• Title/Summary/Keyword: 메시지 신뢰도

Search Result 433, Processing Time 0.023 seconds

The impact of emotional storytelling on brand attitude- compare to humor advertising (감성적 스토리텔링이 브랜드태도에 미치는 영향 - 유머광고와의 비교-)

  • Rhie, Jin-Hee
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.61-68
    • /
    • 2014
  • In the past, to stimulate customers' rationality were used as a marketing methods but the storytelling marketing is appealing to consumers by showing product or brand value. Storytelling marketing attracts clients favorable attitude. In this research, I tried to figure out how emotional storytelling and humor advertising affects to brand attitude a quality of products according to advertising types, brand image, trust, interest, message, advertising model, intension of purchase and recommendation requisite to impact on brand attitude. As a result emotional storytelling was more effective than the humor advertising method when forming the brand attitude and brand image. Also, among the types of advertisement, emotional storytelling tended to bring a significant difference between men and women. Emotional storytelling advertisement are increasing and being competitive. Therefore, we need notable advertisement. It is a significant research to understand how advertising type affects to consumers.

A Kernel-Level Group Communication System for Highly Available Linux Cluster (리눅스 클러스터의 고가용성 보장을 위한 커널 수준 그룹 통신 시스템)

  • 이상균;박성용
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.10
    • /
    • pp.533-543
    • /
    • 2003
  • With the increase of interests in cluster, there have been a number of research efforts to address the high availability issues on cluster. However, there are no kernel-level group communication systems to support the development of kernel-level application programs and it is not easy to use traditional user-level group communication systems for the kernel-level applications. This paper presents the design and implementation issues of KCGCS(Kernel-level Cluster Group Communication System), which is a kernel-level group communication module for linux cluster. Unlike traditional user-level group communication systems, the KCGCS uses light-weight heartbeat messages and a ring-based heartbeat mechanism, which allows users to implement scalable failure detection mechanisms. Moreover, the KCGCS improves the reliability by using distributed coordinators to maintain membership information.

MPEG-21 Event Reporting Message Structure based on digital data broadcasting use case scenarios (디지털 데이터 방송 유즈케이스 시나리오에 기반한 MPEG-21 이벤트 리포팅 구조 설계)

  • 송영주;홍진우;문남미;지경희
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.399-409
    • /
    • 2003
  • In this paper, we present an Event Reporting which is one of the major items of MPEG-21 and exemplify two digital data broadcasting use case scenarios, and according1y we propose the Event Reporting message structure for MPEG-21 broadcasting contents that is based on these use case scenarios. Every interaction with a Digital Item in the multimedia framework can be called an Event. The need to standardize Event Reporting within the Multimedia Framework arise from the need to monitor and communicate amongst Peers and Users the Events relating to Digital Items and/or the programs and devices that operate on them at any given time. However, there are a number of difficulties in providing an accurate report about an Event. Different observers of the Event may have vastly different perspectives. In this paper, we describe a structure and vision of the Event Reporting. Besides we show the activities on MPEG-21 Event Reporting standardization.

화물위치추적 기술 현황 및 개발 방향

  • 박남규;최형림;송근곤;오상환
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1999.10a
    • /
    • pp.199-206
    • /
    • 1999
  • 본 연구에서는 웹기반의 화물차량위치추적시스템의 개발과 관련된 문제를 다루고 있다. 화물위치추적 시스템이란 이동하는 화물차량으로부터 위치데이터 및 관련 정보를 수신하여 중앙관제센터에서 이 정보를 데이터베이스에 저장하여 두고 화물위치 정보를 지도 위에 표시하는 시스템으로 화주, 운송회사 등 육상물류관련 기관에서 화물위치추적, 공동수배송, 화물차량 통제 등 다양한 목적으로 사용될 수 있다. 화물차량위치추적시스템은 AVLS(Automatic Vehicle Location System)라 불리우면서 산업계에서 활용되고 있으며 위치획득 방법의 종류에 따라 다양한 유형의 AVLS모델이 등장하고 있다. 예를 들면 전통적인 GPS(Global Positioning System) 위성 수신, DGPS(Differential GPS) 기지국, PCS(Personal Communication System) Cell, 도로기반 시설에 포함되는 비콘 등의 방법에 의해 AVLS는 구현되고 있다. AVLS는 정보통신 요소 기술과 정보통신 기반 시설로 구성되는데, 정보통신 요소기술로는 위치획측의 매개체인 AVL단말기와 관제시스템 S/W. 그리고 GIS(Geographic Information System)가 있고, 정보통신 기반 시설로는 차량의 단말기와 관제시스템 사이의 데이터 중계를 담당하는 네트워크가 있다. 화물차량위치추적시스템을 구성하기 위한 구비요건으로 중계망의 안정성과 신뢰성, 획득한 위치데이터의 정확성, 관제시스템의 완성도와 AVL단말기의 사용자 인터페이스, GIS S/W개발을 위한 Map API(Application Program Interface)등을 들 수 있다. 본 연구에서는 PCS Cell 방식에 의한 위치결정방식을 채택하였는데, 이것은 PCS망을 기반으로 데이터를 주고받이며 인터넷 단말기로 확장 가능한 PCS 단말기를 사용해서 위치추적을 하는 시스템이다. 이러한 시스템을 선정하게된 배경은 단말기아 망 이용료의 가격이 저렴하여 현실적으로 트럭이 쉽게 부착할 수 있다는 장점이 있으며 나아가 인터넷 단말기를 활용하여 차량과 관제센터사이에 메시지 전송 등 부가적인 서비스가 가능하기 때문이다.

Development of Log Processing Module and Log Server for Ethernet Shipboard Integration Networks (이더넷 기반 선박 통합 네트워크를 위한 로그 처리 모듈 및 로그 서버의 개발)

  • Hwang, Hun-Gyu;Yoon, Jin-Sik;Seo, Jeong-Min;Lee, Seong-Dae;Jang, Kil-Woong;Park, Hyu-Chan;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.331-338
    • /
    • 2011
  • Objectives of shipboard integration networks are to exchange and manage integrated information. Shipboard integration networks use UDP(User Datagram Protocol) multicast for the exchange of information. However, such information can be missed or damaged because UDP can't guarantee reliability. The standard of shipboard integration networks defines error log functions for the missed or damaged information. In this paper, we analyze internal and external log functions. The internal log function records errors internally, and the external log function sends error messages to a log server and records them in a database. We also develop a log processing module and log server for the external log function.

An Off-line Dictionary Attack on Command Authorization in TPM and its Countermeasure (TPM에서 명령어 인가에 대한 오프라인 사전 공격과 대응책)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1876-1883
    • /
    • 2011
  • The TPM is a hardware chip for making a trusted environment on computing system. We previously need a command authorization process to use principal TPM commands. The command authorization is used to verify an user who knows a usage secret to TPM chip. Since the user uses a simple password to compute usage secret, an attacker can retrieve the password by evasdropping messages between user and TPM chip and applying off-line dictionary attack. In this paper, we simulate the off-line dictionary attack in real PC environment adopted a TPM chip and propose a novel countermeasure to defeat this attack. Our proposed method is very efficient due to its simplicity and adaptability without any modification of TPM command structures.

Improvement of OLSR Through MIMC's Decreased Overhead in MANET (모바일 애드 혹 네트워크 환경 하에서 멀티인터페이스 멀티채널의 오버헤드 감소를 통한 OLSR의 성능 개선)

  • Jang, Jae-young;Kim, Jung-ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.3
    • /
    • pp.55-70
    • /
    • 2016
  • The most critical research issue in MANET environment is on supporting reliable communication between various devices. Various Multi-Hop Routing Protocol studies have proceeded. However, some problems you might have found when you use the existing link state routing technique are that it increases Control Message Overhead and it is unstable when node moves in CR circumstance which has transformation of using channel and MIMC circumstance which uses a number of interfaces. This essay offers a technique which is based on On-Demand Hello and the other technique which used Broadcast Interface of optimization as a solution to decrease Control Message Overhead. Also it proposes Quick Route Restoration technique which is utilized by GPS and MPR Selection technique which consider mobility as a solution of stable communication when node moves. Those offered Routing Protocol and OPNET based simulator result will be expected to be an excellent comparison in related research fields.

UPnP Services for RFID Context-Aware System (RFID 상황인식 시스템을 위한 UPnP 서비스)

  • Kim, Dong-Kyun;Jeon, Byung-Chan;Lee, Sang-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2005-2014
    • /
    • 2008
  • In this paper, it is presented to utilize UPnP as RFID service discovery and control mechanism for context-aware services. Using UPnP, it is possible to achieve easy deployment of context-aware services and to provide zero-configuration for RFID services. In addition, SQL based cleaning module which raises detection rates is developed since context-aware applications heavily rely on streams of data gathered from RFID tags. Using the cleaning technique, detection rates are improved from 60-80% to 98% or more In order to verify RFID context aware service based on the UPnP, sample context-aware scenario for physical distribution services is implemented on UPnP over RFID system. The impacts of UPnP messages (or service advertisements on network congestion and SQL cleaning module are experimented and analyzed, and the result show the good correctness and validity of the proposed system.

A Study about Wiretapping Attack and Security of VoIP Service (VoIP 서비스의 도청 공격과 보안에 관한 연구)

  • Park Dea-Woo;Yoon Seok-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.155-164
    • /
    • 2006
  • VoIP technology is Eight New Services among Ubiquitous-IT839 strategies. This paper tested wiretapping or VoIP service in connected a soft phone and LAN and WAN sections, Internet telephones and a device. IP PBX, a banner operator network to have been connected to VoIP Internet network. As a result of having experimented on wiretapping of VoIP networks, Vulnerability was found. and a wiretapping by attacks of a hacker was succeeded in a terminal and proxy and attachment points of a VoIP network like a hub to follow a CVE list. Currently applied a security plan of an each wiretapping section in viewpoints of 6 security function of Access Control. Confidentiality, Authentication. Availability, Integrity. Non-repudiation in VoIP networks named to 070. Prevented wiretapping of contents by the results, the AES encryption that executed wiretapping experiment about a packet after application of a security plan. Prevented wiretapping, and kept security and audit log. and were able to accomplish VoIP information protection to network monitoring and audit log by an access interception and qualification and message hash functions and use of an incoming refusal.

  • PDF

IoT Multi-Phase Authentication System Using Token Based Blockchain (블록체인 기반의 토큰을 이용한 IoT 다단계 인증 시스템)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.6
    • /
    • pp.139-150
    • /
    • 2019
  • IoT(Internet of Things) security is becoming increasingly important because IoT potentially has a variety of security threats, including limited hardware specifications and physical attacks. This paper is a study on the certification technology suitable for the lightened IoT environment, and we propose a system in which many gateways share authentication information and issue authentication tokens for mutual authentication using blockchain. The IoT node can be issued an authentication token from one gateway to continuously perform authentication with a gateway in the block-chain network using an existing issued token without performing re-authentication from another gateway participating in the block-chain network. Since we do not perform re-authentication for other devices in a blockchain network with only one authentication, we proposed multi phase authentication consisting of device authentication and message authentication in order to enhance the authentication function. By sharing the authentication information on the blockchain network, it is possible to guarantee the integrity and reliability of the authentication token.