• Title/Summary/Keyword: Network level

Search Result 4,729, Processing Time 0.036 seconds

Adoption and Diffusion Speed of New Technology with Network Externality in a Two-level Supply Chain : An Approach to Relative Factors in Buyer-Supplier Relationships (네트워크 외부효과를 고려한 두 단계 공급체인에서의 신기술 도입과 확산속도에 대한 연구 : 구매자-공급자간 관계 요인에 대한 모형)

  • Choi, Daeheon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.38 no.3
    • /
    • pp.51-70
    • /
    • 2013
  • This paper develops a model to predict the adoption and level of usage of network technology in a two-level supply chain with buyer-supplier relationships. A firm's adoption of a new technology depends not only on its own beliefs of the new technology's costs and benefits, but also on the adoption decisions of other firms in the supply chain. A model first analyzes an individual supplier's decision about a new technology adoption considering with multiple suppliers and buyers. Individual suppliers' decisions are aggregated with a population model to project how new technology diffuses across the supply chain and examine the pattern of diffusion process. This study found that as more firms adopt in initial periods, the total amount of information to the potential adopters in the population increases, and then the number of firms persuaded by the information increases as the process moves up the distribution of adoption process. We consider three factors influencing the diffusion speed of the new technology in a supply chain network : mean benefits, cost sharing, and information provision. This study examines how such factors affect the reduction of threshold levels, which implies that reductions in threshold levels have an aggregate effect by accelerating the rate of adoption. In particular, we explore relationship factors available in practice in a buyer-supplier relationship and numerically examines how these relationship factors contribute to increase the diffusion speed of the technology in a two-level supply chain.

Flood Forecasting Study using Neural Network Theory and Hydraulic Routing (신경망 이론과 수리학적 홍수추적에 의한 홍수예측에 관한 연구)

  • Jee, Hong Kee;Choo, Yeon Moon
    • Journal of Korea Water Resources Association
    • /
    • v.47 no.2
    • /
    • pp.207-221
    • /
    • 2014
  • Recently, due to global warming, climate change has affected short time concentrated local rain and unexpected heavy rain which is increasingly causing life and property damage. Therefore, this paper studies the characteristic of localized heavy rain and flash flood in Nakdong basin study area by applying Data Mining method to predict flood and constructing water level predicting model. For the verification neural network from Data Mining method and hydraulic flood routing was used for flood from July 1989 to September 1999 in Nakdong point and Iseon point was used to compare flood level change between observed water level and SAM (Slope Area Method). In this research, the study area was divided into three cases in which each point's flood discharge, water level was considered to construct the model for hydraulic flood routing and neural network based on artificial intelligence which can be made from simple input data used for comparison analysis and comparison evaluation according to actual water level and from the model.

Accuracy Analysis of Network-RTK(VRS) for Real Time Kinematic Positioning (실시간 이동 측위 적용을 위한 Network-RTK(VRS) 정확도 분석)

  • No, Sun-Joon;Han, Joong-Hee;Kwon, Jay Hyoun
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.4
    • /
    • pp.389-396
    • /
    • 2012
  • As the demand on the precise positioning for the moving objects has been increased in the various industry field, many studies have been conducted to analyze real time kinematic technique and its practical usage. The main purpose of this study is to analyze the possibility of Network-RTK(VRS) in real-time kinematic positioning. So, the accuracy analysis has been conducted by comparing the Network-RTK(VRS) position with respect to the RTK position. As a result, Network-RTK(VRS) based on kinematic positioning has centimeter level of RMS in the ideal environment compared to RTK positioning. However, when the integer ambiguities was lost, the accuracy of Network-RTK was meter level. At that time, the quality value has been changed dramatically and shows big correlation with accuracy. When the position and height quality values are within 0.1m, the RMS of the horizontal and vertical position appears better than 10cm and 20cm, respectively. However, if the quality value is over 0.1m, the RMS increases to larger than a meter. Therefore, it is recommended to check the quality value when conducting Network-RTK(VRS) kinematic positioning to get the centimeter level accuracy.

Study On Generating Compact Network RTK Corrections Considering Ambiguity Level Adjustment Among Reference Station Networks for Constructing Infrastructure of Land Vehicle (육상교통 인프라 구축을 위한 다중 네트워크 간 미지정수 수준 조정이 고려된 Compact Network PTK 보정정보 생성기법 연구)

  • Song, June-Sol;Park, Byung-Woon;Kee, Chang-Don
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.404-412
    • /
    • 2013
  • Network RTK is widely used especially for static applications so far, however, the demand for high accuracy positioning for kinetic users such as land vehicles is growing for safety and convenience reasons. Kinematic users move along the roads and the network where they receive corrections can be changed. Compact Network RTK corrections should keep consistency while network change. In this paper, we introduced a method of generating Compact Network RTK corrections considering network ambiguity level adjustment by formulation of corrections. We verified the proposed method for reference station networks across whole country. We also generated Compact Network RTK corrections using simulation and real GPS data from reference stations in South Korea and evaluated performance of users. As a result, the discontinuity between corrections from two networks reduced to 0.25 cycle from several cycles. And user could achieve less than 8 cm (2DRMS) horizontal position accuracy continuously regardless of network change.

Priority-Based Resource Allocation Algorithm for Virtual Network (가상 네트워크를 위한 우선순위 기반 자원 할당 알고리즘)

  • Kim, Hak-Suh;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.303-310
    • /
    • 2016
  • Due to the ossification of the Internet, it is difficult to accommodate variety services. One of the efficient solution to this problem is network virtualization. It allows multiple parallel virtual networks to run on the shared physical infrastructure. It needs new resource allocation mechanism to share efficient physical resources. In this paper, we present efficient bandwidth allocation algorithm for virtual network request with high service priority. Our proposed algorithm can withdraw allocated bandwidth from low-level priority virtual network and maintain low-level virtual network service. We evaluated the performance of our proposed algorithm using simulation and found the improvement of approximately 8% acceptance rate.

Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links (고속 인터넷 백본 링크상에서의 트래픽 측정에 의한 네트워크 공격 징후 탐지 방법)

  • Roh Byeong-hee
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.23-33
    • /
    • 2004
  • In this paper, we propose a novel traffic measurement based detection of network attack symptoms on high speed Internet backbone links. In order to do so, we characterize the traffic patterns from the normal and the network attacks appeared on Internet backbone links, and we derive two efficient measures for representing the network attack symptoms at aggregate traffic level. The two measures are the power spectrum and the ratio of packet counts to traffic volume of the aggregate traffic. And, we propose a new methodology to detect networks attack symptoms by measuring those traffic measures. Experimental results show that the proposed scheme can detect the network attack symptoms very exactly and quickly. Unlike existing methods based on Individual packets or flows, since the proposed method is operated on the aggregate traffic level. the computational complexity can be significantly reduced and applicable to high speed Internet backbone links.

  • PDF

A study on Packet Losses for Guaranteering Response Time of Service (서비스 응답시간 보장을 위한 패킷 손실에 관한 연구)

  • Kim Tae-Kyung;Seo Hee-Seok;Kim Hee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.201-208
    • /
    • 2005
  • To guarantee the quality of service for user request, we should consider various kinds of things. The important thing of QoS is that response time of service is transparently suggested 'to network users. We can know the response time of service using the information of network latency, system latency, and software component latency, In this paper, we carried out the modeling of network latency and analyzed the effects of packets loss to the network latency, Also, we showed the effectiveness of modeling using the NS-2. This research can help to provide the effective methods in case of SLA(Service Level Agreement) agreement between service provider and user.

  • PDF

A congestion control scheme estimating global channel busy ratio in VANETs

  • Kim, Tae-won;Jung, Jae-il;Lee, Joo-young
    • Journal of IKEEE
    • /
    • v.21 no.2
    • /
    • pp.115-122
    • /
    • 2017
  • In vehicular safety service, every vehicle broadcasts Basic Safety Message (BSM) periodically to inform neighbor vehicles of host vehicle information. However, this can cause network congestion in a region that is crowded with vehicles resulting in a reduction in the message delivery ratio and an increase in the end-to-end delay. Therefore, it could destabilize the vehicular safety service system. In this paper, in order to improve the congestion control and to consider the hidden node problem, we propose a congestion control scheme using entire network congestion level estimation combined with transmission power control, data rate control and time slot based transmission control algorithm. The performance of this scheme is evaluated using a Qualnet network simulator. The simulation result shows that our scheme mitigates network congestion in heavy traffic cases and enhances network capacity in light traffic cases, so that packet error rate is perfectly within 10% and entire network load level is maintained within 60~70%. Thus, it can be concluded that the proposed congestion control scheme has quite good performance.

Energy-Connectivity Tradeoff through Topology Control in Wireless Ad Hoc Networks

  • Xu, Mengmeng;Yang, Qinghai;Kwak, Kyung Sup
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.30-40
    • /
    • 2017
  • In this study, we investigate topology control as a means of obtaining the best possible compromise between the conflicting requirements of reducing energy consumption and improving network connectivity. A topology design algorithm capable of producing network topologies that minimize energy consumption under a minimum-connectivity constraint is presented. To this end, we define a new topology metric, called connectivity efficiency, which is a function of both algebraic connectivity and the transmit power level. Based on this metric, links that require a high transmit power but only contribute to a small fraction of the network connectivity are chosen to be removed. A connectivity-efficiency-based topology control (CETC) algorithm then assigns a transmit power level to each node. The network topology derived by the proposed CETC heuristic algorithm is shown to attain a better tradeoff between energy consumption and network connectivity than existing algorithms. Simulation results demonstrate the efficiency of the CECT algorithm.

SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area

  • Liu, Xuefeng;Quan, Hanyu;Zhang, Yuqing;Zhao, Qianqian;Liu, Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1229-1248
    • /
    • 2016
  • With the feature of convenience and low cost, remote healthcare monitoring (RHM) has been extensively used in modern disease management to improve the quality of life. Due to the privacy of health data, it is of great importance to implement RHM based on a secure and dependable network. However, the network connectivity of existing RHM systems is unreliable in disaster area because of the unforeseeable damage to the communication infrastructure. To design a secure RHM system in disaster area, this paper presents a Secure VANET-Assisted Remote Healthcare Monitoring System (SVC) by utilizing the unique "store-carry-forward" transmission mode of vehicular ad hoc network (VANET). To improve the network performance, the VANET in SVC is designed to be a two-level network consisting of two kinds of vehicles. Specially, an innovative two-level key management model by mixing certificate-based cryptography and ID-based cryptography is customized to manage the trust of vehicles. In addition, the strong privacy of the health information including context privacy is taken into account in our scheme by combining searchable public-key encryption and broadcast techniques. Finally, comprehensive security and performance analysis demonstrate the scheme is secure and efficient.