• Title/Summary/Keyword: Message Structure

Search Result 375, Processing Time 0.028 seconds

The Effect of Influencer Information Source, Message Sidedness, Consumer Regulatory Focus on E-WOM Intentions about the Cosmetics Advertisements of Instagram (인플루언서 정보원천, 메시지 측면성, 소비자 조절초점이 인스타그램 화장품광고 온라인 구전의도에 미치는 효과)

  • Lim, Se-Won;Han, Sang-In;Hwang, Sun-Jin
    • Journal of Fashion Business
    • /
    • v.25 no.5
    • /
    • pp.149-162
    • /
    • 2021
  • Nowadays, the cosmetic and fashion industries are paying attention to influencer marketing on Instagram. In this study, we determined whether electronic word of mouth (e-WOM) communications were affected by the following parameters: the influencer's information source, message sidedness, and consumer's regulatory focus. The experimental design of this study is a three-way mixed ANOVA, which comprises of 2 (influencer information source: expert vs general consumer) × 2 (message sidedness: two-sided message vs one-sided message) × 2 (consumer regulatory focus: promotion focus vs prevention focus) structure. The data for this research study was obtained by distributing a questionnaire to 410 subjects. The participants were aged between 20 and 39 years and lived in Seoul and Gyeonggi areas. In total, the data of 396 subjects was analyzed with the help of SPSS 25.0 statistical program: frequency analysis, reliability analysis, t-test, three-way ANOVA, and simple main effect analysis were performed. The analysis results were as follows: First, influencer information sources and consumer regulatory focus exhibited a significant interaction with consumers' e-WOM intentions. Second, message sidedness and consumer's regulatory focus exhibited a significant interaction with e-WOM intentions. Third, influencer information source and message sidedness exhibited a significant interaction with consumers' e-WOM intentions. Based on these findings, the type of influencer's information source and the consumer's regulatory focus was taken into consideration while marketing cosmetics on Instagram. Moreover, influencer marketing strategies must be used to evaluate message sidedness. This would help us gauge the consumer's attitude towards advertisements.

Research on Railway Safety Common Data Model and DDS Topic for Real-time Railway Safety Data Transmission

  • Park, Yunjung;Kim, Sang Ahm
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.57-64
    • /
    • 2016
  • In this paper, we propose the design of railway safety common data model to provide common transformation method for collecting data from railway facility fields to Real-time railway safety monitoring and control system. This common data model is divided into five abstract sub-models according to the characteristics of data such as 'StateInfoMessage', 'ControlMessage', 'RequestMessage', 'ResponseMessage' and 'ExtendedXXXMessage'. This kind of model structure allows diverse heterogeneous data acquisitions and its common conversion method to DDS (Data Distribution Service) format to share data to the sub-systems of Real-time railway safety monitoring and control system. This paper contains the design of common data model and its DDS Topic expression for DDS communication, and presents two kinds of data transformation case studied for verification of the model design.

Development of real-time embedded systems for reducing the transmission delay latency in IEC 61850 communication (IEC 61850 통신에서의 전송 지연시간 개선을 위한 실시간 임베디드 시스템 개발)

  • Cho, Chang-Doo;Kang, Seung-Hwa;Kang, Sang-Hee;Nam, Soon-Ryul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.61 no.11
    • /
    • pp.1590-1594
    • /
    • 2012
  • Depend on delay latency rule for message transmission defined in IEC 61850 standard, the fastest message has to be transferred within 3us. This paper suggests how to structure the real time message transmit test environment of IEC 61850 and develope how to securing IEC 61850 communication performance based on IEC 61850 by measuring delay latency of message transfer on embeded linux system.

An Emergency Message Propagation Method with Stem and Branch Structure for Vehicle Safety Communication (차량안전통신을 위한 줄기와 가지 구조를 이용한 긴급 메시지 전파 방법)

  • Yu, Suk-Dea;Cho, Gi-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.203-212
    • /
    • 2007
  • An advanced vehicle safety system can be constructed by exchanging danger-related information ,such as urgency stop, traffic accident, obstacle, and car trouble, among the vehicles. However, because network topology changes rapidly and frequently due to the mobility of vehicles, it is impossible to configure the network for information forwarding in this environment. In the most of vehicle safety communication applications, an emergency message is propagated in a form of broadcasting. The simple broadcasting causes a lot of problems in terms of efficiency due to multi-hop area and radio collision problem. This paper proposes a method of selective message forwarding with stem and branch structure for propagating the emergency messages. However, the proposed method raise the efficiency of message transmission with the selective forwarding based on the priority assignment as its location. We analyze and evaluate the performance by comparing the proposed scheme with other schemes that are presented in the paper.

Software structure design for processing various tactical data

  • Kim, Jin Woo;Lee, Woo Sin;Lee, Seung Chan;Kim, Young Don;Jin, So Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.39-47
    • /
    • 2017
  • In this paper, we propose a message transmission processing structure for efficient use of radio resources. Existing tactical data links have more data and accumulate more data than the amount of tactical data planned according to the situation. This may result in delays in operations and additional problems. To prevent this, priority is assigned to the message and transmission is performed according to the priority on a single basis. And we design a processing structure that can update duplicate messages and delete old messages in order to prevent waste of radio resources. Experiments are conducted to verify that these structures can be implemented and applied to data links.

Messaging System Analysis for Effective Embedded Tester Log Processing (효과적인 Embedded Tester Log 처리를 위한 Messaging System 분석)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.645-648
    • /
    • 2017
  • The existing embedded tester used TCP and shared file system for log processing. In addition, the existing processing method was treated as 1-N structure. This method wastes resources of the tester for exception handling. We implemented a log processing message layer that can be distributed by messaging system. And we compare the transmission method using the message layer and the transmission method using TCP and the shared file system. As a result of comparison, transmission using the message layer showed higher transmission bandwidth than TCP. In the CPU usage, the message layer showed lower efficiency than TCP, but showed no significant difference. It can be seen that the log processing using the message layer shows higher efficiency.

  • PDF

Lattice-based Threshold Ring Signature with Message Block Sharing

  • CHEN, Jiangshan;HU, Yupu;GAO, Wen;Liang, Hongmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1003-1019
    • /
    • 2019
  • Threshold ring signature scheme enables any t entities from N ring members to spontaneously generate a publicly verifiable t-out-of-N signature anonymously. The verifier is convinced that the signature is indeed generated by at least t users from the claimed group, but he cannot tell them apart. Threshold ring signatures are significant for ad-hoc groups such as mobile ad-hoc networks. Based on the lattice-based ring signature proposed by Melchor et al. at AFRICRYPT'13, this work presents a lattice-based threshold ring signature scheme, employing the technique of message block sharing proposed by Choi and Kim. Besides, in order to avoid the system parameter setup problems, we proposed a message processing technique called "pad-then-permute", to pre-process the message before blocking the message, thus making the threshold ring signature scheme more flexible. Our threshold ring signature scheme has several advantages: inherits the quantum immunity from the lattice structure; has considerably short signature and almost no signature size increase with the threshold value; provable to be correct, efficient, indistinguishable source hiding, and unforgeable.

Review on Security Communication Environment in Intelligent Vehicle Transport System (지능형 차량 교통체계에서 보안 통신 리뷰)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.97-102
    • /
    • 2017
  • In this paper, we have interested in cooperative intelligent transport system and autonomous driving system, and focused on analysis of the characteristics of Cooperative Awareness Message (CAM) and Decentralized Environmental Notification Basis Service (DENM) message, which is key delivery message among cooperative intelligent transport system (C-ITS) characteristics for research objectivity. For research method, we also described V2X communication, and also analyzed the security certificate and header structure of CAM and DENM messages. We described CAM message, which is a message informing the position and status of the vehicle. And the DENM message is presented a message informing an event such as a vehicle accident, and analysis security communication, which is supported services. According to standard analysis result, 186 bits or 275 bits are used. In addition to the security header and the certificate format used for vehicle communication, we have gained the certificate verification procedure for vehicles and PKI characteristics for vehicles. Also We derived the characteristics and transmission capability of the security synchronization pattern required for V2X secure communication. Therefore when it is considered for communication service of DENM and CAM in the C-ITS environment, this paper may be meaningful result.

Efficient Algorithms for Causal Message Logging and Revoery (인과적 메시지 로그 및 복구를 위한 효율적인 알고리즘)

  • Lee, Byeong-Ju;Park, Tae-Sun;Yeom, Heon-Yeong;Jo, Yu-Geun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.767-777
    • /
    • 1999
  • 인과적 메시지 로깅 기법은 정상프로세스를 역전(roll-back)시키거나 메시지의 저장을 위해 프로세스의 수행을 중단시키지 않는 장점을 지니고 있지만, 메시지의 크기가 지나치게 커진다는 단점을 지니고 있다. 본 논문에서는 인과적 메시지 로깅 기법의 이러한 문제점을 해결하기 위하여 로그 상속의 개념을 정의하고 로그 연혁을 이용하여 로그 비용, 특히 로그 크기 면에서 효율적인 로깅 기법을 제안한다. 또한 이 로깅 알고리즘을 이용하여 복구시 메시지의 수와 크기를 줄여 복구시간을 줄이는 효율적인 복구 알고리즘을 제안하고, 제안한 알고리즘이 메시지 로그 크기 면에서 효율적임을 증명한다. 또 제안한 알고리즘의 성능을 검증하기 위하여 두 가지 종류의 모의 실험을 수행하여 기존의 로깅 프로토콜과 메시지 크기 면에서의 성능을 비교한 결과를 제시하였다.Abstract Causal message logging has many good properties such as nonblocking message logging and no rollback propagation. However, it requires a large amount of information to be piggybacked on each message, which may incur severe performance degradation. This paper presents an efficient causal logging algorithm based on the new message log structure, LogOn, which represents the causal inter-process dependency relation with much smaller overhead compared to the existing algorithms. The proposed algorithm is efficient in the sense that it entails no additional information other than LogOn to be carried in each message, while other existing algorithms require extra information other than the message logs. This paper also presents an efficient recovery algorithm to solve the problem of a large amount of data exchanges during the recovery. To verify the performance of our algorithm, we give an analysis of the algorithm and perform two simulations and compare the log size with other causal logging protocols.

A Study for Aerodynamic Drag Reduction on Variable Message Sign using Flow Analysis (유동해석 기반 도로전광표지 공기저항 저감 구조 연구)

  • Lim, Se-Mi;Song, Dae-Young;Park, Kyeung-U;Park, Jun-Seok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.6
    • /
    • pp.140-146
    • /
    • 2011
  • As the demand of Variable Message Sign(VMS) has become pervasive in fulfilling the ITS policy, the costs of maintaining the Variable Message Sign operation have also increased. This paper proposes the U-curved figure, the C-curved figure and the ventilated figure type for aerodynamic drag reduction on Variable Message Sign and shows the analysis of aerodynamic drag effects using Flow Analysis. As a results of the flow analysis for right-angled, 45 degrees from side to side and 45 degrees from up or down, the C-curved figure and the ventilated figure type show about 30% aerodynamic drag reduction in all direction. And the U-curved figure type shows vivid aerodynamic drag reduction for right-angled and 45 degree from side to side, but trivial aerodynamic drag reduction for 45 degree from up or down. It is possible to reduce not only the damage on Variable Message Sign due to typhoon because of the aerodynamic drag reduction, but also installation constraints because of lighter Variable Message Sign support structure by appling the proposed structure and analysis in this paper.