• Title/Summary/Keyword: Ad-Execution

Search Result 32, Processing Time 0.022 seconds

Customers' Brand Attitude and Purchase Intention Formation Process by Advertising Execution Types - A Korean Coffee Shop Case (커피전문점의 광고실행 유형이 고객의 상표태도 및 구매의도 형성과정에 미치는 영향)

  • Chung, Hyunyoung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.866-876
    • /
    • 2013
  • For the purpose of creating or maintaining a favorable customers' attitude tourism service firms use an advertising as a communication tool by changing ad-execution formats. Affective or informational ad-executions are normally applied for the service industry. In this study ad-attitude, products attitude, and purchase intention are tested whether the variables would be influenced by the ad-execution formats. As the result the study found that Ad-attitude influenced on product attitude but not on purchase intentions in the affective ad-execution format, whereas the Ad-attitude influenced both on product attitude and purchase intentions.

Concurrency Control Method using the Asynchronous Data Broadcast in Mobile Computing Environments (이동 컴퓨팅 환경에서 비동기적 데이터방송을 사용한 동시성 제어 기법)

  • Ko Seung-Min;Kim Dae-In;Im Sun-Mo;Hwang Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.21-30
    • /
    • 2005
  • In mobile computing environments, a mobile host caches the data to use the narrow bandwidth efficiently and improve the response time. A server periodically broadcasts the update data for maintaining the cache consistency of a mobile host. However, a method for maintaining cache consistency using periodic invalidation report has a problem that defers the commit decision of a mobile transaction to guarantee its serializable execution. In this paper, we propose CCM-AD method that guarantees the serializable execution of a mobile transaction even in the case that it is executed using cached data. As CCM-AD method guarantees the serializable execution of mobile transactions by using the intersection between the data broadcast to mobile host and the data updated at server. Then the CCM-AD method can reduce the delay of commitment decision of a mobile transaction. Also our method can reduce the size of invalidation report.

Effective Webtoon Advertising Production and Media Execution Strategy: Focusing on Attitudes Effect (효과적인 웹툰 광고제작과 매체집행 전략: 태도 효과를 중심으로)

  • Yu, Seung-Yeob
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.585-595
    • /
    • 2022
  • This study confirmed the effect of attitude factors on advertisement effect for the purpose of producing effective webtoon advertisement and suggesting media execution strategy. Data were collected using the experimental method. The research results are as follows. First, it was found that only the attitude of advertisement had a significant effect on the advertisement attention when the form of the webtoon advertisement was general format type ad. Second, when the form of webtoon advertisement was general format type ad, advertisement attitude and product attitude had a significant effect on advertisement click intention. Third, when the placement of the webtoon advertisement was inserted in the middle of the webtoon, the advertisement attitude had a significant effect on the advertisement attention. Fourth, when the product of the webtoon advertisement was an experience product, it was advertisement attitude that had a significant effect on advertisement attention. This study is valuable in that it proposed a strategy for producing webtoon advertisements and executing media through experimental research.

A Study of Ad Avoidance Level, Ad Avoidance Type and Its Predictors in Various Mobile Ad Formats (모바일 광고포맷에 따른 광고회피 수준, 회피 유형, 요인에 관한 연구)

  • Byun, Sung-Hyuk;Cho, Chang-Hoan
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.345-358
    • /
    • 2019
  • In this study, we wanted to identify the level of ad avoidance, type of ad avoidance and predictors that affect ad avoidance according to mobile ad formats. A survey was conducted on users who had experienced mobile ads and a total of 276 responses were used for the analysis. Studies showed that push ad had the highest level of avoidance. In addition, when looking at the type of ad avoidance, the highest ad avoidance type was immediate ad avoidance in all established ad formats and the lowest ad avoidance type was prior ad avoidance. The results of predicting ad avoidance showed that among 11 independent variables, perceived intrusive variable had a positive (+) effect in all ad formats except push ad and attitude toward mobile ad variable had a negative (-) effect in the push ad. This study is meaningful in that it was a comprehensive comparative analysis by subdividing the advertising formats implemented in mobile. This study is also meaningful in that studying how ad avoidance levels and avoidance types differed accordingly and what were the variables that affect ad avoidance. It also had the practical significance that could help establish an efficient ad execution strategy that reflected the characteristics of mobile devices.

A Data Fault Attack on the Miller Algorithm for Pairing Computation in Mobile Ad-Hoc Network Environments (이동 Ad-Hoc 네트워크 환경에서 페어링 연산의 밀러 알고리듬에 대한 데이터 오류 공격)

  • Bae, KiSeok;Sohn, GyoYong;Park, YoungHo;Moon, SangJae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.70-79
    • /
    • 2013
  • Recently, there has been introduced various types of pairing computations to implement ID based cryptosystem for mobile ad hoc network. The Miller algorithm is the most popular algorithm for the typical pairing computation such as Weil, Tate and Ate. In this paper, we analyze the feasibility of concrete data fault injection attack, which was proposed by Whelan and Scott, in terms of regardless of round positions during the execution of the Miller algorithm. As the simulation results, the proposed attack that can be employed to regardless of round positions and coordinate systems is effective and powerful.

De-cloaking Malicious Activities in Smartphones Using HTTP Flow Mining

  • Su, Xin;Liu, Xuchong;Lin, Jiuchuang;He, Shiming;Fu, Zhangjie;Li, Wenjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3230-3253
    • /
    • 2017
  • Android malware steals users' private information, and embedded unsafe advertisement (ad) libraries, which execute unsafe code causing damage to users. The majority of such traffic is HTTP and is mixed with other normal traffic, which makes the detection of malware and unsafe ad libraries a challenging problem. To address this problem, this work describes a novel HTTP traffic flow mining approach to detect and categorize Android malware and unsafe ad library. This work designed AndroCollector, which can automatically execute the Android application (app) and collect the network traffic traces. From these traces, this work extracts HTTP traffic features along three important dimensions: quantitative, timing, and semantic and use these features for characterizing malware and unsafe ad libraries. Based on these HTTP traffic features, this work describes a supervised classification scheme for detecting malware and unsafe ad libraries. In addition, to help network operators, this work describes a fine-grained categorization method by generating fingerprints from HTTP request methods for each malware family and unsafe ad libraries. This work evaluated the scheme using HTTP traffic traces collected from 10778 Android apps. The experimental results show that the scheme can detect malware with 97% accuracy and unsafe ad libraries with 95% accuracy when tested on the popular third-party Android markets.

Routing Configuration Scheme of Ad hoc Node Using Smart Packet in Heterogeneous Routing Domains (이질적인 라우팅 도메인에서 스마트 패킷을 사용한 이동 노드의 라우팅 프로토콜 설정 기법)

  • Choi Jae-Duck;Roh Hyo-Sun;Kim Young-Han;Jung Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.803-810
    • /
    • 2006
  • Mobile ad hoc nodes are supposed to be equipped with a number of operation modules including a specific routing operation module in heterogeneous MANET environment. It is not possible for a mobile node to carry all the necessary operation modules due to the limited resources. This paper proposes a scheme to reconfiguring mobile ad hoc nodes using smart packets in heterogeneous routing domains. The smart packet protocol has a capability to transfer a binary execution module to a mobile node, by which a node can be equipped with any necessary routing modules in any MANET environment. The proposed smart packet agent is designed to be suitable to a light weight terminal owing to its simple architecture. The utility of the proposed scheme was demonstrated through an example of DYMO scenario in the wireless network.

A Study on Finances and Factors of weighting Cost in Government Constructions in the Late of Chosun Dynasty (조선 후기 관영건축공사(官營建築工事)의 재원과 비용 절감 방안에 관한 연구)

  • Lee, Kweon-Yeong
    • Journal of architectural history
    • /
    • v.11 no.3 s.31
    • /
    • pp.53-68
    • /
    • 2002
  • Since the 17th century, the finance for the government construction was demanded unlike the early chosun dynasty. It was consequent upon a transition in the supply method of materials and labors for the construction. The government construction being enforced in chronic financial difficulties had to undergo lack of funds. Especially, a rising construction cost by purchasing lots of materials including wood, and by employing labors weighted the difficulties. In order to put forward a construction, new and various efforts besides diversification in sources of finance ad been looked for. The efforts were driven in three parts which were to be the management of labor and materials, and the way of construction execution. As a result of spending a great effort to save cost, an extinguished improvement in the way of construction execution came out with 'Injungjeon-yeongkweon' in the year 1805.

  • PDF

A Genetic Algorithm for Cooperative Communication in Ad-hoc Networks (애드혹 네트워크에서 협력통신을 위한 유전 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.201-209
    • /
    • 2014
  • This paper proposes a genetic algorithm to maximize the connectivity among the mobile nodes for the cooperative communication in ad-hoc networks. In general, as the movement of the mobile nodes in the networks increases, the amount of calculation for finding the solution would be too much increased. To obtain the optimal solution within a reasonable computation time for a high-density network, we propose a genetic algorithm to obtain the optimal solution for maximizing the connectivity. In order to make a search more efficient, we propose some efficient neighborhood generating operations of the genetic algorithm. We evaluate those performances through some experiments in terms of the maximum number of connections and the execution time of the proposed algorithm. The comparison results show that the proposed algorithm outperforms other existing algorithms.

Efficient Idle Virtual Machine Management for Heterogeneous Cloud using Common Deployment Model

  • Saravanakumar, C.;Arun, C.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1501-1518
    • /
    • 2016
  • This paper presents an effective management of VM (Virtual Machine) for heterogeneous cloud using Common Deployment Model (CDM) brokering mechanism. The effective utilization of VM is achieved by means of task scheduling with VM placement technique. The placements of VM for the physical machine are analyzed with respect to execution time of the task. The idle time of the VMis utilized productively in order to improve the performance. The VMs are also scheduled to maintain the state of the current VM after the task completion. CDM based algorithm maintains two directories namely Active Directory (AD) and Passive Directory (PD). These directories maintain VM with proper configuration mapping of the physical machines to perform two operations namely VM migration and VM roll back. VM migration operation is performed from AD to PD whereas VM roll back operation is performed from PD to AD. The main objectives of the proposed algorithm is to manage the VM's idle time effectively and to maximize the utilization of resources at the data center. The VM placement and VM scheduling algorithms are analyzed in various dimensions of the cloud and the results are compared with iCanCloud model.