• Title/Summary/Keyword: Network Service Industry

Search Result 606, Processing Time 0.036 seconds

The Belt and Road Initiative and the US-China Trade War: Implications for Global Trade Networks (일대일로와 미·중 무역 분쟁: 글로벌 무역 네트워크에의 함의)

  • Hyun, Kisoon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.24 no.3
    • /
    • pp.243-258
    • /
    • 2021
  • By using the trade in value-added(TiVA) database and employing social network analysis, this paper analyzes changes in global trade to be triggered by the Belt and Road Initiative (BRI) and the US-China trade war. The main results are summarized as follows. First, the BRI will help maintain China's core position as the world's manufacturing hub, and will strengthen Europe's service industry capabilities within the global value chain(GVC) network. Second, the US R&D industry, US wholesale and retail industries, and Germany's automobile industry were considered the most influential industries in the GVC network during the 1995-2011 period, and will retain their status until 2049, when the US-China trade war and the BRI are reflected. Third, the increase of the number of communities shows that the BRI might spur fragmentation of the production process. Finally, community structures of inter-industry trade relations, including China's electronics industry, Germany's automobile industry, and US R&D, show important features that are related to the competiveness of each country's service industries.

Design and Implementation Middleware of the Home Network based PLC (PLC 기반의 홈 네트워크 미들웨어 설계 및 구현)

  • Jean, Byoung-Chan;Kim, Hyeock-Jin;Kim, Dong-Kyun
    • Journal of the Korea Computer Industry Society
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2008
  • Home network service, which is a part of Ubiquitous application service provides remote control and monitoring service, other appliance and peristaltic service, security service of appliance is connected to network in the home. <중략> By using gateway which is implemented undertook control of each function and using main server for controlling and monitoring of appliance, implemented system which is able to control the appliance in home from inter/outside is implemented.

  • PDF

Strategy for Sustainable Growth Through Forming Network in Mobile Service Industry: Focusing on Stock-Swapping M&A Strategy of YelloMobile (모바일 서비스 산업에서의 네트워크 형성을 통한 성장 전략: 옐로모바일의 지분교환방식 인수합병을 중심으로)

  • Lee, Saerom;Jahng, Jungjoo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.1
    • /
    • pp.109-119
    • /
    • 2016
  • Due to the fact that it is relatively easy to transfer technology between application developers or content providers, low entry barrier in the business causes fierce competition among the venture companies in mobile service industry. Our study examines a sustainable strategies to operate a business for venture companies that are in a highly competitive technology-intensive industry. In this paper, we examine how venture firms created a network and brought synergy effects, using network theory. Korean venture firm, YelloMobile, uses unique strategies of merger and acquisition through the method of swapping equity and thereby establishing network. We contribute to expand network theory by examining three elements of network: such as network structure, network governance mechanisms, and network contents.

  • PDF

Performance Evaluation of Service-Aware Optical Transport System

  • Youn, Ji-Wook;Yu, Jea-Hoon;Yoo, Tae-Whan
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.241-247
    • /
    • 2010
  • We propose and experimentally demonstrate a service-aware optical transport system. The proposed service-aware optical transport system makes a flow based on service type and priority of traffic. The generated flow is mapped to a corresponding sub-${\lambda}$ for transport over an optical network. Using sub-${\lambda}$ provided by the centralized control plane, we could effectively provide quality-of-service guaranteed Ethernet service and best-effort service simultaneously in a single link. The committed information rate (CIR) traffic and best-effort traffic are assigned to different sub-${\lambda}s$. The bandwidth of the CIR traffic is guaranteed without being affected by violation traffic because the bandwidth is managed per each sub-${\lambda}$. The failure detection time and restoration time from a link failure is measured to be about 60 ${\mu}s$ and 22 ms, respectively, in the ring network. The measured restoration time is much smaller than the 50 ms industry requirement for real-time services. The fast restoration time allows the proposed service-aware optical transport system to offer high availability and reliability which is a requirement for transport networks.

Recommendation Technique using Social Network in Internet of Things Environment (사물인터넷 환경에서 소셜 네트워크를 기반으로 한 정보 추천 기법)

  • Kim, Sungrim;Kwon, Joonhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.47-57
    • /
    • 2015
  • Recently, Internet of Things (IoT) have become popular for research and development in many areas. IoT makes a new intelligent network between things, between things and persons, and between persons themselves. Social network service technology is in its infancy, but, it has many benefits. Adjacent users in a social network tend to trust each other more than random pairs of users in the network. In this paper, we propose recommendation technique using social network in Internet of Things environment. We study previous researches about information recommendation, IoT, and social IoT. We proposed SIoT_P(Social IoT Prediction) using social relationships and item-based collaborative filtering. Also, we proposed SR(Social Relationship) using four social relationships (Ownership Object Relationship, Co-Location Object Relationship, Social Object Relationship, Parental Object Relationship). We describe a recommendation scenario using our proposed method.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

An Empirical Study on the Relative Effectiveness of 3.5 Generation Mobile Service Adoption and Use Intention (3.5세대 이동통신서비스 가입의도 및 이용의도의 상대적 영향력에 관한 연구)

  • Lee, Jun Yub;Kim, Chul Hyun;Byun, Daniel
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.249-262
    • /
    • 2009
  • HSDPA(High Speed Downlink Packet Access) service has begun nationwide network service since the year 2007 and will be leading technology in mobile service technologies in domestic. But the ARPU(Average Revenue Per Use) from HSDPA has not increased, despite of increasing in subscribers with HSDPA service. It's important to understand why the incresing subscriber with hsdp didn't cause the increasing of its usage. The purpose of this study is to examine factors affecting the intention to adopt and to use HSDPA which refer to the new 3.5 generation communication service, and we are to analyze the relation between the two intentions based on previous studies about technology acceptance.

Network Analysis of Technology Convergence on Decentralized Energy by Using Patent Information : Focused on Daegu City Area (특허정보를 활용한 분산형 에너지 기술융합 네트워크 분석 : 대구지역을 중심으로)

  • Han, Jang-Hyup;Na, Jung-Gyu;Kim, Chae-Bogk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.3
    • /
    • pp.156-169
    • /
    • 2016
  • The objective of this study is to investigate patent trends of Daegu city which tries to introduce environment friendly energy and to develop new technology or new industry sprung from technology convergence on smart decentralized energy technology and other technologies. After applying network analysis to corresponding groups of technology or industry convergence, strategy for future energy convergence industry is provided. Patent data applied in Daegu city area are used to obtain research goal. The technology which contains several IPC codes (IPC Co-occurrence) is considered as a convergence technology. Path finder network analysis is used for visualizing and grouping by using IPC codes. The analysis results categorized 13 groups in energy convergence industry and reclassified them into 3 cluster groups (Smart Energy Product Production Technology Group, Smart Energy Convergence Supply Technology Group, Smart Energy Indirect Application Technology Group) considering the technical characteristics and policy direction. Also, energy industry has evolved rapidly by technological convergence with other industries. Especially, it has been converged with IT industry, and there is a trend that energy industry will be converged with service industry and manufacturing industry such as textile, automobile parts, mechanics, and logistics by employing infrastructure as well as network. Based on the research results on core patent technology, convergence technology and inter-industry analysis, the direction of core technology research and development as well as evolution on decentralized energy industry is identified. By using research design and methodology in this study, the trend of convergence technology is investigated based on objective data (patent data). Above all, we can easily confirm the core technology in the local industry by analyzing the industrial competitiveness in the macro level. Based on this, we can identify convergence industry and technology by performing the technological convergence analysis in the micro level.

The Embeddedness of Foreign Firms in Korea : The Case of Business Service Activities (사업서비스 분야 외국인직접투자기업의 한국내 뿌리내림)

  • 이병민
    • Journal of the Korean Geographical Society
    • /
    • v.36 no.4
    • /
    • pp.402-417
    • /
    • 2001
  • This study empahsized the nature of spatial patterns, characteristics and embeddeness of foreign business service firms in Korea utilizing questionnaire survey and interview data. Foreign business services firms are active in forming interfirm networks with clients and supply firms in Korea for widening the market share in Korea. But a low proportion of foreign firms is engaged in academies-industry linkages, government organizations, research institutes, and trade associations. Knowledge transfer and interaction also shows low level of network and the regional development of foreign firms is still in the process of developing, not quite embedded yet. Policy guidances and instituional supports are very essential to strenthen interfirm network and collective learning process of foreing firms in Korea lather than mechanical accumulation of investments. Thus, regional foreign direct investment policy should be targeted towards the incrementation of the potential of foreign firms as a knowledge-intensive industry.

  • PDF