• Title/Summary/Keyword: 네트워크 구조

Search Result 5,074, Processing Time 0.032 seconds

Textmining-Based Analysis for Duty and Knowledge structure of Vocational Counseling Service Industry (텍스트마이닝 기법을 통한 직업상담서비스산업의 직무 및 지식구조 분석)

  • Yook, Dong-In
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.9
    • /
    • pp.366-376
    • /
    • 2017
  • This study attempts to analyze the structure of the knowledge and duties of the vocational counseling service industry by using the text mining method and network analysis, which are methods of big data analysis. The subjects of the survey were vocational counseling, job placement and career change support, three fields in the unit elements of competence included in the National Competency Standards (NCS) which areproposed by the government. Although the analysis results of frequently used words showed that all three fields had independent duties, many were overlapping, such as counseling, examination, employment support, etc. for clients, job seekers, and others. The knowledge required by the employees of this field includes many new fields, such as start-up development, lifelong career consulting, job adaptation and culture conflict, besides the five subjects of vocational psychology, vocational counseling, labor market, job information, and law, which are included in the vocational counselor certification examination. Also, we suggested that the consultants adhere to emotional approaches, such as empathy, acceptance and attentiveness, and take a neutral stance. This study isvaluable in that it is the first attempt to objectively analyze the duties of the vocational counseling service field by big data analysis. In addition, it is also meaningful that we first confirmed the difference between the direction of government policy and the actual practice in the field.

Structure and Biological Function of Plant CRL4, and Its Involvement in Plant Cellular Events (식물 CRL4 복합체의 구조, 기능 및 식물 세포 내 다양한 이벤트와의 연계성)

  • Lee, Jae-Hoon
    • Journal of Life Science
    • /
    • v.26 no.3
    • /
    • pp.364-375
    • /
    • 2016
  • Post-translational modification is an efficient process to rapidly transduce external stimulus into cellular response. Ubiquitination is a typical post-translational modification which is a highly conserved process in eukaryotes. UPS (Ubiquitin/Proteasome System) mediated by the ubiquitination is to target diverse cellular proteins for degradation. Among E3 ubiquitin ligases that function as the key determinant for substrate recognition, CRL (cullin–RING E3 ubiquitin ligase) is the largest family and forms the complex composed of cullin, RBX1, adaptor and substrate receptor. Although CRL1, also known as SCF complex, has been widely researched for its biological role, the functional studies of CRL4 have been relatively elusive. In Arabidopsis, there are 119 substrate receptors named DCAF (DDB1 CUL4 Associated Factor) proteins for CRL4 and a fraction of DCAF proteins have been identified for their potential functions so far. In this paper, current understanding on structure and biological roles of plant CRL4 complexes in a diverse of cellular events is reviewed, especially focusing on CRL4 substrate receptors. Moreover, the regulatory mechanism of CRL4’s activity is also introduced. These studies will be helpful to further understand the signal transduction pathways in which such CRL4 complexes are involved and give a clue to establish the action network of entire CRL4 complexes in plants.

Metapopulation Structure and Movement of a Threatened Butterfly Parnassius bremeri (Lepidoptera: Papilionidae) in Korea (멸종위기종 붉은점모시나비(Parnassius bremeri )의 메타개체군 구조와 이주)

  • Kim, Do-Sung;Park, Doo-Sang;Kwon, Yong-Jung;Suh, Sang-Jae;Kim, Chang-Hwan;Park, Seong-Joon;Kim, Dong-Hyuk;Kim, Jin-Seo;Yu, Hye-Mi;Hwang, Jong-Seok
    • Korean journal of applied entomology
    • /
    • v.50 no.2
    • /
    • pp.97-105
    • /
    • 2011
  • Understanding the metapopulation structure and movement of a species are required for conserving the species. In this paper, migration patterns and connectivity of patches of a threatened butterfly, Parnassius bremeri Bremer, were postulated using the mark-release-recapture (MRR) technique in a habitat located in the mid-southern region of the Korean peninsula. A total of 194 individuals were captured (137 males and 57 females) and, of them, 93 individuals (73 males and 20 females) were recaptured during the MRR experiment. The migration analysis showed 23-150% immigration and 28-53% emigration. There were high correlations between the migrating individuals and the distance between patches, but there was no correlation between migrating individuals and patch size or between migrating individuals and the number of host plants. Consequently, the migration of butterflies occurred frequently between closer patches, while patch size and quantity of the food plant had minor effects on migration behavior. Additionally, males migrated more frequently than females. Analysis of the migration patterns of P. bremeri showed that the central patch played an important role on linking patch groups and more frequent migrations were monitored between nearby patches than between the remote patches. This study suggested that active migrations take place between the neighboring multiple patches and these are accelerated if there is a stepping-stone patch between them.

A Hybrid Scheme of the Transport Error Control for SVC Video Streaming (SVC 비디오 스트리밍을 위한 복합형 전송 오류 제어 기법)

  • Seo, Kwang-Deok;Moon, Chul-Wook;Jung, Soon-Heung;Kim, Jin-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.34-42
    • /
    • 2009
  • In this paper, we propose a practical hybrid transport error control scheme to provide SVC video streaming service over error-prone IP networks. Many error control mechanisms for various video coding standards have been proposed in the literature. However, there is little research result which can be practically applicable to the multilayered coding structure of SVC(the scalable extension of H.264/AVC). We present a new hybrid transport error control scheme that efficiently combines layered Forward Error Correction(FEC) and Automatic Repeat Request(ARQ) for better packet-loss resilience. In the proposed hybrid error control, we adopt ACK-based ARQ instead of NACK-based ARQ to maximize throughput which is the amount of effective data packets delivered over a physical link per time unit. In order to prove the effectiveness of the proposed hybrid error control scheme, we adopt NIST-Net network emulator which is a general-purpose tool for emulating performance dynamics in IP networks. It is shown by simulations over the NIST-Net that the proposed hybrid error control scheme shows improved packet-loss resilience even with much less number of overhead packets compared to various conventional error control schemes.

Elicitation of Collective Intelligence by Fuzzy Relational Methodology (퍼지관계 이론에 의한 집단지성의 도출)

  • Joo, Young-Do
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.17-35
    • /
    • 2011
  • The collective intelligence is a common-based production by the collaboration and competition of many peer individuals. In other words, it is the aggregation of individual intelligence to lead the wisdom of crowd. Recently, the utilization of the collective intelligence has become one of the emerging research areas, since it has been adopted as an important principle of web 2.0 to aim openness, sharing and participation. This paper introduces an approach to seek the collective intelligence by cognition of the relation and interaction among individual participants. It describes a methodology well-suited to evaluate individual intelligence in information retrieval and classification as an application field. The research investigates how to derive and represent such cognitive intelligence from individuals through the application of fuzzy relational theory to personal construct theory and knowledge grid technique. Crucial to this research is to implement formally and process interpretatively the cognitive knowledge of participants who makes the mutual relation and social interaction. What is needed is a technique to analyze cognitive intelligence structure in the form of Hasse diagram, which is an instantiation of this perceptive intelligence of human beings. The search for the collective intelligence requires a theory of similarity to deal with underlying problems; clustering of social subgroups of individuals through identification of individual intelligence and commonality among intelligence and then elicitation of collective intelligence to aggregate the congruence or sharing of all the participants of the entire group. Unlike standard approaches to similarity based on statistical techniques, the method presented employs a theory of fuzzy relational products with the related computational procedures to cover issues of similarity and dissimilarity.

A Multiple Signature Authentication System Based on BioAPI for WWW (웹상의 BioAPI에 기반한 서명 다중 인증 시스템)

  • Yun Sung Keun;Kim Seong Hoon;Jun Byung Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1226-1232
    • /
    • 2004
  • Biometric authentication is rising technology for the security market of the next generation. But most of biometric systems are developed using only one of various biological features. Recently, there is a vigorous research for the standardization of various biometric systems. In this paper, we propose a web-based authentication system using three other verifiers based on functional, parametric, and structural approaches for one biometrics of handwritten signature, which is conformable to a specification of BioAPI introduced by BioAPI Consortium for a standardization of biometric technology. This system is developed with a client-server structure, and clients and servers consist of three layers according to the BioAPI structure. The proposed neb-based multiple authentication system of one biometrics can be used to highly increase confidence degree of authentication without additional several biological measurements, although rejection rate is a little increased. That is, the false accept rate(FAR) decreases on the scale of about 1:40,000, although false reject rate(FRR) increases about 2.7 times in the case of combining above three signature verifiers. So the proposed approach can be used as an effective identification method on the internet of an open network. Also, it can be easily extended to a security system using multimodal biometrics.

A Routing Optimization for Hybrid Routing Protocol in Wireless Ad Hoc Networks (Ad Hoc망에서 하이브리드 라우팅 프로토콜을 위한 경로 설정 최적화)

  • 추성은;김재남;강대욱
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.274-276
    • /
    • 2002
  • Ad Hoc망은 전형적인 무선 네트워킹과는 다른 새로운 무선 네트워킹 파라다임으로써 기존 유선 망의 하부 구조에 의존하지 않고 이동 호스트들로만 구성된 네트워크이다. Ad Hoc망에서 통신을 하기 위해서는 출발지 노드에서 목적지 노드까지 데이터 전송을 위한 라우팅에 관한 문제이다. Ad Hoc망에서는 모든 단말기의 위치변화가 가능하기 때문에 경로설정에 어려움이 따른다. 노드간에 정보를 보내고자 할 때 노드가 인접한 상태가 아니면 정보를 직접 보낼 수 없고 여러 중간 노드들을 거쳐서 정보를 보내는 다중-홉 라우팅 방식을 사용해야 한다. 따라서 중간 노드들은 패킷 라우터의 역할을 해야하는데 무선 통신자체가 좁은 대역폭과 한정된 채널을 가지고 전송 범위가 제한되는 문제가 있다. 또한 노드자체의 이동성과 전력 소모 등으로 인한 이탈은 망 위상을 수시로 변화시키므로 노드간에 정보를 전송하는데 가장 좋은 경로는 수시로 변경될 수 있으므로 많은 어려움이 따르게 된다. 본 논문에서는 이러한 문제의 해결방안으로 경로유지 과정에서 Ad Hoc망 내의 노드들은 이동성의 특성으로 인해 현재 사용되는 경로 보다 더 짧고 효율적인 경로가 발생하고 중간 노드가 이동 될 때 새로운 경로로 갱신하여 솔기없는 최적의 경로를 유지할 수 있는 방법을 제안한다. 제안 방법은 ZRP의 IERP에서 감청모드를 통하여 사용중인 경로보다 최적의 경로를 감지하여 새로운 경로로 갱신하는 방법과 중간 노드가 이동하여 경로가 깨진 경우 부분적으로 경로를 복구하는 방법을 제시하여 항상 최적화된 경로를 유지함으로써 Ad Hoc망의 위상변화에 대한 적응성을 높일 수 있도록 한다.기반으로 하는 교육용 애플리케이션 개발의 용이성의 증대를 기대할 수 있으며, 모델의 재사용성을 보장할 수 있다. 제안한다.수행하였다. 분석에서는 제품의 효율성뿐만 아니라 보안성을 중요하게 생각하였으며, 앞으로 보안 관련 소프트웨어 개발에 사용될 수 있는 도구들이 가이드 라인에 대한 정보를 제공한다.용할 수 있는지 세부 설계를 제시한다.다.으로서 hemicellulose구조가 polyuronic acid의 형태인 것으로 사료된다. 추출획분의 구성단당은 여러 곡물연구의 보고와 유사하게 glucose, arabinose, xylose 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重

  • PDF

Discovering Interdisciplinary Convergence Technologies Using Content Analysis Technique Based on Topic Modeling (토픽 모델링 기반 내용 분석을 통한 학제 간 융합기술 도출 방법)

  • Jeong, Do-Heon;Joo, Hwang-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.3
    • /
    • pp.77-100
    • /
    • 2018
  • The objectives of this study is to present a discovering process of interdisciplinary convergence technology using text mining of big data. For the convergence research of biotechnology(BT) and information communications technology (ICT), the following processes were performed. (1) Collecting sufficient meta data of research articles based on BT terminology list. (2) Generating intellectual structure of emerging technologies by using a Pathfinder network scaling algorithm. (3) Analyzing contents with topic modeling. Next three steps were also used to derive items of BT-ICT convergence technology. (4) Expanding BT terminology list into superior concepts of technology to obtain ICT-related information from BT. (5) Automatically collecting meta data of research articles of two fields by using OpenAPI service. (6) Analyzing contents of BT-ICT topic models. Our study proclaims the following findings. Firstly, terminology list can be an important knowledge base for discovering convergence technologies. Secondly, the analysis of a large quantity of literature requires text mining that facilitates the analysis by reducing the dimension of the data. The methodology we suggest here to process and analyze data is efficient to discover technologies with high possibility of interdisciplinary convergence.

The Structural Relationship among Trust in MIM, Attitude toward Emoticons, and the Intention to Purchase Emoticons in Kakao Talk (모바일 인스턴트 메신저에 대한 신뢰, 이모티콘 사용 태도와 이모티콘 구매의도 사이의 구조적 관계: 카카오톡 사례)

  • Jung, Bohee;Bae, Jungho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.311-325
    • /
    • 2016
  • The communication via MIM(Mobile Instant Messenger) has unique characteristics; one of them is use of emoticons. Although using emoticons in MIM is getting a lot of attention from business fields and emoticons markets in MIM is growing rapidly, there are little researches focused on emoticons in MIM in consumer behaviors and marketing area. So, the purpose of this study is to fill this theoretical and practical gap. For this purpose, we explore the effect of and trust in MIM system and attitude toward use of emoticons on purchase intention to emotions in MIM. Our study used structural equation modeling analysis; the results showed that perceived benefits and perceived risk to MIM affected trust in MIM system significantly, more specifically, while perceived benefits affected trust in MIM system positively, perceived risk affected trust in MIM system negatively. We also found that perceived usefulness of emoticon in MIM and flow experience influenced attitude toward use of emoticons positively. Lastly, trust in MIM system and attitude toward use of emoticons had positive effect on purchase intention to emoticons in MIM. The implication and limitations of this study are also discussed.

A Robustness Test Method and Test Framework for the Services Composition in the Service Oriented Architecture (SOA에서 서비스 조합의 강건성 테스트 방법 및 테스트 프레임워크)

  • Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.800-815
    • /
    • 2009
  • Recently, Web services based service-oriented architecture is widely used to integrate effectively various applications distributed on the networks. In the service-oriented architecture BPEL as a standard modeling language for the business processes provides the way to integrate various services provided by applications. Over the past few years, some types of studies have been made on testing compatibility of services and on discriminating and tracing of the business processes in the services composition. Now a lot of studies about the services composition with BPEL are going on. However there were few efforts to solve the problems caused by the services composition. Especially, there is no effort to evaluate whether a composite service is reliable and whether it is robust against to exceptional situations. In this paper, we suggest a test framework and a testing method for robustness of the composite service written in WS-BPEL. For this, firstly we extract some information from the BPEL process and the participant services. Next, with the extracted information we construct the virtual testing environment that generates various faults and exceptional cases which may be raised within the real services. Finally the testing work for robustness of a composite service is performed on the test framework.