• Title/Summary/Keyword: network operator

Search Result 392, Processing Time 0.025 seconds

Development of a Packet-Switched Public computer Communication Network -PART 1: KORNET Overview and Development of Network Management Center (Packet Switching에 의한 공중 Computer 통신망 개발 연구 -제1부: Kornet 개요 및 NMC 개발)

  • 은종관;이경근
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.6
    • /
    • pp.103-113
    • /
    • 1985
  • This is the first part of the four-part paper describing the development of a packet-switched computer network named the KORNET In this paper, we present the overview of the KORNET, and discuss various aspects on the development of the netwo management center (NMC). The NMC acts as a nerve center of the network, performing such functions as network monitoring, subscriber and network management and routing manage-ment using operator dialogues. In the implementation of the NMC, we have developed various application softwares that include operator interface, primary/srcondary pan, session layer and packet level adaptor. As for packet, link and physical level protocols, we have modified the XODIAC X.25 originally developed by Data General, Inc. All the net-work protocols we have developed comply completely with the CCITT recommendations.

  • PDF

Game Theoretic Model for Radio Channel Sharing between MNO and MVNO (MNO와 MVNO 사이의 무선 채널 공유를 위한 게임이론적 모델)

  • Park, Jae-Sung;Kim, Beom-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.4
    • /
    • pp.312-316
    • /
    • 2010
  • In this paper, we propose a game theoretic channel sharing model that allocates resources of a base station between MNO(Mobile Network Operator) and MVNO(Mobile Virtual Network Operator) in a fair and efficient manner. Considering the input traffic loads of MNO and MVNO, the proposed model uses the bargaining game theory to allocate channel resources between MNO and MNVO. When the input loads of the carriers are asymmetric, the proposed model increases the resource utilization by allocating more channel resources to the operator with high input load. In addition, the proposed model prevents the quality of service of an operator from degrading even if the input load of the other operators increases excessively.

A Study on Efficient Business Model for Mobile Virtual Network Operator (MVNO 사업자의 경쟁력 강화를 위한 비즈니스 모델 연구)

  • Jang, Hee-Seon;Shin, Hyun-Cheul;Han, Sung-Su;Park, Gwang-Man
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.65-74
    • /
    • 2006
  • In this paper, the definition of mobile virtual network operator (MVNO), business situations of operators, regulations, and main benefits are analyzed to discuss the introduction of MVNO system in Korea. In addition to, the analytical hierarchy process (AHP) is performed to study the efficient business model for MVNO under the government's regulation. The three alternatives such as self-regulation, partial-regulation and full refutation are considered for the main criteria of competitiveness activation, investment increment, and economics.

  • PDF

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

A Common Platform for An Internal-Based Mobile Robot and Its Operator Terminal (인터넷 기반의 이동 로봇과 조종 단말기를 위한 공용 플랫폼 개발)

  • Kim, Chun-Soo;Jeon, Jae-Wook
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.252-254
    • /
    • 2004
  • This paper proposes a common platform for an internet-based mobile robot and its operator terminal. The common platform can reduce the cost and time to develop an internet-based robot and its operator terminal. The robot performs the role of a server and its terminal a client. One operator can use this terminal to make a command and this command can be sent to the robot through a wireless network. According to given commands, the robot moves a point and sends an image by using a camera or desired information by using other sensors. The information sent from the robot can help an operator to control the robot. The mobile robot consists of two modules, main module and motion module. Main module can exchange information with the operator terminal, process information, and send a command to motion module. Each application program for one internet-based mobile robot and its operator terminal will be developed to show that the same platform can be used for them. Also, it will be shown that the robot can be controlled easily by using its operator terminal.

  • PDF

Effects of Independent Operator's Company Selection Attributes on Economic and Non-Economic Satisfaction, Trust, and Recommendation in the Network Marketing Industry (네트워크 마케팅 산업에서 독립 사업자의 기업 선택 속성이 경제적 및 비경제적 만족과 신뢰, 추천의도에 미치는 영향)

  • Roh, Hyun-Sik
    • The Korean Journal of Franchise Management
    • /
    • v.10 no.1
    • /
    • pp.19-32
    • /
    • 2019
  • Purpose - Since the opening of Korea's distribution market, the domestic network marketing market has been continuing to grow. In this context, research on network marketing independent operators, which plays the most important role in the network marketing industry, is insufficient. This study was to identify the effects of Independent Operator's Company Selection Attributions on the Economic and Non-Economic Satisfaction, Trust, and Recommendation. The results will provide strategic direction, theoretical and practical implications for companies and operators in the network marketing industry. Research design, data, and methodology - In order to verify the research hypotheses, the data were collected from Independent Operators of Network marketing industry using questionnaires. The pretest was conducted from January 8 to 19, 2018, and the main survey was conducted from February 1 to 28. A total of 210 questionnaires, of which 193 copies were collected. The data were analyzed with SPSS 21.0. and AMOS 21.0. Results - The results are as follows; product competitiveness and system competitiveness have significant effects on economic satisfaction and non-economic satisfaction. Economic and non-economic satisfaction have significant effects on business trust. Economic and non-economic satisfaction did not influence recommendation intention directly, but influence it indirectly. Business trust has a significant effect on business recommendation intention. Conclusions - After starting network marketing business as an independent operator, the competitiveness of the company is meaningless, and product competitiveness and system competitiveness are important factors for economic and non-economic satisfaction. Therefore, network marketing companies and independent operators should prioritize product competitiveness and system competitiveness between business development. The findings show that trust in the business is very important for active business Recommendation to others. Therefore, network marketing firms and independent operators need to make efforts to meet economic and non-economic satisfaction, which have a significant impact on business trust.

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

GENERALIZED SYMMETRICAL SIGMOID FUNCTION ACTIVATED NEURAL NETWORK MULTIVARIATE APPROXIMATION

  • ANASTASSIOU, GEORGE A.
    • Journal of Applied and Pure Mathematics
    • /
    • v.4 no.3_4
    • /
    • pp.185-209
    • /
    • 2022
  • Here we exhibit multivariate quantitative approximations of Banach space valued continuous multivariate functions on a box or ℝN, N ∈ ℕ, by the multivariate normalized, quasi-interpolation, Kantorovich type and quadrature type neural network operators. We treat also the case of approximation by iterated operators of the last four types. These approximations are achieved by establishing multidimensional Jackson type inequalities involving the multivariate modulus of continuity of the engaged function or its high order Fréchet derivatives. Our multivariate operators are defined by using a multidimensional density function induced by the generalized symmetrical sigmoid function. The approximations are point-wise and uniform. The related feed-forward neural network is with one hidden layer.

PARAMETRIZED GUDERMANNIAN FUNCTION RELIED BANACH SPACE VALUED NEURAL NETWORK MULTIVARIATE APPROXIMATIONS

  • GEORGE A. ANASTASSIOU
    • Journal of Applied and Pure Mathematics
    • /
    • v.5 no.1_2
    • /
    • pp.69-93
    • /
    • 2023
  • Here we give multivariate quantitative approximations of Banach space valued continuous multivariate functions on a box or ℝN, N ∈ ℕ, by the multivariate normalized, quasi-interpolation, Kantorovich type and quadrature type neural network operators. We treat also the case of approximation by iterated operators of the last four types. These approximations are derived by establishing multidimensional Jackson type inequalities involving the multivariate modulus of continuity of the engaged function or its high order Fréchet derivatives. Our multivariate operators are defined by using a multidimensional density function induced by a parametrized Gudermannian sigmoid function. The approximations are pointwise and uniform. The related feed-forward neural network is with one hidden layer.

PartitionTuner: An operator scheduler for deep-learning compilers supporting multiple heterogeneous processing units

  • Misun Yu;Yongin Kwon;Jemin Lee;Jeman Park;Junmo Park;Taeho Kim
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.318-328
    • /
    • 2023
  • Recently, embedded systems, such as mobile platforms, have multiple processing units that can operate in parallel, such as centralized processing units (CPUs) and neural processing units (NPUs). We can use deep-learning compilers to generate machine code optimized for these embedded systems from a deep neural network (DNN). However, the deep-learning compilers proposed so far generate codes that sequentially execute DNN operators on a single processing unit or parallel codes for graphic processing units (GPUs). In this study, we propose PartitionTuner, an operator scheduler for deep-learning compilers that supports multiple heterogeneous PUs including CPUs and NPUs. PartitionTuner can generate an operator-scheduling plan that uses all available PUs simultaneously to minimize overall DNN inference time. Operator scheduling is based on the analysis of DNN architecture and the performance profiles of individual and group operators measured on heterogeneous processing units. By the experiments for seven DNNs, PartitionTuner generates scheduling plans that perform 5.03% better than a static type-based operator-scheduling technique for SqueezeNet. In addition, PartitionTuner outperforms recent profiling-based operator-scheduling techniques for ResNet50, ResNet18, and SqueezeNet by 7.18%, 5.36%, and 2.73%, respectively.