• Title/Summary/Keyword: 네트워크 폐쇄

Search Result 127, Processing Time 0.025 seconds

The emergence and ensuing typology of global ebook platform -The case study on Google eBook, Amazon Kindle, Apple iBooks Store (글로벌 전자책 플랫폼의 부상 과정과 유형에 관한 연구 -구글 이북, 아마존 킨들, 애플 아이북스 스토어에 대한 사례연구)

  • Chang, Yong-Ho;Kong, Byoung-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3389-3404
    • /
    • 2012
  • Based on the case study methods, the study analyzes emergence and ensuing typology of global ebook platforms such as Google eBook, Amazon Kindle, iBooks Store. Global ebook platforms show adaptation process responding to rapidly changing digital technological envirment and it's fitness landscape. The critical elements in its emerging process are the distinct selection criteria, the degree of resource abundance and the search process based on open innovation. Based on these critical elements, the global platforms show speciation process, so called niche creation and are evolving into a variety of the typology based on the initial condition of key resource which makes the platform emerge and grow. Each global ebook platforms is evolving into open platform, hybrid platform, closed platform. Google eBook has openness and extensibility due to a variety of devices based on Android and a direct involvement of actors. Amazon Kindle has developed from a online bookstore and into the hybrid platform which have not only closed quality but also openness with ebook devices and mobile network. iBooks Store has developed into the closed platform through the agency model based on competitive hardwares and closed quality with iphone and ipad.

Improved BER Performance of Non-Orthogonal Multiple Access System for Interactive Mobile Users: Maximum Likelihood Detection Perspective (상호작용 이동통신 사용자에 대한 비직교 다중접속 시스템의 BER 성능 향상: ML 검출 관점)

  • Chung, Kyu-Hyuk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.865-872
    • /
    • 2020
  • In the fifth generation (5G) mobile networks, non-orthogonal multiple access (: NOMA) has been considered as a promising technology, to increase the channel capacity. In NOMA, the multiple users share the channel resources and multiplex simultaneously. Recently, for the stronger channel user, it was reported that the bit-error rate (: BER) performance with interactive mobile users is degraded, compared to the BER of non-interactive users. In this paper, in order to improve such degraded BER performance, we propose the maximum-likelihood (: ML) receiver. First, the closed-form expression for the BER of the ML receiver is derived, and then it is shown that the BER of the ML receiver is improved, compared with the BER of the ideal perfect successive interference cancellation (: SIC) receiver. Additionally, based on the analytical expression, Monte Carlo simulations validates the above-mentioned results.

Operational Strategy of Co-creation Platform: Comparative Analysis of Samsung Apps and Apple Appstore (Co-creation 플랫폼 운영 전략: 삼성 앱스와 애플 앱스토어 비교)

  • Kim, Na Rang;Hong, Soon Goo;Kim, Jong Weon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.99-109
    • /
    • 2014
  • This study illustrates and compares the platform strategy of Apple and Samsung, which have been operating their own App stores, by using the $IISI^n$ model. Apple, the first mover of the platform, has employed closed strategy for quality control of the platform and customer loyalty. On the other hand, Samsung has employed open strategy for increasing the platform network effects. The result of this study showed that the platform strategy "Openness", which is a free entry of participants, and "Sharing" of created value, are important along with the excellent platform environment. As a pioneering study of the platform strategy for the co-creation, this research contributes to both theory and practice.

On Design and Performance Analysis of Asymmetric 2PAM: 5G Network NOMA Perspective (비대칭 2PAM의 설계와 성능 분석: 5G 네트워크의 비직교 다중 접속 관점에서)

  • Chung, Kyuhyuk
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.24-31
    • /
    • 2020
  • In non-orthogonal multiple access (NOMA), the degraded performance of the weaker channel gain user is a problem. In this paper, we propose the asymmetric binary pulse amplitude modulation (2PAM), to improve the bit-error rate (BER) performance of the weaker channel user in NOMA with the tolerable BER loss of the stronger channel user. First, we design the asymmetric 2PAM, calculate the total allocated power, and derive the closed-form expression for the BER of the proposed scheme. Then it is shown that the BER of the weaker channel user improves, with the small BER loss of the stronger channel user. The superiority of the proposed scheme is also validated by demonstating that the signal-to-noise ratio (SNR) gain of the weaker channel user is about 10 dB, with the SNR loss of 3 dB of the stronger channel user. In result, the asymmetric 2PAM could be considered in NOMA of 5G systems. As a direction of the future research, it would be meaningful to analyze the achievable data rate for the propsed scheme.

A Dynamic Route Search Algorithm for Time-Sensitive Air Cargo in Air Traffic Management (항공교통관리에서 시간에 민감한 항공운송을 위한 동적 항로탐색 알고리즘)

  • Cho, Tae-Hwan;Kim, Kang-Hee;Choi, Sang-Bang
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.744-751
    • /
    • 2012
  • Air Traffic Management(ATM) is to control air traffic flow quickly and safely. For efficient ATM, the ability which calculate optimal route using filight plan and filght information is required. Especially for the time-sensitive air cargo, it is essential. In this paper, therefore, we present a dynamic route search algorithm which calculate optimal route dynamically. The conventional method using Dijkstra algorithm has a problem that recalculate the entire route when some airways are closed. However, the proposed algorithm recalculates only affected waypoints, so it finds optimal route quickly and accurately. Comparisons with the conventional method and the proposed algorithm show that the proposed algorithm provides better.

A Study on SNS Usage Behavior using Correspondence Analysis (대응일치분석을 이용한 SNS 이용 행태 조사 연구)

  • Kim, Min-Jeong
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.395-403
    • /
    • 2016
  • This study investigates SNS usage behaviors of SNS users with a change of SNS use environment and an increase of users. This study compares the difference of use motivation, preferred type, and main use SNS according to socio-demographic variable of SNS users using cross tabulation analysis and also conducts a comparative analysis of main use SNS of each SNS user using correspondence analysis. The results show main use motivation of SNS is relationship seek, most preferred type is closed type, and main use SNS is Kakaostory. Next, we find that there are differences on use motivation, preferred type, and main use SNS, depending on the socio-demographic characteristics of SNS users. The result of correspondence analysis shows how users are using SNS services and what structure their competitive relations of SNS services are made. In the conclusion, the study presents summary of the findings, implications, and tasks for further studies.

A Study on the Enhancement of Network Survivability through Smart Sensor Technologies Convergence (스마트 센서 기술 융합을 통한 망 생존성 강화에 관한 연구)

  • Yang, Jung-Mo;Kim, Jeong-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.269-276
    • /
    • 2016
  • Public Safty-LTE(Long Term Evolution) is being deployed in the direction of reducing cost by using both of municipal network and commercial network. However, LTE Network is difficult to ensure the survivability during the information communication infrastructure failures. In addition, it is vulnerable in communication coverage of inside buildings and underground. In this study, we propose to implement effectively the network survivability technique through the convergence to the proven technology. As the advent of the IoT Age, smart sensors which are embedded in the environment and the things will be able to provide a useful infrastructure for ensuring the network survivability. Based on the feature of the smart sensor, we designed the sink node architecture to guarantee the network survivability in disaster situation through the convergence of the small cell technology and extension of wireless network coverage technology. The computing power inherent in the environment is a valuable resource that can be utilized in the disaster situation.

The Communication protocol proposal at Ad-hoc for Water-Treatment (수처리 계측제어망 Ad-hoc 적용시 데이터 신뢰성 확보를 위한 통신 프로토콜 제안)

  • Yu, Chool;Seo, Gang do;Choi, Hong yeol;Hong, Sung taek;Ji, Yu chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.984-987
    • /
    • 2013
  • In concept, such as the backup of wired network and disaster prevention network of water treatment measurement and control system, reliability and security of high level of sending and receiving data between the nodes must be ensured in Ad-hoc network construction. Rather than apply the common communication protocols of Ad-hoc network construction during the FA network of closed water treatment facility with the facility of a certain scale is concentrated contrast, and high characteristics of the water treatment system infrastructure, public facilities We have developed a specific protocol another that applies the OTP of communication frame of process control commands and H-ARQ with ZRP by applying the flexibility to time constraints such as precision industrial plants to ensure the safety and property of facility operation.

  • PDF

A Study on Estimating the Number of Users in e-Commerce Systems (전자상거래 시스템의 사용자 수 예측에 관한 연구)

  • Kim, Jeong-Su;Sea, Sang-Koo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.259-274
    • /
    • 2005
  • In this paper, we propose a methodology to estimate the number of users in e-Commerce systems. There have been a lot of previous work under the closed-LAN system environment. But the study on the number of acceptable users in real network environment is hard to find in the literature. Our research applies a Hybrid Simulation by using QoS results for end-to-end high-speed Internet service, and experiments are performed with regard to LAN and WAN, network equipments, and various network bandwidth. As result of the experiments we observed that the response time of high-speed Internet service media(Wireless LAN, ADSL, Cable, VDSL) depends heavily on the sequence and depth of transactions and on the ratio of transactional and non-transactional interactions. That is, as the network and application get more loads, the number of acceptable users decreases. By adding a cache server and an L4 switch to the simulation model, we analysed the changes in the number of users and client response time.

  • PDF

How to Cope with Ransomware in the Healthcare Industry (의료산업에서의 랜섬웨어 대응 방법)

  • Jeon, In-seok;Kim, Dong-won;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.155-165
    • /
    • 2018
  • As medical healthcare industry is growing up rapidly these days, providing various new healthcare service is considered carefully. Health information is considered to be more important than financial information; therefore, protecting health information becomes a very significant task. Ransomware is now targeting industry groups that have high information value. Especially, ransomware has grown in various ways since entering maturity in 2017. Healthcare industry is highly vulnerable to ransomeware since most healthcare organizations are configured in closed network with lack of malware protection. Only meeting the security criteria is not the solution. In the case of a successful attack, restoration process must be prepared to minimize damages as soon as possible. Ransomware is growing rapidly and becoming more complex that protection must be improved much faster. Based on ISO 27799 and 27002 standard, we extract and present security measures against advanced ransomware to maintain and manage healthcare system more effectively.