• Title/Summary/Keyword: Guide Message

Search Result 19, Processing Time 0.023 seconds

Message Structure of Persuasive Storytelling in Travel Guide Booklets of Great Chungchung Visit Year (관광안내서의 스토리텔링적 방문설득 메시지 구조 -대충청 방문의 해 공식 안내서를 중심으로-)

  • Lee, Jung-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.380-390
    • /
    • 2010
  • This study analyzed the message structure of persuasive storytelling which are expressed in the official travel guide booklets of 2010 Great Chungchung visit year. The qualitative content analysis technique proposed by Creswell was used. The results were: First, travel guide booklets used '~haseyo', '~hapsida' styles to persuade the readers in friendly manners. Second, booklets used adjectives such as 'beautiful', 'delightful' to emphasize the attractiveness of tourism product and events. With those adjectives, the message sounds more subtle and emotional to the readers so that the readers will be easily persuaded. Third, booklets used the polite ways of speaking to the readers by using '~supnida', '~hapnida'. Fourth, English version of booklets lacked of storytelling structure in message.

Asynchronous Cache Invalidation Strategy to Support Read-Only Transaction in Mobile Environments (이동 컴퓨팅 환경에서 읽기-전용 트랜잭션을 지원하기 위한 비동기적 캐쉬 무효화 기법)

  • Kim, Il-Do;Nam, Sung-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.325-334
    • /
    • 2003
  • In stateless server, if an asynchronous cache invalidation scheme attempts to support local processing of read-only transaction in mobile client/sever database systems, a critical problem may occur ; the asynchronous invalidation reports provide no guarantees of waiting time for mobile transactions requesting commit. To solve this problem, the server in our algorithm broadcasts two kind of messages, asynchronous invalidation report to reduce transaction latency and periodic guide message to avoid the uncertainty of waiting time for the next invalidation report. The asynchronous invalidation report has its own sequence number and the periodic guide message has the sequence number of the most recently broadcast asynchronous invalidation report. A mobile client checks its cache validity by using the sequence numbers of these messages.

A Technical Guide to Operational Regional Ocean Forecasting Systems in the Korea Hydrographic and Oceanographic Agency (I): Continuous Operation Strategy, Downloading External Data, and Error Notification (국립해양조사원 해양예측시스템 소개 (I): 현업 운영 전략, 외부 해양·기상 자료 내려 받기 및 오류 알림 기능)

  • BYUN, DO-SEONG;SEO, GWANG-HO;PARK, SE-YOUNG;JEONG, KWANG-YEONG;LEE, JOO YOUNG;CHOI, WON-JIN;SHIN, JAE-AM;CHOI, BYOUNG-JU
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.22 no.3
    • /
    • pp.103-117
    • /
    • 2017
  • This note provides technical guide on three issues associated with establishing and automatically running regional ocean forecasting systems: (1) a strategy for continuous production of hourly-interval three-day ocean forecast data, (2) the daily download of ocean and atmospheric forecasting data (i.e., HYCOM and NOAA/NCEP GFS data), which are provided by outside institutions and used as initial condition, surface forcing, and boundary data for regional ocean models, and (3) error notifications to numerical model managers through the Short Message Service (SMS). Guidance on dealing with these three issues is illustrated via solutions implemented by the Korea Hydrographic and Oceanographic Agency, since in embarking on this project we found that this procedural information was not readily available elsewhere. This technical guide is based on our experiences and lessons learned during the process of establishing and operating regional ocean forecasting systems for the East Sea and the Yellow and East China Seas over the 5 year period of 2012-2016. The fundamental approach and techniques outlined in this guide are of use to anyone wanting to establish an automatic regional and coastal ocean forecasting system.

Factors affecting fashion consumers' purchase decisions in nonprofit thrift stores (비영리 중고가게에서 패션제품 소비자의 구매 결정요인)

  • Seo, Min Jeong
    • The Research Journal of the Costume Culture
    • /
    • v.24 no.2
    • /
    • pp.119-131
    • /
    • 2016
  • With the increasing popularity of nonprofit thrift shopping, new marketing strategies are needed to respond to accelerated competition in the secondhand market. To help guide the development of marketing strategies for nonprofit thrift stores, this study aims to identify factors impacting consumers' buying behavior for secondhand fashion items sold in nonprofit thrift stores. Specifically, this study investigated 1) the effects of secondhand fashion selection criteria (i.e., design, brand name, lower price) and personal factors (i.e., gender, household income, beliefs about environment) on the secondhand fashion consumption experience in nonprofit thrift stores and 2) the moderating effects of point of purchase (POP) messages (i.e., "50% Off Sale," "New Arrivals," "Helping Others") on the relationships between purchase intention and impulsive buying in nonprofit thrift stores. An online survey was used to collect the data, and a total of 197 usable responses were received. The results showed that 1) gender, household income, beliefs about environment, and brand name affected the secondhand fashion consumption experience and 2) the POP message "Helping Others" negatively moderated the relationship between purchase intention and impulsive buying in nonprofit thrift stores. These results can help nonprofit thrift stores' managers to develop effective marketing strategies to increase their profits, which can be used to accomplish their mission of addressing social issues.

Image Completion using Belief Propagation Based on Planar Priorities

  • Xiao, Mang;Li, Guangyao;Jiang, Yinyu;Xie, Li;He, Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4405-4418
    • /
    • 2016
  • Automatic image completion techniques have difficulty processing images in which the target region has multiple planes or is non-facade. Here, we propose a new image completion method that uses belief propagation based on planar priorities. We first calculate planar information, which includes planar projection parameters, plane segments, and repetitive regularity extractions within the plane. Next, we convert this planar information into planar guide knowledge using the prior probabilities of patch transforms and offsets. Using the energy of the discrete Markov Random Field (MRF), we then define an objective function for image completion that uses the planar guide knowledge. Finally, in order to effectively optimize the MRF, we propose a new optimization scheme, termed Planar Priority-belief propagation that includes message-scheduling-based planar priority and dynamic label cropping. The results of experiment show that our approach exhibits advanced performance compared with existing approaches.

A New Adaptive Load Sharing Mechanism in Homogeneous Distributed Systems Using Genetic Algorithm

  • Lee Seong-Hoon
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.39-44
    • /
    • 2006
  • Load sharing is a critical resource in computer system. In sender-initiated load sharing algorithms, the sender continues to send unnecessary request messages for load transfer until a receiver is found while the system load is heavy. Meanwhile, in the receiver initiated load sharing algorithms, the receiver continues to send an unnecessary request message for load acquisition until a sender is found while the system load is light. These unnecessary request messages result in inefficient communications, low CPU utilization, and low system throughput in distributed systems. To solve these problems, we propose a genetic algorithm based approach for improved sender-initiated and receiver-initiated load sharing in distributed systems. And we expand this algorithm to an adaptive load sharing algorithm. Compared with the conventional sender-initiated and receiver-initiated algorithms, the proposed algorithm decreases the response time and task processing time.

  • PDF

The Design and Implementation of EDI Document Processing System using XML (XML을 이용한 EDI 문서 처리 시스템 설계 및 구현)

  • 방정환;박진우;김창수;정회경
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10c
    • /
    • pp.519-521
    • /
    • 1999
  • 본 논문은 인터넷상에서 사용이 가능하며 확장성이 뛰어난 XML을 이용하여 B2B (Business to Business) 사이에 사용되는 EDI(Electronic Data Interchange) 문서를 표현함으로써 이기종 시스템과 응용 프로그램간의 원활한 문서 유통을 이룰 수 있는 시스템의 설계 및 구현에 관한 것이다. 이를 위해 기존 EDI 표준인 UN/EDIFACT 메시지 전송 항목에 기반하여 문서형 정의부(Document Type Definition, DTD)를 개발했으며 메시지 수행 지침서(Message Implementation Guide, MIG)를 이용하여 템플리트를 구성하였다. 동적인 XML/EDI 문서를 생성하기 위하여 트랜잭션 처리기 및 생성된 XML 문서의 표현을 위하여 XML 스타일 언어(eXtensible Stylesheet Laguage, XSL)를 자동으로 생성, 변경할 수 있는 XSL 편집기를 개발하였다. 또한 변환 처리기를 두어 기존 EDI 시스템과 원활하게 문서를 교환할 수 있도록 설계 구현하였다.

  • PDF

The Design, Implementation, and Evaluation of Social Marketing Campaigns in Nutrition

  • Keenan, Debra-Palmer;Patricia M. Heacock
    • Journal of Community Nutrition
    • /
    • v.5 no.4
    • /
    • pp.218-229
    • /
    • 2003
  • Over the past two decades in the United States, social marketing has become an increasingly popular means of delivering nutrition education for the purpose of eliciting a specific behavior change. This manuscript defines social marketing via traditional marketing concepts and jargon, as well as through a communications strategy that can be used to guide message and campaign development. Research and evaluation strategies necessary to support the development and assessment of campaign promotions, is discussed. Four campaigns implemented in the United States, and one campaign implemented in Indonesia, are discussed in terms of the strategies presented. These campaigns illustrate how this educational technique and an array of assessment approaches have been applied to varied nutritional issues across diverse target audiences and settings. Practical recommendations, as well as discussion of issues regarding the advantages and disadvantages of using social marketing as an educational strategy, campaign sustainability, and philosophical considerations regarding the use of this educational approach, are addressed.

An Experimental Study on the Adaption of Announcement Based Evacuation Guidance System using Haas Effect in Large Space (대규모 공간에서 선행음 효과를 이용한 음성피난유도 시스템의 적용연구)

  • Baek, Eun-Sun;Baek, Geon-Jong;Shin, Hoon;Song, Min-Jeong;Kook, Chan
    • Fire Science and Engineering
    • /
    • v.25 no.5
    • /
    • pp.100-107
    • /
    • 2011
  • In this study, a simulated situation in which the visions of the evacuees were blocked by the smoke, which is one of the most dangerous factors that cause casualties in case of an emergency, was conducted for the evaluation of the performance of an evacuation guidance system. For this purpose, the behavior and time taken by the experiment subjects in simulated evacuation test were measured and analyzed. When the evacuation guidance sound signals were given by 4 speakers at the same time, most of the subject were disoriented and took generally longer in getting to the pre-designated evac point. And, using only one speaker instead of two showed a better result in terms of the evacuation behavior or and orientation. Also, when there were two or more speakers used for the broadcasting of the guidance message, it turned out that using Hass effect, and placing the speakers closer, could result in higher awareness of the guidance message and maintenance of the orientation, while it also made the subjects took short to get to the evac point.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.