• Title/Summary/Keyword: multiple platforms

Search Result 201, Processing Time 0.023 seconds

Qualitative Study: The Development of Music Business Distribution Channels to Attract Potential Customers

  • Jeong-Eun PARK
    • Journal of Distribution Science
    • /
    • v.21 no.6
    • /
    • pp.13-20
    • /
    • 2023
  • Purpose: This research explores the development of music business distribution channels to attract potential customers based on the current and prior literature. As a result, the research will provide solutions for practitioners in the music distribution channel how they create effective channel in new industry phase which has experienced significant changes due to technological advancement and consumer behavior. Research design, data, and methodology: To obtain textual data in the literature storage, the author conducted content analysis. Even though there are numerous textual resources, selecting only high-quality text data that is only peer-reviewed journal articles and books consistently indicate a high degree of reliability and validity to keep the advantage form content analysis approach. Results: The present study figured out that there are five strategies to attract potential consumers in the music distribution channel, such as (1) 'Marketing Mix', (2) 'Streaming Platforms and Online Music Stores', (3) 'Brick and Mortar Stores and Concerts, and Events', (4) 'Platforms Exclusives and Limited-Edition Merchandise', and 'Partnerships and collaborations. Conclusions: In sum, the practitioners need to consider include building relationships with the fans, studying and understanding their target market, utilizing multiple available distribution channels, embracing new technologies, and analyzing the effectiveness of the adopted distribution channels.

A Static Analysis Technique for Android Apps Written with Xamarin (자마린으로 개발된 안드로이드 앱의 정적 분석 연구)

  • Lim, Kyeong-hwan;Kim, Gyu-sik;Shim, Jae-woo;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.643-653
    • /
    • 2018
  • Xamarin is a representative cross-platform development framework that allows developers to write mobile apps in C# for multiple mobile platforms, such as Android, iOS, or Windows Phone. Using Xamarin, mobile app developers can reuse existing C# code and share significant code across multiple platforms, reducing development time and maintenance costs. Meanwhile, malware authors can also use Xamarin to spread malicious apps on more platforms, minimizing the time and cost of malicious app creation. In order to cope with this problem, it is necessary to analyze and detect malware written with Xamarin. However, little studies have been conducted on static analysis methods of the apps written in Xamarin. In this paper, we examine the structure of Android apps written with Xamarin and propose a static analysis technique for the apps. We also demonstrate how to statically reverse-engineer apps that have been transformed using code obfuscation. Because the Android apps written with Xamarin consists of Java bytecode, C# based DLL libraries, and C/C++ based native libraries, we have studied static reverse engineering techniques for these different types of code.

Cooperative Manipulation of a Virtual Object by Multiple Remote Users

  • Choi, Hyouk-Ryeol;Ryew, Sung-Moo
    • Journal of Mechanical Science and Technology
    • /
    • v.14 no.9
    • /
    • pp.956-967
    • /
    • 2000
  • In this paper, we explore the issues of force display in the cooperative virtual environment shared by multiple users distributed over the network with heterogeneous hardware platforms. The proposed method is to cope with the problem of small time delay and the difference of sampling rate in the distributed configuration. In the proposed approach the interaction forces of the participants are just treated as the independent sources of acceleration. Thus the action of a participant simply changes the acceleration of the virtual object and consequently the states of the virtual object will be updated. When the updated states are reported to all the participants, the information on the time of state changes is delivered, too. Employing the discrete state information updated by the other users, each user modifies his own virtual environment and pseudo-realtime simulation can be realized. Excluding the software interface and the communication technique, it is proposed the simulation method for the operation of respective users and the way of calculating the driving input to the display device. For experimental verification we construct a cooperative virtual environment shared by two remote users and outline the results of experiments.

  • PDF

A Set-top Box with Virtual Platform Support for QoS Management in IMS Based Multiple Provider Networks

  • Siddiqui, Muhammad Shoaib;Hong, Choong-Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.3
    • /
    • pp.886-905
    • /
    • 2012
  • Set-top Box (STB) has evolved from being a device just sitting on top of a TV shelf to a device providing a gateway to the Internet for a home network, receiving services from multiple content providers, and enabling and ensuring Quality of Service (QoS) for the streaming media. IP Multimedia Subsystem (IMS), with its promise to provide a converged access network for multimedia service delivery (such as Triple play & Quadruple play services), has to guarantee QoS support. To enable QoS in IMS-based networks, we have designed a set-top box which provides feedback to the service provider to ensure end-to-end QoS. Our set-top box is designed to provide virtual platforms such that it can support multiple service providers. Each service provider is able to manage its own multimedia streams and ensures the desired network performance for each flow. The set-top box also works as a Home Gateway and provides end-to-end QoS support to the client nodes.

PartitionTuner: An operator scheduler for deep-learning compilers supporting multiple heterogeneous processing units

  • Misun Yu;Yongin Kwon;Jemin Lee;Jeman Park;Junmo Park;Taeho Kim
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.318-328
    • /
    • 2023
  • Recently, embedded systems, such as mobile platforms, have multiple processing units that can operate in parallel, such as centralized processing units (CPUs) and neural processing units (NPUs). We can use deep-learning compilers to generate machine code optimized for these embedded systems from a deep neural network (DNN). However, the deep-learning compilers proposed so far generate codes that sequentially execute DNN operators on a single processing unit or parallel codes for graphic processing units (GPUs). In this study, we propose PartitionTuner, an operator scheduler for deep-learning compilers that supports multiple heterogeneous PUs including CPUs and NPUs. PartitionTuner can generate an operator-scheduling plan that uses all available PUs simultaneously to minimize overall DNN inference time. Operator scheduling is based on the analysis of DNN architecture and the performance profiles of individual and group operators measured on heterogeneous processing units. By the experiments for seven DNNs, PartitionTuner generates scheduling plans that perform 5.03% better than a static type-based operator-scheduling technique for SqueezeNet. In addition, PartitionTuner outperforms recent profiling-based operator-scheduling techniques for ResNet50, ResNet18, and SqueezeNet by 7.18%, 5.36%, and 2.73%, respectively.

Authing Service of Platform: Tradeoff between Information Security and Convenience (플랫폼의 소셜로그인 서비스(Authing Service): 보안과 편의 사이의 적절성)

  • Eun Sol Yoo;Byung Cho Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.137-158
    • /
    • 2018
  • Online platforms recently expanded their connectivity through an authing service. The growth of authing services enabled consumers to enjoy easy log in access without exerting extra effort. However, multiple points of access increases the security vulnerability of platform ecosystems. Despite the importance of balancing authing service and security, only a few studies examined platform connectivity. This study examines the optimal level of authing service of a platform and how authing strategies impact participants in a platform ecosystem. We used a game-theoretic approach to analyze security problems associated with authing services provided by online platforms for consumers and other linked platforms. The main findings are as follows: 1) the decreased expected loss of consumers will increase the number of players who participate in the platform; 2) linked platforms offer strong benefits from consumers involved in an authing service; 3) the main platform will increase its effort level, which includes security cost and checking of linked platform's security if the expected loss of the consumers is low. Our study contributes to the literature on the relationship between technology convenience and security risk and provides guidelines on authing strategies to platform managers.

Study on Multiple & Complex threat situation emulation for ASE System (생존체계 위협조우 상황인지를 위한 복합/다중 위협 상황 Emulation 연구)

  • Lee, Moon-Seok;Lee, Jung-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.516-520
    • /
    • 2010
  • As the substantial increase in battlefield density, multiple and complex weapon system, Ensuring the Survivability of the platform has been emphasized. Most of platforms have equipped with ASE (Aircraft Survivability Equipment) system in order to take action against at modernized hostile weapon under current battlefield. ASE system enhance the survivability of the platform through providing accurate situation awareness information by detecting and countermeasuring hostile threats. One of Key factor of the AE system performance is handling multiple and complex threats. Multiple and complex threat emulation is an effective means of ASE system verification In this study, It discuss system verification method before installation by dealing with complex threat situation consists of individual threat.

  • PDF

Sexism and Ageism in a P2P Lending Market: Evidence from Korea

  • KIM, Dongwoo
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.6
    • /
    • pp.537-550
    • /
    • 2020
  • This study attempts to identify gender and age discrimination by individual lenders in P2P lending markets by analyzing empirical transaction data from multiple platforms including Moneyauction, Popfunding, and 8percent. To do this, the study investigates the effects and importance of a borrower's gender and age on individual lenders' preferences and a borrower's actual repayment performance using multiple linear regression and relative weight analyses. As a result, no gender discrimination is found in the three Korean P2P lending markets, and such indiscrimination is rational, on the grounds that the borrower's gender does not have a statistically significant impact on the lenders' preferences as well as his/her actual repayment performance, and its relative importance is minimal. While, there marginally exists age discrimination against a borrower in the markets, and such ageism is likely to be irrational, on the grounds that the borrower's age has a partly significant and minimally important impact on the lenders' preferences, but has no significant and important impact on his/her repayment performance. For the first time, these findings help to clarify gender and age discrimination issues in the P2P lending market by identifying the rationality of individual lenders' preferences to the borrower's gender and age in the Korea.

Isolation Schemes of Virtual Network Platform for Cloud Computing

  • Ahn, SungWon;Lee, ShinHyoung;Yoo, SeeHwan;Park, DaeYoung;Kim, Dojung;Yoo, Chuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2764-2783
    • /
    • 2012
  • Network virtualization supports future Internet environments and cloud computing. Virtualization can mitigate many hardware restrictions and provide variable network topologies to support variable cloud services. Owing to several advantages such as low cost, high flexibility, and better manageability, virtualization has been widely adopted for use in network virtualization platforms. Among the many issues related to cloud computing, to achieve a suitable cloud service quality we specifically focus on network and performance isolation schemes, which ensure the integrity and QoS of each virtual cloud network. In this study, we suggest a virtual network platform that uses Xen-based virtualization, and implement multiple virtualized networks to provide variable cloud services on a physical network. In addition, we describe the isolation of virtual networks by assigning a different virtualized network ID (VLAN ID) to each network to ensure the integrity of the service contents. We also provide a method for efficiently isolating the performance of each virtual network in terms of network bandwidth. Our performance isolation method supports multiple virtual networks with different levels of service quality.

Development of Data Logging Platform of Multiple Commercial Radars for Sensor Fusion With AVM Cameras (AVM 카메라와 융합을 위한 다중 상용 레이더 데이터 획득 플랫폼 개발)

  • Jin, Youngseok;Jeon, Hyeongcheol;Shin, Young-Nam;Hyun, Eugin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.4
    • /
    • pp.169-178
    • /
    • 2018
  • Currently, various sensors have been used for advanced driver assistance systems. In order to overcome the limitations of individual sensors, sensor fusion has recently attracted the attention in the field of intelligence vehicles. Thus, vision and radar based sensor fusion has become a popular concept. The typical method of sensor fusion involves vision sensor that recognizes targets based on ROIs (Regions Of Interest) generated by radar sensors. Especially, because AVM (Around View Monitor) cameras due to their wide-angle lenses have limitations of detection performance over near distance and around the edges of the angle of view, for high performance of sensor fusion using AVM cameras and radar sensors the exact ROI extraction of the radar sensor is very important. In order to resolve this problem, we proposed a sensor fusion scheme based on commercial radar modules of the vendor Delphi. First, we configured multiple radar data logging systems together with AVM cameras. We also designed radar post-processing algorithms to extract the exact ROIs. Finally, using the developed hardware and software platforms, we verified the post-data processing algorithm under indoor and outdoor environments.