• Title/Summary/Keyword: Message strategy

Search Result 175, Processing Time 0.025 seconds

Flexible, Extensible, and Efficient VANET Authentication

  • Studer, Ahren;Bai, Fan;Bellur, Bhargav;Perrig, Adrian
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.574-588
    • /
    • 2009
  • Although much research has been conducted in the area of authentication in wireless networks, vehicular ad-hoc networks (VANETs) pose unique challenges, such as real-time constraints, processing limitations, memory constraints, frequently changing senders, requirements for interoperability with existing standards, extensibility and flexibility for future requirements, etc. No currently proposed technique addresses all of the requirements for message and entity authentication in VANETs. After analyzing the requirements for viable VANET message authentication, we propose a modified version of TESLA, TESLA++, which provides the same computationally efficient broadcast authentication as TESLA with reduced memory requirements. To address the range of needs within VANETs we propose a new hybrid authentication mechanism, VANET authentication using signatures and TESLA++ (VAST), that combines the advantages of ECDSA signatures and TESLA++. Elliptic curve digital signature algorithm (ECDSA) signatures provide fast authentication and non-repudiation, but are computationally expensive. TESLA++ prevents memory and computation-based denial of service attacks. We analyze the security of our mechanism and simulate VAST in realistic highway conditions under varying network and vehicular traffic scenarios. Simulation results show that VAST outperforms either signatures or TESLA on its own. Even under heavy loads VAST is able to authenticate 100% of the received messages within 107ms. VANETs use certificates to achieve entity authentication (i.e., validate senders). To reduce certificate bandwidth usage, we use Hu et al.'s strategy of broadcasting certificates at fixed intervals, independent of the arrival of new entities. We propose a new certificate verification strategy that prevents denial of service attacks while requiring zero additional sender overhead. Our analysis shows that these solutions introduce a small delay, but still allow drivers in a worst case scenario over 3 seconds to respond to a dangerous situation.

The Activating Plan of Domestic IT Industry after 2002 Worldcup using Competitive Strategy Model : Focused on SI Industry (경쟁 전략 모형을 활용한 "포스트 월드컵" 국내 IT 산업 활성화 방안에 대한 연구 : SI 산업 중심의 분석)

  • Ryu, Kyung-Seok;Park, Joo-Seok;Lee, Sung-Gi
    • Journal of Information Technology Services
    • /
    • v.2 no.1
    • /
    • pp.51-73
    • /
    • 2003
  • The success of 2002 Korea Japan Worldcup became a good opportunity to give the message of revival to the people of Korea. With the effect of it, the national brand image has risen. Nevertheless, in order to maximize the chance of time, the most necessary thing that need to be done is to find the strategic counterproposal of the Post Worldcup. Especially, to find the more active plan in the respect of economy. In this research, we have studied the IT industry(especially SI industry) of the economy in order to look into the strategic counterproposal to get the development effect after the Worldcup. We mainly analyzed the SI industry in the respect of economy, because it is not only a high-value added industry of the integration of knowledge and technology but also a high-tech industry which has a spreading effect on the related industries. To implement the analysis of SI industry, derive and verify the strategy, and get the activating plan, we studied with 4 stages. Firstly, analyze the exterior environment and the interior strength with the Competitive Strategy Model(Specially, 7 Force Model & Value Chain Model). Secondly, get the strategy with SWOT analysis. Thirdly, verify the Strategy with interview and survey. Fourthly, classify the SI industry activation plan into 5 kinds after Worldcup through panel discussion and seminar with the data which we got through interview and survey.

A Narrative Strategy of Storytelling Advertising Videos: Heineken's Case

  • Byun, Chan-Bok
    • Culinary science and hospitality research
    • /
    • v.22 no.1
    • /
    • pp.9-18
    • /
    • 2016
  • The purpose of this paper was to explore the narrative strategy of storytelling advertisement videos for a beer brand Heineken. Heineken was one of the most active advertisers who had made very impressive ad videos. The author selected five story driven advertisement videos which had been most frequently watched by Internet viewers. Those were "The Insider", "Odyssey 2011", "Heineken lip gross", "Italy Activation Milan AC vs. Real Madrid", "the Match". The five selected videos have 90 second running time. The target videos were repeatedly watched and the expected key image cuts and key verbal copies were captured as well. To categorize the narrative structure and key copies of each video, Fog, Budtz & Yakaboylu's four element model of storytelling and Gustav Freytag's three act structure or five stage model of a plot were exploited as underlying theories. Most of the ad videos had clear boundary between or among the stages of the plot and used emotional appeals including humor and sexual appeals. This paper found that the target videos used visual rhetorics to enhance the viewers' persuasion and comprehension. It also revealed that the target videos took advantage of football match as an emotional engagement to get ad viewers closely banded with Heineken.

An Empirical Study of the Usage Performance of Mobile Emoticons : Applying to the Five Construct Model by Huang et al.

  • Lim, Se-Hun;Kim, Dae-Kil;Watts, Sean
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.4
    • /
    • pp.21-40
    • /
    • 2011
  • Emoticons perform an important role as an enhancement to written communication, in areas such as Windows Live Messenger instant messaging, e-mails, mobile Short Message Services (SMS), and others. Emoticons are graphic images used in communications to indicate the feelings of people exchanging messages via mobile technology. In this research, the perceived usefulness of the emoticon in mobile phone text messages is verified with consumers using the five construct model of Huang. A K-means clustering technique for separating three groups based on levels of perceived usefulness of mobile emoticons is used with a structural equation model test using Smart PLS 2.0, and the bootstrap re-sampling procedure. We analyzed relationships among use of emoticons, enjoyment, interaction, information richness, and perceived usefulness. The results show there are relationships among use of emoticons, enjoyment, interaction, perceived usefulness, and information richness, however enjoyment of emoticons did not significantly affect the perceived usefulness of messages with emoticons alone. The results suggest emoticons have different affects on emotion in both mobile, and Messenger contexts. Our study did not consider more detailed media properties, and thus more studies are needed. Our research results contribute to mobile communication activation, provides companies with an understanding of key characteristics of consumers who use emoticons, and provides useful implications for improving management and marketing strategies.

Diet-Related Stomach Cancer Behavior Among Iranian College Students: A Text Messaging Intervention

  • Dehdari, Tahereh;Dehdari, Laleh;Jazayeri, Shima
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.12
    • /
    • pp.5165-5172
    • /
    • 2016
  • Background: Stomach cancer is one of the five most common cancers in Iran. This study examined the effectiveness of a mobile telephone short-message service (SMS) based-education intervention using Health Belief Model (HBM) variables in improving dietary behavior in terms of stomach cancer prevention among a sample of Iranian female college students. Materials and Methods: In this quasi-experimental study, 124 female college students in the dormitories of Yazd University, Yazd, Iran were randomly selected and assigned to either the intervention (n=62) or the control group (n=62). Information (data) regarding HBM variables and dietary behavior related to stomach cancer prevention was collected by a self-administrated questionnaire. Forty eight messages were designed and sent to the participants' phones in the intervention group during the 48-day intervention period. Two groups were followed-up one month after the intervention delivered via SMS. Results: There were significant differences in HBM variables (except for the perceived severity) and the preventive dietary behaviors for stomach cancer in the intervention group compared to the comparison group following the education intervention delivered via SMS. Conclusions: SMS-delivered nutrition education intervention can be a practical strategy to improve dietary behavior related to stomach cancer prevention.

A Priority Based Transmission Control Scheme Considering Remaining Energy for Body Sensor Network

  • Encarnacion, Nico;Yang, Hyunho
    • Smart Media Journal
    • /
    • v.4 no.1
    • /
    • pp.25-32
    • /
    • 2015
  • Powering wireless sensors with energy harvested from the environment is coming of age due to the increasing power densities of both storage and harvesting devices and the electronics performing energy efficient energy conversion. In order to maximize the functionality of the wireless sensor network, minimize missing packets, minimize latency and prevent the waste of energy, problems like congestion and inefficient energy usage must be addressed. Many sleep-awake protocols and efficient message priority techniques have been developed to properly manage the energy of the nodes and to minimize congestion. For a WSN that is operating in a strictly energy constrained environment, an energy-efficient transmission strategy is necessary. In this paper, we present a novel transmission priority decision scheme for a heterogeneous body sensor network composed of normal nodes and an energy harvesting node that acts as a cluster head. The energy harvesting node's decision whether or not to clear a normal node for sending is based on a set of metrics which includes the energy harvesting node's remaining energy, the total harvested energy, the type of message in a normal node's queue and finally, the implementation context of the wireless sensor network.

New Social Video Techniques through The Convergence of a Social Video and Color Marketing (소셜 영상과 컬러 마케팅의 융합을 통한 새로운 소셜 영상 기법)

  • Lim, Seungae;Choi, Hakhyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.117-124
    • /
    • 2014
  • In this paper, it aims to get an effective marketing strategy in terms of business by introducing combined social video and color marketing technique. The process of research will be implementing a stop motion technique video by combining a black and white video with an extracted color image and then, further investigates each process. The expected result is that the effects can contribute to the development and the activation of company or brand's social video marketing by using the new video production technique. From the perspective of a company, the technique can effect in a positive way. They can provide consistent message to customers (public) by the color effect which contain brand's core message.

Implementation of Real-Time Communication in CAN for a Humanoid Robot (CAN 기반 휴머노이드 로봇의 실시간 데이터 통신 구현)

  • Kwon Sun-Ku;Kim Byung-Yoon;Kim Jin-Hwan;Huh Uk-Youl
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.1
    • /
    • pp.24-30
    • /
    • 2006
  • The Controller Area Network (CAN) is being widely used for real-time control application and small-scale distributed computer controller systems. When the stuff bits are generated by bit-stuffing mechanism in the CAN network, it causes jitter including variations in response time and delay In order to eliminate this jitter, stuff bits must be controlled to minimize the response time and to reduce the variation of data transmission time. This paper proposes the method to reduce the stuff bits by restriction of available identifier and bit mask using exclusive OR operation. This da manipulation method are pretty useful to the real-time control strategy with respect to performance. However, the CAN may exhibit unfair behavior under heavy traffic conditions. When there are both high and low priority messages ready for transmission, the proposed precedence priority filtering method allows one low priority message to be exchanged between any two adjacent higher priority messages. In this way, the length of each transmission delays is upper bounded. These procedures are implemented as local controllers for the ISHURO(Inha Semvung Humanoid Robot).

Examining Interaction Patterns in Online Discussion through Multiple Lenses

  • HAN, Seungyeon
    • Educational Technology International
    • /
    • v.15 no.2
    • /
    • pp.117-141
    • /
    • 2014
  • This qualitative study investigated different interaction patterns in an online discussion. The data was collected from asynchronous discussion occurred in a graduate course. The data analysis methods include inductive analysis and mapping strategy. The results of the study suggest three layers of interaction: response sequences, interaction amongst participants, and concept map of messages. The visualization of response sequences enabled the researcher to discover complex and dynamic interaction patterns amongst participants. The many-to-many communication feature of online discussion does not always enable direct one-on-one interaction between two participants. Rather, one message contributed to multiple threads in the stream of conversation. In terms of interaction amongst participants, the interaction amongst participants, as indicated in the data, the messages also bind each participant and consequently a group(s) of participants together. It appears that the contribution of one message may not only enable a response to one participant, but also connect many participants to each other. The concept map of messages proposes that response sequences and interaction amongst participants can also be viewed between concepts within messages in the discussion. On the surface, the messages posted by individuals are linked by the system in a linear fashion as they are posted. However, the interaction extends to collaborative conversation amongst participants. Ultimately, a conceptual network of interrelated ideas including multiple perspectives is built in asynchronous discussion.

Asynchronous Cache Invalidation Strategy to Support Read-Only Transaction in Mobile Environments (이동 컴퓨팅 환경에서 읽기-전용 트랜잭션을 지원하기 위한 비동기적 캐쉬 무효화 기법)

  • Kim, Il-Do;Nam, Sung-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.325-334
    • /
    • 2003
  • In stateless server, if an asynchronous cache invalidation scheme attempts to support local processing of read-only transaction in mobile client/sever database systems, a critical problem may occur ; the asynchronous invalidation reports provide no guarantees of waiting time for mobile transactions requesting commit. To solve this problem, the server in our algorithm broadcasts two kind of messages, asynchronous invalidation report to reduce transaction latency and periodic guide message to avoid the uncertainty of waiting time for the next invalidation report. The asynchronous invalidation report has its own sequence number and the periodic guide message has the sequence number of the most recently broadcast asynchronous invalidation report. A mobile client checks its cache validity by using the sequence numbers of these messages.