• Title/Summary/Keyword: International Network

Search Result 4,112, Processing Time 0.039 seconds

The Role of Electronic Arbitration in the Settlement of Disputes of International Trade Contracts

  • ETESAM ALABD S. ALWHEEBE;ABDULLAH MUSHKUS ALMUTAIRI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.29-37
    • /
    • 2024
  • Resorting to electronic arbitration to resolve disputes in international trade contracts is the most important reflection of technological progress on the reality of international commercial arbitration. Electronic is a modern image of traditional arbitration, and this type of arbitration provides many advantages that are not provided by any legal system for resolving disputes, including speed, effectiveness and lower costs. What will this development produce? Through technical progress in the means of communication, it has become conceivable that international trade dealers agree to arbitration via electronic means of communication, followed by the completion of the arbitration process via the Internet, leading to the issuance of the electronic arbitration award in an electronic manner as well.

Software Engineering Meets Network Engineering: Conceptual Model for Events Monitoring and Logging

  • Al-Fedaghi, Sabah;Behbehani, Bader
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.9-20
    • /
    • 2021
  • Abstraction applied in computer networking hides network details behind a well-defined representation by building a model that captures an essential aspect of the network system. Two current methods of representation are available, one based on graph theory, where a network node is reduced to a point in a graph, and the other the use of non-methodological iconic depictions such as human heads, walls, towers or computer racks. In this paper, we adopt an abstract representation methodology, the thinging machine (TM), proposed in software engineering to model computer networks. TM defines a single coherent network architecture and topology that is constituted from only five generic actions with two types of arrows. Without loss of generality, this paper applies TM to model the area of network monitoring in packet-mode transmission. Complex network documents are difficult to maintain and are not guaranteed to mirror actual situations. Network monitoring is constant monitoring for and alerting of malfunctions, failures, stoppages or suspicious activities in a network system. Current monitoring systems are built on ad hoc descriptions that lack systemization. The TM model of monitoring presents a theoretical foundation integrated with events and behavior descriptions. To investigate TM modeling's feasibility, we apply it to an existing computer network in a Kuwaiti enterprise to create an integrated network system that includes hardware, software and communication facilities. The final specifications point to TM modeling's viability in the computer networking field.

Study on Revitalization Plan for Cheongju International Airport: Focusing on Airport Facilities, Access Transportation, and Flight Network (청주국제공항 활성화 방안 연구: 공항시설, 접근교통 및 운항 네트워크를 중심으로 )

  • Wontae Park;Dong-Kyun Im
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.32 no.1
    • /
    • pp.71-78
    • /
    • 2024
  • In this study, we reviewed access transportation, operating companies, and airport infrastructure to revitalize Cheongju International Airport. Regarding access transportation infrastructure, it is necessary to promote a railway network connecting the metropolitan inland line and the central inland region. In addition, active administrative support from local governments is required to ensure smooth progress in railway and highway infrastructure linkage projects, such as the Osong Connecting Line and Chungbuk Line, high-speed rail network promotion, and expansion of the Chungbuk Eastern Axis Expressway and Central Expressway. Regarding operator access infrastructure, continuous efforts are required to add and attract airlines based at Cheongju International Airport. Regarding airport infrastructure, the Cheongju International Airport runway needs complete resurfacing due to its deterioration. Domestic passenger capacity has exceeded 6.5%, and considering the increase in import and export of high value-added goods in the North Chungcheong region, it is necessary to build and expand passenger terminals and cargo terminals. Cheongju International Airport's runway does not have enough runway length to operate large and ultra-large aircraft, so if it is extended from the existing 2,744m to 456m to 3,200m, several benefits can be expected in terms of revitalizing Cheongju Airport, such as route expansion.

Development of engine room monitoring system complied with IEC 61162-3 international standards for ship's network (IEC 61162-3 선박네트워크 국제표준 적합 기관실모니터링시스템 개발)

  • Kim, Jong Hyun;Yu, Yung Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.37 no.2
    • /
    • pp.183-191
    • /
    • 2013
  • International network standards for SOLAS ship are composed of instrument network that controls and monitors machine in real time, shipboard control network that controls and monitors system through computer by human and telecommunication network that connects ship and shore. This paper describes development of stack for instrument network protocol complied with NMEA 2000 that is IEC 61162-3 international standards for SOLAS ship and also that of engine room monitoring system using the developed stack. Developed engine room monitoring system is certified by NMEA according to standards that require to pass about 1,600 test procedures.

Analysis of Port Connectivity Network Change on the Effect of Liner Shipping Alliance Restructuring Using SNA (SNA를 활용한 정기선사의 전략적 제휴 재편에 따른 항만 네트워크 변화 분석)

  • Kim, Dae-Hyeon;Kim, Sang-Youl;Jang, Hyun-Mi
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.267-283
    • /
    • 2019
  • This study analyzes how the port connectivity network has changed with the restructuring of the liner shipping alliance and explores the impact of these changes on network characteristics using social network analysis (SNA). While due to economies of scale, the scale of ports and liner shipping has expanded, the goal of shipping companies has changed to achieve cost-effectiveness due to the diseconomies of scale. Such changes in the environment have greatly affected ports according to the strategies of major liner alliances, and port centrality has shifted in response to restructuring in strategic alliances. This research confirmed that port centrality has continuously changed, and the reason for this phenomenon was analyzed through the derived main network centrality indices. This finding provides significant implications for port authorities and terminal operators to consider different perspectives when planning for sustainable growth and management.

The Impact of Corporate Capabilities on Management Performance : Focusing on the Korean Distribution Industry during the COVID-19 Pandemic

  • Kil-Yong SEONG;Byoung-Goo KIM;Chun-Su LEE
    • Journal of Distribution Science
    • /
    • v.22 no.3
    • /
    • pp.105-112
    • /
    • 2024
  • Purpose: This study analyzed the relationship between corporate capacity and management performance in the Korean distribution industry during the COVID-19 pandemic. Research design, data and methodology: The data for this study used the 2021 KOTRA GCL Test Data, and multiple regression analysis was performed using SPSS 26. As corporate competency, human capital and related capital of intellectual capital theory were utilized, and the global network level of social network theory was also utilized. As an additional analysis, corporate characteristics factors were used. Results: First, the level of global mindset of human capital acted as a positive factor in management performance, and the level of professional manpower did not achieve significant results. Second, related capital acted as a positive factor in corporate performance. Third, from the perspective of social network theory, the global network level of companies acted as a positive factor in management performance. Finally, the relationship between corporate characteristics and management performance was marginally significant. Conclusions: In order to improve the business performance of a company in a market shock such as the COVID-19 pandemic, it is required to strengthen the level of network construction with customers and increase the level of intellectual capital that a company has.

A study on the Network Intermediary's Liability for Developing Electronic commerce (전자상거래활성화(電子商去來活性化)를 위한 네트워크 정보중개자(情報仲介者)의 책임(責任)에 관한 연구(硏究))

  • Bae, Jung-Han;Kim, Cheol-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.911-932
    • /
    • 2000
  • On increasing a computer network, internet usage, it has been created for Electronic Commerce to place a cyberspace. This cyberspace is limited to apply for contemporary usage and law because it have distinct characters now. Therefore, it is predicted that dispute will be happened in these cyberspaces. This article examines the disputes cases related the computer network intermediary's liability and studies a reasonable improvement ways for developing Electronic Commerce. It has been limited to apply the usage and law the network which can be happened a dispute and has not involved usage and law using computer network yet. Therefore, we should make a self-regulation each other who use network and improved the usage and law involved the network through these methods. We should also establish Alternative Dispute Resolution and try to settle dispute in the cyberspace

  • PDF

Optimum Logical Topology for WDM Networks

  • Nittayawan, Jittima;Runggeratigul, Suwan
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1371-1374
    • /
    • 2002
  • This paper compares four network con-figurations for using as the logical topology in multi- hop wavelength division multiplexing (WDM) networks. The regular network configurations studied in this paper axe ShuffleNet, de Bruijn graph, hypercube, and Man-hattan street network. Instead of using the weight mean hop distance of node placement problem for comparing optimum logical topology, we introduce a new objective function that includes h and the network cost. It can be seen that the network cost strongly depends on the logical topology selected for the implementation of the network. The objective of this paper is to find an optimum logical topology for WDM networks that gives low as well as low network cost.

  • PDF

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.