• Title/Summary/Keyword: MESSAGE

Search Result 4,965, Processing Time 0.038 seconds

An exploratory Study on Audience Experiences and Interpretations of Movercial - focused on comparative analysis with PPL (무버셜의 수용자 경험과 해석에 관한 탐색적 연구 - PPL과의 비교연구를 중심으로)

  • 이현우;김형석
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.303-312
    • /
    • 2004
  • The purpose of this study is to activate the study on movercial. To accomplish of this, the objectives of this study are two-fold. First, this study attempts to find out how movercial are interpreted and experienced compared to product placement; and secondly, to delineate experience and interpretation in terms of the themes of movie centrality and consumption-specific relevance. This study attempted qualitative approach comparing to the criteria consisted of the themes of movie centrality and consumption-specific relevance to gain in-depth understanding of how movercial which is popped up and regarded as a newly creative format in the diffusion of internet culture and mobile communication environment is experienced and interpreted. For this aim, the moviegoer informants were classified into frequent and infrequent based on the classification method of previous product placement study of Delorme & Reid(1999) and Focus Group Interviews and In-depth Interviews were executed for understanding of how are experienced. Major implications of this study were as follows. First, prior experience of brand exposure from movercial enhanced familiarity for advertising in real-life. Second, movercial can be used to influential tools for purchasing decision with advertising and product placement. Third, informants experienced uncomfortable feeling of change and discomfort against the format of hybrid commercial message such as movercial and PPL which is penetrating into the culture and art at large.

  • PDF

A study on the signification of visual message in the website - Focus on intro page of automobile company homepage - (웹사이트에 나타난 시각적 메시지의 의미작용 연구 -자동차 기업 홈페이지의 intro page를 중심으로 -)

  • Park, Sang-Hyeok;Lee, Yong-Ho
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.45-54
    • /
    • 2005
  • Visual messages are fundamental elements for performing communication and indicate the signs which are delivered from the communicator to the communicatee via channels, Generally, we can classify visual messages into two groups; linguistic factors which are rational and deliver abstract concepts and unlinguistic factors which are mental and can be expressed concretely. Especially, web site with receivers' low attention and concentration need images which can attract their attention to visual messages. That is, web site is a medium which allows us to feel visual and emotional experiences. We can call it a standard of sign systems which are consisted of various styles of digital texts. The main purpose of this study lies in that we'll analyze how homepage introductory page as one of the forms of digital text conduces a meaning action to the receivers and that we'll apprehend the structures of images and different types of signs via a semiotic approach and analyze the underlying meaning of the messages. In order to survey the structures of images we'll look into the attitude toward perceiving messages by using semantic differential method which has been developed mostly by Osgood and analyze the visual images by adopting sign types of Fuss. As the signification is created by combining signs, it is significant that we'll analyze the meaning of sings between the transmitters and receivers from the semiotic viewpoint and study the signification systems.

  • PDF

Forward-Secure Public Key Broadcast Encryption (전방향 안전성을 보장하는 공개키 브로드캐스트 암호 기법)

  • Park, Jong-Hwan;Yoon, Seok-Koo
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.53-61
    • /
    • 2008
  • Public Key Broadcast Encryption (PKBE) allows a sender to distribute a message to a changing set of users over an insecure channel. PKBE schemes should be able to dynamically exclude (i.e., revoke) a certain subset of users from decrypting a ciphertext, so that only remaining users can decrypt the ciphertext. Another important requirement is for the scheme to be forward-secrecy. A forward-secure PKBE (fs-PKBE) enables each user to update his private key periodically. This updated private key prevents an adversary from obtain the private key for certain past period, which property is particularly needed for pay-TV systems. In this paper, we present a fs-PKBE scheme where both ciphertexts and private keys are of $O(\sqrt{n})$ size. Our PKBE construction is based on Boneh-Boyen-Goh's hierarchical identity-based encryption scheme. To provide the forward-secrecy with our PKBE scheme, we again use the delegation mechanism for lower level identities, introduced in the BBG scheme. We prove chosen ciphertext security of the proposed scheme under the Bilinear Diffie-Hellman Exponent assumption without random oracles.

The First Telescope in the Korean History I. Translation of Jeong's Report (한국사 최초의 망원경 I. 정두원(鄭斗源)의 "서양국기별장계(西洋國奇別狀啓)")

  • Ahn, Sang-Hyeon
    • Journal of Astronomy and Space Sciences
    • /
    • v.26 no.2
    • /
    • pp.237-266
    • /
    • 2009
  • In 1631 A.D. Jeong Duwon, an ambassador of the Joseon dynasty was sent to the Ming dynasty. There he met $Jo\tilde{a}o$ Rodrigues, a Jesuit missionary, in Dengzhou of Shandong peninsula. The missionary gave the ambassador a number of results of latest European innovations. A detailed description on this event was written in 'Jeong's official report regarding a message from an European country'(西洋國奇別狀啓), which is an important literature work to understand the event. Since the document was written in classical Chinese, we make a comprehensive translation to Korean with detailed notes. According to the report, the items that Rodrigues presented include four books written in Chinese that describe European discoveries about the world, a report on the tribute of new cannons manufactured by Portuguese in Macao, a telescope, a flintlock, a Foliot-type mechanical clock, a world atlas drawn by Matteo Ricci, an astronomical planisphere, and a sun-dial. We discuss the meaning of each item in the Korean history of science and technology. In particular, Jeong's introduction is an important event in the history of Korean astronomy, because the telescope he brought was the first one to be introduced in Korean history. Even though king Injo and his associates of the Joseon dynasty were well aware of the value as military armaments of new technologies such as telescopes, cannons, and flintlocks, they were not able to quickly adopt such technologies to defend against the military threat of Jurchen. We revisit the reason in view of the general history of science and technology of east-Asian countries in the 17th century.

Study on Context-Aware SOA based on Open Service Gateway initiative platform (OSGi플렛폼 기반의 상황인식 서비스지향아키텍쳐에 관한 연구)

  • Choi, Sung-Wook;Oh, Am-Suk;Kwon, Oh-Hyun;Kang, Si-Hyeob;Hong, Soon-Goo;Choi, Hyun-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2083-2090
    • /
    • 2006
  • In an proposed Context-Aware SOA(Service Oriented Architecture) based OSGi(Open Service Gateway initiative) platform, Service provider manages relative kinds of services in an integrative basis from various sensors, puts each service in a SOAP (Simple Object access Protocol) message, and register thorn to the UDDI(Universal Description Discovery and Integration) server of service registry, service requester retrivel the specified kinds of services and call them to service provider. Recently most context-aware technologies for ubiquitous home network are mainly putting emphasis on RFID/USN and location-based technology. Because of this, service-oriented architecture researches have not been made enough. Under the environment of an OSGi service platform, various context-aware services are dynamically mapping from various sensors, new services are being offered for the asking of users, and existing services are changing. Accordingly, the data sharing between services provided, management of service life cycle, and the facilitation of service distribution are needed. Taking into considering all these factors, this study has suggested an Context-Aware SOA based eclipse SOA Tools Platform using OSGi platform that can transaction throughtput of more than 546 TPS of distributional Little's Law from ATAM(Architecture Tradeoff Analysis Method) while remaining stable other condition.

A Ubiquitous Home Network System for Managing Environment-Information Sensors using Image Processing (영상 처리를 이용하여 주변 환경 센서를 관리하기 위한 유비쿼터스 홈 네트워크 시스템)

  • Hong, Sung-Hwa;Jung, Suk-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.931-942
    • /
    • 2010
  • A home network provides users with a variety of information services. The kind and quality of the services can be substantially enhanced by utilizing a variety of data from sensors. However, home networks currently limit their potential by focusing on providing multimedia services rather than services utilizing sensor data. Outdoor electronics are frequently made in a form that emphasizes only certain limited functions in contrast to home appliances. Thus, sensors with one or two functions rather than many can be used in outdoor systems and their use will be more economical than using sensor nodes indoors with more complex home appliances. In this study, we chose to work with motion sensors as they have many potential uses, and we selected a parking lot control system with to use the motion sensors. This parking lot control system was implemented and applied as part of a home network. For this purpose, we defined and implemented a protocol to manage the network in a ubiquitous sensor network environment for the wireless home network in this study. Although a network management system in a Ubiquitous Sensor Network (USN) related to this study is being advanced for other projects, the protocol interface and message system have not yet been clearly defined for use in a general purpose network or in an extension into heterogeneous kinds of networks, communication support, etc. Therefore, USN network management should be conducted for management of faults, composition, power, and applications. To verify the performance of the protocol interface designed in this study, we designed and implemented the necessary units (sensor nodes, sensor gateway, and server) for each network section and, with them, proved the validity of this study.

The Design and Implementation of the Reliable Network RAM using Compression on Linux (리눅스에서 압축을 이용한 안정적인 네트웍 램의 설계 및 구현)

  • 황인철;정한조;맹승렬;조정완
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.232-238
    • /
    • 2003
  • Traditional operating systems use a virtual memory to provide users with a bigger memory than a physical memory. The virtual memory augments the insufficient physical memory by the swap device. Since disks are usually used as the swap device, the cost of a page fault is relatively high compared to the access cost of the physical memory. Recently, numerous papers have investigated the Network RAM in order to exploit the idle memory in the network instead of disks. Since today's distributed systems are interconnected with high-performance networks, the network latency is far smaller than the disk access latency In this paper we design and implement the Network RAM using block device driver on Linux. This is the first implementation of the Network RAM on Linux. We propose the new reliability method to recover the page when the other workstation's memory is damaged. The system using the Network RAM as the swap device reduces the execution time by 40.3% than the system using the disk as the swap device. The performance results suggest that the new reliability method that use the processor more efficiently has the similar execution time with others, but uses smaller server memory and generates less message traffic than others.

An Efficient P2Proxy Caching Scheme for VOD Systems (VOD 시스템을 위한 효율적인 P2Proxy 캐싱 기법)

  • Kwon Chun-Ja;Choi Chi-Kyu;Lee Chi-Hun;Choi Hwang-Kyu
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.111-122
    • /
    • 2006
  • As VOD service over the Internet becomes popular, a large sealable VOD system in P2P streaming environment has become increasing important. In this paper, we propose a new proxy caching scheme, called P2Proxy, to replace the traditional proxy with a sealable P2P proxy in P2P streaming environment. In the proposed scheme, each client in a group stores a different part of the stream from a server into its local buffer and then uses a group of clients as a proxy. Each client receives the request stream from other clients as long as the parts of the stream are available in the client group. The only missing parts of the stream which are not in the client group are directly received from the server. We represent the caching process between clients in a group and a server and then describe a group creation process. This paper proposes the directory structure to share the caching information among clients. By using the directory information, we minimize message exchange overload for a stream caching and playing. We also propose a recovery method for failures about the irregular behavior of P2P clients. In this paper, we evaluate the performance of our proposed scheme and compare the performance with the existing P2P streaming systems.

A Study on Variable Speed Limit Strategies in Freeway Work Zone Using Multi-Criteria Decision Making Process (다기준 의사결정기반 고속도로 공사구간 VSL전략에 관한 연구)

  • Park, Juneyoung;Oh, Cheol;Chang, Myungsoon
    • Journal of Korean Society of Transportation
    • /
    • v.31 no.5
    • /
    • pp.3-15
    • /
    • 2013
  • The purpose of this study is to propose a methodology for operating variable speed limit (VSL) strategies in freeway work zones. A notable feature in this study is to incorporate a multi-criteria decision making process into deriving better VSL strategies. Decision criteria in this study include operational efficiency, safety, and environmental impacts. Travel speed, acceleration noise, and CO2 were used as performance measures for evaluating VSL strategies. A multi-criteria value function was developed through an analytical hierarchical process (AHP) for representing expert's knowledge. Then, a variety of VSL operations scenarios were investigated utilizing a microscopic traffic simulation suite, VISSIM. The proposed methodology would be useful in supporting more efficient, safer, and more environment-friendly traffic operations and control in freeway work zones.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.