• Title/Summary/Keyword: 네크워크 분석

Search Result 73, Processing Time 0.033 seconds

Investigating the Behavior of College Students in Class Registration using Social Network Analysis (사회 네크워크 분석으로 본 수강신청 행태)

  • Lim, Sung-Min;Kim, Jinheum
    • The Korean Journal of Applied Statistics
    • /
    • v.26 no.4
    • /
    • pp.661-674
    • /
    • 2013
  • We investigate the class registration behavior of college students with data collected from the spring semester of 2012. The network originally consists of a 2-mode network between a student and class subjects. We first transform the 2-mode network into 1-mode network of students. We also subdivide it into a smaller network such as components and communities to understand the detailed behavior of students in class registration. Finally, the relationship between GPA and the centrality measures, gender, and grade of students is analyzed using a multiple regression analysis.

The Network Designs And Traffic Grooming Algorithm to Maximize the Throughput in WDM Ring Networks (WDM 링에서 트래픽 전송효율을 최대화하기 위한 네크워크 설계방법 및 트래픽 그루밍 알고리즘)

  • Yoon, Seung-Jin
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.200-207
    • /
    • 2009
  • In this paper, novel traffic gromming algorithms are proposed with a primary goal of maximize the throughput in WDM(Wavelength Division Multiplexing) ring networks. To achieve this goal, we analyze two network designs that are Lightpath Designs and Virtual Topology Designs and simulate the throughput in various traffic environments. From this methods, we propose novel traffic gromming algorithms to maximize the throughput.

  • PDF

Social Network Service how to take advantage of Social Commerce?: Focus on Distribution implications (소셜네크워크 서비스를 소셜커머스 유통시장에 어떻게 활용할 것인가?: 정책적 함의를 중심으로)

  • Kim, Koosung
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.261-269
    • /
    • 2012
  • The purpose of this study was to suggest policies that take advantage of social networking services in the field of social commerce. Presented it, in order for the concept of a social network service for the first time, were examined by four representative types of social network services, and analyzed the characteristics of each. Domestic current status and concepts presented and the addition of social commerce, and analyzed the characteristics of each type proposed six kinds. Utilizing social network services to the end, was to suggest measures that can be incorporated into the social commerce business. The results of this study suggested that the marketing implications for how social network services in the social commerce business that can be utilized in companies that will say that its worth.

Technical Trends of Optical Components for WDM-PON (WDM-PON 광부품 기술동향)

  • Jeong, J.S.;Kwon, O.K.
    • Electronics and Telecommunications Trends
    • /
    • v.27 no.1
    • /
    • pp.86-92
    • /
    • 2012
  • 스마트폰, IPTV, 클라우딩 서비스 등의 새로운 서비스 등장으로 유발된 데이터 통신량의 폭주는 초고속/대용량 차세대 액세스 네크워크 구현을 필요로 하고 있다. 본고에서는 차세대 액세스 네트워크 방식에서 가장 유력한 후보인 WDM-PON 구현을 위한 주요 광부품인 AWG, 비주입형 광송신기 광원, 주입형 광송신기 광원에 대한 발전 현황을 기술하였다. 광부품 기술의 발전 방향은 시장 경쟁력 강화를 위한 저가화, 대단위 포설을 대비한 소형화, 네트워크의 소비 전력 폭주를 대처하는 저전력화 등으로 요약된다.

  • PDF

A PCA-based Data Stream Reduction Scheme for Sensor Networks (센서 네트워크를 위한 PCA 기반의 데이터 스트림 감소 기법)

  • Fedoseev, Alexander;Choi, Young-Hwan;Hwang, Een-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.35-44
    • /
    • 2009
  • The emerging notion of data stream has brought many new challenges to the research communities as a consequence of its conceptual difference with conventional concepts of just data. One typical example is data stream processing in sensor networks. The range of data processing considerations in a sensor network is very wide, from physical resource restrictions such as bandwidth, energy, and memory to the peculiarities of query processing including continuous and specific types of queries. In this paper, as one of the physical constraints in data stream processing, we consider the problem of limited memory and propose a new scheme for data stream reduction based on the Principal Component Analysis (PCA) technique. PCA can transform a number of (possibly) correlated variables into a (smaller) number of uncorrelated variables. We adapt PCA for the data stream of a sensor network assuming the cooperation of a query engine (or application) with a network base station. Our method exploits the spatio-temporal correlation among multiple measurements from different sensors. Finally, we present a new framework for data processing and describe a number of experiments under this framework. We compare our scheme with the wavelet transform and observe the effect of time stamps on the compression ratio. We report on some of the results.

  • PDF

Pattern Analysis of Organizational Leader Using Fuzzy TAM Network (퍼지TAM 네트워크를 이용한 조직리더의 패턴분석)

  • Park, Soo-Jeom;Hwang, Seung-Gook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.2
    • /
    • pp.238-243
    • /
    • 2007
  • The TAM(Topographic Attentive Mapping) network neural network model is an especially effective one for pattern analysis. It is composed of of Input layer, category layer, and output layer. Fuzzy rule, lot input and output data are acquired from it. The TAM network with three pruning rules for reducing links and nodes at the layer is called fuzzy TAM network. In this paper, we apply fuzzy TAM network to pattern analysis of leadership type for organizational leader and show its usefulness. Here, criteria of input layer and target value of output layer are the value and leadership related personality type variables of the Egogram and Enneagram, respectively.

Security and Hacking on Wireless Networking for Small and Medium Business: Survey (중소기업형 무선 네트워크의 해킹과 보안)

  • Shin, Pan-Seop;Kim, Jeong-Min
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2014
  • Wireless network is convenient as compared to the wire, and it is also easy. Therefore, SMEs in the country is the trend that many SMEs prefer the radio using a lot of radio as an extension of the wired network modification felt the burden of fixed installations. Wireless networks are vulnerable to security together than a wired network, since it passes the packet through the broadcasting. Therefore, analyzing the vulnerability of wireless networks, and proposes countermeasures about wireless network security in small and medium-sized businesses.

  • PDF

A semantic network analysis of news reports on an emerging infectious disease by multidrug-resistant microorganism (언어 네트워크 분석을 이용한 신종 감염병 보도 분석: 다제내성균 보도 사례를 중심으로)

  • Park, Kisoo;Lee, Guiohk;Choi, Myung-Il
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.343-351
    • /
    • 2014
  • The present study performed semantic network analysis of the keywords in the headlines of newspapers to investigate the media coverage of the multidrug-resistant microorganisms(MDROs) which is resistant to antibiotics. For this purpose, 229 news stories on MDROs in 28 newspapers from June 1, 2010 to December 31, 2011 were analyzed. The news stories were gathered from the Korea Press Foundation's news database, KINDS (www.kinds.or.kr) and websites of Korean newspapers. The analysis of the keywords revealed 'superbacteria' appeared most frequently (n=155) followed by 'infection' (n=63) which arouses fear among readers. While network was structured with the keywords such as 'domestic', 'multidrug-resistant microorganisms', 'first', 'antibiotics', 'outbreak' and 'infection', the keywords such as 'MDROs related stocks', 'medical staff', and 'safety' were on the periphery of the network.

A Study on comparison of KDD CUP 99 and NSL-KDD using artificial neural network (인공신경망을 통한 KDD CUP 99와 NSL-KDD 데이터 셋 비교)

  • Ji, Hyunjung;Kim, Yonghyun;Kim, Donghwa;Shin, Dongkyoo;Shin, Dongil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.211-213
    • /
    • 2017
  • 최근 컴퓨터 네트워크를 활용하는 다양한 기기들이 개발되고 급격히 확산되면서, 컴퓨터 네크워크는 전보다 많은 보안문제에 직면하게 되었다. 이에 따라 네트워크 보안을 위한 침입탐지시스템의 필요성이 대두된다. 침입탐지시스템을 구현하기 위한 대표적인 데이터 셋으로는 KDD CUP 99(KDD'99)와 이후 KDD'99의 문제점을 보완하여 공개된 NSL-KDD가 있다. 본 논문에서는 KDD'99와 NSL-KDD를 소개하고 인공신경망을 통해 두 데이터 셋을 비교 분석하였다. Multi-Layer Perceptron을 사용해 데이터 셋을 분석해본 결과, KDD'99는 전체 정확도에서 더 높은 결과를 얻은 반면 공격 별 탐지 정확도 면에서는 NSL-KDD에 뒤쳐졌다.

Real-Time Network Traffic Monitoring System using SNMP (SNMP를 이용한 실시간 네트워크 트래픽 모니터링 시스템)

  • 박진호;정진욱
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.69-75
    • /
    • 2002
  • In this paper, we propose the realtime network traffic monitoring system usin SNMP that can supported network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The proposed system consists of two parts: analysis server for collection and analysis of the network information, and supports real-time monitoring of network traffic, and client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using Java and contributes to enhance the effectiveness of network administrator's management.

  • PDF