• Title/Summary/Keyword: External event

Search Result 219, Processing Time 0.028 seconds

Context Centrality in Distributions of Advertising Messages and Online Consumer Behavior

  • CHAE, Myoung-Jin
    • Journal of Distribution Science
    • /
    • v.20 no.8
    • /
    • pp.123-133
    • /
    • 2022
  • Purpose: As moment-based marketing messages (i.e., messages related to current moments or event), companies put significant investments to distribute TV advertising related to external moments in a retail environment. While the literature offers strong support for the value of distributions of context-based messaging to advertisers, less attention has been given to how to design those messages to effectively communicate across channels. This research adds a new dimension of analysis to the study of advertising context and its cross-channel effects on online consumer behavior. Research Design, Data and Methodology: A system-of-equations Tobit regression model was adopted using data collected from an advertising agency that consists of 1,223 TV ads aired during the Rio Olympics and NCAA, tagging from consumers, and a text analysis. Results: First, TV ads with high centrality of context lead to lower online search behavior and higher online social actions. Second, how brands can design messages more effectively was explored by using product information as a moderator that could improve the impact of context-based TV advertisements. Conclusions: Given that expenses in traditional channels are still one of the biggest channel management decisions, it is critical to understand how consumer engagement varies by design of context-based TV advertising.

Grey algorithmic control and identification for dynamic coupling composite structures

  • ZY Chen;Ruei-yuan Wang;Yahui Meng;Timothy Chen
    • Steel and Composite Structures
    • /
    • v.49 no.4
    • /
    • pp.407-417
    • /
    • 2023
  • After a disaster like the catastrophic earthquake, the government have to use rapid assessment of the condition (or damage) of bridges, buildings and other infrastructures is mandatory for rapid feedbacks, rescue and post-event management. Many domain schemes based on the measured vibration computations, including least squares estimation and neural fuzzy logic control, have been studied and found to be effective for online/offline monitoring of structural damage. Traditional strategies require all external stimulus data (input data) which have been measured available, but this may not be the generalized for all structures. In this article, a new method with unknown inputs (excitations) is provided to identify structural matrix such as stiffness, mass, damping and other nonlinear parts, unknown disturbances for example. An analytical solution is thus constructed and presented because the solution in the existing literature has not been available. The goals of this paper are towards access to adequate, safe and affordable housing and basic services, promotion of inclusive and sustainable urbanization and participation, implementation of sustainable and disaster-resilient buildings, sustainable human settlement planning and manage. Simulation results of linear and nonlinear structures show that the proposed method is able to identify structural parameters and their changes due to damage and unknown excitations. Therefore, the goal is believed to achieved in the near future by the ongoing development of AI and control theory.

Techniques for Improving Host-based Anomaly Detection Performance using Attack Event Types and Occurrence Frequencies

  • Juyeon Lee;Daeseon Choi;Seung-Hyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.89-101
    • /
    • 2023
  • In order to prevent damages caused by cyber-attacks on nations, businesses, and other entities, anomaly detection techniques for early detection of attackers have been consistently researched. Real-time reduction and false positive reduction are essential to promptly prevent external or internal intrusion attacks. In this study, we hypothesized that the type and frequency of attack events would influence the improvement of anomaly detection true positive rates and reduction of false positive rates. To validate this hypothesis, we utilized the 2015 login log dataset from the Los Alamos National Laboratory. Applying the preprocessed data to representative anomaly detection algorithms, we confirmed that using characteristics that simultaneously consider the type and frequency of attack events is highly effective in reducing false positives and execution time for anomaly detection.

A Systems Engineering Approach to Ex-Vessel Cooling Strategy for APR1400 under Extended Station Blackout Conditions

  • Saja Rababah;Aya Diab
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.2
    • /
    • pp.32-45
    • /
    • 2023
  • Implementing Severe Accident Management (SAM) strategies is crucial for enhancing a nuclear power plant's resilience and safety against severe accidents conditions represented in the analysis of Station Blackout (SBO) event. Among these critical approaches, the In-Vessel Retention (IVR) through External Reactor Vessel Cooling (IVR-ERVC) strategy plays a key role in preventing vessel failure. This work is designed to evaluate the efficacy of the IVR strategy for a high-power density reactor APR1400. The APR1400's plant is represented and simulated under steady-state and transient conditions for a station blackout (SBO) accident scenario using the computer code, ASYST. The APR1400's thermal-hydraulic response is analyzed to assess its performance as it progresses toward a severe accident scenario during an extended SBO. The effectiveness of emergency operating procedures (EOPs) and severe accident management guidelines (SAMGs) are systematically examined to assess their ability to mitigate the accident. A group of associated key phenomena selected based on Phenomenon Identification and Ranking Tables (PIRT) and uncertain parameters are identified accordingly and then propagated within DAKOTA Uncertainty Quantification (UQ) framework until a statistically representative sample is obtained and hence determine the uncertainty bands of key system parameters. The Systems Engineering methodology is applied to direct the progression of work, ensuring systematic and efficient execution.

The Qualitative Study on the Customer Experience of Shopping Centers - Focused on Comparison between Internal and External Experience Elements on the Fashion Brand Stores - (대형 쇼핑센터에서의 소비자 체험에 관한 탐색적 연구 - 패션브랜드 매장 내·외부에서의 체험요소 비교를 중심으로 -)

  • Kim, Jeong Hee;Lee, Jin Hwa
    • Korean Journal of Human Ecology
    • /
    • v.23 no.1
    • /
    • pp.101-122
    • /
    • 2014
  • In this study, the Pine & Gilmore(1998) and Schmitt(1999, 2003), based on previous studies. Recent trends in large department stores and distribution outlets, discount stores and large retail centers, such as the consumer's experience is divided into internal and external fashion brand stores navigation study. Fashion Brand Stores are defined as the inside of the fashion brand store of the form that sells only the products of a fashion company's brand. Meanwhile, shopping center is defined as all the places at the inside and out of the shopping center excluding the inside of the fashion brand store. Likewise, definitions are clarified as such for use. As for the research method for this study, semi-structured focus group interviews were used since they could provide many more data compared to in-depth interviews. Accordingly, data was collected while carrying out free discussions while two to three subjects listened to each other's opinion regarding the key words raised by the interviewer and while thinking about their experience at the inside and outside of the fashion brand stores. As for the subjects, female consumers between the ages of 20 and 50 were targeted, and the interviews conducted with four, seven, four and three women in their 20s, 30s, 40s and 50s, were used, respectively. Likewise, there were a total of 18 subjects. Exploratory Study of Customer Experience area was classified into integration of significance and categorization. In particular, the contents were classified into elements of experience inside the fashion brand stores and fashion brand stores outsider experience in the shopping center elements and the elements of the common experience of fashion stores and shopping centers based on the results concerning the key contents identified in-depth from the customer aspect. The key experience elements at the inside of fashion brand stores were identified as VMD experience, emotional experience, and experience of the service provided by sales representatives. As for the key experience elements at the shopping center which is at the outside of the fashion brand store, they included service scape experience, cultural event experience, playful behavior experience. Meanwhile, elements of common experience included educational experience and exclusivity experience and human respect experience, which demonstrated some difference in terms of the contents.

A Study of the Force Majeure as Immunity by 3rd Party Liability of the Aircraft-Operator -With respect to the German Aviation Act- (항공기운항자의 제3자 책임에 관한 면책사유로서의 불가항력 조항에 관한 고찰 - 독일 항공법상의 해석을 중심으로 -)

  • Kim, Sung-Mi
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.31 no.1
    • /
    • pp.37-62
    • /
    • 2016
  • Two controversial issues exist in interpretation of "Force Majeure" set forth in the Article 931 (4) of the Korean Commercial Code. Firstly, its scope of application is ambiguous. Secondly, there is a concern that the "immunity" under paragraph 1 and "Force Majeure" may overlap each other. "Force Majeure" refers an event resulted from either natural disaster or 3rd-party. Meanwhile, the latter implies relatively extensive and comprehensive meaning and its interpretation may vary depends on law enforcement. In general, the aircraft accident hardly results in damage or loss to the 3rd-party. Additionally, it is worth to review newly enacted clause and to define its applicability. When the 3rd party is suffered from damage or loss incurred by any external act, it is necessary to explicit the concept of the non-contractual liabilities with respect to 3rd party. From the perspective of protecting aviation industries, the commercial aviation operator may be entitled to immunity in respect of claim for damage incurred by the event of Force Majeure. However, this approach is directly opposite to the victim's benefit and protection by the law. Therefore, the priority of the legal protection should be considered. Although the interest of the commercial aviation operator is not negligible, the protection of the law should be favorable to the 3rd party. Otherwise, the innocent party has no right to claim for damage incurred by aviation accident. Another issue is about the possibility of overlapping of the provision set forth in the paragraph 1 and 4. The former states that the liabilities shall be exempted on account of either the unsettled political or economic situation but this clause is inconsistent with the interpretation on Force Majeure under the latter. As argued above, this may include any event resulted from either political or economic account by the external influence of the 3rd party, thus these two provisions are overlapped. Consequently, in order to develop ordinances and guidelines and to ensure an equal protection to both parties, above two issues must remain open for further discussions.

Professionalism raising of the escort which leads an instance analysis (사례분석을 통한 경호 전문성 제고)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.73-99
    • /
    • 2009
  • There are three assassination and treatening cases in this thesis introduced as analysis data. They are shooting accidents of the U.S.A's President Reagun (1981,3.30), and the President Park Jeong Hee of South Korea(1974.8.15), assassination of the Prime Minister Lavin of Israel (1995.11.4) In March 30, 1981, there was an accident where criminal, Hinckley, fired ball cartridges right before the President Reagan got into the car to move to White House after completing the announcement of Hilton Hotel of Washington. As a result, the chest of president was shot and public information secretary and safeguard were wounded. In August, 15, pm 10:23, where the 29th 8.15 independent anniversay event was being celebrated by the people at the National theater in Jangchungdong, Seoul, the criminal Moon Sekwang fired ball cartridges, he failed to assassinate the President Park Jeong Hee of Korea, but shot the First lady Yuk Young Soo. She was wounded right part of head and died. In November 4, Saturday, pm 22:00 the Prime Minster Lavin had finished the supporting event of Middle Asia's Peace project and was taking on the car when he was killed by the criminal Amir's shooting, The accidents left very important lesson from the aspect of security analysis and it has been frequently used as a material for the education and training of safeguard organization. In Korea, as well as Presidential Security Service, national security departments have selected it as an important model for the subjects such as 'Security Analysis, 'Security Practice' and 'Security Methodology'. In the performance of security duty, security skill is the most important matter. Moreover, it has a close relationship with politics, society and culture. The purpose of this study is to analyze and reevaluate the case, which has been treated as a usual model from the aspect of security analysis, beyond its introduction. Attempted assassination of President Reagan was evaluated as a positive success example because of its rapid response of adjacent guards to evacuate Reagan, who is a guard target, within 10 seconds after the shot. When comparing it to President Kennedy Assassination of 1963, it was evaluated that guards were significantly specialized. In the study, however, it was possible to found many problems such as carelessness of guard, who is in charge of external area of event place, idle attitude for frequently used event place, confusion of wireless communication, risk of wireless security disclose, insufficient provision of compulsory record file, insufficient profiling of dangerous person and unsecured hospital and first-aid room.

  • PDF

Motor Imagery Brain Signal Analysis for EEG-based Mouse Control (뇌전도 기반 마우스 제어를 위한 동작 상상 뇌 신호 분석)

  • Lee, Kyeong-Yeon;Lee, Tae-Hoon;Lee, Sang-Yoon
    • Korean Journal of Cognitive Science
    • /
    • v.21 no.2
    • /
    • pp.309-338
    • /
    • 2010
  • In this paper, we studied the brain-computer interface (BCI). BCIs help severely disabled people to control external devices by analyzing their brain signals evoked from motor imageries. The findings in the field of neurophysiology revealed that the power of $\beta$(14-26 Hz) and $\mu$(8-12 Hz) rhythms decreases or increases in synchrony of the underlying neuronal populations in the sensorymotor cortex when people imagine the movement of their body parts. These are called Event-Related Desynchronization / Synchronization (ERD/ERS), respectively. We implemented a BCI-based mouse interface system which enabled subjects to control a computer mouse cursor into four different directions (e.g., up, down, left, and right) by analyzing brain signal patterns online. Tongue, foot, left-hand, and right-hand motor imageries were utilized to stimulate a human brain. We used a non-invasive EEG which records brain's spontaneous electrical activity over a short period of time by placing electrodes on the scalp. Because of the nature of the EEG signals, i.e., low amplitude and vulnerability to artifacts and noise, it is hard to analyze and classify brain signals measured by EEG directly. In order to overcome these obstacles, we applied statistical machine-learning techniques. We could achieve high performance in the classification of four motor imageries by employing Common Spatial Pattern (CSP) and Linear Discriminant Analysis (LDA) which transformed input EEG signals into a new coordinate system making the variances among different motor imagery signals maximized for easy classification. From the inspection of the topographies of the results, we could also confirm ERD/ERS appeared at different brain areas for different motor imageries showing the correspondence with the anatomical and neurophysiological knowledge.

  • PDF

Architectural Refactoring of Real-Time Software Design for Predictable Controls of Artificial Heart (인공심장의 예측 가능한 제어를 위한 실시간 소프트웨어 설계 구조의 개선)

  • Jeong, Se-Hun;Kim, Hee-Jin;Park, Sang-Soo;Cha, Sung-Deok
    • The KIPS Transactions:PartA
    • /
    • v.18A no.6
    • /
    • pp.271-280
    • /
    • 2011
  • Time-Triggered Architecture (TTA), one of real-time software design paradigms which executes tasks in timely manner, has long been advocated as being better suited in fore-sighting system behavior than event-triggered architecture (ETA). To gain this valuable feature of TTA, however, precise task designing process is mandatory. Alternatively, ETA tries to execute tasks whenever paired events are occurred. It provides intuitive and flexible basement to add/remove tasks and, moreover, better response time performance. However ETA is difficult to analyze because system behavior might be different depending on the order of interrupts detected by the system. Many previous researches recommended TTA when developing safety-critical real-time systems, but cost problem of task designing process and insufficient consensus for applying rigorous software engineering practice are still challenging in practice. This paper describes software refactoring process which applying TTA approach into ETA based embedded software in artificial heart system. We implemented dedicated interrupt monitoring program to capture existing tasks' real-time characteristics. Based on the captured information, proper task designing process is done. Real-time analysis using RMA (Rate-Monotonic Analysis) verified that new design guarantees timeliness of the system. Empirical experiments revealed that revised design is as efficient, when measured in terms of system's external output, as the old design and enhances predictability of the system behavior as well.

A Study of the Tower Crane Hoisting Time Estimation Simulation Model with Climate Element for the High-Rise Building Construction (기후요소를 고려한 초고층 건설공사의 타워크레인 양중시간 예측 시뮬레이션 모델)

  • Yang, Kanghyeok;Lee, Hyun-Soo;Park, Moonseo;Jung, Minhyeok;Hwang, Sungjoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.2
    • /
    • pp.96-107
    • /
    • 2013
  • Tower crane hoisting plan is one of the key element for the success of entire High-Rise Building construction. Hoisting time is the basic factor to appropriate hoisting plan which need to the hoisting load estimate and tower crane selection. With this reason, accurate hoisting time is needed to the proper hoisting plan. The current hoisting time estimation for High-Rise Building focus on the hoisting cycle time estimation with historical data. However, this method underestimated the external influences like environmental factor. Thus, this paper aims to develop the hoisting time estimation model with discrete event simulation which include the wind influences with certain height. According to the simulation result, the hoisting time which applied wind influence is increasing with height growth. Because of the high speed wind, the upper area of building has more operation delay time than the mechanical operation time. Seoul, the research area, has the most fastest wind speed on April and the least on October. Due to these differences of wind speed, the hoisting time is estimated with significant differences between April and October. This hosting time estimation model would be used for estimating the influence of wind. Moreover, this could apply to make the realistic hoisting plan.