• Title/Summary/Keyword: message rate

Search Result 330, Processing Time 0.024 seconds

Fault-Tolerant Parallel Applications in Java Message Passing Systems (자바 메시지 전달 시스템에서의 결함 포용 병렬 애플리케이션)

  • 안진호;김기범;김정훈;황종선
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.768-770
    • /
    • 1998
  • 동기적 검사점(synchronous checkpoiting)기법, 인과적 메시지 로깅(causal message logging)과 향상된 회복 비동기성(improved asynchronism during recovery)을 제공하는 복귀회복(rollback recovery) 기법을 적용하여 자바 메시지 전달 시스템(java massage passing system)에서 수행하는 병렬 에플리케이션들에게 저 비용의 결함 포용성에 따라, 통신망으로 연결된 이질형 (fault-tolerance)(heterogeneous) 컴퓨터들을 이용하는 대규모 분산 시스템들은 아주 효율적인 병렬 컴퓨팅 환경을 제공해준다. 그러나, 이러한 분산 시스템들의 규모가 커짐에 따라 고장률 (failure rate)도 그 만큼 중요하게 된다. 따라서, 고장률이 높은 대규모 분산 시스템들에게 좀더 효율적인 결함 포용성을 제공하는 기법들이 필요하다. 또한, 대규모분산 시스템들은 이질형 컴퓨터들로 구성되어 있기 때문에, 결함 포용성을 제공하는 소프트웨어 패키지들은 플랫폼 독립적(platform independent)이어야 한다. 이러한 문제점은 높은 이식성(portability)을 가지고 있는 자바 언어로 구현함으로써 해결될 수 있다. 따라서, 본 논문은 자바 메시지 전달 시스템에서 수행되는 병렬 애플리케이션들에게 동기적 검사점 기법, 인과적 메시지 로깅과 향상된 비동기성을 제공하는 복귀회복 기법을 높은 이식성을 가진 자바언어로 구현하여 저 비용으로 결함 포용성을 제공하고자 한다.

  • PDF

A improved back-off algorithm using the gaussian model in the vehicular networks (차량 간 통신에서 가우시안 모델을 적용한 개선된 백오프 알고리즘)

  • Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.225-230
    • /
    • 2012
  • When a car accident happened, the accident vehicle should broadcast a safe message to its neighbors in multi-hop. However, the pure flooding is difficult to protect a chain-reaction collision because of the frequent collision and the communication delay. To solve this problem, we proposes a back-off algorithm applied to the estimation of the neighbor node count using the t-distribution. And we proposes a MAC protocol preventing the communication delay by separating the neighbor's count collection channel and data channel. As a result, we show the frame reception success rate of our protocol improved more 10% than the previous protocol.

Comparison of Teaching about Breast Cancer via Mobile or Traditional Learning Methods in Gynecology Residents

  • Alipour, Sadaf;Moini, Ashraf;Jafari-Adli, Shahrzad;Gharaie, Nooshin;Mansouri, Khorshid
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.9
    • /
    • pp.4593-4595
    • /
    • 2012
  • Introduction: Mobile learning enables users to interact with educational resources while in variable locations. Medical students in residency positions need to assimilate considerable knowledge besides their practical training and we therefore aimed to evaluate the impact of using short message service via cell phone as a learning tool in residents of Obstetrics and Gynecology in our hospital. Methods: We sent short messages including data about breast cancer to the cell phones of 25 residents of gynecology and obstetrics and asked them to study a well-designed booklet containing another set of information about the disease in the same period. The rate of learning derived from the two methods was compared by pre- and post-tests and self-satisfaction assessed by a relevant questionnaire at the end of the program. Results: The mobile learning method had a significantly better effect on learning and created more interest in the subject. Conclusion: Learning via receiving SMS can be an effective and appealing method of knowledge acquisition in higher levels of education.

Representation of Multiple Message Authentication Codes using Bloom Filters (블룸 필터를 이용한 다수의 메시지 인증코드의 표현)

  • Son Ju-Hyung;Seo Seung-Woo;Kang Yu;Choe Jin-Gi;Moon Ho-Kun;Lee Myuong-Soo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.365-369
    • /
    • 2006
  • Multiple Message Authentication Codes can be represented by one of the Short MAC, Bloom Filter or Compressed Bloom Filler to reduce communication overheads. However, this will inevitably increase false positive rate (fpr) which is a false authentication probability of adversarial messages in trade-off of communication efficiency. While the simple short MAC scheme has the lowest fpr, one cannot choose arbitrary authenticator size. Bloom filter, randomized data structure often used for membership queries, can represent multiple MACs more flexibly with slightly higher fpr. Furthermore, compressed Bloom filter has the same fpr with the short MAC while maintaining its flexibility. Through our detailed analysis, we show that pros and cons of the three schemes are scenario specific. Therefore one can choose appropriate scheme under given parameters to achieve both communication efficiency and security based on our results.

  • PDF

Maritime English vs Maritime English Communication

  • Choe, Seung-Hui
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.272-274
    • /
    • 2015
  • Success of communication at sea is directly linked with clear and complete delivery and receipt of the target message between interlocutors. It can be said that speakers' effective delivery of their intended message and listeners' precise decoding and accurate understanding are the keys to successful maritime communication. From this perspective, the scope of maritime English education and training needs to be reconceptualized and expanded into the area of communication itself, beyond the simple acquisition of, and familiarization with, IMO Standard Maritime Communication Phrases (SMCP). Therefore, in order to make learners' acquisition of marine communication knowledge more feasible, and the knowledge learned more practically applicable, training on effective and clear oral delivery should be also considered within the frame of maritime English education. Thus, critical training elements to realize this goal need to be suggested as guidelines. In this presentation, the theoretical background on this will be introduced in terms of English as a Lingua Franca (ELF) and Lingua Franca Core (LFC), which are the current mainstream forms of English communication in the international business context. Based on this, six key training elements will be discussed; that is, speech rate, word groups, pauses, nuclear stresses, consonants (including consonant clusters), and vowels (specifically long and short vowels). Finally, the practical pedagogical methods of each element, and its actual application into a real ESP classroom, will be suggested.

  • PDF

BCC Based Mobile WIMAX Initial Network Entry with Improved Security (보안성이 강화된 타원곡선 암호 기반의 Mobile WIMAX 초기 진입 구간)

  • Choi, Do-Hyun;Park, Jung-Oh;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1305-1314
    • /
    • 2011
  • Initial entry section has vulnerability which exposes plain text parameter in Mobile WIMAX environment which is the 4th generation technology. Each node message need to be encrypted to prevent the third party attack or message leakage. In this paper, we propose Mobile WIMAX initial entry section encryption using Elliptic Curve Cryptosystem. We have compared proposed model with existing model using OPNET simulator tool. He delay rate has increased little bit in initial entry section than before after the comparison, but it has shown more effective in average delay and throughput than encryption applied other existing model.

Analysis of New Generation Learner Characteristics : College Students Use of Cyber Communication (신세대 학습자 특성 분석 : 대학생의 사이버 커뮤니케이션 이용 특성)

  • Lee, Okhwa
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.4
    • /
    • pp.25-36
    • /
    • 2005
  • Data of 650 college students in the nation were collected by mail in 2001 Nov. Students preference over cyber communication methods were SMS message, messenger, blog, e-mail in that order. Younger students prefer SMS messages while older students prefer e-mail in relative term. Mobile phone is used more for SMS message than voice communication which is more so with females. The rate of non e-mail use is 57.8%, particularly males(61.9%) and younger students(69.4%) are higher. E-mail, once was very high in use, is being replaced by new media. Suggestion for e-learning environment are being connected, immediacy, active use of blog, more use of fun multimedia information.

  • PDF

Adaptive OLSR Protocol Based on Average Node Distance in Airdropped Distributed Mobility Model (분산 낙하 이동 모델에서의 평균 노드 거리 기반 적응적 OLSR 프로토콜)

  • Lee, Taekmin;Lee, Jinhae;Wang, Jihyeun;Yoo, Joonhyuk;Yoo, Seong-eun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.2
    • /
    • pp.83-91
    • /
    • 2018
  • With the development of IT (Information Technology) technology, embedded system and network technology are combined and used in various environments such as military environment as well as everyday life. In this paper, we propose a new airdropped distributed mobility model (ADMM) modeling the dispersion falling of the direct shot of a cluster bomb, and we compare and analyze some representative MANET routing protocols in ADMM in ns-3 simulator. As a result of the analysis, we show OLSR routing protocol is promising in ADMM environment in the view points of packet delivery ratio (PDR), end to end delay, and jitter. In addition, we propose a new adaptation scheme for OLSR, AND-OLSR (Average Node Distance based adaptive-OLSR) to improve the original OLSR in ADMM environment. The new protocol calculates the average node distance, adapts the period of the control message based on the average node distance increasing rate. Through the simulation study, we show that the proposed AND-OLSR outperforms the original OLSR in PDR and control message overhead.

Discrete-Time Gaussian Interfere-Relay Channel

  • Moon, Kiryang;Yoo, Do-Sik;Oh, Seong-Jun
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.299-310
    • /
    • 2016
  • In practical wireless relay communication systems, non-destination nodes are assumed to be idle not receiving signals while the relay sends messages to a particular destination node, which results in reduced bandwidth efficiency. To improve the bandwidth efficiency, we relax the idle assumption of non-destination nodes and assume that non-destination nodes may receive signals from sources. We note that the message relayed to a particular node in such a system gives rise to interference to other nodes. To study such a more general relay system, we consider, in this paper, a relay system in which the relay first listens to the source, then routes the source message to the destination, and finally produces interference to the destination in sending messages for other systems. We obtain capacity upper and lower bounds and study the optimal method to deal with the interference as well as the optimal routing schemes. From analytic results obtained, we find the conditions on which the direct transmission provides higher transmission rate. Next, we find the conditions, by numerical evaluation of the theoretical results, on which it is better for the destination to cancel and decode the interference. Also we find the optimal source power allocation scheme that achieves the lower bound depending on various channel conditions. We believe that the results provided in this paper will provide useful insights to system designers in strategically choosing the optimal routing algorithms depending on the channel conditions.

A Traffic Handling Scheme for Multi-Media Mobile Communication (멀티미디어 서비스를 위한 이동통신 트래픽 처리 기법)

  • Lee, Moon-Ho;Kim, Byung-Gi;Lee, Hyoung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.493-500
    • /
    • 1996
  • As the greater interests are focused onto wireless message transfer, wireless data base access and mobile computing the techniques for integrating various dat a services into the mobile communication systems are seriously needed. In this paper we propose a traffic handing scheme to provide mixed media services more effectively, and analyze is performance. The proposed scheme was found to improve data performances and, regardless of varying data traffic load, provide acceptable level of blocking rate to voice services simultaneouly. Also it is more effective for message-oriented data services.

  • PDF