• Title/Summary/Keyword: Private Label

Search Result 58, Processing Time 0.033 seconds

A Study on the Distribution Platform Business based on Shinsegae Group

  • KIM, So Hyung
    • Journal of Distribution Science
    • /
    • v.19 no.4
    • /
    • pp.15-24
    • /
    • 2021
  • Purpose: This study deals with the strategic direction of platform business in the 4th Industrial Revolution. In a changing industrial environment, companies that leverage platform businesses can benefit greatly. Platform business is especially important in the distribution industry, so a variety of case analysis studies are needed. In this study, the Shinsegae Group, a platform leader, was selected and case-analyzed to learn more about the growth and development of platform businesses in the distribution industry. Research design, data and Methodology: Various literature research on platform business and secondary data of the distribution industry were reviewed. In this study, additionally, the interview method was used to discuss the development of more platform businesses through the Shinsegae and E-mart related departments. Results: This study investigated the development process and success of distribution platforms. First, a successful platform business builds multi distribution channels. Second, a successful distribution platform business attracts many participants. Third, a successful distribution develops various private label products to build a sustainable platform system. Conclusions and Implications: This study could provide a good example for the growth of companies with distribution platform business. Further implications were discussed.

QoS Support Mechanisms in Mobile MPLS VPN (이동 MPLS VPN에서의 QoS 지원 방안)

  • Lee Young-seok;Yang Hae-kwon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.65-73
    • /
    • 2006
  • Network based VPN(Virtual Private Network) using MPLS(Multiprotocol Label Switching) technology, called PE(Provider Edge router) based MPLS VPN, is regarded as a good solution for intranets or ext3nets because of the low cost and the flexibility of the service provision. In this paper, we describe a mechanism that allows the VPN users to move from one site to another site of the VPN network based on the BGP-E MPLS technology. This mechanism is designed for PE(Provider Edge) routers of the backbone network. PE routers connected to the VPN sites establish a new MPLS path to the mobile node after they detect movement of the mobile VPN node. The new location may belong to the same VPN or to different VPN. We desisted VPN management and control functions of the PE routers in order to interface with the Mobile IP protocol and support the QoS mechanism. The pilot implementation and performance measurement were carried out on a simulation using COVERS tool.

Network based MPLS VPN using BGP-E for Mobility Support (이동서비스를 지원하는 BGP-E 방식 MPLS VPN의 설계 및 구현)

  • Lee, Young-Seok;Lim, Hyoung-Taek;Choi, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.927-937
    • /
    • 2003
  • Network based VPN(Virtual Private Network) using MPLS(Multiprotocol Label Switching) technology is regarded as a good solution for intranets or extranets because of the low cost and the flexibility of the service provision. In this paper, we describea mechanism that allows the VPN users to move from one site to another site of the VPN network based on the BGP-E MPLS technology. This mechanism is designed for and implemented on PE(Provider Edge) routers of the backbone network. PE routers connected to the VPN sites establish a new MPLS path to the mobile node after they detect movement of the mobile VPN node. The new location may belong to the same VPN or to different VPN. We designed VPN management and control functions of the PE routers in order to interface with the Mobile IP protocol. The pilot implementation and performance measurement were carried out on a testbed.

The Implement of small inter-networking by using MPLS (MPLS 이용한 small inter-networking 구현)

  • 송창안;하윤식;김동현;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.145-148
    • /
    • 2003
  • MPLS is one of the most important technics for the growth of the next generation network. MPLS is a kind of third layers switching technics which is combined with second layers switching speed and third layers routing ability. And a simple label switching paradigm which uses short and fired lengths of lables is available in MPLS, too. Like this way, MPLS not only can keep its competitive price but also keep its merits such as second layers speed, third layers expansion, and compatibility with existing protocols. That means the traffic engineering, VPN, QoS ran be supported easily in MPLS. In this thesis, therefore, we will implement a small inter-networking based on MPLS and analyze its performance.

  • PDF

A study on the comparison of VPN with Dedicated Line Network on security (보안측면에서의 가상사설망과 전용회선망의 비교 연구)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.107-122
    • /
    • 2008
  • Communication is be classified into public network and private network. VPN is made by integrating the circuit cost reduction of public network and the reliable security support of public network. This paper analyzes the IPSec using three layer tunneling, MPLS(Multi Protocol Label Switching) integrating 2 layer switching and 3 layer routing techniques and dedicated line from the viewpoint of security. In conclusion, VPN is better than dedicated network line in cost and security. If IPSec VPN is compared with MPLS VPN, MPLS VPN is more excellent than IPSec VPN in safe data transmission, cost, QoS and management.

  • PDF

Multi-Label Image Classification on Long-tailed Optical Coherence Tomography Dataset (긴꼬리 분포의 광간섭 단층촬영 데이터세트에 대한 다중 레이블 이미지 분류)

  • Bui, Phuoc-Nguyen;Jung, Kyunghee;Le, Duc-Tai;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.541-543
    • /
    • 2022
  • In recent years, retinal disorders have become a serious health concern. Retinal disorders develop slowly and without obvious signs. To avoid vision deterioration, early detection and treatment are critical. Optical coherence tomography (OCT) is a non-invasive and non-contact medical imaging technique used to acquire informative and high-resolution image of retinal area and underlying layers. Disease signs are difficult to detect because OCT images have many areas which are not related to any disease. In this paper, we present a deep learning-based method to perform multi-label classification on a long-tailed OCT dataset. Our method first extracts the region of interest and then performs the classification task. We achieve 98% accuracy, 92% sensitivity, and 99% specificity on our private OCT dataset. Using the heatmap generated from trained convolutional neural network, our method is more robust and explainable than previous approaches because it focuses on areas that contain disease signs.

Network Management for the GSMP Open Interface in the MPLS (MPLS의 GSMP 개방형 인터페이스를 위한 망 관리)

  • Cha, Yeong-Uk;Kim, Jin-Nyeon;Kim, Chun-Hui
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.227-234
    • /
    • 2002
  • MPLS which integrates routing of layer 3 and switching of layer 2, enables support for fast forwarding, traffic engineering and virtual private network services. GSMP is open interface protocol between a label switch and a controller, and it provides connection, configuration, event, performance management and synchronization. In the GSMP open interface, the functions of network management can be located either in the controller or in the label switch. To simplify the label switch and enhance the efficiency of resources, we adopt the network management model, in which the SNMP agent is located in the controller and is interworked with the GSMP. We presented the interworking scenrios between the GSMP and the network management of MPLS. We implemented the controller to verify the realization of our adopted network management model, and measured the connection setup delay of the provisioned connection.

A Possible Path per Link CBR Algorithm for Interference Avoidance in MPLS Networks

  • Sa-Ngiamsak, Wisitsak;Varakulsiripunth, Ruttikorn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.772-776
    • /
    • 2004
  • This paper proposes an interference avoidance approach for Constraint-Based Routing (CBR) algorithm in the Multi-Protocol Label Switching (MPLS) network. The MPLS network itself has a capability of integrating among any layer-3 protocols and any layer-2 protocols of the OSI model. It is based on the label switching technology, which is fast and flexible switching technique using pre-defined Label Switching Paths (LSPs). The MPLS network is a solution for the Traffic Engineering(TE), Quality of Service (QoS), Virtual Private Network (VPN), and Constraint-Based Routing (CBR) issues. According to the MPLS CBR, routing performance requirements are capability for on-line routing, high network throughput, high network utilization, high network scalability, fast rerouting performance, low percentage of call-setup request blocking, and low calculation complexity. There are many previously proposed algorithms such as minimum hop (MH) algorithm, widest shortest path (WSP) algorithm, and minimum interference routing algorithm (MIRA). The MIRA algorithm is currently seemed to be the best solution for the MPLS routing problem in case of selecting a path with minimum interference level. It achieves lower call-setup request blocking, lower interference level, higher network utilization and higher network throughput. However, it suffers from routing calculation complexity which makes it difficult to real task implementation. In this paper, there are three objectives for routing algorithm design, which are minimizing interference levels with other source-destination node pairs, minimizing resource usage by selecting a minimum hop path first, and reducing calculation complexity. The proposed CBR algorithm is based on power factor calculation of total amount of possible path per link and the residual bandwidth in the network. A path with high power factor should be considered as minimum interference path and should be selected for path setup. With the proposed algorithm, all of the three objectives are attained and the approach of selection of a high power factor path could minimize interference level among all source-destination node pairs. The approach of selection of a shortest path from many equal power factor paths approach could minimize the usage of network resource. Then the network has higher resource reservation for future call-setup request. Moreover, the calculation of possible path per link (or interference level indicator) is run only whenever the network topology has been changed. Hence, this approach could reduce routing calculation complexity. The simulation results show that the proposed algorithm has good performance over high network utilization, low call-setup blocking percentage and low routing computation complexity.

  • PDF

Non-Profiling Analysis Attacks on PQC Standardization Algorithm CRYSTALS-KYBER and Countermeasures (PQC 표준화 알고리즘 CRYSTALS-KYBER에 대한 비프로파일링 분석 공격 및 대응 방안)

  • Jang, Sechang;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1045-1057
    • /
    • 2022
  • Recently, the National Institute of Standards and Technology (NIST) announced four cryptographic algorithms as a standard candidates of Post-Quantum Cryptography (PQC). In this paper, we show that private key can be exposed by a non-profiling-based power analysis attack such as Correlation Power Analysis (CPA) and Differential Deep Learning Analysis (DDLA) on CRYSTALS-KYBER algorithm, which is decided as a standard in the PKE/KEM field. As a result of experiments, it was successful in recovering the linear polynomial coefficient of the private key. Furthermore, the private key can be sufficiently recovered with a 13.0 Normalized Maximum Margin (NMM) value when Hamming Weight of intermediate values is used as a label in DDLA. In addition, these non-profiling attacks can be prevented by applying countermeasures that randomly divides the ciphertext during the decryption process and randomizes the starting point of the coefficient-wise multiplication operation.

An study on purchasing activity of Private Brand clothing in large discount store (소비자들의 대형마트 PB의류 구매행동에 관한 연구)

  • Kim, Young-Hwan;Kim, Pan-Jin
    • Journal of Distribution Science
    • /
    • v.6 no.1
    • /
    • pp.117-128
    • /
    • 2008
  • The purpose of the research is to furnish basic data for efficient and effective marketing by examining the correlation how a certain element effects on customer's selection behavior, when they choose private label branded clothes at the store of giant discount store like E-.mart, Home-plus, Lotte-mart and 2001 outlet. We come to the following conclusions through such procedures; What we found on this study is that main factors of decision related purchasing garment of private brand in giant discount store is based on the sales price, quality of products and needs of customer's using. Further to this, in terms of choice activity in private brand clothes, we realized the price value is depend on the resonable price with the items because nowadays most customers can be compare to other discount store around their shopping place including trend of garment and quality of products. The order of the general inclination in selection behavior of private branded garment in giant discount store is as follows; Sales price > style & trend > quality of product and substantial convenience > display and prompt buying. Judging from the conclusion of the research we noted that customer's satisfaction comes from their target price to supply substantial needs and in terms of styling of clothes should be considered current trendy compared to national brand as well.

  • PDF