• Title/Summary/Keyword: networking

Search Result 3,312, Processing Time 0.037 seconds

A Study on Types and Performance of Major Retail Banks Automated Service Channel Strategy (자동화기기를 이용한 국내 시중은행의 서비스채널 전략의 유형 및 유효성 분석에 관한 연구)

  • 변지석;이동규
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.14 no.2
    • /
    • pp.139-139
    • /
    • 1989
  • Recently banking industry is experiencing fundamental changes by advancement of information technology. The traditional role of branches is rapidly being replaced with new electronic service channels such as ATM. Phone and PC for they are time-saving and convenient. Automated service channel strategy of retail banks is divided into two different ways, automation and networking. Automation is mainly focused on cost reduction related to the branch operation, while networking is on expansion of customer contact points. Strategic types of banks can be defined from a matrix model where the positioning is determined by the extent of automation and networking. The effectiveness of automated channel strategy depends on how separate strategic types show their performance. Results for deposits and productivity will be given to verify the economic performance of each strategic type.

Route Optimization Scheme for Mobile Content Sources in Content Centric Networking

  • Lee, Jihoon;Rhee, Eugene
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.22-27
    • /
    • 2020
  • Content centric networking (CCN) is regarded as promising internet architecture because it can provide network efficiency in terms of bandwidth consumption by separating contents from a specific network location and decrease network congestion events. However, the application of a CCN does not widely consider the side effects of mobile devices, particularly mobile content sources. For content source mobility, a full routing update is required. Therefore, in this study, a route optimization scheme is proposed for mobile content sources in a CCN environment to provide low communication overhead, short download time, and low resource consumption. The proposed scheme establishes a direct path between content requesters and a mobile content source for the exchange of interest and data packets using interest-piggybacked data packets. Based on the inherent CCN naming characteristics, the content source does not know the name prefix of the content consumer, and thus the proposed optimized CCN scheme utilizes the content router in the home domain of the content source.

An Efficient Rate Control Protocol for Wireless Sensor Network Handling Diverse Traffic

  • Monowar, Muhammad Mostafa;Rahman, Md. Obaidur;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10a
    • /
    • pp.130-131
    • /
    • 2007
  • Wireless Sensor Network typically incorporates diverse applications within the same network. A sensor node may have multiple sensors i.e. light, temperature, seismic etc with different transmission characteristics. Each application has different characteristics and requirements in terms of transmission rates, bandwidth, packet loss and delay demands may be initiated towards the sink. In this paper we propose Heterogeneous Traffic Oriented Rate Control Protocol (HTRCP) which ensures efficient rate control for diverse applications according to the priority specified by the sink. Moreover. HTRCP ensures the node priority based hop by hop dynamic rate adjustment for high link utilization.

  • PDF

Critical Factors Affecting Consumer Acceptance of Online Health Communication: An Application of Service Quality Models

  • Lee, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.3
    • /
    • pp.85-94
    • /
    • 2017
  • The paper examines critical factors affecting consumer behavioral intentions in accepting online health communication through social networking sites. Unlike recent research under this topic, the paper assimilates some components of service quality dimensions and consumer behavior theories. The paper employs factor analysis and structural equation modelling analysis with latent variables to identify critical factors from the survey data collected from Korean consumers. The results of the study identifies three major constructs: consumer needs for health information, the perceived value of tangible attributes of health information providers, and the perceived value of intangible attributes of health information providers. The results show that consumer needs for health information and the tangible and intangible attributes of health information providers should be considered as important antecedents of accepting online health communication through social networking sites. The findings suggest that the success of online health communication via social networking sites largely depends on the tangible and intangible attributes of health information providers.

An Overview of Content Poisoning in NDN: Attacks, Countermeasures, and Direction

  • Im, Hyeonseung;Kim, Dohyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2904-2918
    • /
    • 2020
  • With a huge demand for replicated content on the Internet, a new networking paradigm called information-centric networking (ICN) has been introduced for efficient content dissemination. In ICN, named content is distributed over the network cache and it is accessed by name instead of a location identifier. These aspects allow users to retrieve content from any of the nodes having replicas, and consequently 1) network resources are more efficiently utilized by avoiding redundant transmission and 2) more scalable services are provided by distributing server loads. However, in-network caching in ICN brings about a new type of security issues, called content poisoning attacks, where fabricated content is located in the network cache and interferes with the normal behavior of the system. In this paper, we look into the problems of content poisoning in ICN and discuss security architectures against them. In particular, we reconsider the state-of-the-art schemes from the perspective of feasibility, and propose a practical security architecture.

Distributed and Weighted Clustering based on d-Hop Dominating Set for Vehicular Networks

  • Shi, Yan;Xu, Xiang;Lu, Changkai;Chen, Shanzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1661-1678
    • /
    • 2016
  • Clustering is one of the key technologies in vehicular networks. Constructing and maintaining stable clusters is a challenging task in high mobility environments. DWCM (Distributed and Weighted Clustering based on Mobility Metrics) is proposed in this paper based on the d-hop dominating set of the network. Each vehicle is assigned a priority that describes the cluster relationship. The cluster structure is determined according to the d-hop dominating set, where the vehicles in the d-hop dominating set act as the cluster head nodes. In addition, cluster maintenance handles the cluster structure changes caused by node mobility. The rationality of the proposed algorithm is proven. Simulation results in the NS-2 and VanetMobiSim integrated environment demonstrate the performance advantages.

Heresiological Labeling in Ecumenical Networking from the Ninth to Thirteenth Centuries : The Byzantine Oikoumene Reconsidered

  • KUSABU, Hisatsugu
    • Asian review of World Histories
    • /
    • v.4 no.2
    • /
    • pp.207-229
    • /
    • 2016
  • Apart from its Greco-Roman and Christian connotations, considering its continuous influence in the Byzantine world, the oikoumene should be seen as a geo-political as well as socio-religious concept of networking and unity in popular thought and local narratives. This paper argues that "ecumenical" thought survived after Late Antiquity and through the Byzantine era in the Orthodox transportation infrastructure of people and information. It also provides a review of the circulation of heresiological "labels" in the middle to late Byzantine eras. In the Mediterranean, routes, transportation vehicles, and any media supported intelligent networking in the oikoumene. People in the oikoumene could access foreign teachings or stories from outsiders or "barbarians" of different faiths. Constantinopolitan intellectuals coined and issued labels for heretics, such as the Bogomils, Paulicians, and Massalians, and constructed a narrative of the heretical contamination from the center of the oikoumene. Heresiologists collected the information used in creating these heresy titles from far-flung places in all directions from Constantinople, and then exported the labels, which were spread using the transportation network of the Byzantine oikoumene.

Dynamic Load-Balancing Algorithm Incorporating Flow Distributions and Service Levels for an AOPS Node

  • Zhang, Fuding;Zhou, Xu;Sun, Xiaohan
    • Journal of the Optical Society of Korea
    • /
    • v.18 no.5
    • /
    • pp.466-471
    • /
    • 2014
  • An asynchronous optical packet-switching (AOPS) node with load-balancing capability can achieve better performance in reducing the high packet-loss ratio (PLR) and time delay caused by unbalanced traffic. This paper proposes a novel dynamic load-balancing algorithm for an AOPS node with limited buffer and without wavelength converters, and considering the data flow distribution and service levels. By calculating the occupancy state of the output ports, load state of the input ports, and priorities for data flow, the traffic is balanced accordingly. Simulations demonstrate that asynchronous variant data packets and output traffic can be automatically balanced according to service levels and the data flow distribution. A PLR of less than 0.01% can be achieved, as well as an average time delay of less than 0.46 ns.

A Qualitative Study on the Wild Goose Mother's Everyday Life, Family Relationship and Social Networking (기러기엄마로 살기': 일상생활의 구성 그리고 관계 맺기)

  • Kim, Seon-Mi
    • Journal of Family Resource Management and Policy Review
    • /
    • v.13 no.1
    • /
    • pp.41-59
    • /
    • 2009
  • The purpose of this ethnography is to describe and analyze the wild-goose mother's everyday life, her family relationships, and her social networking. Thirteen mothers from New York, California, and Texas, U.S.A., were interviewed with an unstructured questionnaire. Their residency and everyday schedules are arranged around the children's educational conditions. They have experienced difficult relationships with Korean American immigrants, Korean students, other wild-goose mothers, and Americans. They have failed to develop their social capital effectively due to the language barrier and a cultural capital deficiency. As a kind of family strategy, this separation sometimes strengthens the spousal relationship, preventing divorce, but usually weakens the emotional ties and quality of communication between husband and wife. The acculturation gap between the mother and her children may cause the mother to become alienated and exacerbate the generational conflict.

  • PDF

A Study on the Network System for Healthy Familes Center (건강가정지원센터의 네트워크 구축)

  • Song, Hye-Rim;Kim, So-Young
    • Journal of Family Resource Management and Policy Review
    • /
    • v.11 no.2
    • /
    • pp.95-110
    • /
    • 2007
  • This study proposed the necessities and framework of a network system for the Healthy Families Center. Focused on the community network, this study analyzed the related cases of networking. Based on this analysis, this study suggested an effective scheme for the network system : 1. We need to choose the relevant agencies in the context of community environment. 2. It has to be defined according to the strengths and the weaknesses of the Healthy Families Center. 3. For building an effective and long-term networking system, the specific services in which the related agencies are interested in on the community life survey have to be developed and promoted.

  • PDF