• Title/Summary/Keyword: Concept Network

Search Result 1,790, Processing Time 0.034 seconds

Supply Chain Network Design - a Model and its Applications (공급사슬망 설계를 위한 수리모형 수립 및 응용)

  • Kim Jeonghyuk;Kim Daeki
    • Korean Management Science Review
    • /
    • v.21 no.2
    • /
    • pp.15-25
    • /
    • 2004
  • Great effort has been exerted to redesign the supply chain network as a means to improve corporate competitiveness. In this study, we present a mathematical model and a solution system to help redesign corporate logistics networks. The objective of the model is to minimize total logistics costs. We applied the solution system to real problem cases. We use the model and the concept to develop decision support system that is based on C++ with the use of CPLEX callable library as a solution engine. We tested and verified the DSS for redesigning the network of a large Korean electronics company. Through various scenario analyses. we recommend to redesign their supply chain network that demonstrates the possibility of substantial logistics cost savings.

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

Link Analysis on Institutional Repository web Network of Indian Institute of Technologies Registered in open DOAR-uncovering Patterns and Trends Hidden in the Network

  • Kumar, Kutty
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.8 no.2
    • /
    • pp.23-36
    • /
    • 2018
  • Institutional repositories (IR) are promising to be extremely advantageous to scholars especially in developing countries. IR initiatives started in India during the late nineties and the popularity of this concept is growing rapidly in the higher educational and research institutions to disseminate newly emerging knowledge and expertise. The purpose of this paper is to critically analyze the network links of IR websites among four IITs that are registered in open DOAR (Directory of Open Access Repositories) web portal. The Institutional Repositories chosen for the study are IIT Delhi, IIT Hyderabad, IIT Bombay, and IIT Kanpur. The analysis of the study focused on standard graph and network cohesion metrics, such as density, diameter, eccentricity and distances, and clustering coefficient; for an even more detailed analysis advanced centrality measures and fast algorithms such as clique census are used.

An Analysis on standardization requirements of the Smart Grid network (통신망 관점의 스마트그리드 요구사항 표준화 동향 분석)

  • Cho, Pyung-Dong;Choi, Mun-Hwan;Lee, Snag-Mu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.563-566
    • /
    • 2011
  • Smart grid electrical energy network is constructed in the additional network concept can be viewed with the power and IT. In order to build samrt grid networks the communication requirements should be defined definitely with implementing structure on communication network. In this paper, we introduces smart grid technology and network perspective on the requirements based on ITU-T standards.

  • PDF

Web-based Distribute Control Networks

  • Kiwon Song;Kim, Jonghwi;Park, Gi-Sang;Park, Gi-Heung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.82.4-82
    • /
    • 2001
  • Requirements for device control networks differ greatly from those of data (business) networks. Consequently, any control network which uses a filedbus protocol is, in general, different from If network protocol TCP/IP. One then needs to integrate both fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. Connecting these remote Lon Works networks to the Internet can provide a powerful, integrated, distributed control system. This paper suggests a basic concept that be applied to distributed control over IP network or internet. Specially, Lonworks technology that used LonTalk protocol is reviewed as device network and ...

  • PDF

A NEW ALGORITGMIC HEURISTICS FOR THE SYNTHESIS OF OPTIMAL HEAT EXCHANGER NETWORT

  • Cho, Y.S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.819-824
    • /
    • 1989
  • This paper proposes a new method for the discovery and design of an optimal heat exchanger network. The method is based upon the concept of pinch, a problem reduction technique and the heuristics developed in this work. It generates subproblems in a logical way and solves the subproblems by the heuristics to synthesize an optimal network structure. It is thought that the heuristics can preserve the minimum utility consumption, the minimum number of heat exchanger units, and the minimum number of stream splittings needed for a given problem. The minimum heat exchanger area for the optimal network can then be obtained by adjusting the temperatures associate with the heat exchanger in the optimal network structure. The method is applied to the problems appeared in the literatures. The results show the reductions in the number of heat exchanger units for some problems.

  • PDF

Network Security Practices through Anonymity

  • Smitha, G R;Suprith C Shekar;Ujwal Mirji
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.155-162
    • /
    • 2024
  • Anonymity online has been an ever so fundamental topic among journalists, experts, cybersecurity professionals, corporate whistleblowers. Highest degree of anonymity online can be obtained by mimicking a normal everyday user of the internet. Without raising any flags of suspicion and perfectly merging with the masses of public users. Online Security is a very diverse topic, with new exploits, malwares, ransomwares, zero-day attacks, breaches occurring every day, staying updated with the latest security measures against them is quite expensive and resource intensive. Network security through anonymity focuses on being unidentifiable by disguising or blending into the public to become invisible to the targeted attacks. By following strict digital discipline, we can avoid all the malicious attacks as a whole. In this paper we have demonstrated a proof of concept and feasibility of securing yourself on a network by being anonymous.

Integrated Model of the Higher Education Financing Under the Quadruple Helix Concept

  • Kholiavko, Nataliia;Zhavoronok, Artur;Shaposhnykov, Kostiantyn;Krylov, Denys;Morozova, Liudmyla;Babiak, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.125-132
    • /
    • 2021
  • Rapid growth of the higher education role in ensuring the socio-economic and innovative development of the national economy in the context of the development of the information society and the knowledge economy is observed. Achieving positive synergistic effects of the higher education development requires proper funding for university education and research. The existing funding models for national higher education systems in a number of developing countries need modernization in accordance with the modern challenges of economic and innovative development. The purpose of the article is to formulate theoretical - methodological and applied foundations for the development and implementation of the integrated model of the higher education financing under the Quadruple Helix concept. At the center of the developed model are the areas of interaction identified by the authors, namely: Personnel, Science, Management, Innovation, Social area. This made it possible to specify the interests of all stakeholders and orient the activities of higher education institutions to the satisfaction of these interests. Effective implementation of the integrated Model of the higher education financing requires increasing the level of investment attractiveness and practical value of university research; activation of innovative development of enterprises; state stimulation of business participation in university research and education; harmonization of current legislation with EU standards. Implementation of the Model will diversify sources of funding for universities, increase their level of economic security and achieve integrated synergies from the interaction of universities, business, government and the public (as the main stakeholders within the Quadruple Helix concept).

Application of Information Technologies for Lifelong Learning

  • Poplavskyi, Mykhailo;Bondar, Ihor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.304-311
    • /
    • 2021
  • The relevance of the research involves outlining the need for modern professionals to acquire new competencies. In the conditions of rapid civilizational progress, in order to meet the requirements of the labor market in the knowledge society, there is a readiness for continuous training as an indicator of professional success. The purpose of the research is to identify the impact of various forms of application of information technologies for lifelong learning in order to provide the continuous self-development of each person without cultural or age restrictions and on the basis of rapid digital progress. A high level (96%) of need of the adult population in continuing education with the use of digital technologies has been established. The most effective ways to implement the concept of "lifelong learning" have been identified (educational camps, lifelong learning, mass open online courses, Makerspace activities, portfolio use, use of emoji, casual game, scientific research with iVR game, implementation of digital games, work in scientific cafes). 2 basic objectives of continuing professional education for adults have been outlined (continuous improvement of qualifications and obtaining new qualifications). The features of ICT application in adult education have been investigated by using the following methods, namely: flexibility in terms of easy access to ideas, solving various problems, orientation approach, functional learning, group or individual learning, integration of leisure, personal and professional activities, gamification. The advantages of application of information technologies for continuous education (economic, time, and adaptive) have been revealed. The concept of continuous adult learning in the context of digitalization has been concluded. The research provides a description of the structural principles of the concept of additional education; a system of information requests of the applicant, as well as basic technologies for lifelong learning. The research indicates the lack of comprehensive research in the relevant field. The practical significance of the research results lies in the possibility of using the obtained results for a wider acquaintance of the adult population with the importance of the application of lifelong learning for professional activities and the introduction of methods for its implementation in the educational policy of the state.

Development of Network-based Traction Control System and Study its on Performance Evaluation using Net-HILS (Net-HILS를 이용한 네트워크기반 구동력제어시스템 개발 및 성능평가에 관한 연구)

  • Ryu, Jung-Hwan;Yoon, Ma-Ru;Hwang, In-Yong;SunWoo, Myoung-Ho
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.14 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • This paper presents a network-based traction control system(TCS), where several electric control units (ECUs) are connected by a controller area network(CAN) communication system. The control system consists of four ECUs: the electricthrottle controller, the transmission controller, the engine controller and the traction controller. In order to validate the traction control algorithm of the network-based TCS and evaluate its performance, a Hardware-In-the-Loop Simulation(HILS) environment was developed. Herein we propose a new concept of the HILS environment called the network-based HILS(Net-HILS) for the development and validation of network-based control systems which include smart sensors or actuators. In this study, we report that we have designed a network-based TCS, validated its algorithm and evaluated its performance using Net-HILS.