• Title/Summary/Keyword: Message-In-Message

Search Result 4,408, Processing Time 0.032 seconds

Connection Frequency Buffer Aware Routing Protocol for Delay Tolerant Network

  • Ayub, Qaisar;Mohd Zahid, M. Soperi;Abdullah, Abdul Hanan;Rashid, Sulma
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.649-657
    • /
    • 2013
  • DTN flooding based routing protocol replicate the message copy to increase the delivery like hood that overloads the network resources. The probabilistic routing protocols reduce replication cost by forwarding the message to a node that holds high predictability value to meet its destination. However, the network traffic converges to high probable nodes and produce congestion that triggers the drop of previously stored messages. In this paper, we have proposed a routing protocol called as Connection frequency Buffer Aware Routing Protocol (CFBARP) that uses an adaptive method to maintain the information about the available buffer space at the receiver before message transmission. Furthermore, a frequency based method has been employed to determine the connection recurrence among nodes. The proposed strategy has performed well in terms of reducing message drop, message relay while increases the delivery probability.

Designing and Implementing Message Broker System based on SOAP (SOAP 기반의 메시지 Broker 시스템 설계 및 구현)

  • 김용수;주경수
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1071-1078
    • /
    • 2003
  • SOAP is a protocol used for information exchange in distributed computing environment and SOAP defines mechanisms for message transferring between distributed system and remote procedure call/response process. This SOAP is able to be used independently on operating systems and program languages because it uses only a text-based XML for protocol. Therefor ebXML that is a standard for E-Commerce adopts SOAP for message exchange. In this paper, we developed Message Broker System based on SOAP. By this Message Broker System we can more easily exchange messages for B2B. Accordingly we can manage and integrate a lots of business partners.

  • PDF

The Effects of a Hepatitis Education Program according to Message Frames (메시지 유형에 따른 A형 간염 예방교육 프로그램의 효과)

  • Park, Ju-Young;Woo, Chung-Hee
    • Journal of muscle and joint health
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • Purpose: This study was examined the effects of a hepatitis A education on attitude, vaccination intention, and preventive behavior. Methods: Eighty-eight college students at two universities participated in this study. The data were collected from August 29 to September 30 in 2011 and were analyzed using descriptive statistics, t-test, and ${\chi}^2$ test. Results: There were no significant differences of preventive behavior of hepatitis A between the positive and negative message groups (t=1.10, p=.499). However, the negative message group had a significantly higher attitude of preventive behavior (t=0.92, p=.049) and vaccination intention (${\chi}^2$=5.43, p=.039) than the positive message group. Conclusion: This study demonstrates that negatively framed messages are effective on increasing the attitude, vaccination intention, and preventive behavior.

A Study of the Message Protocols Technologies in M2M Platforms (사물통신에서 메시지 프로토콜 기술 연구)

  • Lee, Chang-Yeol;Hong, Han-Kuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.53-61
    • /
    • 2010
  • M2M Platform is the future ubiquitous network technologies which provide the integrated service with the networks and devices. It requires the standardized message protocols among the sensor applications. In this study, we developed the message protocols that support the data abstraction and interoperability among application systems with characteristics of sensor systems. The message protocols consist of the data representation formats and data exchange functions.

Transient Alert Message Processing System for the LSST era

  • Shin, Min-Su
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.71.2-71.2
    • /
    • 2019
  • We have developed and tested a prototype system to process transient alert messages from the currently working facilities such as Gaia and GCN notices. Our experiments with the prototype focus on developing a platform that can be used in the LSST era with about 10 million alerts per night and helping Korean community members with the automated processing environment to provide auxiliary information for every alert message. The system consists of a message broker implemented by Redis and multiple message subscribers specialized for specific scientific interests. The current implementation of the entire system allows new Korean members to adopt their own processing chains receiving the messages from our local broker. We welcome experimental ideas and opinions from the Korean community about the current message processing system. We plan to test the current system with the ZTF alerts in the near future.

  • PDF

A study of Web Service Security System using the Secure Network Transfer Message (안전한 네트워크 전송 메시지를 이용한 웹 서비스 보안 시스템에 관한 연구)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.850-853
    • /
    • 2008
  • As th Internet grew rapidly, the Electronic Commerce that is based on Internet increased. The Electronic Commerce is unsubstantial in the mutual authentication between the parties and a commerce As a solution to this issue, a Web server uses a Client Message technology. The purpose of Client Message is to validate the user and the electronic commercial transaction. Further, it increases efficiency and offers several ability at various purposes. However, the Client Message is transferred and stored as an unencrypted text file, the information can be exposed easily to the network threats, end system threats, and Client Message harvesting threats. In this paper designed by used crypto algorithm a Secure Message as a solution to the issue have proposed above. Further, designed a security service per Network transmitting message to transfer client's user input information to a Web server safety.

  • PDF

A Message Schedulability Analysis using an Improved EDF Scheduling for Distributed Real-Time Systems (분산 실시간 시스템에서 개선된 EDF 정책을 사용한 메시지 스케줄가능성 분석)

  • Lee, Eun-Mi;Heu, Shin
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.9
    • /
    • pp.520-529
    • /
    • 2002
  • This paper presents an approach for scheduling network messages with real-time dynamic algorithms. We present the method that calculates an intermediate relative deadline of the message based on the EDF(Earliest Deadline First) scheduling policy. We adjust the slack of message by using this intermediate relative deadline to allocate a priority of message. The priority of the message can be determined accurately by using the slack that calculates in our approach, which increases the schedulability efficiency of the message. As a result, we reduce the worst-case response time and improve the guarantee ratio of real-time messages. Also, we describe the analysis method to check the schedulability on message sets, and show the efficiency of our approach by comparing the results of the DM(Deadline Monotonic) approach and the existing EDF approach with that of the improved EDF in our approach through the simulation.

Remote Procedure Call Scheme to Support Fault-Tolerance (결함 허용을 제공하는 원격 프로시듀어 호출 기법)

  • Han, Suk-Jin;Koo, Yong-Wan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.453-465
    • /
    • 1995
  • RPC(Remote Procedure Call) has been studied for programmer to easily write distributed program of little bit higher efficiency and reliability. In this study, fault-tolerant remote procedure call for hardware failures is proposed. Fault-tolerance is supplied by replicated procedures with node group, so called chain, and copies along chains are linearly ordered. Calls for procedure are sent to primary copy along chains, and other copies are propagated internally. If failures happen, first copy in faultless chain returns the result to the caller, Especially, in this study processing of redundant call message and result message, while using limited ack message, are avoided. This method supplies efficient and reliable fault-tolerance compared with existing remote procedure call.

  • PDF

Design and evaluation of an alert message dissemination algorithm using fuzzy logic for VANETs

  • Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.4
    • /
    • pp.783-793
    • /
    • 2010
  • Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. We present a fuzzy alert message dissemination algorithm to improve performance for road safety alert application in Vehicular Ad-hoc Network (VANET). In the proposed algorithm, when a vehicle receives an alert message for the first time, the vehicle rebroadcasts the alert message according to the fuzzy control rules for rebroadcast degree, where the rebroadcast degree depends on the current traffic density of the road and the distance between source vehicle and destination vehicle. Also, the proposed algorithm is the hybrid algorithm that uses broadcast protocol together with token protocol according to traffic density. The performance of the proposed algorithm is evaluated through simulation and compared with that of other alert message dissemination algorithms.

A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security (물리 계층에서 보안 재밍 신호 공유의 한계점과 이진 재밍 메시지 도청의 해결책)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.63-67
    • /
    • 2014
  • A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.