• Title/Summary/Keyword: Timely message

Search Result 22, Processing Time 0.024 seconds

Service Trends by Country in Geography-based Public Warning Using Commercial Mobile Network (이동통신망을 이용한 지리 기반 재난경보서비스의 국가별 동향 분석)

  • H.J. Kang;S.L. Ju;S.H. Oh;W.S. Jung
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.3
    • /
    • pp.66-77
    • /
    • 2023
  • Governments intend to use the public warning system to deliver timely and accurate information using accessible communication technologies for protecting the population and reducing damage to life and property. In particular, many countries implement system interworking with smartphones to notify of disasters or emergencies. In Korea, since 2020, due to the influence of the coronavirus disease, frequent emergency text messages led people to turn off related notifications, and complaints for receiving irrelevant messages from nearby warning areas have increased. Therefore, technical improvements for issuing more accurate disaster information to a specific region should be devised through a geography-based emergency disaster message transmission service. We analyze development trends of public warning systems and service cases of geography-based emergency text transmission services in various countries.

High Level Approach Programming in Real Time Distributed Network System

  • Jeong, Chan-Joo;Kim, Gwang-Jun;Lee, Joon;Nam, Ki-Hwan;Bae, Chul-Soo
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1105-1108
    • /
    • 2002
  • Real-time(RT) object-oriented(OO) distributed computing is a form of RT distributed computing realized with a distributed computer system structured in the form of an object network. Several approached proposed in recent years for extending the conventional object structuring scheme to suit RT applications, are briefly reviewed. Then the approach named the TMO(Time-triggered Message-triggered Object)structuring scheme was formulated with the goal of instigating a quantum productivity jump in the design of distributed time triggered simulation. The TMO scheme is intended to facilitate the pursuit of a new paradigm in designing distributed time triggered simulation which is to realize real-time computing with a common and general design style that does not alienate the main-stream computing industry and yet to allow system engineers to confidently produce certifiable distributed time tiggered simulation for safety-critical applications. The TMO structuring scheme is a syntactically simple but semantically powerful extension of the conventional object structuring approached and as such, its support tools can be based on various well-established OO programming languages such as C++ and on ubiquitous commercial RT operating system kernels. The Scheme enables a great reduction of the designers efforts in guaranteeing timely service capabilities of application systems.

  • PDF

A Semantics Analysis in the Net Arts fran a Cybernetics Perspective (사이버네틱스 관점에서 본 넷 아트에 나타난 의미론적 분석)

  • Eun, Chang Ik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.123-136
    • /
    • 2011
  • Arts gains a new relation as the new academic area that deals with living organisms and through this technology, it affects everything, such as the body, entity, consciousness and unconsciousness to bring an overall change. Based on this premise, arts require a different interpretation from the previous product-focused interpretation or the analysis focusing on the aesthetics. As the result of arts using the scientific methods, I examined the changes of the arts semantics and how it evolved with what kind of contents and characteristics. The net art with the internet base also form a close relationship with the social and cultural codes. In categorizing the social issues and the topical discussions with semantic factors that evolve from the digital biological perspective, it can be divided into four types of complex interaction, positive feedback negative feedback, and amplification of unsettledness. Based on the characteristics of the multimedia and the interactive reaction, the technique and the imagery amplify the message through a spatial and timely meeting in a mutual repletion. In other words, the emotional communication is used to attempt the messages from the products and the expression in various methods.

A Proposal of Time Synchronization amongst Wireless Sensors for Ship Diagnosis and Maintenance Supporting (선박의 진단 및 정비를 위해 사용되는 무선 센서 간 효율적인 시간동기 알고리즘 제안)

  • Kim, Byoung-Kug
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.4
    • /
    • pp.267-272
    • /
    • 2020
  • In order to monitor in large area of a ship without any concerns of spacial environments, there can be the use of many sensors that support wireless network technologies. Through the deployment of the wireless sensors and their autonomous network formations, the status of a ship can be easily monitored in real time. Moreover, if all the sensors are timely synchronized with each other, the locations and the moving directions of certain events can be estimated. Thus, the time synchronization amongst wireless sensors are crucial. In this paper, we propose an algorithm which supports reduced message transmissions between the sensors for synchronization.

Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message (무장데이터링크 메시지를 이용한 기동표적 타격평가 연구)

  • Baek, Inhye;Woo, Sang Hyo;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.187-196
    • /
    • 2021
  • The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.

Integrity, Orbit Determination and Time Synchronisation Algorithms for Galileo

  • Merino, M.M. Romay;Medel, C. Hernandez;Piedelobo, J.R. Martin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.9-14
    • /
    • 2006
  • Galileo is the European Global Navigation Satellite System, under civilian control, and consists on a constellation of medium Earth orbit satellites and its associated ground infrastructure. Galileo will provide to their users highly accurate global positioning services and their associated integrity information. The elements in charge of the computation of Galileo navigation and integrity information are the OSPF (Orbit Synchronization Processing Facility) and IPF (Integrity Processing Facility), within the Galileo Ground Mission Segment (GMS). Navigation algorithms play a key role in the provision of the Galileo Mission, since they are responsible for computing the essential information the users need to calculate their position: the satellite ephemeris and clock offsets. Such information is generated in the Galileo Ground Mission Segment and broadcast by the satellites within the navigation signal, together with the expected a-priori accuracy (SISA: Signal-In-Space Accuracy), which is the parameter that in fault-free conditions makes the overbounding the predicted ephemeris and clock model errors for the Worst User Location. In parallel, the integrity algorithms of the GMS are responsible of providing a real-time monitoring of the satellite status with timely alarm messages in case of failures. The accuracy of the integrity monitoring system is characterized by the SISMA (Signal In Space Monitoring Accuracy), which is also broadcast to the users through the integrity message.

  • PDF

A Comparative Case Study of Factors Determining Documentary Films' Success :Focusing on "My Love, Don't Cross That River" and "Two Doors" (다큐멘터리영화의 성공을 결정짓는 요인에 관한 비교사례연구 -<님아, 그 강을 건너지 마오>와 <두 개의 문>을 중심으로)

  • Im, So-Yeon;Lee, Yun-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.503-517
    • /
    • 2017
  • After a few recent documentary films had commercial success, factors for their success are getting attention. This paper explores the factors of the financial success of two documentary films. "My Love, Don't Cross That River" gained extended popularity with its universal message, and "Two Doors" conveyed a poweful political message. This paper conducted a case study by inteviewing production directors and distribution managers. Analysis was based on the three categories suggested by Litman and Kohl(1989): creative sphere, distribution-scheduling release pattern, and marketing efforts. Findings present the common factors of the two movies' success in the following areas: persons and events showing a powerful reality, a message with new and fresh insight, artistic quality, distribution strategy with timely scheduling, release time (period), public relations, and advertising.. In addition, "My Love, Don't Cross That River" was helped by a sufficient budget for scheduling/releasing and advertising. Its wide-release stratergy worked as well. "Two Doors" was aided by the government support for release and by the special factor called 'Participating viewer'. By examining the factors of documentary films' commercial success, this study has an implication for the popularization of documentary movies by indicating how to strategically apply relevant factors.

Optimization of Fugitive Dust Control System for Meteorological Conditions (기상조건별 비산먼지 관리체계 최적화 연구)

  • Kim Hyun-Goo
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.21 no.6
    • /
    • pp.573-583
    • /
    • 2005
  • Fugitive dust, which is emitted in the ambient air without first passing through a stack or duct designed to control flow, is frequently generated by means of wind erosion from storage yards at Pohang Steel Wokrs. The size distribution of fugitive dust is mostly in the range of coarse particulate which is deposited as soon as emitted and less harm to human health; however $20\%$ of fugitive dust contains PM 10 known as one of most harmful airborne pollutant. Consequently, effective control and reduction of fugitive dust is strongly requested by the local society, but it is not easy so far because the generation and dispersion of fugitive dust highly depends on meteorological conditions, and it being occurred for irregularity. This research presented a fugitive dust control system for each meteorological condition by providing statistical prediction data obtained from a statistical analysis on the probability of generating the threshold velocity at which the fugitive dust begins to occur, and the frequency occurring by season and by time of the wind direction that can generate atmospheric pollution when the dispersed dust spreads to adjacent residential areas. The research also built a fugitive dust detection system which monitors the weather conditions surrounding storage yards and the changes in air quality on a real-time basis and issues a warning message by identifying a situation where the fugitive dust disperses outside the site boundary line so that appropriate measures can be taken on a timely basis. Furthermore, in respect to the spraying of water to prevent the generation of fugitive dust from the storage piles at the storage yard, an advanced statistical meteorological analysis on the weather conditions in Pohang area and a case study of fugitive dust dispersion toward outside of working field during $2002\∼2003$ were carried out in order to decide an optimal water-spraying time and the number of spraying that can prevent the origin of fugitive dust emission. The results of this research are expected to create extremely significant effects in improving surrounding environment through actual reduction of the fugitive dust produced from the storage yard of Pohang Steel Works by providing a high-tech warning system capable of constantly monitoring the leakage of fugitive dust and water-spray guidance that can maximize the water-spraying effects.

The XP-table: Runtime-efficient Region-based Structure for Collective Evaluation of Multiple Continuous XPath Queries (The XP-table: 다중 연속 XPath 질의의 집단 처리를 위한 실행시간 효율적인 영역 기반 구조체)

  • Lee, Hyun-Ho;Lee, Won-Suk
    • Journal of KIISE:Databases
    • /
    • v.35 no.4
    • /
    • pp.307-318
    • /
    • 2008
  • One of the primary issues confronting XML message brokers is the difficulty associated with processing a large set of continuous XPath queries over incoming XML seams. This paper proposes a novel system designed to present an effective solution to this problem. The proposed system transforms multiple XPath queries before their run-time into a new region-based data structure, called an XP-table, by sharing their common constraints. An XP-table is matched with a stream relation (SR) transformed from a target XML stream by a SAX parser. This arrangement is intended to minimize the runtime workload of continuous query processing. Also, system performance is estimated and verified through a variety of experiments, including comparisons with previous approaches such as YFilter and LazyDFA. The proposed system is practically linear- scalable and stable for evaluating a set of XPath queries in a continuous and timely fashion.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.