RISS 학술연구정보서비스

다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      • 무료
      • 기관 내 무료
      • 유료

        Khyati,Jagan,Bijal,Mehta,Rasananda,Panda 글로벌지식마케팅경영학회 2018 Global Marketing Conference Vol.2018 No.07

        Digital advertising is one of the most crucial medium of communication and marketing (Berner and Kiley, 2005). Digital advertising brings with itself several benefits such as increase in reach, low advertising cost, and high degree of customer engagement. However, along with benefits it also brings several challenges for the marketers such as comprehending consumer attitude, consumption and behaviour towards digital advertisements. According to prior literature attitude towards internet consists of factors such as information, entertainment, irritation, and trustworthiness (Aaker & Bruzzone, 1985). Ad blocking has become one of the most important concerns for advertising industry globally. This paper has attempted to understand the series of actions that leads to ad blocking. This series consists of consumer response and consumer attitude towards digital advertising where the constant ad delivery creates ad intrusiveness which leads to ad irritation which in turn leads to ad avoidance and ultimately results in ad blocking. Ad blocking further has serious consequences in brand image and brand valuation, because as more number of users opt to download and use ad blockers, advertisement instead of increasing brand valuation results in brand devaluation, not to mention wastage of ad spend. Through literature review it was found that reports discuss ad blockers and its operations but there is little understanding on the process that leads a consumer to install ad blocking software on his digital device. The research objective of the study is therefore, to understand cognitive process of consumers that leads them to take a decision of installing an ad blocking software on their digital device. The study therefore proposes four research questions, 1. What aspects of online advertising irritate users? 2. How do consumers avoid advertisements? 3. What causes a consumer to use ad blocker? 4. What cognitive process lead a consumer to install ad blocking software? A mixed method research is adopted for the purpose of this paper. In the first stage a qualitative research was conducted through semi-structured interviews in order to understand consumer opinion on what leads them to install an ad blocking (Jagani and Panda 2016). Thematic analysis of transcripts was conducted from which 81 items on ad irritation, ad avoidance and ad blocking were identified for second stage of the study which consists of online survey using quantitative research methods. The items for the quantitative survey are \categorised in three main categories viz. Irritation, Avoidance and Action. The sample consists of 18 to 35 year olds who are active users of internet and have been exposed to digital advertisement, spends more than two hours per day on internet through various digital device and are aware of ad blockers or have used them in the past. Non-probabilistic sampling method was selected for the study and quota sampling was implemented. The study aims to comprehend the process that leads a consumer to install an ad blocking software on his or her digital device.

      • KCI등재SCOPUS

        Secrecy Performance of Threshold-Based Cognitive Relay Network With Diversity Combining

        Khyati,Chopra,Ranjan,Bose,Anupam,Joshi 한국통신학회 2018 Journal of communications and networks Vol.20 No.4

        In the spectrum sharing mode, the transmitting powerof the secondary user (SU) is optimally controlled, such that noadditional interference occurs at the primary user (PU). In this paper,the secrecy outage performance is analyzed for such cognitiveunderlay decode-and-forward (DF) threshold-based relay network. The relayed and the direct signals are combined at the secondaryeavesdropper and destination. Unlike other works to date, we haveused both selection combining (SC) and maximal ratio combining(MRC) diversity schemes at the destination and eavesdropper withall possible permutations, and the best possible combination forcognitive system secrecy has been validated. Further, we considerthreshold-based relaying where, the relay can successfully decodeand re-transmit, only if the received signal-to-noise ratio (SNR)meets the particular threshold. We show that the diversity scheme,the threshold SNR, the secrecy rate, and the interference power allhave a significant impact on cognitive system secrecy. We have alsoshown that the secrecy performance is more sensitive to changesin the quality of direct link between source to eavesdropper thansource to destination, especially at the higher secrecy rates. Theaccuracy of the analytical expressions is corroborated by the computersimulation results.

      • KCI등재SCOPUS

        Scalable Energy Efcient Hexagonal Heterogeneous Broad Transmission Distance Protocol in WSN‑IoT Networks

        Khyati,Shrivastav,Kishor,D.,Kulat 대한전기학회 2020 Journal of Electrical Engineering & Technology Vol.15 No.1

        In this paper hexagonal heterogeneous broad transmission distance protocol (HEXA-HTBTDP) is introduced and scalability analysis is performed in the context of internet-of-things (IoTs). A two-dimensional (2-D) hexagonal feld is taken for the random deployment of sensor nodes which will be benefcial in the recently emerging integrated wireless sensor networkinternet-of-things (WSN-IoTs). This technology opens new horizons for the cellular and mobile communications. With the growing demand for an efcient utilization of resources at present, it is a challenging task to develop clustering protocols which support wirelessly connected heterogeneous sensor nodes. They exist either independently or embedded within devices in the network. With a common objective of achieving energy efciency, reliable communication, connectivity and coverage of network feld, scalability is analyzed by varying the number of nodes and their initial energies. Two-level energy heterogeneity is adopted in the form of normal and advanced nodes. HEXA-HTBTDP is compared with hexagonal feld versions of classical protocols viz. hexagonal stable election protocol (HEXA-SEP) and hexagonal energy efcient heterogeneous clustered scheme (HEXA-EEHC). Benchmarking parameters used for the comparison of results are stability period, network lifetime, instability period, residual energy and energy variance. The hexagonal feld will expand the current scenario of clustering for the achievement of quality of service (QoS) and quality of user experience (QoE) in real time WSN-IoT systems

      맨 위로 스크롤 이동