• Title/Summary/Keyword: Communication message

Search Result 1,633, Processing Time 0.026 seconds

Attributes of Social Networking Services : A Classification and Comparison (소셜 네트워크 서비스의 속성 : 분류와 비교)

  • Sohn, Jeong Woong;Kim, Jin Ki
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.1
    • /
    • pp.24-38
    • /
    • 2018
  • Since a social networking service (SNS) isconsidered as an effective means to communicate and interact with customers, companies are trying to utilize SNS effectively. There is a lack of theory relating to the attributes of SNS. This study aims to investigate the attributes of SNS to classify SNS. Based on the social network theory, and previous studies on internet, blog, homepage, communication attributes, this study proposes the seven attributes to classify SNS: interaction, communication, entertainment, information, sharing, intimacy and connection. A pre-test, a pilot test and a main test are conducted. In the main test, 239 SNS users are participated. Through a factor analysis this study verifies the seven attributes of SNS. An analysis of variance with multiple comparisons of $Scheff{\acute{e}}$ method identifies that three attributes, interaction, communication and connection, are found to play significant roles to differentiate SNS. Looking at the overall mean values of the SNS by attribute, interaction, sharing, entertainment, intimacy and communication were relatively high in Facebook. Facebook showed higher values in attributes of interaction, sharing, entertainment, intimacy and communication. Twitter shows the relatively high scores for information and connection. Regarding interaction, Facebook shows higher scores than Twitter and Cyworld. For connection, Cyworld showed a significantly lower score than Twitter and Facebook. Cyworld was separated from the others in the light of communication. Cyworld is relatively weak in communication as it is limited to the message exchanges. The results will help in identifying major attributes for each SNS and classifying SNS.

Implementation of Two-way Data Link using the Thuraya Geostationary Orbit Satellite (Thuraya 정지궤도 위성을 이용한 양방향 데이터 링크 구현)

  • Jang, Won-Chang;Lee, Myung-Eui
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.333-338
    • /
    • 2019
  • Satellite communication is not used by many people like mobile communication, but it is a necessary technology for public service and communication services, such as providing the Internet in military, disaster, remote education and medical services, island areas, and infrastructure vulnerable areas. However, most communication modems have problems with two-way communication with server as IP addresses are assigned to floating IP that change every time they communicate with the network. In this paper, we used the Raspberry Pi as the controller of the terminal device to communicate the network through the satellite modem and the PPP protocol, and to solve the problem of the modem with the floating IP, we used the text message function of the satellite modem. Through this process, two-way data links using the Thuraya geostationary orbit satellite were implemented.

Fantastic Collaboration of Financial Services and Telecommunication: a Frontier Case of Integrated Marketing Communication of 'Club SK Card'

  • Lee, Seon Min;Chun, Seungwoo;Joo, Young Hyuck;Yoo, Changjo
    • Asia Marketing Journal
    • /
    • v.15 no.4
    • /
    • pp.223-241
    • /
    • 2014
  • In May 2012, the collaboration of Hana Bank, top financial service company, and SK Planet, top telecommunication service provider, introduced a new credit card that was filled with all-in-one benefits into the market. Leveraging strong infrastructure of two companies, each top in its own industries, the awareness and preference of 'Club SK Card' brand rapidly increased to about 25% in less than one year. Moreover, this new card was enthroned in the most sold credit card of year 2012, accounting for a market share of 7.2% in the credit card market and more than 80% in the mobile credit card market. To make these results possible, 'Club SK Card' marketing team developed an effective marketing communication strategy which followed the 6M model. The mission of the marketing communication strategy was simple and clear. It was to deliver the card's inherent strengths on consumer benefits that come from the support of subsidiary and affiliated companies of SK Planet. According to OK Cashbag data, the marketing communication team selected the appropriate target consumers and approached them directly, inducing actual purchase behavior. The target consumers received straightforward messages about 'Club SK Card' and were led to join in the new membership at their most frequently visited supermarket or franchise restaurant. The straightforward communication message embedded in an eye-catching commercial ad with a hook song accompanied with a dance was delivered via public media. The ad became so popular that many other television programs quoted or made parodies of the ad. Courtesy of the commercial ad, the brand name disseminated rapidly and widely among the public. In October 2012, an ingenious planning and persistent implementation of the communication strategy results 'Club SK Card' to be ranked top in brand awareness as well as advertising preference tests.

  • PDF

A Study on Intensified scheme to WLAN Secure based on IEEE 802.1x Framework (IEEE 802.1x 프레임워크 기반에서의 무선랜 보안 강화 방안에 관한 연구)

  • Lee Joon;Hong Seong-pyo;Shin Myeong-sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.136-141
    • /
    • 2006
  • The IEEE 802.1x can be using various user authentication mechanisms: One-Time Password, Certificate-Based TLS, Challenge/Response and Keberos through EAP(Extended Authentication Protocol). But, IEEE 802.1x also has vulnerabilities about the DoS, the session hijacking and the Man in the Middle attack due to the absence of AP authentication. In this paper, we propose a WLAN secure system which can offer a safety secure communication and a user authentications by intensified the vulnerability of spoofing and DoS attacks. The suppose system offers a safe secure communication because it offers sending message of integrity service and also it prevents DoS attack at authentication initial phase.

A Novel Approach for Accessing Semantic Data by Translating RESTful/JSON Commands into SPARQL Messages

  • Nguyen, Khiem Minh;Nguyen, Hai Thanh;Huynh, Hiep Xuan
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.3
    • /
    • pp.222-229
    • /
    • 2016
  • Linked Data is a powerful technology for storing and publishing the structures of data. It is helpful for web applications because of its usefulness through semantic query data. However, using Linked Data is not easy for ordinary users who lack knowledge about the structure of data or the query syntax of Linked Data. For that problem, we propose a translator component that is used for translating RESTful/JSON request messages into SPARQL commands based on ontology - a metadata that describes the structure of data. Clients do not need to worry about the structure of stored data or SPARQL, a kind of query language used for querying linked data that not many people know, when they insert a new instance or query for all instances of any specific class with those complex structure data. In addition, the translator component has the search function that can find a set of data from multiple classes based on finding the shortest paths between the target classes - the original set that user provide, and target classes- the users want to get. This translator component will be applied for any dynamic ontological structure as well as automatically generate a SPARQL command based on users' request message.

Implementation and Performance Analysis of Event Processing and Buffer Managing Techniques for DDS (고성능 데이터 발간/구독 미들웨어의 이벤트, 버퍼 처리 기술 및 성능 분석)

  • Yoon, Gunjae;Choi, Hoon
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.449-459
    • /
    • 2017
  • Data Distribution Service (DDS) is a communication middleware that supports a flexible, scalable and real-time communication capability. This paper describes several techniques to improve the performance of DDS middleware. Detailed events for the internal behavior of the middleware are defined. A DDS message is disassembled into several submessages of independent, meaningful units for event-driven structuring in order to reduce the processing complexity. The proposed technique of history cache management is also described. It utilizes the fact that status access and random access to the history cache occur more frequently in the DDS. These methods have been implemented in the EchoDDS, the DDS implementation developed by our team, and it showed improved performance.

Reversible Watermarking Using Adaptive Edge-Guided Interpolation

  • Dai, Ningjie;Feng, Guorui;Zeng, Qian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.856-873
    • /
    • 2011
  • Reversible watermarking is an open problem in information hiding field, with embedding the encoded bit '1' or '0' into some sensitive images, such as the law enforcement, medical records and military images. The technique can retrieve the original image without distortion, after the embedded message has been extracted. Histogram-based scheme is a remarkable breakthrough in reversible watermarking schemes, in terms of high embedding capacity and low distortion. This scheme is lack of capacity control due to the requirement for embedding large-scale data, because the largest hidden capacity is decided by the amount of pixels with the peak point. In this paper, we propose a reversible watermarking scheme to enlarge the number of pixels with the peak point as large as possible. This algorithm is based on an adaptive edge-guided interpolation, furthermore, hides messages by interpolation-error, i.e. the difference between the original and interpolated image value. Simulation results compared with other state-of-the-art reversible watermarking schemes in this paper demonstrate the validity of the proposed algorithm.

Implementation and Performance Evaluation of a Wireless VoIP System based on the Binary-CDMA Technology (Binary CDMA 기반의 무선 VoIP 시스템의 구현 및 성능평가)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2555-2562
    • /
    • 2011
  • Binary CDMA is a new standard technology for wireless communication developed by our country that makes high speed communications and good quality of services. In this paper we researched the development methods and implementation of a wireless VoIP System based on the Binary-CDMA technology that makes it freely installed in any place without phone cables and laying works. We designed the structure of the Binary-CDMA Wireless VoIP System and defined messages and data structures for call control. And then we designed and implemented call control message flow between VoIP terminals for user's communication.

An Implementation of an Operating System with multiple personalities : design of the Direct Procedure Call IPC scheme (다중개성 운영체계의 구현에 관한 연구 : 직접 프로시져 호출 방식의 통신기법)

  • Cho, Shi-Hoon;Bang, Nam-Seok;Lee, Joon-Won
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.9
    • /
    • pp.2404-2414
    • /
    • 1998
  • An operating system should be easy to extend and to be customized to accomodate the diverse needs when it is to support multiple personalities. Though microkernel is the best as architecture for such customization, it raises performance issues due to its intrinsic overhead in interprocess communication. In this paper, we present a new !PC mechanism that overcomes the traditional IPC performance lag by providing a direct bridge between processes. The communication overhead is similar to the one of local procedure call, which is the known minimal overhead. Even in its worst case, our scheme is shown to pcrfonn better than the other alternative, the message passing scheme.

  • PDF

Extended Information Pool and Indirect Meeting Mechanism for Inter-agent Communications (이동에이전트간 통신을 지원하는 확장된 정보 저장소와 간접 미팅 기법)

  • Jeon, Byung-Kook;Yi, Keun-Sang;Choi, Yung-Keun
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.131-137
    • /
    • 2000
  • The communication and collaboration of mobile agents are efficient in doing information processing in the Internet. Therefore, this paper proposes an efficient communication mechanism that support to inter-agent communications and collaborations. For the remark mentioned above, a mobile agent system provides an indirect meeting mechanism as well as an extended information pool, which has an effect on decreasing network bandwidth. In addition, some proposed communication methods can support to message multicasting so that those are effectively adapted for a model of group agent. Finally, the proposed mechanism is implemented and analyzed in the MAS, a mobile agent system model developed by the Java language.

  • PDF