three-dimensional noise and vibration even thought the aspect ratio (L/D) is small. The cavity giving large effects to the flow might make large noise, cause structural damage or breakage, harm the aerodynamic performance and stability, or damage the sensitive devices. In this study, numerical analysis was performed for cavity flows by the unsteady compressible three dimensional Reynolds-Averaged Navier-Stokes (RANS) equations with Wilcox's $\kappa-\omega$ turbulence model. The MPI(Message Passing Interface) parallelized code was used for calculations by PC-cluster. The cavity has the aspect ratios of 2.5, 3.5 and 4.5 with the W/D ratio of 2 for three-dimensional cavities. The Sound Pressure Level (SPL) analysis was done with FFT to check the dominant frequency of the cavity flow. The dominant frequencies were analyzed and compared with the results of Rossiter's formula and Ahuja& Mendoza's experimental datum.

A Variability Design and Customization Technique of Message Flow for Improving Generality (범용성 향상을 위한 메시지 흐름 가변성 설계 및 특화 기법)

  • Cho, Eun-Sook;Kim, Chul-Jin
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.115-127
    • /
    • 2008
  • The component for satisfying several domain requirements must be developed to support variety. But, when the application is developed using the component, it happens other requirements. So, it is difficult to design component to satisfy severaldomain requirements. Also, it is impossible to support the special business logic. As this problem, the component must provide to the white-box component, it is not the black-box component. So, in this paper, we propose the variability design technique and the customization technique using the design technique that can support the various requirements. This technique is not focus on designing the component to analyze various domains. The variability of the component is designed to the initial variability in the component development phase and we use the customization technique for applying the variability to developing application. The variability can be re-designed during developing the application to use the component applying the variability. The variability of the component is evolved and the generation of the component is increased via the iteration Generally, the range of the component variability is classified the function modification within the component and the component internal structure modification as requirements in the component outside. As the range of the variability, we propose the variability design technique of the behavior and the message flow. This paper proposes a message flow design technique for modifying function call.

  • PDF