• Title/Summary/Keyword: Network configuration

Search Result 1,103, Processing Time 0.024 seconds

The Effect of Message Construal Level, Temporal Distance and Consumer's SNS Self-efficacy on Consumers' Attitude Toward SNS Fashion Advertisements

  • Cho, Hyojung;Lee, Mi Young
    • International Journal of Human Ecology
    • /
    • v.16 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • The purpose of this study was to examine the effects of the construal level and temporal distance of a message and consumer's Social Network Service (SNS) self-efficacy on consumers' attitudes toward SNS fashion advertising. This study employed a 2 (message configuration: high construal level/low construal level) ${\times}$ 2 (temporal distance: distant future/near future) ${\times}$ 2 (SNS self-efficacy: high/low) between-subject factorial design. The survey was conducted on Facebook users in their twenties (N=216). The results are as follows: First, attitude toward SNS fashion advertising and purchase intention was higher when the message construal level was lower and when the temporal distance was closer. Second, no interactions between temporal distance and message construal level for attitude toward SNS advertising and purchase intention were found in this study. However, interactions between temporal distance and SNS self-efficacy for attitude toward SNS advertising and purchase intention were found. When the SNS self-efficacy was high, message with the low construal level reacted significantly positive in terms of attitude toward the ad as well as purchase intention. It is expected that this study will provide insight for apparel makers or retailers to use SNS as a new advertising media for fashion marketing. Practical implications and limitations are discussed.

The Development of Multi-Fault Restoration Algorithm for Distribution Network (배전계통 광역 정전복구 알고리즘 개발)

  • Jung, Jin-Soo;Lee, Seung-Jae;Jung, Jong-Wook;Lim, Young-Bae;Bae, Seok-Myung;Yi, Geon-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.3
    • /
    • pp.69-77
    • /
    • 2006
  • This paper presents the service restoration in electric power distribution systems. The aim of the service restoration is to control an emergency taken place in distribution systems and to restore out-of service areas as soon as possible when a fault occurs in distribution systems. For this reason, new service restoration strategies in multi-outage area are suggested in this paper. The suggested algorithm consist of two schemes. One is an individual restoration scheme, the other is an integrated restoration scheme. The former determines a restoration order of outage areas based on a restoration index. Unless the former scheme can generate a feasible restoration plan, the latter one will try to find out a new configuration without an overloaded section through tie exchange method.

Introduction of IPv4 and IPv6 Muliticast address allocation and Standardization trends (IPv4 및 IPv6에서의 멀티캐스트 할당 기법과 표준화 동향)

  • 인민교;박정수;홍용근;김용진
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.57-60
    • /
    • 2001
  • In this paper, I will describe the trends of multicast address allocation mechanism. IP Multicast efficiently supports this type of transmission by enabling sources to send a single copy of a message to multiple recipients who explicitly want to receive the information. Generally, MAAs server or MADCAP servers are used to allocate multicast addresses. As the need of home networking and autoconfiguring network mechanism has been increased, not only automatic host IP configuration but also automatic multicast address generation mechanism was demanded. in this paper, I will explain the automatic multicast address mechanism in a host. management techniques and the trends of multicast address generation and allocation mechanism that is bong now discussed In IETF.

  • PDF

IoT Platform for Network Service Self-Configuration Based on Data Flow (데이터 플로우 기반의 네트워크 서비스 자율 설정을 위한 사물인터넷 플랫폼)

  • Kwon, Kideok;Yoo, Younghwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.2047-2053
    • /
    • 2015
  • Our research proposese an IoT Broker (gateway) platform which considers the both sides of a service developer and a user. The platform associates the devices around us with virtual-entities and infers the owner of the devices through the ontology scheme. These functionalities can make the service developer easily design a new service. For the user, the service can be automatically installed and deployed under this platform. We also make it possible for the IoT broker to be plugged-in by integrating various communication platforms and protocols into that platform. Our expreriment with the AllJoyn plug-in on Node-RED substantiated that various service flows can be easily deployed and work on our platform.

Relay-Based WUSB/DRD/WLP Cooperative Protocol Design in Ship Area (선박 내 Relay-based WUSB/DRD/WLP 연동 프로토콜 설계)

  • Lee, Seung Beom;Jeong, Min-A;Kwon, Jang-Woo;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.789-800
    • /
    • 2014
  • In this paper, we propose a cooperative protocol of relay-based WUSB/DRD and WLP device in WSS of ship area WiMedia environment. For this purpose, we investigate a RNT table configuration and algorithm of RNS relay node used in relay-based cooperative communication. Then, we describe a device that makes up WLP network and propose a cooperative protocol for WUSB/DRD/WLP device communication. The proposed cooperative protocol can communicate with WUSB/DRD/WLP devices by using standard DRP reservation and WUSB DRP reservation.

Synthesis, Structure, and Magnetic Properties of 1D Nickel Coordination Polymer Ni(en)(ox)·2H2O (en = ethylenediamine; ox = oxalate)

  • Chun, Ji-Eun;Lee, Yu-Mi;Pyo, Seung-Moon;Im, Chan;Kim, Seung-Joo;Yun, Ho-Seop;Do, Jung-Hwan
    • Bulletin of the Korean Chemical Society
    • /
    • v.30 no.7
    • /
    • pp.1603-1606
    • /
    • 2009
  • A new 1D oxalato bridged compound Ni(en)(ox)-2$H_2$O, (ox = oxalate; en = ethylenediamine) has been hydrothermally synthesized and characterized by single crystal X-ray diffraction, IR spectrum, TG analysis, and magnetic measurements. In the structure the Ni atoms are coordinated with four oxygen atoms in two oxalate ions and two nitrogen atoms in one ethylenediamine molecule. The oxalate anion acts as a bis-bidentate ligand bridging Ni atoms in cis-configuration. This completes the infinite zigzag neutral chain, [Ni(en)(ox)]. The interchain space is filled by water molecules that link the chains through a network of hydrogen bonds. Thermal variance of the magnetic susceptibility shows a broad maximum around 50 K characteristic of one-dimensional antiferromagnetic coupling. The theoretical fit of the data for T > 20 K led to the nearest neighbor spin interaction J = -43 K and g = 2.25. The rapid decrease in susceptibility below 20 K indicate this compound to be a likely Haldane gap candidate material with S = 1.

A Internet of Things(IoT) based exploration robot design for remote control and monitoring (사물인터넷(IoT) 기반 원격 제어 및 모니터링이 가능한 탐사로봇 설계)

  • Kim, Byung-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.185-190
    • /
    • 2015
  • The trend of Internet of things are changed from public and examples of corporate center to B2C service. As you can see, through the practice of domestic and international services Internet of Things, conventional disaster, disasters, such as the case of the public sector, factory automation company now mainly direct B2C (Business to Consumer) services are affecting the individual has spread. In this paper we propose a method of platforms and components, and network configuration plan for exploration robot design based on remote control and monitoring system with IoT.

Engine Technology Design of On-line 3D Game (온라인 3D 게임의 엔진 테크놀러지 디자인)

  • Choi, Hak-Hyun;Kim, Jung-Hee
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.579-586
    • /
    • 2007
  • The process of developing a online 3D game engine involves designing details of the engine, alpha test, adjustment, supplementation, beta test and introduction, and an online 3D game engine is made of a server engine and client engine. The server engine, which is made of server construction part, distribution center and DB construction part for building asymmetric multiple servers, is developed by Linux, and the client engine, which is made of a graphic part, sound part, AI part and object management part, is developed by using DirectX in Windows, and it proposes an engine configuration and method based on 3D engine technology by analyzing the network technology, which is a common engine technology.

  • PDF

A Study on Global Scheduler for Computing Resources and Network Resources Management (컴퓨팅 자원 및 네트워크 자원의 관리를 위한 티켓 기반 글로벌 스케줄러에 관한 연구)

  • Lim, Chang-Sun;Ahn, Seong-Jin;Chung, Jin-Wook;Park, Jin-Sub
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.13-19
    • /
    • 2009
  • In this paper, the integrated management of grid resources for conducting research on the global scheduler, the proposed plan is designed for. Research on the global scheduler and the grid system as a global scheduler for the system to understand the concept of a global scheduler configuration was necessary to check conditions. And other global scheduler, global positioning system and the differentiation of a ticket-based system was introduced to the concept. Finally, this paper proposed by the global scheduler for the system design, through prototyping to determine the actual effect can be used to determine whether is was.

  • PDF

On the Configuration and Improvement of Security Control Systems (보안관제시스템 구성 및 개선방안 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.69-80
    • /
    • 2017
  • Due to the advanced IT environment, the role of Security Monitoring & Control becomes more important as the cyber-crime is becoming intelligent, diversified, and advanced. In contrast to the way it relied solely on security devices such as Firewall and IDS in the past, Security Monitoring & Control tasks responding to cyber attacks through real-time monitoring have become wide spread and their role is also important. In response to current cyber threats, since security equipment alone can not be guaranteed a stable defense, the task of Security Monitoring & Control became essential to operate and monitor security equipment and to respond in real time. In this study, we will discuss how to configure network security system effectively and how to improve the real-time Security Monitor & Control.