• Title/Summary/Keyword: message design

Search Result 1,115, Processing Time 0.023 seconds

Design and Implementation of Parking Information Support System for Inner Parking Lot Based on Microprocessor (마이크로프로세서 기반의 실내 주차정보 제공 시스템 설계 및 구현)

  • Yoo, Si-On;Oh, Hyoung-Jin;Oh, Kab-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.51-59
    • /
    • 2010
  • Apartment complex, buildings, markets and department stores have inner parking lots which can accept many cars but drivers waste lots of times to find the empty parking spaces in crowding parking lots. In this paper, we proposed the inner parking information support system based on microprocessor which can decrease roaming times to find vacant parking spot in confusing parking lots through notice monitor and provide SMS to make it easy to find parked place. Proposed system consist with RFID system for detecting access of cars, microprocessor system for processing data of checking existence of cars on parking spots and communicating with server, and server system which processes information of cars' in and out, guides empty parking spots and parked location to drivers. Suggested system is realized by handmade model parking lot size of 8 cars, and we confirmed practicality by providing information using parking notice monitor and single message service.

Evaluating the Safety Effects of Dynamic Message in a Work Zone: A Case Study (도로 공사구간 동적표지판 안전효과 평가: 사례 연구)

  • Moon, Jae-Pil;Lee, Suk-Ki;Cho, Jung-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.3
    • /
    • pp.46-57
    • /
    • 2019
  • Generally speeding appeared to be the most contributing factor of fatalities occurred in work zones, and highway agencies in South Korea have concerned of the safety of workers and drivers in the poor circumstances. In this study, a portable variable message signs (PVMS) system as an alternative of control speeding in work zones was implemented. This study evaluated the safety effectiveness of the PVMS based on speeds and the compliance with the speed limit. Linear regression and logistic regression models were adopted to quantify the safety effect of the PVMS between the 'before' and 'after'. The results showed that most of points had statistically significant speeds reduction experience after PVMS installation. Also, the percentage of vehicle exceeding the speed limit by 10 km/h or more was decreased significantly between 50 and 80% in the 'after' periods compared to the 'before' periods. Therefore, the PVMS would be contributed to benefit safety in work zones which there is a difference in design speed of the adjacent normal section.

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

Design of Fault-tolerant MA Migration Scheme based on Encrypted Checkpoints (암호화된 체크포인트를 이용한 결함 허용성을 가지는 이동 에이전트의 이주 기법 설계)

  • 김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.77-84
    • /
    • 2003
  • A mobile agent is a program which represents a user in a network and is capable of migrating from one node to another node, performing computations on behalf of the user. In this paper, we suggest a scheme that can safely recover mobile agent using the checkpoint that is saved at the platform that it visited previously and restart its execution from the abnormal termination point of the mobile agent. For security, mobile agent uses its public key to encrypt the checkpoint and the home platform uses the private key of the mobile agent to decrypt the encrypted checkpoints at the recovery stage. When home platform receives the checkpoint of the mobile agent, home platform verifies the checkpoint using message digest. Home platform verifies the correctness of the checkpoint by comparing the message digest generated at checkpoint mention time with the message digest generated at mobile agent recovery time.

Implementation of Git's Commit Message Complex Classification Model for Software Maintenance

  • Choi, Ji-Hoon;Kim, Joon-Yong;Park, Seong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.131-138
    • /
    • 2022
  • Git's commit message is closely related to the project life cycle, and by this characteristic, it can greatly contribute to cost reduction and improvement of work efficiency by identifying risk factors and project status of project operation activities. Among these related fields, there are many studies that classify commit messages as types of software maintenance, and the maximum accuracy among the studies is 87%. In this paper, the purpose of using a solution using the commit classification model is to design and implement a complex classification model that combines several models to increase the accuracy of the previously published models and increase the reliability of the model. In this paper, a dataset was constructed by extracting automated labeling and source changes and trained using the DistillBERT model. As a result of verification, reliability was secured by obtaining an F1 score of 95%, which is 8% higher than the maximum of 87% reported in previous studies. Using the results of this study, it is expected that the reliability of the model will be increased and it will be possible to apply it to solutions such as software and project management.

Distributed Operation of Structural Design Process (구조 설계 프로세스의 분산운용)

  • Hwang Jin-Ha;Park Jong-Hoi;Kim Kyung-Ill
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2005.04a
    • /
    • pp.663-671
    • /
    • 2005
  • Distributed operation of overall structural design process, by which product and process optimization are implemented, is presented in this paper. The database-interconnected multilevel hybrid method, in which the conventional design method and the optimal design approach are combined, is utilized there. The method selectively takes the accustomed procedure of the conventional method in the conceptional framework of the optimal design. Design conditions are divided into primary and secondary criteria This staged application of design conditions reduces the computational burden for large complex optimization problems. Two kinds of numeric and graphic processes, are simultaneously implemented on the basis of concurrent engineering concepts in the distributed environment of PC networks. Numerical computation on server and graphic works on independent client are communicated through message passing. Numerical design is based on the optimization methodology and the drawing process is carried out by AutoCAD using the AutoLISP programming language. The prototype design experimentation for some steel trusses shows the validity and usability of the method. This study has sufficient adaptability and expandability in methodology, in that it is based on general theory and industry standard systems.

  • PDF

A Study on the Artistic Character of Textile Design of the Wiener Werkstaette (빈공방(Wiener Werkstaette) 직물디자인의 예술적 특성 연구)

  • Lim Young-Ja;Choi Og-Su
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.7
    • /
    • pp.121-134
    • /
    • 2004
  • Wiener Werkstaette(workshop) established in 1903 was an artistic handicraft working group, the central figure of which was an architecture, J. Hoffman. Especially its textile design part established in 1910 produced good results. The textile design part of Wiener Werkstaette took total artwork (Gesamtkunstwerke), which Pursued artistic work in all visual parts of life, as a central concept of their work and tried to insert the artistic creativity into the textile design. Regarding the influence relationship between Wiener Werkstaette textile design and formative art, it was influenced by the geometric tendency of C.R. Mackintosh and the style and motive of Japanese art. From 1910's, bright, vivid and cheerful designs were mass-produced by uniquely using various motives, techniques and colors. The formative significance of Wiener Werkstaette textile design are as follows. Firstly, the pattern includes both rational and sensual elements. Secondly, the aesthetic patterns of Wiener Werkstaette include formative elements anticipating the modernism. The leading artistic sense like this played role of catalyzer through which the golden age of artistic decoration, art deco, came. The significance of the textile was made aware through clothes design . The clothes design made with Wiener Werkstaette textile conveyed message as art to everyone and provided the elite of society supporting them with Proud that they are fashion leader ahead of times and have artistic sense. Wiener Werkstaette textile design like this played big role as an instrument for realizing the total artwork by attaining the new artistic formative fruits.

Design and Implementation of Real-time Remote Control System (실시간 무선 원격제어 시스템의 설계 및 구현)

  • 이문구;박성원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1589-1592
    • /
    • 2003
  • Existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for instantaneous control. The implemented real time wireless remote control system provides remote server management functions, error or event message (unctions, log record functions, authentication function via mobile devices.

  • PDF

Real-time Characteristic Analysis of A Micro Kernel for Supporting Reconfigurability (재구성된 마이크로 커널의 실시간 특성 분석)

  • 박종현;임강빈;정기현;최경희
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.121-124
    • /
    • 2000
  • Goal of this Paper is to design and develop core kernel components f3r single processor real-time system, which include real-time schedulers, synchronization mechanism, IPC, message passing, and clock & timer. The goal also contains the basic researches on dynamic load balancing and scheduling which provide mechanism for the distributed information processing and efficient resource sharing among various information appliances based on network.

  • PDF

APPLICATION OF $(\upsilon,\kappa,\lambda)$-CONFIGURATION TO GENERATION OF A CONFERENCE KEY

  • Chung, Il-Yong
    • Journal of applied mathematics & informatics
    • /
    • v.8 no.2
    • /
    • pp.531-537
    • /
    • 2001
  • In order for all participants at video conference to communicate mutually, the conference key should be necessary. In this paper, we present the communication protocol that generates a conference key efficiently based on $(\upsilon,\kappa,\lambda)$-configuration, one class of block designs, which minimizes message transmission overhead needed for this key. Especially, in the case of ${\lambda}=1$, the protocol requires only $O(\sqrt[v]{v})$ messages, where v is the number of participants.