• 제목/요약/키워드: Message Strategy

검색결과 173건 처리시간 0.023초

위기대응 전략으로서 정체성 프레이밍 효과 (The Effect of Identification Framing as Crisis Response Strategy)

  • 조승호
    • 한국콘텐츠학회논문지
    • /
    • 제18권1호
    • /
    • pp.327-335
    • /
    • 2018
  • 본 연구의 목적은 기존에 위기커뮤니케이션 주로 다뤄진 규범적 이론을 넘어서 상이한 위기유형에 대응할 수 있는 프레이밍 전략으로 정체성 프레이밍을 소개하고 이에 효과를 밝히는데 있다. 정체성 프레이밍은 포괄적이며 조직정체성을 위한 전략적 메시지이며 이것은 사회적 정체성과 유사하다. 본 연구는 정체성 프레이밍의 효과를 검증하기 위해서 실험연구를 실시하였으며, 실험디자인을 통해 위기유형, 위기대응, 프레이밍 효과를 조작화 하였다. 위기유형은 내부적인 요인에 발생한 위기와 외부적 요인에 의해 발생한 요인으로 조작화 하였고, 위기대응은 사과와 부정으로, 마지막으로 정체성프레임 유무를 통해 $2{\times}2{\times}2$ 요인설계 되었다. 총 242명의 대학생이 이 실험에 참여했으며, 주요한 연구결과는 정체성 프레이밍 위기 유형과 위기대응 전략에 상관없이 유의한 효과가 있는 것으로 나타났다.

비동기적 방송을 하는 이동 컴퓨팅 환경에서 효율적인 캐쉬 일관성 유지 정책 (A Strategy for Efficiently Maintaining Cache Consistency in Mobile Computing Environments of the Asynchronous Broadcasting,)

  • 김대옹;박성배;김길삼;황부현
    • 한국컴퓨터정보학회논문지
    • /
    • 제4권3호
    • /
    • pp.78-92
    • /
    • 1999
  • 이동 컴퓨팅 환경에서 이동 사용자는 무선 통신망의 협소한 대역폭을 효율적으로 사용하기 위하여 자주 사용하는 데이타를 자신의 캐쉬에 저장하여 사용한다. 이동 트랜잭션의 정확성을 보장하기 위하여 캐쉬 데이터는 서버에 있는 데이타와 일관성이 유지되어야 한다. 이 논문은 비동기적 방송을 하는 이동 컴퓨팅 환경에서 이동호스트의 이동으로 인하여 이동호스트가 캐쉬한 데이터가 서버에 있는 데이타와 일관성이 위배될 때, 효율적으로 캐쉬 일관성을 유지하도록 하는 새로운 정책을 제안한다. 이 정책은 갱신율이나 갱신 패턴이 변하여도 무효화되는 데이터의 개수에 영향을 받지 않으며, 전송하는 무효화 메시지의 량은 항상 일정하고 상대적으로 작다. 따라서, 무선망의 협소한 대역폭을 향상시키고 통신 비용을 감소시킨다.

차세대 엔터프라이즈웨어 마이포스 소개

  • 정창현
    • 한국데이타베이스학회:학술대회논문집
    • /
    • 한국데이타베이스학회 1995년도 제4회 멀티미디어 산업기술 학술대회 논문집
    • /
    • pp.3-19
    • /
    • 1995
  • 시스템 Technology ★ Server Technology - 운영환경구축 ★ Network 구성설계 - ATM, FDDI, NMS ★ Client/Server시스템 구성별 Bench Marking ★ Windows 메뉴 및 GUI 설계 ★다기능 PC 운영환경 설정 시스템 Technology ★ Data Base Technology - DB Administration - BB Performance Tuning ★ System Integration Technology - Application Integration - System Flow Control - Task Control - Applicational Interface - S/W Down Load 시스템 Technology ★ Memory Optimization ★ IBM/Facom Host API ★ 영상전화 Customizing - Intel Proshare ★ Auto Dialing - CTI Link ★ IC-Card Interface 시스템 Technology ★ Sound 처리 - Voice Mail - 음절 처리 ★ Image 처리 ★도움말 처리 - Hyper Text 시스템 Technology ★ Socket Programming - 긴급메일 - Peer to peer message switching ★ Set Up Programming -Install Shield ★ DB Access Programming - DB-Library ★ TCP/IP Programming(중략)

  • PDF

5G 시대 군(軍) SNS 위기커뮤니케이션 전략에 관한 연구 - 메시지 형태가 장병 인식에 미치는 영향을 중심으로 - (A Study on Army SNS Crisis Communication Strategy of 5G Age - Focusing on the effect of message form on the perception of soldiers -)

  • 김태웅;이동희;이상은
    • 한국콘텐츠학회:학술대회논문집
    • /
    • 한국콘텐츠학회 2019년도 춘계종합학술대회
    • /
    • pp.41-42
    • /
    • 2019
  • 본 논문은 5G시대와 전 장병이 일과 후 병영에서 스마트폰을 사용하게 됨에 따라, SNS를 활용한 효과적인 군 위기관리 커뮤니케이션 전략을 제시하기 위해 SNS 메시지의 형태가 장병들의 위기에 대한 인식과 메시지의 수용도, 군에 대한 태도에 어떠한 영향을 주는지 실험연구를 통해 실증적으로 분석 연구하였으며 실무적 함의를 제시했다.

  • PDF

An Optimal Driving Support Strategy(ODSS) for Autonomous Vehicles based on an Genetic Algorithm

  • Son, SuRak;Jeong, YiNa;Lee, ByungKwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.5842-5861
    • /
    • 2019
  • A current autonomous vehicle determines its driving strategy by considering only external factors (Pedestrians, road conditions, etc.) without considering the interior condition of the vehicle. To solve the problem, this paper proposes "An Optimal Driving Support Strategy(ODSS) based on an Genetic Algorithm for Autonomous Vehicles" which determines the optimal strategy of an autonomous vehicle by analyzing not only the external factors, but also the internal factors of the vehicle(consumable conditions, RPM levels etc.). The proposed ODSS consists of 4 modules. The first module is a Data Communication Module (DCM) which converts CAN, FlexRay, and HSCAN messages of vehicles into WAVE messages and sends the converted messages to the Cloud and receives the analyzed result from the Cloud using V2X. The second module is a Data Management Module (DMM) that classifies the converted WAVE messages and stores the classified messages in a road state table, a sensor message table, and a vehicle state table. The third module is a Data Analysis Module (DAM) which learns a genetic algorithm using sensor data from vehicles stored in the cloud and determines the optimal driving strategy of an autonomous vehicle. The fourth module is a Data Visualization Module (DVM) which displays the optimal driving strategy and the current driving conditions on a vehicle monitor. This paper compared the DCM with existing vehicle gateways and the DAM with the MLP and RF neural network models to validate the ODSS. In the experiment, the DCM improved a loss rate approximately by 5%, compared with existing vehicle gateways. In addition, because the DAM improved computation time by 40% and 20% separately, compared with the MLP and RF, it determined RPM, speed, steering angle and lane changes faster than them.

글로벌 패션광고의 표준화 분석 (Analysis of the Standardization of Global Fashion Advertizing)

  • 조은영;홍병숙
    • 한국의류학회지
    • /
    • 제22권7호
    • /
    • pp.882-891
    • /
    • 1998
  • This study purported to analyze the condition of the degree standardization and types of global ads. in the multinational fashion brand corporations. The analyzed ads. were sampled from monthly magazines on same seasons in 1997. This study was done by means of checklists were modified other researcher's research measurments. Researcher counted of advertising message. Zero point meant perfect stan-dardization and 13 points meant perfect non-standardization. The types of advertising appeal were analyzed according to constituent unit's expression types. The results of the study proved that the degree of standardization was considerably high, which means that the multinational fashion brand corporations used the standardization strategy. In particular, the degree of standardization in sports wear and casual wear ads. was low compared with the degree of standardization in the other ads. Most of the global fashion ads. were composed of illustrations only. Besides, emotional appeal type was usually used in glabal fashion ads.

  • PDF

실시간 다중고장진단 제어기법에 관한 연구 (A Study on Real time Multiple Fault Diagnosis Control Methods)

  • 배용환;배태용;이석희
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 1995년도 춘계학술대회 논문집
    • /
    • pp.457-462
    • /
    • 1995
  • This paper describes diagnosis strategy of the Flexible Multiple Fault Diagnosis Module for forecasting faults in system and deciding current machine state form sensor information. Most studydeal with diagnosis control stategy about single fault in a system, this studies deal with multiple fault diagnosis. This strategy is consist of diagnosis control module such as backward tracking expert system shell, various neural network, numerical model to predict machine state and communication module for information exchange and cooperate between each model. This models are used to describe structure, function and behavior of subsystem, complex component and total system. Hierarchical structure is very efficient to represent structural, functional and behavioral knowledge. FT(Fault Tree). ST(Symptom Tree), FCD(Fault Consequence Diagrapy), SGM(State Graph Model) and FFM(Functional Flow Model) are used to represent hierachical structure. In this study, IA(Intelligent Agent) concept is introduced to match FT component and event symbol in diagnosed system and to transfer message between each event process. Proposed diagnosis control module is made of IPC(Inter Process Communication) method under UNIX operating system.

  • PDF

The Design, Implementation, and Evaluation of Social Marketing Campaigns in Nutrition

  • Keenan, Debra-Palmer;Patricia M. Heacock
    • Journal of Community Nutrition
    • /
    • 제5권4호
    • /
    • pp.218-229
    • /
    • 2003
  • Over the past two decades in the United States, social marketing has become an increasingly popular means of delivering nutrition education for the purpose of eliciting a specific behavior change. This manuscript defines social marketing via traditional marketing concepts and jargon, as well as through a communications strategy that can be used to guide message and campaign development. Research and evaluation strategies necessary to support the development and assessment of campaign promotions, is discussed. Four campaigns implemented in the United States, and one campaign implemented in Indonesia, are discussed in terms of the strategies presented. These campaigns illustrate how this educational technique and an array of assessment approaches have been applied to varied nutritional issues across diverse target audiences and settings. Practical recommendations, as well as discussion of issues regarding the advantages and disadvantages of using social marketing as an educational strategy, campaign sustainability, and philosophical considerations regarding the use of this educational approach, are addressed.

공공 웹사이트의 정보서비스 및 커뮤니티 요소 평가 -한국 관공서, 군, 경찰 홈페이지를 중심으로- (The Evaluation of the Information Service and Community Factors in Korean Public Websites)

  • 이재관
    • 한국국방경영분석학회지
    • /
    • 제29권1호
    • /
    • pp.76-87
    • /
    • 2003
  • This paper proposes that we need a simpler method for developing the Website strategy for public institutions. The research objectives are threefold: (1) A model that relates to the monitoring of Website strategy in the public sector is proposed. The model includes basic dimensions and a $2{\times}3$ matrix that is a simplified version of the Mohammed et dl.s Marketspace Matrix. (2) The model is tested empirically with a sample of 56 Websites selected from govemment agencies, military organizations and police stations in Korea. (3) The effect of dimension/factors on the innovation level is tested. A special attention is paid to online attracting that is important for public institutions which usually do not use offline advertising aggressively. Results from regression analyses show that main dimensions (Marketing Drivers and relationship Stages) and three factors (Basic Information, Support Information, and Participation) in the matrix are all significantly influential on the innovation level, but the Attracting is not. Colorful designs and attracting features of a homepage have not necessarily anything to do with innovation. This message can offer a good piece of advice for managers of Websites.

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.