• Title/Summary/Keyword: Mobile Message

Search Result 731, Processing Time 0.025 seconds

A Study on the Influencing Factors of Online Word-of-Mouth Adoption in the Mobile Applications Market (모바일 애플리케이션 마켓에서 온라인 구전 수용에 영향을 미치는 요인에 관한 연구)

  • Ha, Na-Yeun;Kim, Kyung-Kyu;Lee, Ho
    • Journal of Information Management
    • /
    • v.43 no.1
    • /
    • pp.109-134
    • /
    • 2012
  • This study, focusing on process of online Word-of-Mouth(oWOM) adoption in applications market which is a major issue of recent mobile industry, tried to empirically analyze how main characteristics of oWOM affect trust and process of oWOM adoption. To do this, based on understanding about applications market and precedent studies on online communication and Elaboration Likelihood Model(ELM), I developed the research model and proposed seven hypotheses. The subjects were smart phone users who ever used review in mobile applications market. The study method was questionnaire survey. As a result, trust in review was suggested as prerequisite for consumers to accept on-line review in mobile applications market. And it was empirically proved that for the customers to feel trust, these are necessary - positive assessment on argument quality, vividness of delivered explanation, and neutrality of message. The theoretical implications of this study are that based on studies on oWOM, factors affecting trust in review were explored in the environment of mobile applications market with less judgement clues for decision making compared to other on-line media and then, these factors were conceptualized. From the practical view, this study suggested implication on what attributes companies or developers can strategically utilize while investigating prerequisites of oWOM adoption.

IMAGE ENCRYPTION THROUGH THE BIT PLANE DECOMPOSITION

  • Kim, Tae-Sik
    • The Pure and Applied Mathematics
    • /
    • v.11 no.1
    • /
    • pp.1-14
    • /
    • 2004
  • Due to the development of computer network and mobile communications, the security in image data and other related source are very important as in saving or transferring the commercial documents, medical data, and every private picture. Nonetheless, the conventional encryption algorithms are usually focusing on the word message. These methods are too complicated or complex in the respect of image data because they have much more amounts of information to represent. In this sense, we proposed an efficient secret symmetric stream type encryption algorithm which is based on Boolean matrix operation and the characteristic of image data.

  • PDF

Synthetic feedback information construction to control a Networked Robot

  • Hong, Soon-Hyuk;Jeon, Jae-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.107.6-107
    • /
    • 2002
  • $\textbullet$ An autonomous mobile robot was controlled through the Internet. $\textbullet$ For the direct control, the feedback data should be provided properly. $\textbullet$ Therefore, an efficient communication scheme should be defined. $\textbullet$ To overcome the transmission delay, the highly abstracted message format was used. $\textbullet$ As the feedback data, the real image sequences may suffer the transmission delay or loss of content. $\textbullet$ To resolve this, the feature information was used to construct the synthetic feedback information. $\textbullet$ By doing this, the operator could feel the hands-on control with an Internet-based robot.

  • PDF

Graph theoretical considerations of a channel assignment problem on multihop wireless networks

  • Tamura, Hiroshi;Watanabe, Kaoru;Sengoku, Masakazu;Shinoda, Shoji
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.967-970
    • /
    • 2002
  • Multihop wireless networks consist of mobile terminals with personal communication devices. Each terminal can receive a message from a terminal and send it to the other terminal. In this paper, we discuss edge coloring problems related to multihop wireless networks. We show some relations about the problems.

  • PDF

A Study on Method of QoS Guarantee for Ad hoc network (Ad hoc 망의 QoS 보장 방안에 대한 연구)

  • 이광제;정진욱
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.129-132
    • /
    • 2003
  • In this paper, we propose the DQM - CBRP( Distributed QoS Monitoring - Cluster Based Routing Protocol ) routing protocol to provide Quality of Service guarantee for multimedia service in Ad hoc mobile network. This paper proves the DQM-CBRP can avoid message loss and is suitable to guarantee of QoS thru simulation of COMNET III.

  • PDF

A Study on the Development of functional standard for 2G MNP by ACQ (ACQ 방식의 2G 이동전화번호이동성 구현을 위한 망기능 규격에 관한 연구)

  • 정영식;곽용원;민재홍;김환우
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.165-168
    • /
    • 2003
  • 이동전화 번호이동성 구현을 위한 망기능 규격은 ACQ 방식으로 이동전화 번호이동성 (Mobile Number Portability, MNP)을 2G 이동전화 상호간에 제공하기 위한 망의 기능구조 및 정보흐름을 규정한다. 본 논문에서는 번호이동성 요구사항에 따라, 소요되는 망기능 및 시스템 기능을 정의하고, 이들 기능간에 주고받는 정보를 규정한다. 본 논문은 번호이동성에 따른 SMS(Short Message Service)의 처리방법 또한 규정한다.

  • PDF

Temporal Segmentation of Mobile Text Message (시간정보에 기반한 핸드폰 문자의 대화 구분)

  • Jung, Hun-Young;Lee, Jong-Hyeok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.306-308
    • /
    • 2012
  • 핸드폰 사용이 보편화되고 핸드폰의 문자 사용량이 늘어감에 따라 대량의 핸드폰 문자 메시지를 구축하는 건이 가능해졌다. 이러한 문자 데이터를 처리에 기반이 되는 대화 구분 방법을 제안하였다. 이 방법론은 기존 문서분류 방식을 적용하는데 발생하는 문제를 피하기 위해 시간정보를 사용하는 비지도학습 방법론이다. 해당 방법을 실제 핸드폰 메시지 데이터에 적용한 결과 정확율과 재현율에서 0.9를 넘는 높은 성능을 보였다.

Trends of Wi-Fi Calling Service (와이파이 콜링 서비스 동향)

  • Jeong, S.K.;Lee, S.W.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.212-218
    • /
    • 2015
  • 와이파이 콜링 서비스란 Wi-Fi 네트워크 환경에서 음성전화 및 Short Message Service(SMS) 등의 이동전화서비스를 제공하는 것으로 Subscriber Identification Mobule(SM) 카드에 부여된 자신의 이동전화번호를 그대로 사용하여 음성전화 및 문자의 착 발신이 가능한 서비스이다. 아이폰6 출시 당시 와이파이 콜링 기능을 탑재하여 이슈가 된 바 있으며, 미국의 통신사업자인 T-Mobile 등이 커버리지 보완을 목적으로 적극적으로 서비스하고 있다. 본고에서는 와이파이 콜링 서비스의 특징, 유사 서비스와의 비교, 기술방식, 서비스 동향을 알아보고자 한다.

  • PDF

A Spam Message Filter System for Mobile Environment (휴대폰의 스팸문자메시지 판별 시스템)

  • Lee, Songwook
    • Annual Conference on Human and Language Technology
    • /
    • 2010.10a
    • /
    • pp.194-196
    • /
    • 2010
  • 휴대폰의 광범위한 보급으로 문자메시지의 사용이 급증하고 있다. 이와 동시에 사용자가 원하지 않는 광고성 스팸문자도 넘쳐나고 있다. 본 연구는 이러한 스팸문자메시지를 자동으로 판별하는 시스템을 개발하는 것이다. 우리는 기계학습방법인 지지벡터기계(Support Vector Machine)을 사용하여 시스템을 학습하였으며 자질의 선택은 카이제곱 통계량을 이용하였다. 실험결과 F1 척도로 약 95.5%의 정확률을 얻었다

  • PDF

A Design of Safe AKA Module for Adapted Mobile Payment System on Openness SMART Phone Environment (개방형 스마트 폰 환경에 적합한 모바일 결제 시스템을 위한 안전한 AKA(Authentication Key Agreement) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.11
    • /
    • pp.1687-1697
    • /
    • 2010
  • The USIM-based AKA authentication process is essential to a mobile payment system on smart phone environment. In this paper a payment protocol and an AKA module are designed for mobile payment system which is suitable for openness smart phone environment. The payment protocol designs the cross authentication among components of the mobile payment system to improve the reliability of the components. The AKA module of mobile payment system based on 3GPP-AKA protocol prevents the exposure of IMSI by creating the SSK(Shared Secure Key) through advance registration and solves the SQN(SeQuence Number) synchronization problem by using timestamp. Also, by using the SSK instead of authentication vector between SN and authentication center, the existing bandwidth $(688{\times}N){\times}R$ bit between them is reduced to $320{\times}R$ bit or $368{\times}R$ bit. It creates CK and IK which are message encryption key by using OT-SSK(One-Time SSK) between MS and SN. In addition, creating the new OT-SSK whenever MS is connected to SN, it prevents the data replay attack.