• Title/Summary/Keyword: network

Search Result 59,057, Processing Time 0.063 seconds

Social Network Analysis to Analyze the Purchase Behavior Of Churning Customers and Loyal Customers (사회 네트워크 분석을 이용한 충성고객과 이탈고객의 구매 특성 비교 연구)

  • Kim, Jae-Kyeong;Choi, Il-Young;Kim, Hyea-Kyeong;Kim, Nam-Hee
    • Korean Management Science Review
    • /
    • v.26 no.1
    • /
    • pp.183-196
    • /
    • 2009
  • Customer retention has been a pressing issue for companies to get and maintain the loyal customers in the competing environment. Lots of researchers make effort to seek the characteristics of the churning customers and the loyal customers using the data mining techniques such as decision tree. However, such existing researches don't consider relationships among customers. Social network analysis has been used to search relationships among social entities such as genetics network, traffic network, organization network and so on. In this study, a customer network is proposed to investigate the differences of network characteristics of churning customers and loyal customers. The customer networks are constructed by analyzing the real purchase data collected from a Korean cosmetic provider. We investigated whether the churning customers and the loyal customers have different degree centralities and densities of the customer networks. In addition, we compared products purchased by the churning customers and those by the loyal customers. Our data analysis results indicate that degree centrality and density of the churning customer network are higher than those of the loyal customer network, and the various products are purchased by churning customers rather than by the loyal customers. We expect that the suggested social network analysis is used to as a complementary analysis methodology with existing statistical analysis and data mining analysis.

Design and Implementation for Construction Method of Management Network in MPLS-TP Network (MPLS-TP 망에서 관리 망 구축 방안에 대한 설계 및 구현)

  • Moon, Sungnam;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.59-65
    • /
    • 2015
  • To build a flexible network than traditional transport network, the carrier ethernet technology is emerging in network industry recently and MPLS-TP technologies are being applied as a major standard technology for the carrier ethernet. However, network management technologies required to handle equipment installed in MPLS-TP network are not clear. This paper propose an efficient method to build a management network automatically without any additional configuration when network equipments are installed in MPLS-TP network. The proposed scheme reduce cost required for both equipment installation and network maintenance by minimizing configuration procedures of connecting management system with network. We evaluated the effectiveness of the proposed scheme by applying the scheme to a real MPLS-TP equipment.

Active Distribution Network Expansion Planning Considering Distributed Generation Integration and Network Reconfiguration

  • Xing, Haijun;Hong, Shaoyun;Sun, Xin
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.540-549
    • /
    • 2018
  • This paper proposes the method of active distribution network expansion planning considering distributed generation integration and distribution network reconfiguration. The distribution network reconfiguration is taken as the expansion planning alternative with zero investment cost of the branches. During the process of the reconfiguration in expansion planning, all the branches are taken as the alternative branches. The objective is to minimize the total costs of the distribution network in the planning period. The expansion alternatives such as active management, new lines, new substations, substation expansion and Distributed Generation (DG) installation are considered. Distribution network reconfiguration is a complex mixed-integer nonlinear programming problem, with integration of DGs and active managements, the active distribution network expansion planning considering distribution network reconfiguration becomes much more complex. This paper converts the dual-level expansion model to Second-Order Cone Programming (SOCP) model, which can be solved with commercial solver GUROBI. The proposed model and method are tested on the modified IEEE 33-bus system and Portugal 54-bus system.

A Study on the Factors Influencing the Number of Network Organizations, Network Continuity and Service Continuity of Community Child Centers - Focusing on Chonbuk Province - (지역아동센터의 네트워크 연계기관수 및 네트워크 지속성, 서비스 지속성 영향요인 연구 - 전북지역을 중심으로 -)

  • Kim, Hyeon Suk;Seo, Yoon
    • Korean Journal of Child Studies
    • /
    • v.34 no.6
    • /
    • pp.159-175
    • /
    • 2013
  • The purpose of this study was to explore how the number of network organizations, network continuity and service continuity of community child centers were affected by the charge factors, organizational factors and environmental factors of community child centers. To better understand this, we researched 107 community child centers in Chonbuk Province. The key results are as follows. The interpersonal connections of the charge factors had a strong effect on the number of network organizations, but organizational factors and environmental factors appeared to have no effect on the number of network organizations. The operational type(religious group), organizational support level of the organizational factors and public-private cooperation, regular consultative group operation(no) of the environmental factors appeared to have an effect on the level of network continuity. The region(local), regular consultative group operation(yes) and public-private cooperation of the environmental factors appeared to have an effect on the level of service continuity. It was hoped that the results would enable us to explore how factors related to a network had an effect on the service continuity, the number of network organizations and clients referral network continuity, and they appeared to have an effect on the service continuity.

Localized Algorithm to Improve Connectivity and Topological Resilience of Multi-hop Wireless Networks

  • Kim, Tae-Hoon;Tipper, David;Krishnamurthy, Prashant
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.2
    • /
    • pp.69-81
    • /
    • 2013
  • Maintaining connectivity is essential in multi-hop wireless networks since the network topology cannot be pre-determined due to mobility and environmental effects. To maintain the connectivity, a critical point in the network topology should be identified where the critical point is the link or node that partitions the network when it fails. In this paper, we propose a new critical point identification algorithm and also present numerical results that compare the critical points of the network and H-hop sub-network illustrating how effectively sub-network information can detect the network-wide critical points. Then, we propose two localized topological control resilient schemes that can be applied to both global and local H-hop sub-network critical points to improve the network connectivity and the network resilience. Numerical studies to evaluate the proposed schemes under node and link failure network conditions show that our proposed resilient schemes increase the probability of the network being connected in variety of link and node failure conditions.

Network Coding-based Maximum Lifetime Algorithm for Sliding Window in WSNs

  • Sun, Baolin;Gui, Chao;Song, Ying;Chen, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1298-1310
    • /
    • 2019
  • Network coding (NC) is a promising technology that can improve available bandwidth and packet throughput in wireless sensor networks (WSNs). Sliding window is an improved technology of NC, which is a supplement of TCP/IP technology and can improve data throughput and network lifetime on WSNs. This paper proposes a network coding-based maximum lifetime algorithm for sliding window in WSNs (NC-MLSW) which improves the throughput and network lifetime in WSN. The packets on the source node are sent on the WSNs. The intermediate node encodes the received original packet and forwards the newly encoded packet to the next node. Finally, the destination node decodes the received encoded data packet and recovers the original packet. The performance of the NC-MLSW algorithm is studied using NS2 simulation software and the network packet throughput, network lifetime and data packet loss rate were evaluated. The simulations experiment results show that the NC-MLSW algorithm can obviously improve the network packet throughput and network lifetime.

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour;Maha Abdelhaq;Njoud Alghamdi;Maram Alneami;Tahani Alrsheedi;Salma Aldghbasi;Rahaf Almalki;Sarah Alqahtani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.111-119
    • /
    • 2023
  • Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

Assessing Convolutional Neural Network based Malicious Network Traffic Detection Methods (컨볼루션 신경망 기반 유해 네트워크 트래픽 탐지 기법 평가)

  • Yeom, Sungwoong;Nguyen, Van-Quyet;Kim, Kyungbaek
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.20-29
    • /
    • 2019
  • Recently, various machine learning based traffic classification methods are focused on detecting malicious network traffic. In this paper, convolutional neural network based malicious network traffic classification method is introduced and its performance is evaluated. In order to utilize the convolutional neural network which is excellent in analyzing images, a image transform method from important information of network traffic to a standardized image is proposed, and the transformed images are used as learning input of a CNN network traffic classifier. By using the real network traffic dataset, the proposed image transform method and CNN based network traffic classification method are evaluated. Especially, under various configurations of CNN, the performance of the proposed method is evaluated.

Analysis of IT security threats and countermeasures in a network-separated environment (망분리 환경에서의 IT 보안 위협 및 대응 방법 분석)

  • Kim, chang Seok;Kim, Jong-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.638-640
    • /
    • 2021
  • The network separation environment is a network security design system that separates the internal business network from the external Internet network. It separates the internal business network from the external Internet by separating it into a business network that is not connected to the network to which the Internet is connected. The network is separated, and it is a relatively secure network structure compared to Danilman in terms of security. However, there are frequent cases of infecting internal networks by using vulnerabilities in internal systems, network devices, and security devices. In this paper, we analyze the vulnerability of IT security threats in such a network isolation environment and provide technical measures for effective security monitoring.

  • PDF

Analysis on the Increasing Marginal Revenue of the Network Economy

  • Yang, Jian
    • The Journal of Economics, Marketing and Management
    • /
    • v.6 no.3
    • /
    • pp.10-13
    • /
    • 2018
  • Purpose - On the basis of discussing the network economy concept and the commentary of the marginal revenue decreasing of traditional economic theory, The concept of network economy has just been put forward in recent years. The reason why such a concept appears is that the information technology, marked by computer network, plays an increasingly important role in economic activities. Some people define network economy as an economic form based on network technology and human capital. this paper points out network economy existing the marginal revenue increasing and analyzes the reasons that influencing the marginal revenue increasing. Research design, data, methodology - The network economy has fundamentally changed the traditional economic laws. The economic basis of industrial society is the law of incremental marginal cost, which reflects the socialization of high cost in industrial society. Results - As the number of network members increases, the value of the network increases explosively, and the value increases attract more members to join, resulting in more returns. Conclusion - In conclusion, network economy has changed many aspects of traditional economy, resulting in decreasing marginal cost, decreasing transaction cost in and out of enterprise organizations, and making the effect of increasing scale compensation more prominent. This is of great significance to the information construction in China.