• Title/Summary/Keyword: IT Business Network

Search Result 1,598, Processing Time 0.024 seconds

Topic Based Hierarchical Network Analysis for Entrepreneur Using Text Mining (텍스트 마이닝을 이용한 주제기반의 기업인 네트워크 계층 분석)

  • Lee, Donghun;Kim, Yonghwa;Kim, Kwanho
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.33-49
    • /
    • 2018
  • The importance of convergence activities among business is increasing due to the necessity of designing and developing new products to satisfy various customers' needs. In particular, decision makers such as CEOs are required to participate in networks between entrepreneurs for being connected with valuable convergence partners. Moreover, it is important for entrepreneurs not only to make a large number of network connections, but also to understand the networking relationship with entrepreneurs with similar topic information. However, there is a difficult limit in collecting the topic information that can show the lack of current status of business and the technology and characteristics of entrepreneur in industry sector. In this paper, we solve these problems through the topic extraction method and analyze the business network in three aspects. Specifically, there are C, S, T-Layer models, and each model analyzes amount of entrepreneurs relationship, network centrality, and topic similarity. As a result of experiments using real data, entrepreneur need to activate network by connecting high centrality entrepreneur when the corporate relationship is low. In addition, we confirmed through experiments that there is a need to activate the topic-based network when topic similarity is low between entrepreneurs.

Review Of Some Cryptographic Algorithms In Cloud Computing

  • Alharbi, Mawaddah Fouad;Aldosari, Fahd;Alharbi, Nawaf Fouad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.41-50
    • /
    • 2021
  • Cloud computing is one of the most expanding technologies nowadays; it offers many benefits that make it more cost-effective and more reliable in the business. This paper highlights the various benefits of cloud computing and discusses different cryptography algorithms being used to secure communications in cloud computing environments. Moreover, this thesis aims to propose some improvements to enhance the security and safety of cloud computing technologies.

Network separation construction method using network virtualization (네트워크 가상화를 이용한 망 분리 구축 방법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1071-1076
    • /
    • 2020
  • The importance of network separation is due to the use of the Internet with existing business PCs, resulting in an internal information leakage event, and an environment configured to allow servers to access the Internet, which causes service failures with malicious code. In order to overcome this problem, it is necessary to use network virtualization to separate networks and network interconnection systems. Therefore, in this study, the construction area was constructed into the network area for the Internet and the server farm area for the virtualization system, and then classified and constructed into the security system area and the data link system area between networks. In order to prove the excellence of the proposed method, a network separation construction study using network virtualization was conducted based on the basis of VM Density's conservative estimates of program loads and LOBs.

Applying a Novel Neuroscience Mining (NSM) Method to fNIRS Dataset for Predicting the Business Problem Solving Creativity: Emphasis on Combining CNN, BiLSTM, and Attention Network

  • Kim, Kyu Sung;Kim, Min Gyeong;Lee, Kun Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.1-7
    • /
    • 2022
  • With the development of artificial intelligence, efforts to incorporate neuroscience mining with AI have increased. Neuroscience mining, also known as NSM, expands on this concept by combining computational neuroscience and business analytics. Using fNIRS (functional near-infrared spectroscopy)-based experiment dataset, we have investigated the potential of NSM in the context of the BPSC (business problem-solving creativity) prediction. Although BPSC is regarded as an essential business differentiator and a difficult cognitive resource to imitate, measuring it is a challenging task. In the context of NSM, appropriate methods for assessing and predicting BPSC are still in their infancy. In this sense, we propose a novel NSM method that systematically combines CNN, BiLSTM, and attention network for the sake of enhancing the BPSC prediction performance significantly. We utilized a dataset containing over 150 thousand fNIRS-measured data points to evaluate the validity of our proposed NSM method. Empirical evidence demonstrates that the proposed NSM method reveals the most robust performance when compared to benchmarking methods.

A Study on the Possibility of Applying Peer-to-Peer(P2P) Model to e-Business (P2P(peer-to-peer) 모델의 e비즈니스 적용 가능성에 관한 연구)

  • Moon, Hyung-Nam
    • International Commerce and Information Review
    • /
    • v.6 no.3
    • /
    • pp.63-79
    • /
    • 2004
  • Peer-to-peer(P2P) has potential strength and possible factors which enable it to develop toward a new business by supplementing the limitation of the existing central server-type network. In various business sectors, various attempts have already been made to apply P2P. The computing power which was possible to be formed through peer-to-peer networking will become a powerful tools for expanding toward new business area depending the utilization methods by sector. Although the technology-centric P2P concept is a major interest now, its development direction will head toward service-centric P2P concept for satisfying desires of end-users(individual peers) for reliable contents and improving their purchasing convenience. But the solution requisites should be solved for the efficient application of P2P to business such as the establishment of and supplement for the industrial standard and legal system for P2P, the enhancement of peers recognition of P2P. Presently e-commerce using P2P is being implemented by a few enterprises locally by means of B2C. But if many enterprises enter this type of e-commerce, and the standardization of peer programmes, goods and documents is made, it will be able to be extended to B2B. Also it seems that it can be utilized in international transactions as well as in domestic transactions. So there is much room for the application of P2P to be extended further. Also there has been presented the necessity for related industries to support their work with theories and for academic studies to be made actively to set the direction of its development. It is hoped that multi-angled and in-depth studies on the utilization of P2P and various attempts to application of it to business be made on the basis of this study. For the development of P2P, continuous study and attempts are needed. The field of P2Ps application is very large and it will become a powerful tool, depending upon its application methods.

  • PDF

A study on Maritime Marketing strategy in the information Era (정보화시대 해운마케팅 전략에 관한 소고)

  • 김대진;전준수
    • Journal of Korea Port Economic Association
    • /
    • v.18 no.2
    • /
    • pp.47-64
    • /
    • 2002
  • Global Shipping companies and harbor facilities have tried to construct e-business network to strengthen the competitiveness in this rapidly changing cyber environment. from now on, in a few years, it will be backward enterprises and business that could not adapt this e-business currency, international shipping companies has been together The intta and The GTnexus web site for customer need to fulfill Gradually this currency is going to expand in the world The goal of this research is to study up-to-date internet marketing strategy and global shipping company's present condition of on-line marketing. it will be helpful to make domestic marketing business competitive and to acquire superior position for Domestic shipping company in market.

  • PDF

A Study on RFID Application Method in Franchise Business (프랜차이즈산업에서의 RFID 적용 방법에 대한 연구)

  • Rim, Jae-Suk;Choi, Wean-Yang
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2008
  • At present, companies write daily work record or use bar-code in order to collect distribution flow data in real time. However, it needs additional works to check the record or read the bar-code with a scanner. In this case, human error could decrease accuracy of data and it would cause problems in reliability. To solve this problem, RFID (Radio Frequency Identification) is introduced in many automatic recognition sector recently. RFID is a technology that identification data is inserted into micro-mini IC chip and recognize, trace, and manage object, animal, or person using wireless frequency. This is being emerged as the core technology in future ubiquitous environment. This study is intended to suggest RFID application method in franchise business. Traceability and visibility of individual product are supplied based on EPCglobal network. It includes DW system which supplies various assessment data about product in supply chain, financial transaction system which is based on product transaction and position information, and RFID middleware which refines and divides product data from RFID tag. With the suggested application methods, individual product's profile data are supplied in real time and it would boost reliability to customer and make effective cooperation with existing operation systems (SCM, CRM, and e-Business) possible.

Smart Phone and Vehicle Authentication Scheme with M2M Device (M2M 기기에서 스마트폰 및 차량 인증 기법)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.1-7
    • /
    • 2011
  • As the developing of the information technology, M2M market that is using communication between devices is growing rapidly and many companies are involved in M2M business. In this paper, the concept of telematics and vulnerabilities of vehicle network security are discussed. The convergence of vehicle and information technology, the development of mobile communication technology have improved quality of service that provided to user but as a result security threats has diverse. We proposed new business model that be occurred to the participation of mobile carriers in telematics business and we analyzed mobile radio communication network security vulnerabilities. We proposed smart phone and Vehicle authentication scheme with M2M device as a way to solve vulnerabilities.

A Study on the Global e-Networking of Trading Companies in Korea (무역업체의 글로벌 경쟁력 강화를 위한 e-네트워크 구축에 관한 연구)

  • Choi, Heung-Seob;Her, Eun-Kyung
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.97-115
    • /
    • 2008
  • This paper is to review how Korean trading companies perform and promote the digital transformation through the e-networking with global market, and how much they extend the volume of export, and make the company grow inward or outward in order to enhance the effects of economic growth in Korea. It is suggested that global agreement on e-Trade(or u-Trade) should be made in order to expand the global e-networking practices and to ensure transferring of transport documents(or business documents). Moreover, it also suggested that networking on the global trading partners such as government authorities, diplomatic offices abroad, overseas Koreans, students studying abroad, Korean merchants abroad, etc. should be made in single window for improving and upgrading the image of Korean trading companies. By making of global e-network platform between overseas business partners, trading companies are able to expect various synergy effects such as improving the satisfaction of their customers, promoting the global transactions, reducing the operation and transaction cost, helping fording overseas buyers, and extending export volume and sales profit, etc. Customers can also obtain the information about trading goods easily and rapidly, and cut down the transaction stage using information exchange with partners. All of the trading partners in the world can maintain their business partnership as long as they use the global e-network.

  • PDF

Success Factors of UCSD CONNECT as Business Incubator (UCSD CONNECT의 기업보육 성공요인)

  • Chun, Se-Hak;Byun, Yong-Hwan
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.135-149
    • /
    • 2015
  • The purpose of this study is, through journal review, to introduce and analyze the success factor and programs of CONNECT which have made key contributions in the construction of San diego Bio-cluster and thereby show directions business incubators in Korea should try to follow. CONNECT is a most popular bench-marking case over the world for bio-venture incubation. In this paper, core success factors and incubating programs of CONNECT are analyzed in detailed way for local govenments and incubating institutions to develop enterprise promotion policy. CONNECT is famous for its tailored services to meet the varying needs of entrepreneurs at all stages of their business life cycles and growth. CONNECT is a pioneer which provide mainly software services by using network while it provide hardware supports like space at minimun level. CONNECT has provided early stage corporations with diverse software services on which business incubators in Korea should have focus Since its inception, CONNECT has assisted more than 800 technology companies. Leadership of policy makers, network and software services have been key success factors of UCSD CONNECT.