• Title/Summary/Keyword: message analysis

Search Result 929, Processing Time 0.031 seconds

The Influence of Knowledge, Beliefs and Attitudes on Anti-Smoking Public Service Announcement Message Types and Audience Characteristics (수용자특성 및 금연광고 메시지가 지식․신념․태도에 미치는 영향)

  • Ryu, Ji-Hye;Cho, Kyoung-Won
    • Korean Journal of Health Education and Promotion
    • /
    • v.31 no.1
    • /
    • pp.1-11
    • /
    • 2014
  • Objectives: In this study, the most executed social norm and advertisement about health consequences status were examined. The direction of effective anti-smoking advertisement is suggested in this study by figuring out the primary factors which affect smoking attitudes. Methods: The survey period of this study was from Nov $5^{th}$ to Nov $16^{th}$, 2012. 423 complete questionnaires were used for final analysis. The collected data were analyzed by SPSS Ver. 14.0, and reliability analysis, factor analysis, frequency analysis, F/t qualification, t-test, and multiple regression analysis, were performed. Results: This study is worth as a diagnosis of current status by using advertisement about social norm(51.4%) and health result(34.3%), which covers total of 85% in appeal types of anti-smoking advertisement that has been practically used in Korea. As a result, the health result type showed better result on belief and attitude. Conclusions: When establishing message strategy for anti-smoking advertisement, this study can help future direction for effective anti-smoking advertisement by figuring out effect of factors on smoking attitude.

Investigation of wind-induced dynamic and aeroelastic effects on variable message signs

  • Meyer, Debbie;Chowdhury, Arindam Gan;Irwin, Peter
    • Wind and Structures
    • /
    • v.20 no.6
    • /
    • pp.793-810
    • /
    • 2015
  • Tests were conducted at the Florida International University (FIU) Wall of Wind (WOW) to investigate the susceptibility of Variable Message Signs (VMS) to wind induced vibrations due to vortex shedding and galloping instability. Large scale VMS models were tested in turbulence representative of the high frequency end of the spectrum in a simulated suburban atmospheric boundary layer. Data was measured for the $0^{\circ}$ and $45^{\circ}$ horizontal wind approach directions and vertical attack angles ranging from $-4.5^{\circ}$ to $+4.5^{\circ}$. Analysis of the power spectrum of the fluctuating lift indicated that vertical vortex oscillations could be significant for VMS with a large depth ratio attached to a structure with a low natural frequency. Analysis of the galloping test data indicated that VMS with large depth ratios, greater than about 0.5, and low natural frequency could also be subject to galloping instability.

Content Analysis of Jeanwear`s Advertisement -Focusing on Magazine`s Advertisement- (진웨어 광고의 내용분석 -잡지광고를 중심으로-)

  • 이주연;박길순
    • The Research Journal of the Costume Culture
    • /
    • v.5 no.4
    • /
    • pp.80-88
    • /
    • 1997
  • The purpose of this study was to identify the denotating of visual message and linguistic message in the advertisement of Jean-wear, and to identify the image type in the advertisement of Jean-wear. Content analysis was done using the advertisement of Jean-wear from several fashion magazines which were published from January, 1996 to August, 1997. The advertisement of Jean-wear reflects the reality using the photos, and is image appeal type, appeals to the model\`s lifestyle, the western value. And that mostly singles person was appeared in the advertisement means solitude in modern society.

  • PDF

ANALYSIS OF THE SECURITY OF GENERIC HOMOMORPHIC AUTHENTICATED ENCRYPTION

  • Jinsu Kim
    • East Asian mathematical journal
    • /
    • v.39 no.3
    • /
    • pp.291-298
    • /
    • 2023
  • Recently, a new type of encryption called Homomorphic Authenticated Encryption (HAE) has been proposed. This combines the functionality of homomorphic encryption with authentication. Several concrete HAE schemes have been developed and security results for homomorphic authenticated encryption, designed by combining a homomorphic message authentication scheme with a homomorphic secret-key encryption, have been partially reported. In this paper, we analyze the security of a design method that combines homomorphic message authentication and homomorphic encryption, with a focus on the encryption after authentication (EAA) type. The results of our analysis show that while non-forgeability and indistinguishability are maintained, strong non-forgeability is not.

CRYPTANALYSIS AND IMPROVEMENT OF A PROXY SIGNATURE WITH MESSAGE RECOVERY USING SELF-CERTIFIED PUBLIC KEY

  • Chande, Manoj Kumar;Lee, Cheng-Chi
    • Bulletin of the Korean Mathematical Society
    • /
    • v.53 no.4
    • /
    • pp.1051-1069
    • /
    • 2016
  • Combining the concept of self-certified public key and message recovery, Li-Zhang-Zhu (LZZ) gives the proxy signature scheme with message recovery using self-certified public key. The security of the proposed scheme is based on the discrete logarithm problem (DLP) and one-way hash function (OWHF). Their scheme accomplishes the tasks of public key verification, proxy signature verification, and message recovery in a logically single step. In addition, their scheme satisfies all properties of strong proxy signature and does not use secure channel in the communication between the original signer and the proxy signer. In this paper, it is shown that in their signature scheme a malicious signer can cheat the system authority (SA), by obtaining a proxy signature key without the permission of the original signer. At the same time malicious original signer can also cheat the SA, he can also obtain a proxy signature key without the permission of the proxy signer. An improved signature scheme is being proposed, which involves the remedial measures to get rid of security flaws of the LZZ et al.'s. The security and performance analysis shows that the proposed signature scheme is maintaining higher level of security, with little bit of computational complexity.

Contention-based Reservation Protocol Using a Counter for Detecting a Source Conflict in WDM Single-hop Optical Network with Non-equivalent Distance

  • Sakuta, Makoto;Nishino, Yoshiyuki;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.365-373
    • /
    • 2001
  • We propose a new channel reservation protocol which can reduce message delay by using a counter for detection of d source conflict in a WDM single-hop network with non-equivalent propagation delay. A source convict occurs when a source node has the right to transmit more than or equal to two messages simultaneously, which are transmitted using different wavelengths. In such a case, the source node has to newly obtain the right to transmit the message. In the proposed protocol, by using a source conflict counter a source node can detect a source conflict before a wave-length assignment is performed. Therefore, the source node can start a procedure to newly obtain the right to transmit the message which cannot be transmitted due to a source conflict. We analyse the throughput performance by taking the effect of a source conflict into account, and show that the approximate analysis and the computer simulated results are close. Also, from computer simulated results, we show that our proposed protocol can reduce mean message delay dramatically without degrading throughput performance as the offered load becomes large.

  • PDF

Social curation as an advertising tool - Message strategy of fashion brand images on vertical SNS - (소셜큐레이션과 광고 - 버티컬 SNS에서 표현된 패션브랜드 이미지의 메시지 전략 -)

  • Shin, In Jun;Lee, Kyu-Hye
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.3
    • /
    • pp.498-511
    • /
    • 2015
  • This paper examines advertising images of fashion brands in vertical social network site (SNS) from the viewpoints of message strategies. Vertical social network sites are types of social curation systems applied to social networking, where information is selected, organized, and maintained. Fashion brands communicate with consumers by presenting images on vertical SNSs, anticipating improvements in brand image, popularity, and loyalty. Those images portray content for particular brands and seasonal concepts, thus creating paths for product sales information. Marketing via SNSs corresponds to relationship marketing, which refers to long-term interrelationship and value augmentation between the company and consumer, and viral advertising, which relies on word of mouth distribution via social network platforms. Taylor's six-segment message strategy wheel, often used for analyzing viral ads, was applied to conduct a content analysis of the images. A total of 2,656 images of fashion brands advertised on Instagram were selected and analyzed. Results indicated that brand values were somewhat related to the number of followers. Follower rankings and comment rankings were also correlated. In general, fashion brands projected sensory messages most often. Acute need and rational messages were less common than other messages. Sports brands and luxury brands presented sensory messages, whereas fast fashion brands projected routine images most often. Fashion brands promoted on vertical SNSs should portray advertising images that combine message strategies

An Efficient Link-K Message Aggregation and Transmission Method for IP-based Tactical Networks (IP 기반 전술네트워크를 위한 효율적인 Link-K 메시지 통합 및 전송기법)

  • Yoon, Sun-Joong;Sung, Yun-Kyung;Cho, Youn-Chul;Ko, Young-Bae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1064-1070
    • /
    • 2010
  • Korea Department of Defense has been developing Link-K, Korean Joint Tactical Datalink, to support their independent joint operations and trying to enlarge the scope of Link-K tactical message delivery to nodes in IP based tactical networks for sharing situation awareness more broadly. A Link-K tactical message size is too small to fit into an IP packet, inefficiently wasting most of the IP packet space of the low bandwidth IP-based tactical networks. This paper proposes a new Link-K tactical message aggregation and delivery method when tactical messages need to be sent to some nodes located at IP-based tactical networks. With numerical analysis and OPNET simulation studies, we prove the effectiveness and efficiency of the proposed method.

Messaging System Analysis for Effective Embedded Tester Log Processing (효과적인 Embedded Tester Log 처리를 위한 Messaging System 분석)

  • Nam, Ki-ahn;Kwon, Oh-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.645-648
    • /
    • 2017
  • The existing embedded tester used TCP and shared file system for log processing. In addition, the existing processing method was treated as 1-N structure. This method wastes resources of the tester for exception handling. We implemented a log processing message layer that can be distributed by messaging system. And we compare the transmission method using the message layer and the transmission method using TCP and the shared file system. As a result of comparison, transmission using the message layer showed higher transmission bandwidth than TCP. In the CPU usage, the message layer showed lower efficiency than TCP, but showed no significant difference. It can be seen that the log processing using the message layer shows higher efficiency.

  • PDF

Message Complexity Analysis of TDMA Ad-hoc Network MAC Protocols (TDMA Ad-hoc 네트워크 MAC 프로토콜의 메시지 복잡도 분석)

  • Kim, Sang-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.768-776
    • /
    • 2009
  • This paper analyses the message complexity of TDMA ad hoc MAC protocols. Since the network resource of ad hoc networks is limited due to the multiple interferences and the contention-based wireless channel, the scalability issue is one of the main research topics in developing ad hoc algorithms. Simulation demonstrates that SMACS protocol has the lowest message complexity, whereas TMMAC has the highest. In addition, it is found that since the effect of unicast dominates in the message complexity compared to other factors with an increasing number of nodes, Z-MAC tends to have the property of linearity, whereas BMA and TMMAC show exponential increases in their complexities.