• Title/Summary/Keyword: Information message

Search Result 3,325, Processing Time 0.027 seconds

The study of preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient

  • Kim, Hyun-Ji;Kang, Jung-Ae;Lee, Sang-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.57-63
    • /
    • 2016
  • The purpose of the study is to investigate the preference by emoticon types according to the gender of sender, emotion types of message and intimacy with the recipient. Results show that women mostly prefer to use dynamic and imaged emoticon than men. However, the preference of using text messages increases when both men and women express uncomfortable emotion. Especially, when users send family messages, they tend to prefer for text message. And when users send close friends messages, the preference for dynamic and imaged emoticon is high. When users send distant friends messages, the similar tendency is shown regardless of emotion. These results can provide the information to use emoticon in the filed of education and take advantage in digital education and mobile education.

The Study on the Advertising Effect of Multiple Models -Message Regulatory Focus as An Moderator- (복수모델의 광고효과에 관한 연구 - 메시지 조절초점의 조절 효과를 중심으로 -)

  • Song, Jun-Ho;Kim, Hyo-Gyu
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.127-151
    • /
    • 2013
  • This research was to investigate the role of message regulatory focus on the advertising effect of multiple models. The multiple models are limited to two models in one advertisement in this research. This research investigated the hypothesis that multiple models, in terms of multiple source effect and social consensus, appears specifically to enhance the relationship of consumer and commercial models on the conditions of promotion-focused message which leads to the information processing of relational elaboration. This research applied a between-subjects factorial design targeting 2(the number of model: single model vs. multiple models) by 2(message regulatory focus: promotion-focused message vs. prevention-focused message). As a result, multiple models showed more positive ad attitude, brand attitude, and purchase intention than did single model. And promotion-focused message with multiple models showed more positive ad attitude, brand attitude, and purchase intention than did prevention-focused message with multiple models. Also there was an interaction effect between the number of model and the type of message regulatory focus. It wasn't fully supported that there is no difference of advertising effect between promotion-focused message and prevention-focused message on the condition of single model.

  • PDF

XMPP/SIP Presence Service System using Efficient Message Control Method (효율적 메시지 제어방식을 사용한 XMPP/SIP 프레즌스 서비스 시스템)

  • Jang, Choonseo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2678-2684
    • /
    • 2014
  • In this paper a new message control method that can reduce server load and network traffic in XMPP/SIP presence service system has been proposed. This presence service system can process both XMPP(Extensible Massaging and Presence Protocol) based presence information and SIP(Session Initiation Protocol) based presence information. A new XMPP stanza architecture with added elements for presence stanza and IQ stanza has been designed, and a new presence information data processing method which can reduce size of SIP notification message and SIP PUBLISH message has been suggested. Furthermore a messages exchanging procedure that can transfer presence information between XMPP domain and SIP domain has been also suggested. The performance of the proposed system has been analysed by simulation.

A Techniques for Information Hiding in the Steganography using LSB and Genetic Algorithm (유전적 알고리즘과 LSB를 이용한 스테가노그래피의 정보은닉 기법)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.277-282
    • /
    • 2018
  • The goal of the secret message communication on the internet is to maintain invisibility and confidentiality. Digital steganography is a technique in which a secret message is inserted in a cover medium and transmitted to a destination so that a third party can not perceive the existence of the message itself. Steganography is an efficient method for ensuring confidentiality and integrity together with encryption techniques. In order to insert a secret (Hangul) message, I propose a image steganography method that the secret character is separated and converted into binary code with reference to the encryption table, the cover image is divided into two areas, and the secret message and the right l-LSB information of the second area are encrypted and crossed, concealing the k-LSB of the first region. The experimental results of the proposed method show that the PSNR value is 52.62 and the acceptable image quality level.

Development of Java Message Service using IDL/SSO (IDL/SSO를 이용한 Java Message Service의 개발)

  • 정명희;문남두;안건태;김현규;이명준
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.484-486
    • /
    • 2000
  • JMS(Java Message Service)는 분산된 엔터프라이즈 시스템간의 메시지 생성, 전달, 수신 및 읽기를 위한 자바 기반의 표준 API를 제공한다. 이 API의 구조는 메시징 방식에 따라 Topic을 메시지 서버로 하는 Pulish-Subcribe모델과 Queue를 서버로 기자는 Point-To-Point 모델로 구분된다. IDL/SSO는 병행성(Concurrency), 영속성(Persistency), 필터(filter)등의 기능을 제공하는 공유객체 명세언어 시스템이다. 본 논문에서는 이 IDL/SSO를 이용하여 JMS를 구현하는 방법에 대하여 기술한다.

  • PDF

Delay Analysis of the ISDN D-channel Access Protocol (ISDN D-채널 Access Protocol의 Delay 분석)

  • 이구연;은종관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.98-111
    • /
    • 1990
  • In this paper a queneing model for the D channel access protocal recommeded by CCITT is developed, and delays of the signalling and packet messages are analyzed using the model, Behaviors of packet and signalling messages in the D-channel access system are also investigated. The analytical results have been verified by simulation.

  • PDF

Dynamic Density-based Inhibited Message Diffusion For Reducing Overhead In Delay Tolerant Network (DTN에서 오버헤드 감소를 위한 동적 밀도 기반 메시지 확산 억제 기법)

  • Dho, Yoon-hyung;Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.120-122
    • /
    • 2015
  • In this paper, we proposed an algorithm of the unnecessary copied message inhibition using dynamic density what is called DDIM(Dynamic Density-based Inhibited Message diffusion) in DTNs(Delay Tolerant Networks). Existing DTN routing algorithms as Epidemic and Spray and Wait have some problems that occur large overhead in dense network due to the thoughtless message diffusion. Our proposed method, the DDIM, determines adjusted number of copied message through dynamic node density that is calculated using node's radio coverage and neighbor nodes in period time to solve message diffusion problem. It decrease overhead without losing message delivery ratio and increased latency through reducing message diffusion. In this paper, we compare delivery ratio, average latency and overhead of proposed algorithm, DDIM, and existing DTN routing algorithm and prove enhanced performance through simulation results.

  • PDF

A Study on the Comparison of Reliability Between MQTT and CoAP (Confirmative Message) (MQTT와 CoAP(Confirmative message) 신뢰성 비교)

  • Ryu, Kuem-gang;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.485-487
    • /
    • 2017
  • With the growth of the IoT, security is a growing concern. Things the risk of IoT security has been constantly raised, and there have been many cases of hacking. As a result, there is a growing concern and scale about security, but there is a lack of interest and research on the message protocols between Iot devices. With the development of the IoT, the importance of low-power, lightweight and accurate message delivery will become more important and more advanced message protocols will be needed. In this paper, it is aimed to construct the system for communication between client and server of MQTT and CoAP with Confirmative option, which are most used among IoT message protocols and compare the message reliability of each communication protocol to check efficiency.

  • PDF

A Study on Conditional Access Message Multiplexing Method in T-DMB Conditional Access System (T-DMB 제한수신시스템에서 제한 수신 메시지 다중화 기법 연구)

  • Kim, Dong-Hyun;Seo, Hyung-Yoon;Bae, Byung-Jun;Kim, Jong-Deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.722-724
    • /
    • 2010
  • CAS(Conditional Access System) was developed for paid-for service in cable and fixed satellite broadcast system and technology and market maturity are high. However, these assessment is limited by CAS in fixed broadcasting system. In case of digital mobile broadcast such as T-DMB is difficult to apply CAS technology of fixed broadcasting system because of a use method and technology characteristic. Expecially, in case T-DMB using limited resources, a CAS message which must transmit in each service channel can cause problems. It is desirable that system transmits the CAS message which transmitted by each service channel through logical CAS message-only channel. In order to make a logical CAS message channel, we need a multiplexing techniques for CAS message using in each channel. In this paper, we design the CAS message multiplexing techniques for composition of CAS message-only channel.

  • PDF

Reliability Analysis According to Concurrent Message Transmission in MQTT (MQTT에서 동시다발적 메시지 전송에 따른 신뢰성 분석)

  • Kim, Sung-jin;Cho, Kyoung-woo;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.533-535
    • /
    • 2017
  • MQTT provides three QoS levels on top of the TCP/IP layer to ensure message delivery reliability. However, in an environment where messages are concurrently transmitted and received in a node, messages are lost due to the delivery method for QoS level. In this paper, it construct an experimental environment in which MQTT generates concurrently messages, and confirm the message reliability according to QoS level. Therefore, we analyze the message reception ratio on the subscriber side by changing number of publisher and transmission cycle of message. Experimental results show that the message reception ratio of 1 and 2 except QoS level 0 decreases as the number of publisher increases or the message transmission cycle increases.

  • PDF