• 제목/요약/키워드: network scope

검색결과 330건 처리시간 0.025초

네트워크 외부성을 고려한 마케팅 채널 경쟁 분석 (Analysis of Marketing Channel Competition under Network Externality)

  • 조형래;이민호;임상규
    • 산업경영시스템학회지
    • /
    • 제40권1호
    • /
    • pp.105-113
    • /
    • 2017
  • Network externality can be defined as the effect that one user of a good or service has on the value of that product to other people. When a network externality is present, the value of a product or service is dependent on the number of others using it. There exist asymmetries in network externalities between the online and traditional offline marketing channels. Technological capabilities such as interactivity and real-time communications enable the creation of virtual communities. These user communities generate significant direct as well as indirect network externalities by creating added value through user ratings, reviews and feedback, which contributes to eliminate consumers' concern for buying products without the experience of 'touch and feel'. The offline channel offers much less scope for such community building, and consequently, almost no possibility for the creation of network externality. In this study, we analyze the effect of network externality on the competition between online and conventional offline marketing channels using game theory. To do this, we first set up a two-period game model to represent the competition between online and offline marketing channels under network externalities. Numerical analysis of the Nash equilibrium solutions of the game showed that the pricing strategies of online and offline channels heavily depend not only on the strength of network externality but on the relative efficiency of online channel. When the relative efficiency of online channel is high, the online channel can greatly benefit by the network externality. On the other hand, if the relative efficiency of online channel is low, the online channel may not benefit at all by the network externality.

네트워크도시의 이론적 검토와 동남권에의 적용 가능성에 관한 연구 (Theoretical Examination of Network cities and Application Possibility for South-East Region in Korea)

  • 권오혁
    • 한국경제지리학회지
    • /
    • 제12권3호
    • /
    • pp.277-290
    • /
    • 2009
  • 이 연구는 네트워크도시 모델의 관점에서 동남권 도시들의 연계 구조를 분석하고자 하였다. 이론적 논의에서는 네트워크도시의 특성을 검토하였으며, 이러한 관점에서 동남권 지역 도시들에 대한 적용 가능성을 고찰하였다. 사례지역 연구 결과, 동남권의 광역적 산업클러스터는 형태상으로 뿐 아니라 여타의 측면에서도 전형적인 네트워크도시의 특성을 보유하고 있는 것으로 나타났다. 특히 주요 도시들의 독립성과 상호의존성, 성장 특성은 네트워크도시의 특징을 명확히 보여준다. 동남권 도시들은 상호 독립성을 유지한 채 긴밀히 연계되어 있으며 기능적으로도 분화되어 있다. 더하여 네트워크도시의 성장성과 함께 네트워크도시 내 중소 도시들의 성장도 두드러지게 나타났다. 이러한 도시간 연계는 지역 산업의 경쟁력을 지지하고 있는 것으로 사료된다. 동남권 지역의 산업경쟁력을 향상시키기 위해서는 산업 및 도시연계 구조에 부합하는 광역적 대응이 필요할 것이다.

  • PDF

V5.2 링크 식별 절차의 신뢰성 향상 방안 (Improvement of Reliability in V5.2 Link Identification Procedure)

  • 이충돈;김영화방효찬최승욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 추계종합학술대회 논문집
    • /
    • pp.249-252
    • /
    • 1998
  • ETSI(European Telecommunications Standards Institute) 300 34701, ITU-T(International Telecommunication Union) G.965 recommended PSTN, CONTROL, LINK CONTROL, BCC, PROTECTION protocols on V-Interfaces. But it is possible to occur misalignment between LE(Local Exchange) and AN(Access Network), especially in link identification procedure because there isn't any comment about V5.2 system management. In this paper we propose S/W guard timer to improve reliability in V5.2 link identification procedure in scope of Recommendation.

  • PDF

새로운 CAD/CAM 블록의사용 : PICN and RNC (Novel CAD/CAM hybrid blocks: PICN and RNC)

  • 고경호
    • 대한치과의사협회지
    • /
    • 제56권3호
    • /
    • pp.167-174
    • /
    • 2018
  • The development of dental materials has widened the scope of materials by changes in processing methods. CAD/CAM processing enables the use of zirconia as a dental material. Recent esthetic materials development has been made. For aesthetic purposes, a block for CAD/CAM processing by mixing polymer and ceramic materials are fabricated. However there is no guideline of how these materials should be used in actual clinical practice. Mechanical properties, wear and clinical studies were reviewed.

  • PDF

최적규모의 변전소 집중원방감시제어(SCADA) 시스템 구성 (The configuration of optimal structure for substation SCADA system)

  • 이용해;남태현
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1988년도 한국자동제어학술회의논문집(국내학술편); 한국전력공사연수원, 서울; 21-22 Oct. 1988
    • /
    • pp.678-682
    • /
    • 1988
  • Current substation SCADA system has only one control center where two or three operaters monitor and control more than 40 substations spreaded far and wide. The scope of this system is too wide to cope with the concurrent multiple accidents in electric network by the typhoon and large mow. This paper describes the method to organize the optimal structure of substation SCADA system using remote console and small scale control center.

  • PDF

A STUDY ON THE OPTIMAZATION OF CONSTRUCTION MANAGEMENT BY USING A DESIGN STRUCTURE MATRIX

  • Nobuyuki Suzuki;Aketo Suzuki
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.383-388
    • /
    • 2005
  • In the construction industry, complex works are carried out with significant resources under non-linear circumstances where clear concepts of project management could be of benefit to all parties and personnel involved. In this paper, we define the optimum project management configuration for construction management by using DSM (Design Structure Matrix). Furthermore DSM can be visualized as a network model, and then Graph Theory provides us the numerical results.

  • PDF

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

ITU Access Network의 기능적 모형에 근거한 이동망의 가입자 접속 부문 정립에 관한 연구 (A Study on Concept of the Mobile Access Part based on the ITU's Access Network Functional Model)

  • 김문수
    • 한국통신학회논문지
    • /
    • 제28권1A호
    • /
    • pp.17-24
    • /
    • 2003
  • Access Network은 대부분의 정보통신망에서 가장 중요한 요소라 할 수 있다. 또한 최종 이용자에서 직접 연결되는 부문으로 가장 많은 투자 재원이 요구되며, 최근에는 광대역의 매우 다양한 접속 기술이 개발 보급되고 있는 상황이다. 가입자의 이동성에 따른, 그리고 무선 전파 자원과 유선 교환 및 전송망을 이용한다는 복합적 특성으로 인하여 기존 유선의 가입자 망과는 다르게 이동망의 Access Network 내지는 가입자 접속부문에 대한 명확한 정의나 상세한 기능 및 범위가 정립되지 못하고 있는 상황이다 이에 본 논문은 ITU-T의 일반적인 Access Network의 기능적 모델을 참조하여 IS 95 A/B 및 cdma2000-1X 이동통신기술 표준의 음성 서비스를 위한 CDMA 기지국 시스템, 기지국 제어 시스템, 이동교환시스템 등의 하위시스템의 특성과 기능을 고찰하여 보다 체계적이고, 기능적 관점에서의 가입자 접속부문에 대한 대안적 정의를 제시한다.

CIM을 위한 Mini-MAP 네트워크 접속장치의 구현에 관한 연구 (A Study on the Implemention of a Mini-MAP Network Interface Module for CIM)

  • 김현기;이전우;하정현;정하재;채영도
    • 전자공학회논문지B
    • /
    • 제30B권10호
    • /
    • pp.59-68
    • /
    • 1993
  • This paper describes implemation of 'General-purpose ETRI MAP interface module' (GEM) for Mini-MAP network. GEM operates as a Mini-MAP node in our FA system. To communicate between GEM and programmable devices(PD) such as PLC and CNC, serial communication is used. Application programs of a MiNi-MAP host system control and monitor programmable devices via GEM. GEM is implemented and tested on the basis of the MAP 3.0. TBC in the Nini-MAP board performs the function of the MAC sublayer. The LLC sublayer is implemented according to the specification of Class 3 that includes Type 1 and 3. And the MMS services are designed within the scope of implementation class MAP3. All the softwares are implemented under the real-time multitask OS for real-time application of the Mini-MAP and they are loaded into PROMs at the network board of GEM. We tested the LLC functions to make use of a protocol analyzer for the token-passing protocol. Also the MMS conformance test was carried out by exchanging primitives between GEM and a MMS product that had already passed the conformance test. Therefore GEM is proposed as a network tool of Computer Integrated Manufacturing (CIM) to integrate PDs which don't support MAP functions.

  • PDF

항공통신 네트워크에서 보안구조 및 모델 (Security Architecture and Model in Aeronautical Communication Network)

  • 홍진근
    • 한국산학기술학회논문지
    • /
    • 제10권1호
    • /
    • pp.122-127
    • /
    • 2009
  • 본 본 논문은 항공 교통 체계에서 가장 중요하게 고려되는 안전한 항공체계에 대한 연구를 중심으로 보안구조를 검토하고 보안모델을 제시하였다. 분석된 내용은 항공서비스 분야 관련 보안기술을 기반으로 국제적인 기술 동향과 함께 국내의 항공체계에 대한 보안모델을 다루고 있다. 항공통신 네트워크의 보안 프레임워크에서는 항공과 지상 데이터링크 보안기술, 항공체계에 따른 보안구조를 분석하였고 U-information HUB 모델의 보안구조를 제시하였다. U-information HUB 보안구조는 항공사, 공항 네트워크, 항공기, 관련 정부기관 등과 연동범위를 포함하고 있다.