• Title/Summary/Keyword: message design

Search Result 1,115, Processing Time 0.028 seconds

Object Oriented Real Time Distributed Programming and Time-triggered Message-triggered Object(TMO) Scheme

  • Kim, Gwang-Jun;Ra, Sang-Dong;Bae, Chul-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10A
    • /
    • pp.990-999
    • /
    • 2002
  • The object-oriented(OO) distributed real-time(RT) programming movement started in 1990's and is growing rapidly at this turn of the century. Distributed real-time simulation is a field in its infancy but it is bounded to receive steadily growing recognition for its importance and wide applicability. The scheme is called the distributed time-triggered simulation scheme which is conceptually simple and easy to use but widely applicable. A new generation object oriented(OO) RT programming scheme is called the time-triggered message triggered object(TMO) programming scheme and it is used to make specific illustrations of the issues. The TMO structuring scheme is a general-style components structuring scheme and supports design of all types of component including hard real time objects and non real time objects within one general structure.

The Forwarding Channel of a BTS in IS-95 CDMA Cellular Network

  • Kwag, Min-kok;Jung, Duk-in;Shin, In-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.990-994
    • /
    • 2000
  • The design of LAI(Local Area Identifier), the first paging area for searching the mobile terminal has a close relation with the performance of paging channel in CDMA cellular network. This paper discusses the performance of the forward channel of IS-95 CDMA standard, known as the paging through the related messages such as call control message, channel assignment message. Modeling and simulation work were conducted to quantify the performance of paging channel in terms of traffic handling capacity and blocking levels. This result serves as illustrative guidelines for the proper engineering of common control channel, which has a major impact on the overall performance of cellular network.

  • PDF

Design and Implementation about Trust Evaluation Mechanism of Distributed Services In Mobile Ad-hoc Network (Mobile Ad-hoc Network 상의 분산된 서비스에 대한 신뢰도 평가 기법 설계 및 구현)

  • Jang, Jong-Deok;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.29-34
    • /
    • 2009
  • The many transaction occurs because of service will not be able to trust in mobile Ad-hoc Network. Overcomes like this problem point with the plan for, This paper proposes the trust evaluation mechanism which is the possibility becoming the standard of the node selection which provides a better service by using the transaction message which is basic occurs from within the mobile Ad-hoc network and in the transaction message which is additional. At last, this paper embodies the trust mechanism which proposes, confirms the trust value which is evaluated with NS2 simulator.

  • PDF

The Design Of Improved Information Security System based on SSL(Secure Socket Layer) For Providing Secure Communication Services (안전한 통신 서비스를 제공하는 향상된 SSL(Secure Socket Layer) 기반 정보보호 시스템의 설계)

  • 유성진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1387-1394
    • /
    • 2000
  • The SSL(Secure Socket Layer) protocol is one of the mechanism widely used in the recent network system. The improved information security mechanism based on the SSL is designed in this paper. There are important four information security services. The first is the authentication service using the Certificate offered from the SSL(Secure Socket Layer), the second is the message confidentiality service using the DES encryption algorithm, the third is the message integrity service using Hash function, and the fourth is Non-repudiation service. Therefore, information could be transferred securely under the information security mechanism including Non-repudiation service especially designed in this paper.

  • PDF

Development of ICPL for Heterarchical SFCS (Heterarchical SFCS를 위한 ICPL 개발에 관한 연구)

  • Kwon, Sung-Pil;Cho, Hyun-Bo;Jung, Moo-Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.25 no.2
    • /
    • pp.150-161
    • /
    • 1999
  • This paper deals with the design and development of a real-time integrated communication architecture for heterarchical SFCS(Shop Floor Control System). In autonomous agent-based heterarchical SFCS, each functional unit of parts and resources is equipped with an intelligent controller (agent) that acts as the representative of the entity. The controllers communicate and negotiate with other controllers on a real-time basis through message passing and bidding protocol to achieve mutual agreements for task sharing. ICPL(Integrated Communication Protocol and Language) is proposed for this purpose. ICPL is a language and a protocol for supporting communication among intelligent controllers. Based on the speech act theory, this paper proposes a semantic description for ICPL that associates the description of the cognitive states of controllers with the use of language primitives (message_type). Semantics for the basic set of ICPL messages is described. Eventually, an ICPL-based communication architecture can provide the implementation of the distributed and heterarchical SFCS, and makes the intelligent controller transparent to the negotiation problem.

  • PDF

Design of a IPsec's Message Authentication Module HMAC (HMAC를 이용한 IPsec의 Message Authentication Module 설계)

  • Kim, Yong-Hoon;Ha, Jin-Suk;Lee, Kwang-Youb
    • Annual Conference of KIPS
    • /
    • 2002.04b
    • /
    • pp.813-816
    • /
    • 2002
  • 현재 인터넷은 IPv4(Internetworking Protocol, version 4)를 사용하고 있다. 하지만 데이터 통신은 1970년대에 IPv4가 나온 이래에 발전을 거듭하여 왔다. IPv4는 빠르게 발전하는 인터넷에의 요구를 수용하기 위해 IPv6가 제안되었고 현재 표준이 되었다. IPv6에서는 암호화와 인증옵션들은 패킷의 신뢰성과 무결성을 등을 제공한다. 인터넷에서의 정보보호는 인터넷을 구성하는 여러 계층에서 이루어 질 수 있지만, IPsec에서는 AH(Authentication Header)프로토콜과 IPsec ESP(Encapsulating Security Payload)프로토콜 두 가지의 암호 프로토콜이 사용되지만 AH에서는 HMAC를 이용한 HMAC-MD5나 HMAC-SHA-1 중 하나를 반드시 기본 인증 알고리즘으로 지원하여야 한다. 본 논문에서는 MD5를 이용한 HMAC-MD5를 기준으로 설계하였으며, Iterative Architecture과 Full loop unrolling Architecture의 두 가지 구조를 설계하였다.

  • PDF

Is Augmented Reality Advertising a Cure-all? An Empirical Investigation of the Impact of Innovation Resistance on Augmented Reality Advertising Effectiveness

  • Lee, Heejun;Cho, Chang-Hoan
    • International Journal of Contents
    • /
    • v.15 no.3
    • /
    • pp.21-31
    • /
    • 2019
  • This study employs an experimental design to investigate the conditions under which the use of AR may be particularly effective or rather ineffective in advertising contexts. We first discuss the inconsistent results regarding the effectiveness of AR on advertising message comprehension and argue that these inconsistencies can be at least partly explained by the moderating effect of an individual's resistance to innovation (i.e., AR technologies). We then provide statistically significant interaction effects between ad types (AR-based, traditional 2D) and innovation resistance. Finally, we suggest that the effect of AR on certain variables is constrained or unconstrained by an individual's level of receptivity or resistance to a new technology-based advertising platform, and that flow experience is equivalent regardless of these levels.

A Design of MHS Access Control Policy for Preventing Cascade Vulnerability (캐스케이드 취약성 방지를 위한 MHS 접근통제 정책 설계)

  • 조인준;김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.117-128
    • /
    • 1997
  • When computer systems with mandatory access control mechanism are interconnected each other for enforcing the MHS(Message Handling System) security on the multilevel secure distributed network environment, illegal information flow may occurs due to the unexpected cascade vulnerability problem. In this paper, new MHS security policy and security property functions are proposed for preventing the cascade vulnerability.

A Study on the Speed of Message Output for Smooth Cummunication for Chat Platform between Idol and Fandom (팬덤과 아이돌의 상호 채팅 플랫폼에서 원활한 커뮤니케이션을 위한 메시지 출력 속도에 관한 연구)

  • Jungha Kim
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.68-75
    • /
    • 2023
  • In this study, I would like to conduct a study on the design of chat UX between fandom and idol. The 1:多 form of message exposure method between idols and fandom was studied and the optimal exposure form and speed were tested. Based on the results of the experiment, 30 sentences were selected per second among various options, and based on this, the results were applied to the actual Universe platform to facilitate communication between idols and fans.

Design and Implementation of Companion to Improve Windows Shared Folders (윈도우즈 공유 폴더 기능 향상을 위한 도우미 설계 및 구현)

  • Yoon, Kyung Seob;Lim, Do Yeon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.177-180
    • /
    • 2020
  • 윈도우즈(Windows)에는 서버 메시지 블록(SMB :Server Message Block) 프로토콜을 이용하여 폴더(Folder)를 공유(Share)할 수 있는 기능을 제공 하고 있다. SMB 프로토콜은 네트워크 상 존재하는 노드들 간에 자원을 공유할 수 있도록 설계된 프로토콜이다. 주로 네트워크에 연결된 컴퓨터끼리 파일, 프린터, 포트 또는 기타 메시지를 주고받는데 사용된다. 하지만 이 기능은 대부분 사람들이 잘 알지 못하고 설정 방법을 몰라 사용 하지 않는 경우가 많다. 본 논문에서는 이 공유 폴더 기능을 보다 쉽고 빠르게 설정 할 수 있도록 공유 폴더 기능 향상을 위한 도우미를 설계하고 구현 한다.

  • PDF