• 제목/요약/키워드: Network Study

검색결과 20,511건 처리시간 0.042초

홈 네트워크 서비스 구축을 위한 미들웨어 설계 및 구현 (A Design and Implementation of the Middleware for the Home Network Service)

  • 이승주
    • 정보학연구
    • /
    • 제10권4호
    • /
    • pp.57-67
    • /
    • 2007
  • In this paper, we propose a design and implementation of Home Network Middleware which offer integrated service of electronic products. Most senior nations setting to core paradigm to ubiquitous computing techniques and effort to get the novel information and making more power about information techniques. But, they don't have a skill to Home Network Middleware in electronic products. It is a more important in Home Network Middleware. So, we will try to study about Home Network Middleware skill. And suggest to proposition that is a novel Home Network Middleware.

  • PDF

공급사슬구조에 따른 경영성과에 관한 연구 (A Study on the Management Performance Depends on the Supply Chain Structure)

  • 장형욱;이상식
    • 한국산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.110-119
    • /
    • 2005
  • 본 논문은 공급사슬구조를 크게 공급네트워크(supply network), 전환네트워크(conversion network), 그리고 유통네트워크(distribution network)라는 세 유형의 구조로 구분하였으며 각 공급사슬구조별 경영성과에 어떠한 영향을 미치는가에 대하여 국내 103개 상장기업을 대상으로 실증분석을 하였다. 또한 경영성과에 대하여서는 균형성과표(Balanced Scorecard; BSC) 모형을 이용하였다. 연구결과, 학습 및 성장성과, 고객성과, 재무성과의 경우 공급사슬구조에 따른 경영성과간 차이가 있음이 검증되었으나, 내부프로세스성과의 경우 경영성과간 차이가 통계적으로 유의하지 않았다. 또한, Scheff의 다중비교 결과에 따라 유통네트워크 중심기업의 경우 다른 공급사슬구조보다 상대적으로 경영성과가 높은 것으로 나타났다.

  • PDF

Designing a Distribution Network for Faster Delivery of Online Retailing : A Case Study in Bangkok, Thailand

  • Amchang, Chompoonut;Song, Sang-Hwa
    • 산경연구논집
    • /
    • 제9권5호
    • /
    • pp.25-35
    • /
    • 2018
  • Purpose - The purpose of this paper is to partition a last-mile delivery network into zones and to determine locations of last mile delivery centers (LMDCs) in Bangkok, Thailand. Research design, data, and methodology - As online shopping has become popular, parcel companies need to improve their delivery services as fast as possible. A network partition has been applied to evaluate suitable service areas by using METIS algorithm to solve this scenario and a facility location problem is used to address LMDC in a partitioned area. Research design, data, and methodology - Clustering and mixed integer programming algorithms are applied to partition the network and to locate facilities in the network. Results - Network partition improves last mile delivery service. METIS algorithm divided the area into 25 partitions by minimizing the inter-network links. To serve short-haul deliveries, this paper located 96 LMDCs in compact partitioning to satisfy customer demands. Conclusions -The computational results from the case study showed that the proposed two-phase algorithm with network partitioning and facility location can efficiently design a last-mile delivery network. It improves parcel delivery services when sending parcels to customers and reduces the overall delivery time. It is expected that the proposed two-phase approach can help parcel delivery companies minimize investment while providing faster delivery services.

신경회로망을 이용한 수도 증발산량 예측 -백프로파게이션과 카운터프로파게이션 알고리즘의 적용- (Estimating Evapotranspiration of Rice Crop Using Neural Networks -Application of Back-propagation and Counter-propagation Algorithm-)

  • 이남호;정하우
    • 한국농공학회지
    • /
    • 제36권2호
    • /
    • pp.88-95
    • /
    • 1994
  • This paper is to evaluate the applicability of neural networks to the estimation of evapotranspiration. Two neural networks were developed to forecast daily evapotranspiration of the rice crop with back-propagation and counter-propagation algorithm. The neural network trained by back-propagation algorithm with delta learning rule is a three-layer network with input, hidden, and output layers. The other network with counter-propagation algorithm is a four-layer network with input, normalizing, competitive, and output layers. Training neural networks was conducted using daily actual evapotranspiration of rice crop and daily climatic data such as mean temperature, sunshine hours, solar radiation, relative humidity, and pan evaporation. During the training, neural network parameters were calibrated. The trained networks were applied to a set of field data not used in the training. The created response of the back-propagation network was in good agreement with desired values and showed better performances than the counter-propagation network did. Evaluating the neural network performance indicates that the back-propagation neural network may be applied to the estimation of evapotranspiration of the rice crop. This study does not provide with a conclusive statement as to the ability of a neural network to evapotranspiration estimating. More detailed study is required for better understanding and evaluating the behavior of neural networks.

  • PDF

이동통신 액세스망 설계 (Mobile Access Network Design)

  • 김후곤;백천현;권준혁;정용주
    • 경영과학
    • /
    • 제24권2호
    • /
    • pp.127-142
    • /
    • 2007
  • This study deals with the optimal design of mobile access network connecting base stations(BSs) and mobile switching centers(MSCs). Generally mobile operators constitute their access networks by leasing communication lines. Using the characteristic of leased line rate based on administration region, we build an optimization model for mobile access network design which has much smaller number of variables than the existing researches. And we develop a GUI based optimization tool integrating the well-known softwares such as MS EXCEL. MS VisualBasic, MS PowerPoint and Ip_solve, a freeware optimization software. Employing the current access network configuration of a Korean mobile carrier, this study using the optimization tool obtain an optimal solution for both single MSC access network and nation-wide access network. Each optimal access network achieves 7.45% and 9.49% save of lease rate, respectively. Considering the monthly charge and total amount of lease line rate, our optimization tool provides big amount of save in network operation cost. Besides the graphical representation of access networks makes the operator easily understand and compare current and optimal access networks.

SNS 이용동기 수준에 따른 정보교류, 네트워크 밀도, 정보신뢰성, 유대인식의 차이에 관한 연구 (A study on the Information interchange degree, Network density, Information reliability, Network sense of solidarity of According to the motive difference on Using social networks)

  • 박원준
    • 한국전자통신학회논문지
    • /
    • 제9권6호
    • /
    • pp.657-664
    • /
    • 2014
  • 본 연구는 SNS 이용자들을 대상으로 이용동기를 분석하여, 각 이용동기의 중간값을 기준으로 상, 중, 하로 구분하고, 정보교류, 네트워크 밀도, 정보신뢰도, 유대인식의 차이를 알아보았다. 소셜 네트워크 이용 동기는 정보추구 동기, 사회적 영향동기, 오락적 동기, 네트워크 형성동기로 나타났다. 이러한 이용동기 수준에 따라 종속변인으로 설정한 정보교류 정도, 네트워크 밀도, 정보신뢰도, 유대인식에 차이가 나타났다. 특히 정보교류 정도와 정보의 신뢰성은 4가지 동기 수준에 따라 차이가 나타났으며, 네트워크 밀도와 유대인식의 차이는 사회적 영향 동기 수준에 따라 차이가 나타났다.

Development of a Neural Network for Optimization and Its Application to Assembly Line Balancing

  • Hong, Dae-Sun;Ahn, Byoung-Jae;Shin, Joong-Ho;Chung, Won-Jee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.587-591
    • /
    • 2003
  • This study develops a neural network for solving optimization problems. Hopfield network has been used for such problems, but it frequently gives abnormal solutions or non-optimal solutions. Moreover, it takes much time for solving a solution. To overcome such disadvantages, this study adopts a neural network whose output nodes change with a small value at every evolution, and the proposed neural network is applied to solve ALB (Assembly Line Balancing) problems . Given a precedence diagram and a required number of workstations, an ALB problem is solved while achieving even distribution of workload among workstations. Here, the workload variance is used as the index of workload deviation, and is reflected to an energy function. The simulation results show that the proposed neural network yields good results for solving ALB problems with high success rate and fast execution time.

  • PDF

Mobile Ad Hoc Network에서 시스템 보안 기법에 관한 연구 (The Study of System Security Technique for Mobile Ad Hoc Network)

  • 양환석
    • 디지털콘텐츠학회 논문지
    • /
    • 제9권1호
    • /
    • pp.33-39
    • /
    • 2008
  • Ad Hoc Network는 인프라스트럭처 기반의 네트워크가 아니고 노드들이 분포되어 있기 때문에 공격을 받기가 쉽다. 침입탐지시스템은 다른 노드들의 신뢰 수준을 감지하고 노드의 로컬 보안에 대한 검사와 감시 능력을 제공한다. 본 논문에서는 침입 탐지를 하는데 오버헤드를 줄이기 위해 클러스터링 기법을 적용하였다. 그리고 노드들 간의 신뢰도를 측정하기 위해 클러스터 헤드가 멤버 노드로부터 받은 신뢰 정보와 자신의 정보를 조합하여 다른 노드의 신뢰도를 평가한다. 이렇게 함으로써 네트워크내의 노드들의 대한 인증을 정확하게 수행할 수 있게 되어 안전한 데이터 전송을 제공하게 된다.

  • PDF

Effects of Social Media Utilization on Labor Union Social Capital in South Korea

  • Lee, Ji-Heon;Jung, Hoe-Kyung
    • International journal of advanced smart convergence
    • /
    • 제6권2호
    • /
    • pp.34-50
    • /
    • 2017
  • This study delved into the effects of labor union members' social media utilization for the formation of labor union social capital. Specifically, this study aimed to identify the effects of labor union-related social media use and participation on the labor union's social capital formation through quantitative and qualitative research. It set up trust, network, and participation as social capital components and as dependent variables. Network, in particular, was divided into bonding and bridging aspect. There is the correlation between labor union-related social media use and the formation of labor union social capital. As participation in the group type social media operated by a labor union becomes more active, evaluation on labor union social capital throughout trust, network, and participation is higher. Especially, the correlation between bonding network and bridging network was high. This proves that a labor union's bond enhancement does not result in the labor union's selfishness, but it can build a cooperative system with an external network.

네트워크 보안성 측정방법에 관한 연구 (A Study on Method for Network Security Measurement)

  • 성경
    • 한국항행학회논문지
    • /
    • 제11권1호
    • /
    • pp.79-86
    • /
    • 2007
  • 정보기술의 급격한 발전과 함께 정보보호 분야에서 다양하고 복잡한 제품 및 서비스가 등장하게 되었다. 본 연구에서는 다양하고 복잡한 네트워크 보안성과 보안성능부분에 초점을 맞추어 네트워크 보안성을 평가하기 위해 필요한 평가 시스템들을 추출하고 이들 각각을 평가할 수 있는 체크리스트와 각 시스템들이 네트워크 보안성에 얼마만큼 기여하는지를 결정하여 네트워크 보안성을 평가할 수 있는 방법을 제시하였다. 또한 네트워크 보안성능을 평가할 수 있는 평가 모델과 테스트 시에 필요한 테스트 시나리오를 제시하였다.

  • PDF