• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.035 seconds

Availability-based Server Redirection System for Effective Content Delivery on Web (웹상에서의 효과적인 콘텐츠 전송을 위한 가용율 기반의 서버 재설정 시스템)

  • Song, Seung-Hyeon;Jang, Sung-Ho;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.61-71
    • /
    • 2009
  • The server redirection system replicates contents on replica servers in the distributed network environment. When users make a request for contents, the system can provide the contents much faster than the client-server network system. In the server redirection system, it is the most important to select the optimal replica server with user's information because many replica servers are geographically distributed. And, the system can serve contents to users flexibly if a redirector is well constructed. In this paper, the redirector makes a list of candidates suitable for user conditions by the decision tree method and calculates the availability of each replica server. And, the redirector selects the replica server with the highest availability. This paper also proposes an availability-based server redirection system that predicts the availability of each replica server in order to reduce the workload of replica servers and the repetitive communication messages between a redirector and replica servers. If a user accesses the network path for the replica server selected and noticed by the proposed system, the user can get contents effectively and efficiently.

Filtering Algorithms for Position Evaluation and Tracking of Tactical Objects (전술객체 위치 모의 및 추적을 위한 필터링 알고리즘 연구)

  • Kim, Seok-Kwon;Jin, Seung-Ri;Son, Jae-Won;Park, Dong-Jo
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.199-208
    • /
    • 2010
  • Positions of tactical objects are represented as Time, Space and Position Information(TSPI) in modeling and simulations(M&S). The format and required information record for TSPI is investigated by referring the TSPI object model of the Test and Training Enabling Architecture(TENA), which has been developed by the United States Department of Defense. The most sophisticated tactical data link, Link-16 has a Precise Participant Location and Information (PPLI) message. We study the data format for exchanging TSPI data based on the PPLI message. To evaluate and track positions of tactical objects, we consider the Kalman filter for linear systems, and the extended Kalman filter and the unscented Kalman filter for nonlinear systems. Based on motion equations of a ballistic missile, the tracking performance for the trajectory of the ballistic missile is simulated by the unscented Kalman filter.

Case Analysis of the Promotion Methodologies in the Smart Exhibition Environment (스마트 전시 환경에서 프로모션 적용 사례 및 분석)

  • Moon, Hyun Sil;Kim, Nam Hee;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.171-183
    • /
    • 2012
  • In the development of technologies, the exhibition industry has received much attention from governments and companies as an important way of marketing activities. Also, the exhibitors have considered the exhibition as new channels of marketing activities. However, the growing size of exhibitions for net square feet and the number of visitors naturally creates the competitive environment for them. Therefore, to make use of the effective marketing tools in these environments, they have planned and implemented many promotion technics. Especially, through smart environment which makes them provide real-time information for visitors, they can implement various kinds of promotion. However, promotions ignoring visitors' various needs and preferences can lose the original purposes and functions of them. That is, as indiscriminate promotions make visitors feel like spam, they can't achieve their purposes. Therefore, they need an approach using STP strategy which segments visitors through right evidences (Segmentation), selects the target visitors (Targeting), and give proper services to them (Positioning). For using STP Strategy in the smart exhibition environment, we consider these characteristics of it. First, an exhibition is defined as market events of a specific duration, which are held at intervals. According to this, exhibitors who plan some promotions should different events and promotions in each exhibition. Therefore, when they adopt traditional STP strategies, a system can provide services using insufficient information and of existing visitors, and should guarantee the performance of it. Second, to segment automatically, cluster analysis which is generally used as data mining technology can be adopted. In the smart exhibition environment, information of visitors can be acquired in real-time. At the same time, services using this information should be also provided in real-time. However, many clustering algorithms have scalability problem which they hardly work on a large database and require for domain knowledge to determine input parameters. Therefore, through selecting a suitable methodology and fitting, it should provide real-time services. Finally, it is needed to make use of data in the smart exhibition environment. As there are useful data such as booth visit records and participation records for events, the STP strategy for the smart exhibition is based on not only demographical segmentation but also behavioral segmentation. Therefore, in this study, we analyze a case of the promotion methodology which exhibitors can provide a differentiated service to segmented visitors in the smart exhibition environment. First, considering characteristics of the smart exhibition environment, we draw evidences of segmentation and fit the clustering methodology for providing real-time services. There are many studies for classify visitors, but we adopt a segmentation methodology based on visitors' behavioral traits. Through the direct observation, Veron and Levasseur classify visitors into four groups to liken visitors' traits to animals (Butterfly, fish, grasshopper, and ant). Especially, because variables of their classification like the number of visits and the average time of a visit can estimate in the smart exhibition environment, it can provide theoretical and practical background for our system. Next, we construct a pilot system which automatically selects suitable visitors along the objectives of promotions and instantly provide promotion messages to them. That is, based on the segmentation of our methodology, our system automatically selects suitable visitors along the characteristics of promotions. We adopt this system to real exhibition environment, and analyze data from results of adaptation. As a result, as we classify visitors into four types through their behavioral pattern in the exhibition, we provide some insights for researchers who build the smart exhibition environment and can gain promotion strategies fitting each cluster. First, visitors of ANT type show high response rate for promotion messages except experience promotion. So they are fascinated by actual profits in exhibition area, and dislike promotions requiring a long time. Contrastively, visitors of GRASSHOPPER type show high response rate only for experience promotion. Second, visitors of FISH type appear favors to coupon and contents promotions. That is, although they don't look in detail, they prefer to obtain further information such as brochure. Especially, exhibitors that want to give much information for limited time should give attention to visitors of this type. Consequently, these promotion strategies are expected to give exhibitors some insights when they plan and organize their activities, and grow the performance of them.

A Study on Omission and Suggestive Expressions in Motion Graphics (모션그래픽에서 생략과 암시적 표현에 관한 연구)

  • Youm, Dong-Cheol
    • Cartoon and Animation Studies
    • /
    • s.15
    • /
    • pp.251-265
    • /
    • 2009
  • Motion Graphics are a great effective vehicle for precise communication between customers in various media and formats. The important thing in the expression of Motion Graphics is to deliver messages clearly. Some current Motion Graphics which are focused on only attracting attention or sensational expressions more than narrative are evaluated lower. This study aims to utilize easy and positive Motion Graphics to deliver messages by applying their utility to production of Motion Graphics, omitting time spent on delivering effective messages and analyzing their suggestive expression methods because of the nature of producing Motion Graphics. This thesis is to study several theoretical backgrounds of omission and implicated expressions mentioned in the similar studies from the view of Motion Graphics, and to search applied examples and functional things using the expression methods in some film title sequence. Excellent Motion Graphics use planned omission and implicated methods rather than to use entire narratives or complicated descriptions. Especially, a film title sequence should focus on symbolic visual expressions. They are necessary to attract the audience's interest. To overcome the limitation of time and space deliver a huge amount of information quickly and powerfully, Motion Graphics should properly use omission of image and time and suggestive expressions through symbols and metaphors. Then they will have a role to level up their current values and discussions.

  • PDF

The Effects of Public Library Service Using Book-Trailer on User Behavioral Reaction (공공도서관 북트레일러 서비스가 이용자 행동반응정도에 미치는 영향)

  • Hong, Myoung-A;Yi, Yong Jeong;Jeong, Tae-Seon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.4
    • /
    • pp.83-105
    • /
    • 2020
  • The study explored the extent of the effect of content book trailer services among the specialized services of the library using the latest technology. The AIDMA&AISAS model was employed to measure the seven reactions of user behavior: Attention, Interest, Search, Desire, Memory, Action, and Share. A total of 287 responses were analyzed by conducting surveys with users who had experienced book trailer services at 13 public libraries located in Incheon. The study found that there were significant differences in user behavioral reactions in all of the content genre, including message, conflict, and character, and in particular, the character genre had the highest effects, followed by conflict and message genres. However, the post-hoc test indicated that there was no significant difference between the genres of conflict and character in terms of interest, search, and user satisfaction. The present study suggests theoretical implications by assessing and confirming the effects of book trailer services of the content genre on the reactions of user behavior compared with previous studies that measured the effects of the book trailer services of the form genre, and further practical implications for effective book trailer services.

The Magnitude of the Third-person Effect by Comparison Target: A Study on the Effects of Relation of Perceivers to the Comparison Targets and Their Involvement in the Issue (지각대상자에 따른 제3자 효과 지각 변화의 원인: 수용자와 지각대상자의 관계와 관여도를 중심으로)

  • Jeong, Ir-Kwon
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.362-393
    • /
    • 2006
  • The purpose of this manuscript was to investigate the effects of issue involvement and relation of perceivers to comparison targets on the magnitude of third person perceptions. The investigation was expected to help us to understand the underlying process of third person effect hypothesis. Data was collected from adult residents in Ohio, United States by telephone survey in 2003(n=524). Like most other third person effect studies, this study supported the hypothesis: Respondents perceived more media effects on others than themselves for both 'Negative media portrayals of smokers' and 'News coverage of Roman Catholic priest's sexual scandals'. Results of five hypothesis tests suggest that when relationship between a perceiver and a particular comparison target is present third person perception is explained more by cognitive components than motivational components. In this case, third person perception varies with comparison target's issue involvement while it is independent of social distance between the perceivers and the comparison target. Also, perceivers' issue involvement positively correlates with the magnitude of third person effect. Based on the results, it is concluded that when perceives or a comparison target is involved in a message cognitive processes accounting for the relationship can impact the magnitude of third person effect. An important theoretical implication of the study is that third person effect is, to some extent, related with framing effect and priming effect.

  • PDF

A Study on Reliable Multicast Transmission using Recovery Cluster (복구 클러스터를 이용한 신뢰성 있는 멀티캐스트 전송에 관한 연구)

  • Gu, Myeong-Mo;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.1-6
    • /
    • 2019
  • Multicast is an efficient method for real-time transmission in many multimedia applications. It is important to recover lost packets and to manage multicast groups according to the network status in order to improve the reliability of multicast transmissions. In this paper, we propose a method that can efficiently recover lost packets in a large multicast group. In the proposed method, we create a recovery cluster (RC) using a multicast domain (MD) for recovery of lost packets. In the conventional methods, clusters send a request message for lost packets to the senders in order to recover the packets lost from many multicast applications. This increases packet delay time and overhead because of the feedback messages and retransmitted packets. In the proposed method, we improve these problems using the RC, which consists of many MDs (which have overlay multicast senders), and many cluster heads (CHs). We divide the message into blocks, and divide each block into many segments for packet recovery using the CHs. When packet loss occurs, all CHs share the segment information and recover the lost segments at the same time. Simulation results show that the proposed method could improve the packet recovery ratio by about 50% compared to the conventional methods.

Contents Routing in the OpenFlow-based Wireless Mesh Network Environment (OpenFlow기반 무선 메쉬 네트워크 환경에서의 컨텐츠 라우팅)

  • Kim, Won-Suk;Chung, Sang-Hwa;Choi, Hyun-Suk;Do, Mi-Rim
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.810-823
    • /
    • 2014
  • The wireless mesh network based on IEEE 802.11s provides a routing based on a destination address as it inherits legacy internet architecture. However, this architecture interested in not 'what' which is originally the users goal but 'where'. Futhermore, because of the rapid increase of the number of mobile devices recently, the mobile traffic increases geometrically. It reduces the network effectiveness as increasing many packets which have same payload in the situation of many users access to the same contents. In this paper, we propose an OpenFlow-based contents routing for the wireless mesh network(WMN) to solve this problem. We implement contents layer to the legacy network layer which mesh network uses and the routing technique based on contents identifier for efficient contents routing. In addition we provide flexibility as we use OpenFlow. By using this, we implement caching technique to improve effectiveness of network as decreasing the packet which has same payload in WSN. We measure the network usage to compare the flooding technique, we measure the delay to compare environment using caching and non caching. As a result of delay measure it shows 20% of performance improve, and controller message decrease maximum 89%.

A Robust Continuous Object Tracking Protocol Using Chained Selective Wakeup Strategy in Wireless Sensor Networks (무선 센서 네트워크에서 연결된 선택적 활성화 기법을 사용하는 강건한 연속 객체 추적 프로토콜)

  • Hong, Hyungseop;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.1
    • /
    • pp.72-79
    • /
    • 2013
  • In wireless sensor networks, the selective wakeup scheme is one of the energy saving mechanisms, that is used for an object detecting or tracking. Recently, many protocols are proposed using the selective wakeup scheme for the continuous objects tracking such as forest fires and poison gas. They predict the future shape of continuous objects and activate only sensors in the predicted boundary area of the objects. It works correctly in a uniformly deployed wireless sensor networks. However, it cannot be directly applied to a randomly deployed sensor networks with voids. When the predicted area is in the void area, the activation message cannot reach and the predicted area cannot be activated at the right time. It leads to many detection errors for continuous object. Moreover, if a sensor is once foiled in a activation control then the next activation control might be continuously failed. The detection errors can be result in serious harm to people. In this paper, we propose a chaining selective wakeup scheme for robust continuous object tracking in wireless sensor networks. In our protocol, we collect the information of a void area during the network configuration time; if the next boundary area is in the void area, we activate the chained area surrounding the void area with activation control message.

An Implementation of System for Detecting and Filtering Malicious URLs (악성 URL 탐지 및 필터링 시스템 구현)

  • Chang, Hye-Young;Kim, Min-Jae;Kim, Dong-Jin;Lee, Jin-Young;Kim, Hong-Kun;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.405-414
    • /
    • 2010
  • According to the statistics of SecurityFocus in 2008, client-side attacks through the Microsoft Internet Explorer have increased by more than 50%. In this paper, we have implemented a behavior-based malicious web page detection system and a blacklist-based malicious web page filtering system. To do this, we first efficiently collected the target URLs by constructing a crawling system. The malicious URL detection system, run on a specific server, visits and renders actively the collected web pages under virtual machine environment. To detect whether each web page is malicious or not, the system state changes of the virtual machine are checked after rendering the page. If abnormal state changes are detected, we conclude the rendered web page is malicious, and insert it into the blacklist of malicious web pages. The malicious URL filtering system, run on the web client machine, filters malicious web pages based on the blacklist when a user visits web sites. We have enhanced system performance by automatically handling message boxes at the time of ULR analysis on the detection system. Experimental results show that the game sites contain up to three times more malicious pages than the other sites, and many attacks incur a file creation and a registry key modification.