• Title/Summary/Keyword: ISP Model

Search Result 95, Processing Time 0.028 seconds

Relationship Brand Orientation and Internal Brand Equity at Internet Service Providers: An Organization Change Readiness Effect

  • TOBING, Rudy P.;SUROSO, SUROSO;HALIM, Rizal Edy;ALIF, Gunawan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.181-193
    • /
    • 2020
  • The midst competition makes a brand all together with its offering products and services is becoming a crucial element for company existence. This requires direct involvement from internal organizational to develop effective strategic branding. According to Asosiasi Penyelenggara Internet Indonesia (APJII), Indonesia's internet penetration is among the highest in Asia. The purpose of this research is to improve the strategic role of brand orientation within Internet Service Provider (ISP) for maximizing return on the company's financial and non-financial benefits by proposing organization change readiness variable. The data collection is taken using an online survey with a non-parametric sampling method and collected 68 qualified respondents for data analysis using SEM-PLS (Structural Equation Modeling with Partial Least Square). The result indicates partial hypotheses on the constructed model between variables brand orientation, brand commitment, and internal brand equity is acceptable. Another finding is stated hypotheses on organization change readiness as moderation is not accepted and means there is no significance to the constructed model. The main conclusion resumes associative human memory can shape up organization change readiness inside internal toward then brand. Relevant cues generate information received in the human brain then will create common associative and becoming social identity on internal brand equity.

Analysis of Network Neutrality in Two-sided Markets Using Game Theory (게임이론에 의한 양면시장에서의 망중립성 분석)

  • Oh, Hyung Sool;Lee, Jae Ha
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.162-169
    • /
    • 2018
  • Net neutrality, which has not been a problem, has recently become a problem for ISPs (Internet Service Providers), and their complaints have been paid by domestic platform companies, but overseas global IT companies such as Google and YouTube, generate huge revenues from domestic markets. In this situation, domestic IT companies claim that it is natural to impose more expensive charges or restrict speed on users who generate huge traffic. On the other side, however, the telecommunication network has become an essential public good that is essential to our everyday life, and because it has been given a monopoly position by a private company to efficiently respond to the explosive demand for telecommunication services, It is necessary to provide equal and universal service and fulfill public duty. In this paper, we deal with the network neutrality problem, focusing on the price elasticity between the CP (Contents Provider) and the ISP, rather than the user who is one side of the two-sided market for the already saturated satellites communication market. We present a game model that determines the optimal price for each platform by Nash equilibrium and analyze how the net neutrality affects CP according to the change of exogenous variables through the proposed game model.

Models for Internet Traffic Sharing in Computer Network

  • Alrusaini, Othman A.;Shafie, Emad A.;Elgabbani, Badreldin O.S.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.28-34
    • /
    • 2021
  • Internet Service Providers (ISPs) constantly endeavor to resolve network congestion, in order to provide fast and cheap services to the customers. This study suggests two models based on Markov chain, using three and four access attempts to complete the call. It involves a comparative study of four models to check the relationship between Internet Access sharing traffic, and the possibility of network jamming. The first model is a Markov chain, based on call-by-call attempt, whereas the second is based on two attempts. Models III&IV suggested by the authors are based on the assumption of three and four attempts. The assessment reveals that sometimes by increasing the number of attempts for the same operator, the chances for the customers to complete the call, is also increased due to blocking probabilities. Three and four attempts express the actual relationship between traffic sharing and blocking probability based on Markov using MATLAB tools with initial probability values. The study reflects shouting results compared to I&II models using one and two attempts. The success ratio of the first model is 84.5%, and that of the second is 90.6% to complete the call, whereas models using three and four attempts have 94.95% and 95.12% respectively to complete the call.

Bigdata Analysis Project Development Methodology (빅데이터 분석 프로젝트 수행 방법론)

  • Kim, Hyoungrae;Jeon, Do-hong;Jee, Sunghyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.3
    • /
    • pp.73-85
    • /
    • 2014
  • As the importance of big data analysis increases to improve the competitiveness of a corporate, a unified big data project development methodology is required in order to study the problem of a corporate in a systematic way and evaluate the problem w.r.t. a business value after solving the problem. This paper propose Scientific Data Anslysis and Development methodology(SDAD) which are integrated methodology of software development and project management for easier application into a field project. SDAD consisits of 6 stages(problem definition stage, data preparation stage, model design stage, model development stage, result extraction stage, service development state), each stages has detailed processes(47) and productions(93). SDAD, furthermore, unified previous ISP, DW, SW development methodologies in terms of the data analysis and can easily interchange the productions with them. This paper, lastly, introduces a way to assign responsible persons for each process and provide communication procedures in RACI chart to improves the efficiency of the interaction among professionals from different subjects. SDAD is applied to a Bigdata project in Korea Employment Information Services institution and the result turned out to be acceptable when evaluated by the supervision.

Model and Architecture of User-Defined Networks for Seamless Mobility Management in Diverse Wireless Environment (다양한 무선 환경에서 끊김 없는 이동성 관리를 위한 사용자 정의 네트워크 모델 및 구조)

  • Chun, Seung-Man;Nah, Jae-Wook;Lee, Seung-Mu;Choi, Jun-Hyuk;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.35-43
    • /
    • 2011
  • In this paper, we propose a novel architecture for seamless mobility management to provide users with seamless Internet connection when users roam between diverse wireless local area networks (WLANS) controlled by different management entities. There have been many researches in IETF, i.e., MIPv6, HMIPv6, and PMIPv6, to provide the mobility management. However, practically since wireless access points or access routers, which are managed by an individual manager or ISP managers, have different authentication scheme and the supported mobility management, the previous mobility management protocol developed by IETF can not guarantee the quality of service of application services as the mobile node performs the handover. To solve this drawback, we propose the mobility management scheme to provide QoS-guaranteed Internet services during the handover by configurating the wireless networks which is defined by users. More specifically, we present a model, the architecture and an algorithm for user-defined network (UDN) to provide the seamless Internet service. Finally, the performance of the proposed algorithm is evaluated by the network simulation tool.

On the Tree Model grown by one-sided purity (단측 순수성에 의한 나무모형의 성장에 대하여)

  • 김용대;최대우
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.1
    • /
    • pp.17-25
    • /
    • 2001
  • Tree model is the most popular classification algorithm in data mining due to easy interpretation of the result. In CART(Breiman et al., 1984) and C4.5(Quinlan, 1993) which are representative of tree algorithms, the split fur classification proceeds to attain the homogeneous terminal nodes with respect to the composition of levels in target variable. But, fur instance, in the chum prediction modeling fur CRM(Customer Relationship management), the rate of churn is generally very low although we are interested in mining the churners. Thus it is difficult to get accurate prediction modes using tree model based on the traditional split rule, such as mini or deviance. Buja and Lee(1999) introduced a new split rule, one-sided purity for classifying minor interesting group. In this paper, we compared one-sided purity with traditional split rule, deviance analyzing churning vs. non-churning data of ISP company. Also reviewing the result of tree model based on one-sided purity with some simulated data, we discussed problems and researchable topics.

  • PDF

SAR in a Human Head Depending on the Arrangement of Antenna of Mobile Phone (이동통신단말기 안테나 배치에 따른 두부의 전자파 흡수율)

  • 이애경;김진석;이광천;조광윤
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.10 no.7
    • /
    • pp.1095-1103
    • /
    • 1999
  • Presently, the retractable phone with a whip antenna composed of a helix and a monopole is most widely used for cellular mobile communications. However, since the length of the monopole is usually about λ/4, the strong radiated electric fields are produced in the region where the auricle of a head is contacted directly. This field distribution results in high specific absorption rates(SAR's) in the head. In this paper, SAR distributions and local SAR values for the inversely shaped phone(ISP) whose antenna arrangement is opposite to the original retractable phone(ORP) are compared with those for the ORP. This phone is accomplished by mounting the $\lambda$/4-whip antenna on the bottom, not on the top of the handset. The time-averaged field distribution in a computational space including a human model and a phone model is computed using the finite-difference time-domain(FDTD) method. SAR distributions and local SAR values for these phones are calculated with the field distributions. An anatomical head model and an approximate hand model were used to consider a real situation. From the analyzed data, it is shown that this arrangement of the antenna considerably reduces the spatial peak SAR in a human head.

  • PDF

A Study of Information Strategy Plan for Korea Institute of Oriental Medicine(KIOM) (한국한의학연구원 정보화전략계획 연구)

  • Kim, Chul;Yea, Sang-Jun;Kim, Sang-Hyun;Jang, Hyun-Chul;Song, Mi-Young
    • Korean Journal of Oriental Medicine
    • /
    • v.14 no.3
    • /
    • pp.137-148
    • /
    • 2008
  • Computerization is recognized as simple supporting tools up to recently but Information is made for the improvement of company's outcome beyond the assistant tools and is emerged as core tools of creating new opportunities for company in point of management strategy. But Information plays minor role in Korean Institute of Oriental Medicine(KIOM) yet. Information has not processed systematically because of lack of understanding and budget in KIOM. The purpose of this research is to make plan for knowledge information which is aimed to make effective supporting and strengthening the ability of KIOM's research, until 2013. Also we tried to find new project s for information and to apply the result to planned information projects. The final goal of this study is to make mid/long-term information plan of KIOM. We applied the general information strategy planning(ISP) method which is progressed as analysis of information technology, analysis of information status, design of future model and extraction of action plan order. First, we examined the information elements for the advanced management from analysis of management environment and analyzed information technology trends. Second, we list up the gaps and problems of KIOM's information status and define the future model to solve this problems. It is showed the road map of time and budget for future model to progress systematically inner-information of purpose. We hope that information of KIOM will be conducted successfully.

  • PDF

A Conceptual Model for Location Based Public Transit Transfer Information Service (사용자 위치기반 환승정보서비스 개념모델)

  • Lim, Jung-Sil;Moon, Young-Jun;Oh, Young-Tae;Lee, Choul-Ki;Bae, Myoung-Hwan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.1-12
    • /
    • 2008
  • The issues of developing the value added services for public transport connectivity and transfer with information and communication technologies has been discussed in terms of incorporating system facilities with public transit modes to increase the ridership of public transit. This paper demonstrates a conceptual model for providing the location based public transit transfer information service on demand with respect to system requirements, subsystems, and logical architecture based on the national ITS architecture. The subsystems in this study which include transfer information center, parking concierge, user route guidance and information provision system are also investigated in detail in order for information service and/or contents provider to develop business models on public transit connectivity and transfer. This model is expected to be utilized in providing the variety of service models with the different types of public transit connectivity and transfer systems according to the system scale and the public transit modes.

  • PDF

Analysis of Flight Trajectory Characteristics of the MRBM by Adjusting the Angle of a Flight Path (비행경로각 조정에 의한 중거리 탄도미사일의 비행궤적 특성 해석)

  • Kim, Jiwon;Kwon, Yong Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.2
    • /
    • pp.173-180
    • /
    • 2015
  • North Korea has developed ballistic missiles over the past 30 years. It is believed that they have a variety of ballistic missiles more than 1,000. Because these ballistic missiles threaten South Korea directly, accurate analysis of them is essential. Flight trajectories of the ballistic missiles are generally changed by means of adjusting payload weight, Isp, flight path angle, and cut-off time. The flight path angle is widely used to control the missile range. However it is difficult to predict the missile trajectory exactly in real operational environment because the missile could be launched according to its intention and purpose. This work analyzed the 1,000 km range MRBM's trajectory characteristics from adjusting flight path angle which is depressed as well as lofted method. The analysis of missile trajectory characteristics is based on the simulation of the missile trajectory model developed by KNDU research team.