• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.036 seconds

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

Dual Process Linear Protection Switching Method Supporting Node Redundancy (노드 이중화를 위한 이중 프로세스 선형 보호 절체 방법)

  • Kim, Dae-Ub;Kim, Byung Chul;Lee, Jae Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.26-37
    • /
    • 2016
  • The core technologies of the current transport network are OAM and protection switching to meet the sub-50ms protection switching time via a path redundancy when a link or node failure occurs. The transport networks owned by public network operators, central/local governments, and major enterprises are individually configured and managed with service resiliency in each own protected sub-network. When such networks are cascaded, it is also important to provide a node resiliency between two protected sub-networks. However, the linear protection switching in packet transport networks, such as MPLS-TP and Carrier Ethernet, does not define a solution of dual node interconnection. Although Ethernet ring protection switching covers the dual node interconnection scheme, a large amount of duplicated data frames may be flooded when a failure occurs on an adjacent (sub) ring. In this paper, we suggest a dual node interconnection scheme with linear protection switching technology in multiple protected sub-networks. And we investigate how various protected sub-network combinations with a proposed linear or ring protection process impact the service resiliency of multiple protected sub-networks through extensive experiments on link and interconnected node failures.

Feasibility of Massive Device-to-Device Communications in Cellular Networks (셀룰러 네트워크에서의 대규모 D2D 통신의 실현 가능성 연구)

  • Hwang, YoungJu;Sung, Ki Won;Kim, Seong-Lyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1091-1101
    • /
    • 2012
  • Device-to-device (D2D) communication is expected to offer local area services with low transmit power and short link distance, even not via any infrastructures. These advantages will lead to the deployment of D2D systems in a massive scale, where the order of magnitude of D2D user density is higher than that of cellular user density. Network-assisted D2D systems, where D2D resources are managed by cellular networks, are unable to support the large number of D2D devices, due to the signaling overhead for control signals. In this case, no coordination can be an answer. This paper considers uncoordinated D2D systems, which is implemented with a number of D2D devices in a large scale. By analyzing the transmission capacity of D2D systems, we found a feasibility condition under which the uncoordinated D2D communications possibly coexist within cellular networks, sharing the uplink spectrum. In addition, we provide guidelines for the operational points of massive D2D communications, giving some knowledge about proper transmit power level and link distance of uncoordinated D2D.

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.10
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Blockchain Network Construction Tool and its Electronic Voting Application Case (블록체인 자동화도구 개발과 전자투표 적용사례)

  • AING TECKCHUN;KONG VUNGSOVANREACH;Okki Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.151-159
    • /
    • 2021
  • Construction of a blockchain network needs a cumbersome and time consuming activity. To overcome these limitations, global IT companies such as Microsoft are providing cloud-based blockchain services. In this paper, we propose a blockchain-based construction and management tool that enables blockchain developers, blockchain operators, and enterprises to deploy blockchain more comfortably in their infrastructure. This tool is implemented using Hyperledger Fabric, one of the famous private blockchain platforms, and Ansible, an open-source IT automation engine that supports network-wide deployment. Instead of complex and repetitive text commands, the tool provides a user-friendly web dashboard interface that allows users to seamlessly set up, deploy and interact with a blockchain network. With this proposed solution, blockchain developers, operators, and blockchain researchers can more easily build blockchain infrastructure, saving time and cost. To verify the usefulness and convenience of the proposed tool, a blockchain network that conducts electronic voting was built and tested. The construction of a blockchain network, which consists of writing more than 10 setting files and executing commands over hundreds of lines, can be replaced with simple input and click operations in the graphical user interface, saving user convenience and time. The proposed blockchain tool will be used to build trust data infrastructure in various fields such as food safety supply chain construction in the future.

A Study on SNS Records Management (기록관리 대상으로서 SNS 연구)

  • Song, Zoo-Hyung
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.101-138
    • /
    • 2014
  • This study examined the influence and meaning of SNS as the hot topic of our time from the archival perspective and also studied the 'SNS records management'. The many users mean a high accessibility and utilization of SNS, which increase the influence and value of SNS as a record. Politically, SNS is a tool that strengthens the communication among the voters, politicians and the public while economically, it is a window to accept the complaints of the customers and a marketing tool. In addition, the voices of social minorities are also recorded unlike in the traditional media, which makes the SNS record a method to gain the social variety and diversity. SNS is a place of formation of collective memory and collective memory itself. Furthermore, it can play the role of public sphere. It also is a place for generation of 'big data' in an archival sense. In addition, this study has classified the SNS records management into primary and secondary management that include record management entities, subjects, periods, methods, and causes. This study analyzed the history, status, and the meaning of SNS to assess the values and meanings as the preliminary study for the future SNS record management studies.

Leased Line Traffic Prediction Using a Recurrent Deep Neural Network Model (순환 심층 신경망 모델을 이용한 전용회선 트래픽 예측)

  • Lee, In-Gyu;Song, Mi-Hwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.391-398
    • /
    • 2021
  • Since the leased line is a structure that exclusively uses two connected areas for data transmission, a stable quality level and security are ensured, and despite the rapid increase in the number of switched lines, it is a line method that is continuously used a lot in companies. However, because the cost is relatively high, one of the important roles of the network operator in the enterprise is to maintain the optimal state by properly arranging and utilizing the resources of the network leased line. In other words, in order to properly support business service requirements, it is essential to properly manage bandwidth resources of leased lines from the viewpoint of data transmission, and properly predicting and managing leased line usage becomes a key factor. Therefore, in this study, various prediction models were applied and performance was evaluated based on the actual usage rate data of leased lines used in corporate networks. In general, the performance of each prediction was measured and compared by applying the smoothing model and ARIMA model, which are widely used as statistical methods, and the representative models of deep learning based on artificial neural networks, which are being studied a lot these days. In addition, based on the experimental results, we proposed the items to be considered in order for each model to achieve good performance for prediction from the viewpoint of effective operation of leased line resources.

A Study on the Distribution Characteristics of the Small Village Wetlands in Mountainous Rural Area - Case on Geumsan-gun, Chungnam - (산지 읍면지역 소규모 마을습지 분포 특성 연구 - 충남 금산군을 사례로 -)

  • Park, Mi-Ok;Seo, Joo-Young;Yang, Seung-Bin;Koo, Bon-Hak
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.6
    • /
    • pp.37-44
    • /
    • 2019
  • This study was conducted to identify the distribution characteristics of small village wetlands in Geumsan County, an inland mountain zone, and comparing with Seocheon County, a coastal plain area with different ecological environment characteristics. Using Arc-GIS (v10.1) the village wetland code was extracted to derive the possible location of the village wetland, and the final distribution of the village was obtained by performing indoor judging work based on satellite images, aerial photographs, topographical maps, Korea Land Information System (KLIS), land use level, land cover degree (division), and land use status by local surveying and indoor analyzing. Although Geumsan County (576.66km2) is more than 60% larger than Seocheon County (358.04km2), 607 villages in Geumsan County and 570 villages in Seocheon County are capable of making similar levels of 106.5% of wetlands, but only a fraction of those in Seocheon County were found to be 67.6%. The density of the village wetlands was much lower than that of Seocheon County, a coastal plain area, because there were many mountainous areas in Geumsan County, and most of the wetlands temporarily created for water supply were removed during the analysis phase of the Jeongsa Image, so the actual wetlands of the village were judged to be only two-thirds different from those of Seocheon County.

Design and Implementation of a SQL based Moving Object Query Process System for Controling Transportation Vehicle (물류 차량 관제를 위한 SQL 기반 이동 객체 질의 처리 시스템의 설계 및 구현)

  • Jung, Young-Jin;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.699-708
    • /
    • 2005
  • It becomes easy and generalized to track the cellular phone users and vehicles according to the Progress of wireless telecommunication, the spread of network, and the miniaturization of terminal devices. It has been constantly studied to provide location based services to furnish suitable services depending on the positions of customers. Various vehicle tracking and management systems are developed to utilize and manage the vehicle locations to relieve the congestion of traffic and to smooth transportation. However the designed previous work can not evaluated in real world, because most of previous work is only designed not implemented and it is developed for simple model to handle a point, a line, a polygon object. Therefore, we design a moving object query language and implement a vehicle management system to search the positions and trajectories of vehicles and to analyze the cost of transportation effectively. The designed query language based on a SQL can be utilized to get the trajectories between two specific places, the departure time, the arrival time of vehicles, and the predicted uncertainty positions, etc. In addition, the proposed moving object query language for managing transportation vehicles is useful to analyze the cost of trajectories in a variety of moving object management system containing transportation.

Concept and Application of Groundwater's Platform Concurrency and Digital Twin (지하수의 플랫폼 동시성과 Digital Twin의 개념과 적용)

  • Doo Houng Choi;Byung-woo Kim;E Jae Kwon;Hwa-young Kim;Cheol Seo Ki
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.13-13
    • /
    • 2023
  • 디지털 기술은 오늘날 플랫폼과 디지털 트윈의 기술도입을 통해 현실 세계를 네트워크와 가상세계와의 연결이 통합되어진 가상 현실 세계의 입문 도약이다. 현실에서 가상현실의 사이의 디지털 전환(digital transformation)에는 디지털 기술과 솔루션을 비즈니스의 모든 영역에 통합하는 것이 포함된다. 이러한 디지털 전환의 핵심은 데이터에 관한 것이며, 데이터를 활용하여 가치를 창출하고 고객경험과 비즈니스 영역을 극대화하는 방식을 제공한다. 최적의 데이터를 제공하기 위한 플랫폼과 가상 현실세계 구현을 위한 디지털 트윈의 상호연계 관한 기본 개념은 데이터 수집, 데이터 분석, 데이터 시각화 및 데이터 보고와 같은 데이터 비즈니스이다. 현장 데이터는 디지털 양식을 통해 수집, 기록, 저장된다. 현장 IoT 기반 데이터(사진 및 비디오 매체 등)는 지속적으로 수집되고 종종 다른 데이터베이스에 저장되지만 지리 공간적 위치에 연결되지 않는다. 모든 디지털 발전을 조화시키고 지하수 데이터에서 더 빠른 이해를 도출하기 위해서는 디지털 트윈이 시작되어야 한다. 단일 지하수플랫폼에서 현장 조건을 시각화하고 실시간 데이터를 스트리밍하며, 과거 3D 데이터와 상호작용하여지질 또는 지화학 데이터를 선택적 사용을 위해 지하수 플랫폼과 디지털 트윈이 연계되어야 한다. 데이터를 디지털 정보모델과 연결하면 디지털 트윈에 생명을 불어넣을 수 있지만 디지털 트윈의 가치를 극대화하려면 여전히 데이터 플랫폼 서비스와 전달 방식을 선택해야 한다. 지하수 플랫폼동시성을 갖는 디지털 트윈은 정적 및 동적 데이터를 저장하는 데이터베이스 또는 크라우드 서비스에서 데이터를 가져오는 API(애플리케이션 프로그래밍 인터레이스), 디지털 트윈을 위한 호스팅 공간, 디지털 대상을 구축하는 소프트웨어, 구성 요소 간 읽기/쓰기를 위한 스크립트, chatGPT 및 API를 활용할 수 있다. 이를 통해 수집된 데이터의 실시간 양방향 통신기술인 지하수 플랫폼 기술을 활용하여 디지털 트윈을 적용하고 완성할 수 있고, 이를 지하수 분야에도 그대로 적용할 수 있다. 지하수 분야의 디지털 트윈 기술의 근간은 지하수 모니터링을 위한 관측장치와 이를 활용한 지하수 플랫폼의 구축 및 양방향 자료전송을 통한 분석 및 예측기술이다. 특히 낙동강과 같이 유역면적이 넓고 유역 내 지자체가 많아 이해관계가 다양하며, 가뭄과 홍수/태풍 등 기후위기에 따른 극한 기상이변가 자주 발생하고, 또한 보 및 하굿둑 개방 등 정부정책 이행에 따른 민원이 다수 발생하는 지역의 경우 하천과 유역에 대한 지하수 플랫폼과 디지털 트윈의 동시성 기술적용 시 지하수 데이터에 대한 고려가 반드시 수반되어야 한다.

  • PDF