• Title/Summary/Keyword: Value Exchange Network

Search Result 66, Processing Time 0.024 seconds

Multi-Sided Networks of Digital Platform Ecosystem: The Case of Ride-Hailing in Indonesia

  • Mohammad Nabil Almunawar;Muhammad Anshari
    • Asia pacific journal of information systems
    • /
    • v.30 no.4
    • /
    • pp.808-831
    • /
    • 2020
  • The business world has been undergoing a digital transformation. The adoption of multi-sided digital platform across the world has sped up this transformation. Multi-sided digital platforms create value by mediating interactions and transactions of distinct groups of users. A platform and its stakeholders need to be considered as a business ecosystem. Elements or components in the ecosystem exchange values and together form a network of exchange values. The objective of this paper is to construct a framework for crafting and observing digital business ecosystems. The foundation theories used to construct the framework are transaction cost economy (TCE), multi-sided markets, and value network. This paper uses Go-Jek, a growing ride-hailing platform from Indonesia, as a case to discuss how the framework works in mapping Go-Jek's digital business ecosystem, and then explain its expansion strategy. This paper has both theoretical and managerial contributions. It provides a formal definition of digital business ecosystems as a network of exchange values. The framework does not only help studies the existing business ecosystems but also can be used to craft a new business ecosystem. It can also be used to study value exchanges within the ecosystem, assessing or crafting ecosystem expansion strategies.

Implementation of Exchange Rate Forecasting Neural Network Using Heterogeneous Computing (이기종 컴퓨팅을 활용한 환율 예측 뉴럴 네트워크 구현)

  • Han, Seong Hyeon;Lee, Kwang Yeob
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.11
    • /
    • pp.71-79
    • /
    • 2017
  • In this paper, we implemented the exchange rate forecasting neural network using heterogeneous computing. Exchange rate forecasting requires a large amount of data. We used a neural network that could leverage this data accordingly. Neural networks are largely divided into two processes: learning and verification. Learning took advantage of the CPU. For verification, RTL written in Verilog HDL was run on FPGA. The structure of the neural network has four input neurons, four hidden neurons, and one output neuron. The input neurons used the US $ 1, Japanese 100 Yen, EU 1 Euro, and UK £ 1. The input neurons predicted a Canadian dollar value of $ 1. The order of predicting the exchange rate is input, normalization, fixed-point conversion, neural network forward, floating-point conversion, denormalization, and outputting. As a result of forecasting the exchange rate in November 2016, there was an error amount between 0.9 won and 9.13 won. If we increase the number of neurons by adding data other than the exchange rate, it is expected that more precise exchange rate prediction will be possible.

An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine (IPsec System에서 IKEv2 프로토콜 엔진의 구현 및 성능 평가)

  • Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.35-46
    • /
    • 2006
  • The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system was pointed out the faults of scalability, speed, efficiency and stability. In this research, we tried to resolve those faults, and implemented the newly designed IKEv2 protocol in the IPsec test bed system. In the trend of network expansion, the current Internet Key Exchange protocol has a limitation of network scalability, so we implemented the new Internet Key Exchange protocol as a recommendation of RFC proposal, so as to resolve the fault of the key exchange complexity and the speed of authentication process. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency with using the preexistence state value in negotiation phase.

Analysis on the Exchange Value of Traffic Rights between Korea and China Strategic Route: Focusing On Incheon International Airport (한중 전략노선 운수권 교환가치 분석: 인천국제공항을 중심으로)

  • Choi, Yu-Jin;Park, Jung-Hee
    • Korea Trade Review
    • /
    • v.44 no.1
    • /
    • pp.159-175
    • /
    • 2019
  • In China, the government has aggressively led the construction and expansion of airports across China. Upon this opportunity, "Korea-China" network is expected to expand. Therefore this study tried to deduce implications for Incheon International Airport by expansion of "Korea-China" traffic rights. As a result of analyzing the exchange values of traffic rights on the "Incheon~Beijing/Chengdu" routes, it was found that there is a concern that Chinese airlines could make inroads into Korean airline's market. In both routes, Korean airline's market share and passenger demand increased while the sales decreased after expanding traffic rights. On the other hand, Chinese airlines showed an increase in sales and a larger passenger growth than Korean airlines. Therefore it is necessary for the government to expand the traffic rights through detailed route value analysis.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

Timestamp based Key Exchange Protocol for Satellite Access Network (위성환경에서의 Timestamp 기반 키 교환 프로토콜)

  • Song, In-A;Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.2
    • /
    • pp.162-170
    • /
    • 2016
  • The key exchange protocols are very important to provide the secure communication in broadband satellite access network. However key exchange protocol of ETSI(European Telecommunications Standards Institute) is vulnerable to man-in-the-middle-attack by using Diffie-Hellman algorithm. And the key exchange protocol using certification is not useful in satellite environment. We propose the key exchange protocol using Timestamp which have the resistant to man-in-the-middle-attack. Proposed protocol is able to prevent the man-in-the-middle-attack by calculated time value. Also showing experiment results, we prove that proposed protocol improve memory usage, communication amount and calculation amount than other protocols.

MNE's Ability to Mitigate the FX Exposure: Subsidiary Network and Pass-through Ability

  • Cho, Hyejin
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.6 no.4
    • /
    • pp.1-12
    • /
    • 2018
  • Purpose - This paper tests the effect of the structure of manufacturing and marketing subsidiary network on FX exposure of Korean MNEs. Furthermore, the moderating effect of pass-through ability on the relationship between the subsidiary network and FX exposure is explored. Research design and methodology - This study utilizes a sample of 309 Korean MNEs constructed from database offered by KOTRA and KIS-VALUE. Results - As operational flexibility arising from having operations in multiple locations provides an option for firms to tackle FX exposure, greater breadth of manufacturing subsidiary network reduces FX exposure, and greater depth increases FX exposure. However, both the breadth and depth of marketing subsidiary network decrease FX exposure due to the firm's higher level of market presence and knowledge to devise an appropriate marketing strategy that can buffer adverse exchange rate movement. Such an effect is intensified when MNE's have FX exposure pass-through ability stemming from differentiated good. Conclusions - Empirical findings suggest that types and structure of Korean MNEs' foreign subsidiary network are closely related to the level of FX exposure they are experiencing. Also, they can utilize marketing subsidiary network more efficiently when having a higher R&D intensity.

Communication Delay Properties in Performance Model of Profibus Token Passing Protocol (Profibus 토큰 패싱 프로토콜 성능 모델에서의 전송 지연 특성)

  • Lee, Kyung-Chang;Kim, Hyun-Hee;Lee, Seok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.12
    • /
    • pp.1055-1064
    • /
    • 2003
  • In many automated systems, such as manufacturing systems and process plants, a fieldbus is a very important component for the exchange of various and sometimes crucial information. Some of the information has a tendency to rapidly lose its value as time elapses after its creation. Such information or data is called real-time data that includes sensor values and control commands. In order to deliver these data in time, the fieldbus network should be tailored to have short delay with respect to the individual time limit of various data. Fine-tuning the network for a given traffic requires the knowledge on the relationship between the protocol parameters such as timer values and the performance measure such as network delay. This paper presents a mathematical performance model to calculate communication delays of the Profibus-FMS network when the timer value and the traffic characteristics are given.

History of The Legal Developments of Corporations in Saudi Arabia

  • Alzhrani, Abdulrahman AA
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.420-424
    • /
    • 2022
  • The Arab Automotive Company was the first corporation in Saudi Arabia and was founded in 1928. Since then, the number of Saudi corporations had increased. In 1985, Tadawul (The Saudi Stock Exchange ) was instituted under the supervision of the Saudi Arabian Monetary Authority (SAMA) and the base value of the index was 1000. This decision came as a response to accelerated growth in the number of Saudi corporations which had increased during the 1970s as the Saudi's economy developed.

Collective Betweenness Centrality in Networks

  • Gombojav, Gantulga;Purevsuren, Dalaijargal;Sengee, Nyamlkhagva
    • Journal of Multimedia Information System
    • /
    • v.9 no.2
    • /
    • pp.121-126
    • /
    • 2022
  • The shortest path betweenness value of a node quantifies the amount of information passing through the node when all the pairs of nodes in the network exchange information in full capacity measured by the number of the shortest paths between the pairs assuming that the information travels in the shortest paths. It is calculated as the cumulative of the fractions of the number of shortest paths between the node pairs over how many of them actually pass through the node of interest. It's possible for a node to have zero or underrated betweenness value while sitting just next to the giant flow of information. These nodes may have a significant influence on the network when the normal flow of information is disrupted. We propose a betweenness centrality measure called collective betweenness that takes into account the surroundings of a node. We will compare our measure with other centrality metrics and show some applications of it.