• Title/Summary/Keyword: internet communications

Search Result 1,891, Processing Time 0.026 seconds

Effective Use of Internet Communication Tools in Hotel Marketing (호텔마케팅에서 인터넷 의사소통 도구의 효율적 이용방안)

  • Chung, Hyun-Young
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.10
    • /
    • pp.62-71
    • /
    • 2006
  • With the introduction of internet applications to the hotel industry hotel customers are very willing to use the electronic communication tools in their both searching information and purchasing behaviors. It is generally agreed that the internet communication tools can be a strategic one for less competitive hotels in the traditional marketing environment. This study found that there are significant differences among several classifications of hotels in the use of internet communications as a marketing tool. The study also found that there are some possibilities for local hotels to overcome the current marketing handicaps with internet communications.

  • PDF

State of the Art 3GPP M2M Communications toward Smart Grid

  • Kwon, Young-Min;Kim, Jun-Suk;Chung, Min-Young;Choo, Hyun-Seung;Lee, Tae-Jin;Kim, Mi-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.468-479
    • /
    • 2012
  • Recent advances in wireless communications and electronics has enabled the development of machine-to-machine (M2M) communications. This communication paradigm has been expected as an automated control and report solution for smart grid. The smart grid enables customers and operators to utilize the collected usage information from a large number of meters with transceivers for efficiency and safety. In this paper, we introduce architecture, requirements and challenges of M2M communications for smart grid. We extract technical issues that should be resolved in M2M communications to support the smart grid via third-generation partnership project (3GPP) cellular networks. We then present the current state of the art of research results to deal with such issues. Finally, we outline the open research issues.

Optimal Price Strategy Selection for MVNOs in Spectrum Sharing: An Evolutionary Game Approach

  • Zhao, Shasha;Zhu, Qi;Zhu, Hongbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3133-3151
    • /
    • 2012
  • The optimal price strategy selection of two bounded rational cognitive mobile virtual network operators (MVNOs) in a duopoly spectrum sharing market is investigated. The bounded rational operators dynamically compete to sell the leased spectrum to secondary users in order to maximize their profits. Meanwhile, the secondary users' heterogeneous preferences to rate and price are taken into consideration. The evolutionary game theory (EGT) is employed to model the dynamic price strategy selection of the MVNOs taking into account the response of the secondary users. The behavior dynamics and the evolutionary stable strategy (ESS) of the operators are derived via replicated dynamics. Furthermore, a reward and punishment mechanism is developed to optimize the performance of the operators. Numerical results show that the proposed evolutionary algorithm is convergent to the ESS, and the incentive mechanism increases the profits of the operators. It may provide some insight about the optimal price strategy selection for MVNOs in the next generation cognitive wireless networks.

Interference-Aware Channel Assignment Algorithm in D2D overlaying Cellular Networks

  • Zhao, Liqun;Wang, Hongpeng;Zhong, Xiaoxiong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1884-1903
    • /
    • 2019
  • Device-to-Device (D2D) communications can provide proximity based services in the future 5G cellular networks. It allows short range communication in a limited area with the advantages of power saving, high data rate and traffic offloading. However, D2D communications may reuse the licensed channels with cellular communications and potentially result in critical interferences to nearby devices. To control the interference and improve network throughput in overlaid D2D cellular networks, a novel channel assignment approach is proposed in this paper. First, we characterize the performance of devices by using Poisson point process model. Then, we convert the throughput maximization problem into an optimal spectrum allocation problem with signal to interference plus noise ratio constraints and solve it, i.e., assigning appropriate fractions of channels to cellular communications and D2D communications. In order to mitigate the interferences between D2D devices, a cluster-based multi-channel assignment algorithm is proposed. The algorithm first cluster D2D communications into clusters to reduce the problem scale. After that, a multi-channel assignment algorithm is proposed to mitigate critical interferences among nearby devices for each D2D cluster individually. The simulation analysis conforms that the proposed algorithm can greatly increase system throughput.

A new model and testing verification for evaluating the carbon efficiency of server

  • Liang Guo;Yue Wang;Yixing Zhang;Caihong Zhou;Kexin Xu;Shaopeng Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2682-2700
    • /
    • 2023
  • To cope with the risks of climate change and promote the realization of carbon peaking and carbon neutrality, this paper first comprehensively considers the policy background, technical trends and carbon reduction paths of energy conservation and emission reduction in data center server industry. Second, we propose a computing power carbon efficiency of data center server, and constructs the carbon emission per performance of server (CEPS) model. According to the model, this paper selects the mainstream data center servers for testing. The result shows that with the improvement of server performance, the total carbon emissions are rising. However, the speed of performance improvement is faster than that of carbon emission, hence the relative carbon emission per unit computing power shows a continuous decreasing trend. Moreover, there are some differences between different products, and it is calculated that the carbon emission per unit performance is 20-60KG when the service life of the server is five years.

Forecasting Internet Traffic by Using Seasonal GARCH Models

  • Kim, Sahm
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.621-624
    • /
    • 2011
  • With the rapid growth of internet traffic, accurate and reliable prediction of internet traffic has been a key issue in network management and planning. This paper proposes an autoregressive-generalized autoregressive conditional heteroscedasticity (AR-GARCH) error model for forecasting internet traffic and evaluates its performance by comparing it with seasonal autoregressive integrated moving average (ARIMA) models in terms of root mean square error (RMSE) criterion. The results indicated that the seasonal AR-GARCH models outperformed the seasonal ARIMA models in terms of forecasting accuracy with respect to the RMSE criterion.

Improved Accountable Internet Protocol Using Signature (시그니처를 이용한 향상된 Accountable 인터넷 프로토콜)

  • Park, Gi-Tae;Lee, Jae-Hwoon;Jung, Hee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.200-206
    • /
    • 2014
  • Accountable Internet Protocol (AIP) is one of the future Internet architectures to provide accountability concept by using the self-certifying address that is derived by the public key of the host. In AIP, when a host sends a packet, a domain that is located between the source and the destination hosts discards the packet in order to verify the source IP address. Therefore, performance degradation can occur due to packet discard especially when there is asymmetric route. In this paper, we propose the improved AIP mechanism to verify the source IP address without discarding the packet by including the timestamp, public key value and the signature for protecting from forfeiting the source address. Security safety of the proposed mechanism is evaluated and the proposed mechanism can provide the more robust security as well as reducing the latency due to discarding packets.