• Title/Summary/Keyword: message objects

Search Result 121, Processing Time 0.024 seconds

Design of TMO Model based Dynamic Analysis Framework: Components and Metrics (TMO모델 기반의 동적 분석 프레임워크 설계 : 구성요소 및 측정지수)

  • Jeong, Yoon-Seok;Kim, Tae-Wan;Chang, Chun-Hyon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.377-392
    • /
    • 2005
  • A lot of studies to measure and analyze the system performance have been done in areas such as system modeling, performance measurement, monitoring, and performance prediction since the advent of a computer system. Studies on a framework to unify the performance related areas have rarely been performed although many studies in the various areas have been done, however. In the case of TMO(Time-Triggered Message-Triggered Object), a real-time programming model, it hardly provides tools and frameworks on the performance except a simple run-time monitor. So it is difficult to analyze the performance of the real-time system and the process based on TMO. Thus, in this paper, we propose a framework for the dynamic analysis of the real-time system based on TMO, TDAF(TMO based Dynamic Analysis Framework). TDAF treats all the processes for the performance measurement and analysis, and Provides developers with more reliable information systematically combining a load model, a performance model, and a reporting model. To support this framework, we propose a load model which is extended by applying TMO model to the conventional one, and we provide the load calculation algorithm to compute the load of TMO objects. Additionally, based on TMO model, we propose performance algorithms which implement the conceptual performance metrics, and we present the reporting model and algorithms which can derive the period and deadline for the real-time processes based on the load and performance value. In last, we perform some experiments to validate the reliability of the load calculation algorithm, and provide the experimental result.

Method of Motion Graphic Design Approach from Postmodern Point of View (포스트모던적 관점에서 본 모션그래픽 디자인 접근 방안)

  • Kim Gyo-Wan;Hong Su-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.124-131
    • /
    • 2006
  • Motion graphic is also developing into its own genre in graphic design by establishing individual industrial fields. images and graphics but also recognize even motions and sounds as communication elements delivering a message. Nevertheless, web communication designers have yet to experimentally test the visual motion priniciples or the audio sound expressions in terms of technology. If the dance are used, they may be new communication approaches in the age of multi-media, which allows for communication of visual and audio information or images. With such conceptions in mind, this study was aimed at reviewing the structural relationship between visual motion principles of the kinetic and the sound images to combine the audio and video effects. To this end, the basic structure of dance and music were substituted into the dance to determine their relevancy, and thereupon, examine the effective sound expression methods and techniques depending on movements of the objects in the monitor. Thus, this study, by inquiring into the uniqueness of choreography in motion graphic, presents the possibility of limitless expression of designer creation and inner world, and the ultimate goal lies in assuring the artistic value of motion graphic and its position as a synthetic art.

  • PDF

A Study on Body Painting according to Nature Art Types (자연미술 유형에 따른 바디페인팅 연구)

  • Park, Jeongshin
    • Journal of Fashion Business
    • /
    • v.18 no.4
    • /
    • pp.66-79
    • /
    • 2014
  • Unlike other body arts, body painting illuminates the value of art using eco-friendly formative activity and natural environment and highlights the need of eco-friendly activity. However, although body painting has focused on forming right relationship between human beings and nature, there are few researches which are linked with nature art. Therefore, the purpose of this study is to argue the need to study body painting as nature art in connection with natural environment and analyze body painting according to nature art types. The study methods included both theoretical review and empirical review. The theoretical review examined the concept and characteristics of nature art through previous researches and literature and the empirical review looked into the types and works of nature art and applied them to body painting works. The results were as follows. First, an installation type was possible by arranging and attaching certain materials to the body. Second, a physical type was possible by representing body itself as the part of nature. Third, a symbolic type was possible by making body appearance as a some symbol based on artist's idea. Fourth, a sound type was possible by stimulating auditory hallucination using the nature of objects and sensing a sound. Fifth, an ecological type was possible by conveying the message of living things in nature to the body. Sixth, an interior type was possible by inducing indoor installation of works. Seventh, a poetic type was possible by making one feel a poetic inspiration expressed in nature using the mystery of the sea and a simple sequential pattern of floral leaves. Eighth, a drawing type was possible by adding artist's intentional hand with a pictorical technique. Ninth, a indigenous type was possible by reproducing South American indian's primitive style. The review of this study suggests that body painting works have been expressed in experimental and temporary arrangement like nature art in nature and can be applied according to nine types of nature art.

A Real-Time Monitoring Method and Dynamic Load-Balancing Metrics for CORBA Applications (코바 어플리케이션의 동적 부하 분산을 위한 실시간 모니터링 기법 및 메트릭스)

  • Choi, Chang-Ho;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.4
    • /
    • pp.315-326
    • /
    • 2000
  • As Internet is being widely used as an infra of distributed applications, the most of today's softwares are changing into Internet-based distributed applications. The development methods using the middleware, like CORBA ORB, make the development of the web-based software easy. However, the performance verification method useful for an optimized software distribution is not provided at software development. Additionally, monitoring methods and metrics for dynamic load-balancing are not presented at run-time. This paper presents the method to monitor the message between objects, load metric, and metrics for load-balancing. To calculate a load of a node, we define events occurred between applications, time between the events, then extract the data related to a load. And we derive formula calculating the load from the extracted data. Then using the formula, we present the metrics for dynamic load-balancing. Moreover, we observe the utilization and efficiency of the monitoring algorithm, load metric, and load-balancing metrics.

  • PDF

A Database Security System for Detailed Access Control and Safe Data Management (상세 접근 통제와 안전한 데이터 관리를 위한 데이터베이스 보안 시스템)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Hong, Sung-Jin;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.5
    • /
    • pp.352-365
    • /
    • 2009
  • Recently, data access control policies have not been applied for authorized or unauthorized persons properly and information leakage incidents have occurred due to database security vulnerabilities. In the traditional database access control methods, administrators grant permissions for accessing database objects to users. However, these methods couldn't be applied for diverse access control policies to the database. In addition, another database security method which uses data encryption is difficult to utilize data indexing. Thus, this paper proposes an enhanced database access control system via a packet analysis method between client and database server in network to apply diverse security policies. The proposed security system can be applied the applications with access control policies related to specific factors such as date, time, SQL string, the number of result data and etc. And it also assures integrity via a public key certificate and MAC (Message Authentication Code) to prevent modification of user information and query sentences.

Mythological Imagination in Animation - Focusing on Animation (애니메이션에 나타난 신화적 상상력 - 애니메이션 <오늘이>를 중심으로)

  • Cho, Mi-Ra
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.237-245
    • /
    • 2007
  • When reviewing animation based on a mythical motive, the mythical imaginary power has been dependent only on audio visual senses thereby resorting to a fantasy nature regardless of reality, or there has been too much emphasis on an educational message and animation has been utilized as a conflicting composition between good and evil. Therefore, this thesis reviewed 1) whether the author's consciousness was reflected in animation according to the contemporary interpretation of mythical imaginary power and 2) whether the author included an internal meaning of a universal subject by having a short animation that was produced by actively utilizing a mythical motive as a text. Also, based on the analysis, the study deduced the conclusion that the most important thing in animation based on a mythical motive is the author's consciousness that reinterprets the theme of 'universality' from a contemporary perspective before expressing the mythical objects through the senses such as by a brilliant image and sound. The products of such an analysis are supposed to solve the problem over how mythical factors need to be applied and utilized in creating animation.

A Study of Routing and Signaling Extensions of GMPLS for QoS Provision in NGN (NGN에서 QoS 제공을 위한 GMPLS의 라우팅 및 시그널링 화장 연구)

  • 장석기;박광채
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.925-933
    • /
    • 2003
  • Network is expected to be developed into optical Internet network collected IP layer and optical layer, but GMPLS is risen at the transitional evolution stage because of the present technology level. GMPLS that MPLS is extended and generalized is able to support not only the packet switching device but also the devices which perform switching in time, wavelength, and space domain. To implement the common control plane to these various switching types, GMPLS extends the existing MPLS signaling and routing protocol. In this paper, we describe the overview of GMPLS technology, and then we will refer to the OSPF(Open Shortest Path First), which was used to exchange the status information of link, as the plan of routing extension to exchange the information of various link type, bandwidth, link protection type etc. And also, we describe the definition of new protocol, so called, LMP that is a signaling protocol for solving complex problem which manages hundreds and thousands of links between two nodes. And we will examine and analyze the plan of signaling protocol extension to apply signaling protocol RSVP-TE(Resource Reservation Protocol) for traffic engineering in MPLS to network, and the message objects and formats associated with modified RSVP.

Modeling and Interoperability Test Case Generation of a Real-Time QoS Monitoring Protocol

  • Chin, Byoung-Moon;Kim, Sung-Un;Kang, Sung-Won;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.21 no.4
    • /
    • pp.52-64
    • /
    • 1999
  • QoS monitoring is a kind of real-time systems which allows each level of the system to track the ongoing QoS levels achieved by the lower network layers. For these systems, real-time communications between corresponding transport protocol objects is essential for their correct behavior. When two or more entities are employed to perform a certain task as in the case of communication protocols, the capability to do so is called interoperability and considered as the essential aspect of correctness of communication systems. This paper describes a formal approach on modeling and interoperability test case generation of a real-time QoS monitoring protocol. For this, we specify the behavior of flow monitoring of transport layer QoS protocol, i.e., METS protocol, which is proposed to address QoS from an end-to-end's point of view, based on QoS architecture model which includes ATM net work in lower layers. We use a real-time Input/Output finite State Machine to model the behavior of real-time flow monitoring over time. From the modeled real-time I/OFSM, we generate interoperability test cases to check the correctness of METS protocol's flow monitoring behaviors for two end systems. A new approach to efficient interoperability testing is described and the method of interoperability test cases generation is shown with the example of METS protocol's flow monitoring. The current TTCN is not appropriate for testing real-time and multimedia systems. Because test events in TTCN are for message-based system and not for stream-based systems, the real-time in TTCN can only be approximated. This paper also proposes the notation of real-time Abstract Test Suite by means of real-time extension of TTCN. This approach gives the advantages that only a few syntactical changes are necessary, and TTCN and real-time TTCN are compatible. This formal approach on interoperability testing can be applied to the real-time protocols related to IMT-2000, B-ISDN and real-time systems.

  • PDF

A Study on Storing Node Addition and Instance Leveling Using DIS Message in RPL (RPL에서 DIS 메시지를 이용한 Storing 노드 추가 및 Instance 평준화 기법 연구)

  • Bae, Sung-Hyun;Yun, Jeong-Oh
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.590-598
    • /
    • 2018
  • Recently, interest in IoT(Internet of Things) technology, which provides Internet services to objects, is increasing. IoT offers a variety of services in home networks, healthcare, and disaster alerts. IoT with LLN(Low Power & Lossy Networks) feature frequently loses sensor node. RPL, the standard routing protocol of IoT, performs global repair when data loss occurs in a sensor node. However, frequent loss of sensor nodes due to lower sensor nodes causes network performance degradation due to frequent full path reset. In this paper, we propose an additional selection method of the storage mode sensor node to solve the network degradation problem due to the frequent path resetting problem even after selecting the storage mode sensor node, and propose a method of equalizing the total path resetting number of each instance.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.