• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.026 seconds

Research on Usability of Mobile Food Delivery Application: Focusing on Korean Application and Chinese Application (모바일 배달 애플리케이션 사용성 평가 연구: 한국(배달의민족)과 중국(어러머)을 중심으로)

  • Yang Tian;Eunkyung Kweon;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.1-16
    • /
    • 2018
  • The development and generalization of the Internet increased the popularity of food delivery service applications in Korea. The food delivery market based on online-to-offline service is growing rapidly. This study compares the usability of Korean food delivery service application between that of Chinese food delivery service application. This study suggests improvement points for Korean food delivery service applications. To conduct this study, we explore the status of various food delivery service applications and conduct interviews and surveys based on the honeycomb model developed by Peter Morville. This study obtained the following results. First, all restaurants participating in the Korean food delivery service must be able to accept order through the application. Second, the shopping cart function must be able to accept order of all restaurants simultaneously. Third, when users look for menu recommendation, their purchase history and shopping cart functions should appear at the first page of the website. Users should be able to perceive the improved usability of the website using those functions. Fourth, when the search window is fixed on the top of each page, users should be able to find the information they need. Fifth, the application must allow users to find the exact location of the delivery person and the estimated delivery time. Finally, the restaurants'address should be disclosed and fast delivery time should be confirmed to enhance users'trust on the application. This study contributes to academia and industry by suggesting useful insight into food delivery service applications and improving the point of food delivery service application in Korea.

Analysis of Building Characteristics and Temporal Changes of Fire Alarms (건물 특성과 시간적 변화가 소방시설관리시스템의 화재알람에 미치는 영향 분석 연구)

  • Lim, Gwanmuk;Ko, Seoltae;Kim, Yoosin;Park, Keon Chul
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.83-98
    • /
    • 2021
  • The purpose of this study to find the factors influencing the fire alarms using IoT firefighting facility management system data of Seoul Fire & Disaster Headquarters, and to present academic implications for establishing an effective prevention system of fire situation. As the number of high and complex buildings increases and former bulidings are advanced, the fire detection facilities that can quickly respond to emergency situations are also increasing. However, if the accuracy of the fire situation is incorrectly detected and the accuracy is lowered, the inconvenience of the residents increases and the reliability decreases. Therefore, it is necessary to improve accuracy of the system through efficient inspection and the internal environment investigation of buildings. The purpose of this study is to find out that false detection may occur due to building characteristics such as usage or time, and to aim of emphasizing the need for efficient system inspection and controlling the internal environment. As a result, it is found that the size(total area) of the building had the greatest effect on the fire alarms, and the fire alarms increased as private buildings, R-type receivers, and a large number of failure or shutoff days. In addition, factors that influencing fire alarms were different depending on the main usage of the building. In terms of time, it was found to follow people's daily patterns during weekdays(9 am to 6 pm), and each peaked around 10 am and 2 pm. This study was claimed that it is necessary to investigate the building environment that caused the fire alarms, along with the system internal inspection. Also, it propose additional recording of building environment data in real-time for follow-up research and system enhancement.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

주거부문 행정자료의 인구주택총조사 활용방안

  • Lee, Geon;Byeon, Mi-Ri;Lee, Myeong-Jin;Seo, U-Seok
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2005.11a
    • /
    • pp.117-120
    • /
    • 2005
  • 인구주택총조사는 국가통계의 가장 기본이 되는 자료를 생산하는 조사로 거의 대부분의 나라에서 전수조사방식으로 정기적으로 시행해왔다. 그러나 최근 들어 일부 국가, 특히 선진국에서 응답거부가 늘고, 조사대상을 접촉하기 어려운 등 조사환경이 나빠지고 있다. 아울러 조사비용이 급격하게 증가하고 있다. 이에 각 국의 통계청에서는 이러한 상황을 인구센서스에 대한 '근본적인 도전'으로 간주하고 있다(Jensen, 2000). 심지어 독일이나 네델란드에서는 조사환경의 악화로 1990년대 이후 인구센서스를 중단한 상태이다(Bierau, 2000). 조사환경의 악화는 조사의 포괄성과 신뢰성에 대한 문제를 야기한다. 선진국들과 마찬가지로 우리나라에서도 조사환경이 빠른 속도로 악화되고 있다. 더욱이 우리의 경우 읍면동사무소 기능축소로 말미암아 과거 인구주택총조사에서 실제 조사에 도움을 주었던 행정지원이 없어짐에 따라 앞으로 조사의 어려움은 더욱 커질 것으로 보인다. 이렇듯 악화되는 조사환경변화에 대응하여 선진 국가에서는 다양한 형태의 인구센서스방식들이 모색되고 있다. 많은 나라들이 순환형 센서스보다는 행정자료를 인구주택총조사에 활용하는 방안을 모색하고 있으며, 덴마크나 핀란드 등 일부 국가에서는 이미 전혀 조사를 하지 않고 행정자료로 대부분의 인구센서스 통계를 생산하고 있다(Harala, 1996; Gaasemyr, 1999; Laihonen, 1999), 많은 나라들이 행정자료를 활용한 인구센서스 방식을 선호하는 데는 또 다른 이유가 있다. 자료의 측면에서 보면, 행정자료를 활용할 경우 매년 인구센서스 통계를 생산할 수 있다. 실제로 현재 덴마크와 핀란드는 인구센서스에 준하는 통계를 매년 생산하고 있다. 또한 이러한 자료를 바탕으로 지역통계 수요에 즉각 대처할 수 있다. 더 나아가 이와 같은 통계는 전 국민에 대한 패널자료이기 때문에 통계적 활용의 범위가 방대하다. 특히 개인, 가구, 사업체 등 사회 활동의 주체들이 어떻게 변화하는지를 추적할 수 있는 자료를 생산함으로써 다양한 인과적 통계분석을 할 수 있다. 행정자료를 활용한 인구센서스의 이러한 특징은 국가의 교육정책, 노동정책, 복지정책 등 다양한 정책을 정확한 자료를 근거로 수립할 수 있는 기반을 제공한다(Gaasemyr, 1999). 이와 더불어 행정자료 기반의 인구센서스는 비용이 적게 드는 장점이 있다. 예를 들어 덴마크나 핀란드에서는 조사로 자료를 생산하던 때의 1/20 정도 비용으로 행정자료로 인구센서스의 모든 자료를 생산하고 있다. 특히, 최근 모든 행정자료들이 정보통신기술에 의해 데이터베이스 형태로 바뀌고, 인터넷을 근간으로 한 컴퓨터네트워크가 발달함에 따라 각 부처별로 행정을 위해 축적한 자료를 정보통신기술로 연계${cdot}$통합하면 막대한 조사비용을 들이지 않더라도 인구센서스자료를 적은 비용으로 생산할 수 있는 근간이 마련되었다. 이렇듯 행정자료 기반의 인구센서스가 많은 장점을 가졌지만, 그렇다고 모든 국가가 당장 행정자료로 인구센서스를 대체할 수 있는 것은 아니다. 행정자료로 인구센서스통계를 생산하기 위해서는 각 행정부서별로 사용하는 행정자료들을 연계${cdot}$통합할 수 있도록 국가사회전반에 걸쳐 행정 체제가 갖추어져야 하기 때문이다. 특히 모든 국민 개개인에 관한 기본정보, 개인들이 거주하며 생활하는 단위인 개별 주거단위에 관한 정보가 행정부에 등록되어 있고, 잘 정비되어 있어야 하며, 정보의 형태 또한 서로 연계가 가능하도록 표준화되어있어야 한다. 이와 더불어, 현재 인구센서스에서 표본조사를 통해 부가적으로 생산하는 경제활동통계를 생산하기 위해서는 개인이 속한 사업체를 파악할 수 있도록 모든 사업체가 등록되어 있고, 개인의 경제활동과 관련된 각종 정보들이 사업체에 잘 기록 및 정비되어 있어야 한다. 따라서 행정자료 기반의 인구센서스통계생산은 단지 국가의 통계뿐만 아니라 행정조직과 행정체계를 정비하고, 개인과 사업체의 등록체계를 정비하며, 사업체의 개인에 관한 정보를 정비하여 표준화하는 막대한 작업을 수반한다. 이런 이유에서 대부분의 국가들은 장래에 행정자료 기반의 인구센서스통계생산을 목표로 하되, 당장은 행정자료를 인구센서스에 보조적 수단을 사용하는 데 노력을 기울이고 있다. 우리나라의 경우 행정자료를 인구주택총조사에 활용할 수 있는 몇 가지 중요한 기반을 갖추고 있다. 첫째, 1962년부터 시행한 주민등록제도가 있다. 주민등록제도는 모든 국민 개개인을 파악할 수 있는 주민등록번호를 갖추고 있으며 40년 이상 제도화되어 오류가 거의 없는 편이다. 둘째, 세계 10위권 내에 들 정도로 높은 우리나라의 정보화 수준과 2000년부터 시작된 전자정부사업으로 행정자료를 연계${cdot}$통합할 수 있는 기반이 잘 갖추어져 있다. 반면, 우리나라 행정자료 가운데 주거(생활)단위와 사업체를 파악할 수 있는 자료는 매우불완전하다. 대표적으로 인구센서스통계의 주요한 단위인 가구를 파악할 수 있는 수준으로 주소체계가 정비되어 있지 않으며, 많은 사업체, 특히 소규모 사업 가운데 등록되어 있지 않거나 등록오류가 많은 편이다. 이외에도 과세대장, 토지대장 등 많은 행정자료가 아직은 불완전하여 이들을 직접 연계하기에 어렵다. 행정자료를 연계하기 위해서는 모든 자료를 정비하고 표준화하여 실제 행정에 활용하여야 하기 때문에 행정적으로 많은 노력과 시간이필요하다. 따라서 현재는 손쉬운 부분에서부터 인구주택총조사에 행정자료를 활용하고, 앞으로 활용 과정을 거치면서 행정자료를 정비하고 표준화하는 장기적인 방안을 마련할 필요가 있다.

  • PDF

A Regression-Model-based Method for Combining Interestingness Measures of Association Rule Mining (연관상품 추천을 위한 회귀분석모형 기반 연관 규칙 척도 결합기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.127-141
    • /
    • 2017
  • Advances in Internet technologies and the proliferation of mobile devices enabled consumers to approach a wide range of goods and services, while causing an adverse effect that they have hard time reaching their congenial items even if they devote much time to searching for them. Accordingly, businesses are using the recommender systems to provide tools for consumers to find the desired items more easily. Association Rule Mining (ARM) technology is advantageous to recommender systems in that ARM provides intuitive form of a rule with interestingness measures (support, confidence, and lift) describing the relationship between items. Given an item, its relevant items can be distinguished with the help of the measures that show the strength of relationship between items. Based on the strength, the most pertinent items can be chosen among other items and exposed to a given item's web page. However, the diversity of the measures may confuse which items are more recommendable. Given two rules, for example, one rule's support and confidence may not be concurrently superior to the other rule's. Such discrepancy of the measures in distinguishing one rule's superiority from other rules may cause difficulty in selecting proper items for recommendation. In addition, in an online environment where a web page or mobile screen can provide a limited number of recommendations that attract consumer interest, the prudent selection of items to be included in the list of recommendations is very important. The exposure of items of little interest may lead consumers to ignore the recommendations. Then, such consumers will possibly not pay attention to other forms of marketing activities. Therefore, the measures should be aligned with the probability of consumer's acceptance of recommendations. For this reason, this study proposes a model-based approach to combine those measures into one unified measure that can consistently determine the ranking of recommended items. A regression model was designed to describe how well the measures (independent variables; i.e., support, confidence, and lift) explain consumer's acceptance of recommendations (dependent variables, hit rate of recommended items). The model is intuitive to understand and easy to use in that the equation consists of the commonly used measures for ARM and can be used in the estimation of hit rates. The experiment using transaction data from one of the Korea's largest online shopping malls was conducted to show that the proposed model can improve the hit rates of recommendations. From the top of the list to 13th place, recommended items in the higher rakings from the proposed model show the higher hit rates than those from the competitive model's. The result shows that the proposed model's performance is superior to the competitive model's in online recommendation environment. In a web page, consumers are provided around ten recommendations with which the proposed model outperforms. Moreover, a mobile device cannot expose many items simultaneously due to its limited screen size. Therefore, the result shows that the newly devised recommendation technique is suitable for the mobile recommender systems. While this study has been conducted to cover the cross-selling in online shopping malls that handle merchandise, the proposed method can be expected to be applied in various situations under which association rules apply. For example, this model can be applied to medical diagnostic systems that predict candidate diseases from a patient's symptoms. To increase the efficiency of the model, additional variables will need to be considered for the elaboration of the model in future studies. For example, price can be a good candidate for an explanatory variable because it has a major impact on consumer purchase decisions. If the prices of recommended items are much higher than the items in which a consumer is interested, the consumer may hesitate to accept the recommendations.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Role of Project Owner in OSS Project: Based on Impression Formation and Social Capital Theory (오픈소스 소프트웨어 운영자 역할이 성과에 미치는 영향: 인상형성과 사회적 자본 이론을 중심으로)

  • Lee, Saerom;Baek, Hyunmi;Jahng, Jungjoo
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.23-46
    • /
    • 2016
  • With the increasing socio-economic value of an open collaboration over the Internet, it has become significantly important to successfully manage open source software development program. Most of the previous research have focused on various factors that influence the performance of the project, but studies on how the project owners recognized as "leader" affect the outcome of the project are very limited. This research investigates how individual and governance characteristics of an owner influences the performance of project based on impression formation and social capital theory. For a data set, we collect 611 Repositories and the owner's data from the open source development platform Github, and we form knowledge sharing network of an each repository by using social network analysis. We use hierarchical regression analysis, and our results show that a leader, who exposes a lot of one's personal information or who has actively followed and showed interests to communicate with other developers, affects positive impacts on project performance. A leader who has a high centrality in knowledge sharing network also positively affects on project performance. On the other hand, if a leader was highly willing to accept external knowledge or is recognized as an expert in the community with large numbers of followers, the result show negative impacts on project performance. The research may serve as a useful guideline not only for the future open source software projects but also for the effective management of different types of open collaboration.

Building Transparency on the Total System Performance Assessment of Radioactive Repository through the Development of the FEAS Program (FEAS 프로그램 개발을 통한 방사성폐기물 처분장 종합 성능 평가(TSPA) 투명성 증진에 관한 연구)

  • 서은진;황용수;강철형
    • Tunnel and Underground Space
    • /
    • v.13 no.4
    • /
    • pp.270-278
    • /
    • 2003
  • Transparency on the Total System Performance Assessment (TSPA) is the key issue to enhance the public acceptance for a permanent high level radioactive repository. Traditionally, the study on features, events and processes (FEPs) and associated scenarios has been regarded as the starting point to open the communicative discussion on TSPA such as what to evaluate, how to evaluate and how to translate outcomes into more friendly language that many stakeholders can easily understand and react with. However, in most cases, it has been limited to one way communication, because it is difficult for stakeholders outside the performance assessment field to assess the details on the story of the safety assessment, scenario and technical background of it. Fortunately, the advent of the internet era opens up the possibility of two way communication from the beginning of the performance assessment so that every stakeholder can exchange their keen opinions on the safety issues. To achieve it, KAERI develops the systematic approach from the FEPs to Assessment methods flow chart. All information is integrated into the web based program named FEAS (FEp to Assessment through Scenario development) under development in KAERI. In parallel, two independent systems are also under development the web based QA(Quality Assurance) system and the PA(Performance Assessment) input database. It is ideal to integrate the input data base with the QA system so that every data in the system can checked whenever necessary. Throughout the next phase R&D starting from the year 2003, these three systems will be consolidated into one unified system.

The Relationship between Offline Trust and Online Transaction in Internet Banking (인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.