• Title/Summary/Keyword: MESSAGE model

Search Result 652, Processing Time 0.032 seconds

Modeling message dissemination over multi-channel social network (다중 채널 소셜 네트워크상의 메시지 전송 모델링)

  • Kim, Kyung Baek
    • Smart Media Journal
    • /
    • v.3 no.1
    • /
    • pp.9-15
    • /
    • 2014
  • In these days, along with the extreme popularity of online social network services, it becomes an important problem understanding the role of social network in the research of message dissemination. Past studies of message dissemination over online social network services mostly consider the coverage of message dissemination and the methods to maximize it. But, these works lack of the consideration of the impact of multi channel social network, which has multiple communication channel with distinct properties of message transfer and various users with distinct channel preferences. In this paper, the new message dissemination model over multi-modal multi-channel social network, the Delay Weighted Independent Cascade Model, is proposed. The proposed model considers various channels including online social network service, email, SMS messaging, phone and mouth-to-mouth and their distinct message transfer properties. In order to consider the various user properties, the different value of probability of forwarding a message and the different preference of communication channel is considered. Moreover, the proposed model considers the distribution of user location and allows to analyze the properties of message dissemination under various scenarios. Based on the proposed model, a message dissemination simulator is generated and the message disseminations on various scenarios are analyzed.

Delay of a Message in a Time-Varying Bluetooth Link (시변 블루투스 링크에서 메시지의 지연시간)

  • Jong, Myoung-Soon;Park, Hong-Seong
    • Journal of Industrial Technology
    • /
    • v.23 no.A
    • /
    • pp.41-46
    • /
    • 2003
  • Because the quality of a radio link in real environment is generally varied with time, there is a difference between the delay in the real environment and one obtained from the analytic model where a time-varying link model is not used as a link model for a Bluetooth. This paper analyzes the transmission delay of a message in the time-varying radio link model for the Bluetooth. The time-varying radio link is modeled with a two-state Markov model. The mean transmission delay of the message is analytically obtained in terms of the arrival rate of the message, the state transition probability in the Markov model, and the packet error rate.

  • PDF

The Study on the Advertising Effect of Multiple Models -Message Regulatory Focus as An Moderator- (복수모델의 광고효과에 관한 연구 - 메시지 조절초점의 조절 효과를 중심으로 -)

  • Song, Jun-Ho;Kim, Hyo-Gyu
    • Management & Information Systems Review
    • /
    • v.32 no.3
    • /
    • pp.127-151
    • /
    • 2013
  • This research was to investigate the role of message regulatory focus on the advertising effect of multiple models. The multiple models are limited to two models in one advertisement in this research. This research investigated the hypothesis that multiple models, in terms of multiple source effect and social consensus, appears specifically to enhance the relationship of consumer and commercial models on the conditions of promotion-focused message which leads to the information processing of relational elaboration. This research applied a between-subjects factorial design targeting 2(the number of model: single model vs. multiple models) by 2(message regulatory focus: promotion-focused message vs. prevention-focused message). As a result, multiple models showed more positive ad attitude, brand attitude, and purchase intention than did single model. And promotion-focused message with multiple models showed more positive ad attitude, brand attitude, and purchase intention than did prevention-focused message with multiple models. Also there was an interaction effect between the number of model and the type of message regulatory focus. It wasn't fully supported that there is no difference of advertising effect between promotion-focused message and prevention-focused message on the condition of single model.

  • PDF

Research on Railway Safety Common Data Model and DDS Topic for Real-time Railway Safety Data Transmission

  • Park, Yunjung;Kim, Sang Ahm
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.57-64
    • /
    • 2016
  • In this paper, we propose the design of railway safety common data model to provide common transformation method for collecting data from railway facility fields to Real-time railway safety monitoring and control system. This common data model is divided into five abstract sub-models according to the characteristics of data such as 'StateInfoMessage', 'ControlMessage', 'RequestMessage', 'ResponseMessage' and 'ExtendedXXXMessage'. This kind of model structure allows diverse heterogeneous data acquisitions and its common conversion method to DDS (Data Distribution Service) format to share data to the sub-systems of Real-time railway safety monitoring and control system. This paper contains the design of common data model and its DDS Topic expression for DDS communication, and presents two kinds of data transformation case studied for verification of the model design.

A Multi Upper Bound Access Control Model with Inheritance Attributes

  • Kim, Seok-Woo
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.6
    • /
    • pp.162-166
    • /
    • 1997
  • A message server have two basic functionalities, a server role for processing the processing the user environment as well as an entity role for transferring message to other entity in message system environment. The user who is going to send and receive his important information really wants to keep his own security requests. To satisfy this requirement, message server must be enforced by two seperated security policies- one for message processing security policy under department's computer working environment, the other for send/receive security policy under message system's communication path environment. Proposed access control model gurantees the user's security request by combining constrained server access control and message system access control with multi upper bound properties which come from inheritance attributes of originating user security contexts.

  • PDF

A Model for VMS Message Reading Time Using Driving Simulator (Driving Simulator를 이용한 VMS 메시지 판독시간모형 개발)

  • Kim, Tae-Hyung;Kim, Sung-Min;Oh, Cheol;Kim, Jeong-Wan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.3
    • /
    • pp.24-32
    • /
    • 2007
  • Variable message sign (VMS), which is used for providing real-time information on traffic conditions and accident occurrences, is one of the important components of intelligent transportation systems. It is essential that the scheme of VMS message phase and duration should be designed with the consideration of drivers' message reading time that will be depended on various causal factors, such as the amount of VMS messages, drivers' travel speed, and geometric conditions. However, there have been not much efforts to explore the relationships between the drivers' message reading time and the above causal factors. Driving simulator experiments were conducted to obtain drivers' message reading time with respect to the amount of VMS messages, drivers' travel speed, and different geometric conditions. Regression modeling techniques were applied to develop an estimation model for drivers' message reading time. Probabilistic outcomes of the proposed model would be greatly utilized to design proper VMS message phase and duration.

  • PDF

Cross-Model Effect of Model Types, Product Gender Identity and Message Appeal Type (모델유형과 제품의 성 정체성 그리고 메시지 소구에 따른 크로스 광고모델 효과)

  • Kim, Eun-Hee;Yu, Seung Yeob
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.105-114
    • /
    • 2014
  • This study has recently been issued to businesses and consumers who examined the effects of cross-advertising model. Experimental design, the model type (2) ${\times}$ sexuality products (2) ${\times}$ advertising message appeal form (2) is a factorial design. The results are as follows. First, the advertising model, based on the type of cognitive response to advertising than the general model of cross-recall index was higher model. Second, the product of gender identity in response to what the advertising product for women than men was higher index of product recalls. Third, the ad attention model ANOVA results for each type of message, the main effect of appeal type was identified. In addition, the type and model of sexual identity, and message appeal type in the type of model interaction effects were found. Finally, the model-product analysis of goodness of fit, the model type and sexual identity and appeal type messages of main effect were identified. The result is more efficient advertising effect model strategies for promoting meaningful results, it is meant to be confirmed.

Proposed Message Transit Buffer Management Model for Nodes in Vehicular Delay-Tolerant Network

  • Gballou Yao, Theophile;Kimou Kouadio, Prosper;Tiecoura, Yves;Toure Kidjegbo, Augustin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.153-163
    • /
    • 2023
  • This study is situated in the context of intelligent transport systems, where in-vehicle devices assist drivers to avoid accidents and therefore improve road safety. The vehicles present in a given area form an ad' hoc network of vehicles called vehicular ad' hoc network. In this type of network, the nodes are mobile vehicles and the messages exchanged are messages to warn about obstacles that may hinder the correct driving. Node mobilities make it impossible for inter-node communication to be end-to-end. Recognizing this characteristic has led to delay-tolerant vehicular networks. Embedded devices have small buffers (memory) to hold messages that a node needs to transmit when no other node is within its visibility range for transmission. The performance of a vehicular delay-tolerant network is closely tied to the successful management of the nodes' transit buffer. In this paper, we propose a message transit buffer management model for nodes in vehicular delay tolerant networks. This model consists in setting up, on the one hand, a policy of dropping messages from the buffer when the buffer is full and must receive a new message. This drop policy is based on the concept of intermediate node to destination, queues and priority class of service. It is also based on the properties of the message (size, weight, number of hops, number of replications, remaining time-to-live, etc.). On the other hand, the model defines the policy for selecting the message to be transmitted. The proposed model was evaluated with the ONE opportunistic network simulator based on a 4000m x 4000m area of downtown Bouaké in Côte d'Ivoire. The map data were imported using the Open Street Map tool. The results obtained show that our model improves the delivery ratio of security alert messages, reduces their delivery delay and network overload compared to the existing model. This improvement in communication within a network of vehicles can contribute to the improvement of road safety.

The Effect of the Brand-Page Characteristics on the Type of Word-of-Mouth Messages (SNS 브랜드페이지(브랜드커뮤니티)특성이 구전메세지 형태에 미치는 영향)

  • Lee, Hye Ran;Son, Dal Ho
    • The Journal of Information Systems
    • /
    • v.31 no.4
    • /
    • pp.189-207
    • /
    • 2022
  • Purpose Previous research on customer engagement in SNS marketing has mainly addressed the conceptualization of type of word-of-mouth messages. However, there is a lack of researches about the effect of the brand-page characteristics on the type of word-of-mouth messages. Therefore, this study examined the effect of brand-page characteristics in terms of the type of word-of-mouth messages as the main objective and the effect of the type of word-of-mouth messages in terms of the brand loyalty as the secondary objective in the context of Facebook. Design/methodology/approach The empirical research was based on a poll done through 400 research candidates in the Facebook and the final 342 responses were collected and used in statistical data analysis. The adaptability, trust, and validity to measurement model were verified and the structural relationship in the research model was analyzed through these 342 responses. The collected data verified hypotheses established using the SPSS statistical package and structural equation model using AMOS. Findings The results showed that the BP-information provision had a non-significant effect on the factual word-of-mouth message and a significant effect on the evaluative word-of-mouth message. The BP-reliability had a significant effect on the factual word-of-mouth message and the evaluative word-of-mouth message. The BP-entertainment had a significant effect on the factual word-of-mouth message and the evaluative word-of-mouth effect. The BP-interaction had a non-significant effect on the factual word-of-mouth message and the evaluative word-of-mouth message. Finally, the factual word-of-mouth message and the evaluative word-of-mouth message had a significant effect on the brand loyalty.

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.