• Title/Summary/Keyword: Message Flow

Search Result 158, Processing Time 0.025 seconds

Political Discourse Among Key Twitter Users: The Case Of Sejong City In South Korea

  • Hsu, Chien-leng;Park, Se Jung;Park, Han Woo
    • Journal of Contemporary Eastern Asia
    • /
    • v.12 no.1
    • /
    • pp.65-79
    • /
    • 2013
  • This paper examines communication patterns of key Twitter users by considering the socially and politically controversial Sejong City issue in South Korea. The network and message data were drawn from twtkr.com. Social network-based indicators and visualization methods were used to analyze political discourse among key Twitter users over time and illustrate various types of Tweets by these users and the interconnection between these key users. In addition, the study examines general Twitter users' participation in the discussion on the issue. The results indicate that some Twitter profiles of media outlets tend to be very dominant in terms of their message output, whereas their Tweets are not likely to be circulated by other users. Noteworthy is that Twitter profiles of individuals who are geographically affiliated with the issue are likely to play an important role in the flow of communication.

Parallelization of a Two-Dimensional Navier-Stokes Solver Using Hybrid Meshes (혼합격자를 이용한 2차원 난류 유동장 해석 프로그램의 병렬화)

  • Ok Honam;Park Seung-O
    • 한국전산유체공학회:학술대회논문집
    • /
    • 1999.11a
    • /
    • pp.115-126
    • /
    • 1999
  • A two-dimensional Navier-Stokes solver using hybrid meshes is parallelized with a domain decompostion method. The focus of this paper is placed on minimizing the amount of effort in parallelizing the serial version of the solver, and this is achieved by adding an additional layer of cells to each decomposed domain. Most subroutines of the serial solver are used without modification, and the information exchange between neighboring domains is achieved using MPI(Message Passing Interface) library. Load balancing among the processors and scheduling of the message passing are implemented to reduce the overhead of parallelization, and the speed-up achieved by parallelization is measured on the transonic invisicd and turbulent flow problems. The parallelization efficiencies of the explicit Runge-Kutta scheme and the implicit point-SGS scheme are compared and the effects of various factors on the results are also studied.

  • PDF

A Design of MHS Access Control Policy for Preventing Cascade Vulnerability (캐스케이드 취약성 방지를 위한 MHS 접근통제 정책 설계)

  • 조인준;김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.117-128
    • /
    • 1997
  • When computer systems with mandatory access control mechanism are interconnected each other for enforcing the MHS(Message Handling System) security on the multilevel secure distributed network environment, illegal information flow may occurs due to the unexpected cascade vulnerability problem. In this paper, new MHS security policy and security property functions are proposed for preventing the cascade vulnerability.

A framework for parallel processing in multiblock flow computations (다중블록 유동해석에서 병렬처리를 위한 시스템의 구조)

  • Park, Sang-Geun;Lee, Geon-U
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.21 no.8
    • /
    • pp.1024-1033
    • /
    • 1997
  • The past several years have witnessed an ever-increasing acceptance and adoption of parallel processing, both for high performance scientific computing as well as for more general purpose applications. Furthermore with increasing needs to perform the complex flow calculations in an efficient manner, the use of the message passing model on distributed networks has emerged as an important alternative to the expensive supercomputers. This work attempts to provide a generic framework to enable the parallelization of all CFD-related works using the master-slave model. This framework consists of (1) input geometry, (2) domain decomposition, (3) grid generation, (4) flow computations, (5) flow visualization, and (6) output display as the sequential components, but performs computations for (2) to (5) in parallel on the workstation clustering. The flow computations are parallized by having multiple copies of the flow-code to solve a PDE on different spatial regions on different processors, while their flow data are exchanged across the region boundaries, and the solution is time-stepped. The Parallel Virtual Machine (PVM) is used for distributed communication in this work.

A Study on MMS DRM System (MMS DRM 시스템에 대한 연구)

  • Yang, Dong-Hyuk;Doh, Yang-Hoi;Jwa, Jeong-Woo;Kim, Ho-Chan;Boo, Chang-Jin;Ko, Sung-Taek
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.729-733
    • /
    • 2006
  • Short message service (SMS) is a Popular mobile data service in cellular networks. One SMS message can carry 50 Korean alphabets. Cellular operators standard and develop multimedia message service (MMS) based on P2P as color phones having multimedia solutions such as MIDI, MP3, JPG, PNG, and MPEG have been developed. MMS can be a key cash flow in the non-voice mobile revenue together with SMS. Copyrights protection of contents in a MMS message can be issued as MMS can be the popular P2P service such as MMS. In this paper, we propose MMS DRM system to protect copyrights of contents in MMS with the minimum change of MMS system. The proposed MMS DRM system protect copyrights of contents using DRM Packager, DRM Server, and DRM Agent and support various use cases to activates MMS in mobile networks.

  • PDF

Hybrid Link State Update Algorithm in QoS Routing (하이브리드 QoS 라우팅 링크 상태 갱신 기법)

  • Cho, Kang Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.55-62
    • /
    • 2014
  • This paper has proposed Hybrid QoS Routing Link State Update(LSU) Algorithm that has had a both advantage of LSU message control in periodic QoS routing LSU algorithm and QoS routing performance in adaptive LSU algorithm. Hybrid LSU algorithm can adapt the threshold based network traffic information and has the mechanism that calculate LSU message transmission priority using the flow of statistical request bandwidth and available bandwidth and determine the transmission of the message according to update rate per a unit of time. We have evaluated the performance of the proposed algorithm and the existing algorithms on MCI simulation network using the performance metric as the QoS routing blocking rate and the mean update rate per link, it thus appears that we have verified the performance of this algorithm that it can diminish to 10% of the LSU message count.

Measures to Improve the Efficacy of Road User-Centered VMS Traffic Information Offering (도로이용자 중심의 VMS 교통정보 제공 효용성 향상 방안)

  • Yoon, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.12
    • /
    • pp.190-201
    • /
    • 2021
  • The variable message sign (VMS) is equipment to improve the efficiency of traffic flow and safety of travel by providing real-time information to road users on traffic, road, weather situation, and traffic control due to construction. The information messages of the letter-based VMS taking up most of the VMS on the general national highways consist of section, travel time in sections, and road control situation. This study devised an improvement plan centered on road users, not road managers-centered existing message-based VMS through an analysis of road users' preference targeting the letter-based VMS operated in the general national highways in the Seoul Metropolitan Area. By presenting the measure for system improvement through which information on unexpected situations that road users prefer the most can be quickly and efficiently provided, this study aims to improve the efficiency of road user-centered VMS traffic information.

NUMERICAL ANALYSIS OF TWO- AND THREE-DIMENSIONAL SUBSONIC TURBULENT CAVITY FLOWS (2차원과 3차원 아음속 공동 유동 특성에 대한 수치적 연구)

  • Choi, Hong-Il;Kim, Jae-Soo
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2007.10a
    • /
    • pp.187-193
    • /
    • 2007
  • The flight vehicles have cavities such as wheel wells and bomb bays. The flow around a cavity is characterized as unsteady flow because of the formation and dissipation of vortices due to the interaction between the freestream shear layer and cavity internal flow, the generation of shock and expansion waves. Resonance phenomena can damage the structures around the cavity and negatively affect aerodynamic performance and stability. In the present study, numerical analysis was performed for cavity flows by the unsteady compressible three dimensional Reynolds-Averaged Navier-Stokes (RANS) equations with Wilcox's ${\kappa}\;-\;{\omega}$ turbulence model. The cavity has the aspect ratios of 2.5, 3.5 and 4.5 for two-dimensional case, same aspect ratios with the W/D ratio of 2 for three-dimensional case. The Mach and Reynolds numbers are 0.53 and 1,600,000 respectively. The flow field is observed to oscillate in the "shear layer mode" with a feedback mechanism. Based on the SPL(Sound Pressure Level) analysis of the pressure variation at the cavity trailing edge, the dominant frequency was analyzed and compared with the results of Rossiter's formula. The MPI(Message Passing Interface) parallelized code was used for calculations by PC-cluster.

  • PDF

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.3_4
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

A Numerical Study for the Three-Dimensional Fluid Flow Past Tube Banks and Comparison with PIV Experimental Data

  • Ha, Man-Yeong;Kim, Seung-Hyeon;Kim, Kyung-Chun;Son, Young-Chul
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.12
    • /
    • pp.2236-2249
    • /
    • 2004
  • The analysis for the three-dimensional fluid flow past tube banks arranged in equilateral-triangular form at Re$\_$max/=4,000 is carried out using a large eddy simulation technique. The governing equations for the mass and momentum conservation are discretized using the finite volume method. Parallel computational techniques using MPI (Message Passing Interface) are implemented in the present computer code. The computation time decreases linearly proportional to the number of used CPUs in the present parallel computation. We obtained the time-averaged streamwise and cross-streamwise velocities and turbulent intensities. The present numerical results are compared with the PIV experimental data and agree generally well with the experimental data.