• Title/Summary/Keyword: Data Message

Search Result 1,513, Processing Time 0.026 seconds

Role of Advertising Message in the Development of Brand Image with Reference to Insurance Industry: an Exploratory Study

  • Bhakar, S.S.;Sikarwar, Nitin
    • Asia-Pacific Journal of Business
    • /
    • v.4 no.1
    • /
    • pp.43-51
    • /
    • 2013
  • The research is done with reference to insurance industry. Three companies are taken for the study, first one is LIC, second is ICICI Prudential and third one is ING Vysya life insurance. The impact of advertising message was seen on the brand image of these companies. Six print ads were taken for each company and data was collected from five hundred and forty respondents and forming a sample size of thirty. Three questionnaires were prepared one for brand image before showing ad; second one for advertising message and third one for brand image after showing ads. Through this study these three companies were also compared on the ground of which company has the effect on its brand image by showing ads of that company before and after.

  • PDF

The Influence of Advertising Evaluation on Advertising Attitude and Buying Intension for Casual Wear Advertisements (캐주얼 의류 광고의 평가가 광고태도 및 구매의도에 미치는 영향)

  • 신혜봉
    • The Research Journal of the Costume Culture
    • /
    • v.12 no.4
    • /
    • pp.566-578
    • /
    • 2004
  • The purposes of this study were to identify the dimensions of advertising evaluation and to examine the influence of advertising evaluation on advertising attitude and buying intension. Also this study categorized the advertising responses. Through the pretest, 15 casual wear brand's advertisements were selected and presented as stimuli. The data was collected from 377 female university students using questionnaire and analyzed by descriptive statistics, factor analysis and multiple regression fer path analysis. The results of This study were as follows. First, 5 factors were identified for the dimensions of advertising evaluation: model/message/product/brand/tone & manner. Second, through the path analysis, advertising evaluation had direct and indirect influences on buying intension. The influences of dimensions of advertising evaluation on buying intension were also examined: model, message and product had indirect influence on buying intension mediated by advertising attitude, whereas product and brand had direct influence on buying intension. Especially, product affected considerably on buying intension. Third, advertising responses were categorized into five dimensions: tone & manner/model/message/product/brand.

  • PDF

Effective Control of Message Queues on Real-Time Operating Systems (실시간 운영체제에서 효율적인 메시지 큐 제어)

  • 류현수;이재규;성영락;이철훈
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.295-297
    • /
    • 2003
  • 실시간 운영체제는 여러 개의 독립적인 태스크가 동시에 실행될 수 있는 멀티태스킹 환경을 제공한다. 이러한 독립적인 태스크들 사이에 정보를 주고받기 위해서는 태스크들 사이의 통신이 필요하며 이러한 ITC(Inter-Task Communication)를 지원하는 방법에는 Global Variable과 Message 전송 두 가지 방법이 있다. Global Variable 은 Data Corruption 의 위험이 있기 때문에 보통의 실시간 운영체제에서는 Message 전송 방식을 주로 사용하는데 이러한 방식에는 메시지 큐, 메시지 메일박스, 메시지 포트 등이 있다. 본 논문에서는 태스크들 간에 또는 태스크와 ISR(Interrupt Service Routine)이 여러 개의 메시지를 서로 전달할 수 있는 메시지 큐에 대해서 설명하고 있다. 또한 태스크 또는 ISR 이 메시지 큐로부터 메시지를 주고받을 때 메모리의 동적 할당을 보다 효과적으로 처리함으로써 효율적인 메시지 큐 제어기법에 대해서 제시하고 있다.

  • PDF

Enhancing LSB Method Performance Using Secret Message Segmentation

  • Khrisat, Mohammad S.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.383-388
    • /
    • 2022
  • Many methods used for secret data steganography are based on least significant bit method, which is suffering from security and the embedded message can be easily hacked. In this paper research a proposed method of adding security issues will be introduced, a complex private key will be constructed, the contents of this key will depend on the results of secrete message segmentation. The proposed method will be implemented and the obtained experimental results will be compared with least significant method results to prove that the proposed method raises the image quality parameters.

A Security Description Assistance in Web Services (웹서비스에서 보안 설정 지원)

  • Hung, Pham Phuoc;Nasridinov, Aziz;Byun, Jeong-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.956-959
    • /
    • 2011
  • When SOAP message in Web Services has sensitive and important data, it is necessary to protect the message from XML rewriting attacks. These attacks create a foundation for typical faults in SOAP message and make it vulnerable to use in Web Service environment. Currently, Web Services middleware offers limited functions to detect these faults and possibly fix them. In this paper, we propose a Security Description Assistance which identifies and fixes typical faults in SOAP messages. Our system adapts simulation-based approach, which allows system to self-optimize its performance in different conditions and thus improve the reliability of Web Services.

A New NTFS Anti-Forensic Technique for NTFS Index Entry (새로운 NTFS 디렉토리 인덱스 안티포렌식 기법)

  • Cho, Gyu-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.4
    • /
    • pp.327-337
    • /
    • 2015
  • This work provides new forensic techinque to a hide message on a directory index in Windows NTFS file system. Behavior characteristics of B-tree, which is apoted to manage an index entry, is utilized for hiding message in slack space of an index record. For hidden message not to be exposured, we use a disguised file in order not to be left in a file name attribute of a MFT entry. To understand of key idea of the proposed technique, we describe B-tree indexing method and the proposed of this work. We show the proposed technique is practical for anti-forensic usage with a real message hiding case using a developed software tool.

A Study on Distributed Message Allocation Method of CAN System with Dual Communication Channels (중복 통신 채널을 가진 CAN 시스템에서 분산 메시지 할당 방법에 관한 연구)

  • Kim, Man-Ho;Lee, Jong-Gap;Lee, Suk;Lee, Kyung-Chang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.10
    • /
    • pp.1018-1023
    • /
    • 2010
  • The CAN (Controller Area Network) system is the most dominant protocol for in-vehicle networking system because it provides bounded transmission delay among ECUs (Electronic Control Units) at data rates between 125Kbps and 1Mbps. And, many automotive companies have chosen the CAN protocol for their in-vehicle networking system such as chassis network system because of its excellent communication characteristics. However, the increasing number of ECUs and the need for more intelligent functions such as ADASs (Advanced Driver Assistance Systems) or IVISs (In-Vehicle Information Systems) require a network with more network capacity and the real-time QoS (Quality-of-Service). As one approach to enhancing the network capacity of a CAN system, this paper introduces a CAN system with dual communication channel. And, this paper presents a distributed message allocation method that allocates messages to the more appropriate channel using forecast traffic of each channel. Finally, an experimental testbed using commercial off-the-shelf microcontrollers with two CAN protocol controllers was used to demonstrate the feasibility of the CAN system with dual communication channel using the distributed message allocation method.

The Implementation of Vital Sign Information Parsing Module using TMO(Time Triggered and Message Triggered Method) (TMO를 이용한 생체정보 수신모듈 구현)

  • Cho, Eui-Joo;Kim, Chun-Suk;Kim, Gwang-Gun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.247-253
    • /
    • 2008
  • The TMO may contain two types of methods, time-triggered methods(also called the spontaneous methods of SpMs) which are clearly separated from the conventional service methods (SvMs). The SpM executions are triggered upon design time whereas the SvM executions are triggered by service request message from clients. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems.

  • PDF

Interest Based Clustering Mechanism for Hybrid P2P (하이브리드 P2P를 위한 관심분야 기반 클러스터링)

  • Lee, Lee-Sub
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.69-75
    • /
    • 2006
  • P2P services occupy more then 50% of the internet traffics. A huge number of query packets are generated since pure P2P based models rely on message flooding for their query mechanisms. In this study, the numbers of query messages generated in the pure P2P and hybrid P2P model are analyzed. The results show that hybrid P2P models also could suffer from message flooding. To reduce the message flooding, this study proposes an interest based clustering mechanism for hybrid P2P services. By applying this clustering algorithm, it could reduce 99.998% of the message flooding. The proposed algorithm also reduces the cost of the joining operations by storing previous supernodes.

  • PDF

Smart Door Lock Systems using encryption technology (암호화 기법을 활용한 사물인터넷 기반의 스마트 도어락 시스템)

  • Lee, Sung-Won;Park, Seung-Min;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.1
    • /
    • pp.65-71
    • /
    • 2017
  • Since existing Internet of Things(IoT) is vulnerable, it may cause property damage due to the information leakage. Especially, the smart door lock system built on the IoT can cause more damage. To solve these problems, this paper classify the data generated by the sensor according to the condition and send an alarm message to the user's smartphone through Google Cloud Message (GCM). We made it possible to check the images in real time through the smartphone application and control the door lock using the TCP / IP protocol. Also, we applied OTP-Based Matrix SEED algorithm to door lock system to improve security.