• Title/Summary/Keyword: Convergence Network

Search Result 3,994, Processing Time 0.029 seconds

Revitalization small businesses of the overseas exchange through the convergence of private network (Focusing on Laos in the Indochina Peninsula) (인적네트워크 융합을 통한 중소기업의 해외무역 활성화방안 (인도차이나반도의 라오스를 중심으로))

  • Kim, Deok-Man
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2015
  • This paper was studied in export policy Revitalization of SMEs mainly in various countries of Indochina, especially in Laos, which is emerging as a new market after China. Laos is a socialist country, but in 2014, led by the current active open-door policy, education, social, cultural and people-to-people exchanges are going briskly, light industry and the expansion of social infrastructure such as laying the foundation for economic development. This paper presents a plan to dominate the emerging frontier markets are public enterprises and government agencies that do not respond quickly. Already pioneered by building a network in local development staff for this purpose, such as volunteers, missionaries, professors and configure the network of exploitation and human development personnel look for Revitalization of SMEs in urban and regional growth.

Investigation of Trend in Virtual Reality-based Workplace Convergence Research: Using Pathfinder Network and Parallel Neighbor Clustering Methodology (가상현실 기반 업무공간 융복합 분야 연구 동향 분석 : 패스파인더 네트워크와 병렬 최근접 이웃 클러스터링 방법론 활용)

  • Ha, Jae Been;Kang, Ju Young
    • The Journal of Information Systems
    • /
    • v.31 no.2
    • /
    • pp.19-43
    • /
    • 2022
  • Purpose Due to the COVID-19 pandemic, many companies are building virtual workplaces based on virtual reality technology. Through this study, we intend to identify the trend of convergence and convergence research between virtual reality technology and work space, and suggest future promising fields based on this. Design/methodology/approach For this purpose, 12,250 bibliographic data of research papers related to Virtual Reality (VR) and Workplace were collected from Scopus from 1982 to 2021. The bibliographic data of the collected papers were analyzed using Text Mining and Pathfinder Network, Parallel Neighbor Clustering, Nearest Neighbor Centrality, and Triangle Betweenness Centrality. Through this, the relationship between keywords by period was identified, and network analysis and visualization work were performed for virtual reality-based workplace research. Findings Through this study, it is expected that the main keyword knowledge structure flow of virtual reality-based workplace convergence research can be identified, and the relationship between keywords can be identified to provide a major measure for designing directions in subsequent studies.

A Study on Influencer Food-Content Sentiment Keyword Analysis using Semantic Network based on Social Network

  • Ryu, Gi-Hwan;Yu, Chaelin;Lee, Jun Young;Moon, Seok-Jae
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.95-101
    • /
    • 2022
  • The development of the 4th industry has increased social media, and the rise of COVID-19 has stimulated non-face-to-face services. People's consumption patterns are also changing a lot due to non-face-to-face services. In this paper, food content keywords are derived through social network-based semantic network analysis, emotions are analyzed, and keywords applied to food recommendation platforms are input. We collected food, influencer, and corona keyword analysis data through Textom. A lot of research has been done through online reviews of existing influencer content. However, there is a lack of research on keyword sentiment analysis provided by influencers rather than consumers and research perspectives. This paper uploads language and topics derived through online reviews of existing publications and subscribers, and goes beyond the limits used in marketing methods. By analyzing keywords that influencers suggest when uploading content, you can apply data that applies them to food recommendation platforms and applications.

General Local Transformer Network in Weakly-supervised Point Cloud Analysis (약간 감독되는 포인트 클라우드 분석에서 일반 로컬 트랜스포머 네트워크)

  • Anh-Thuan Tran;Tae Ho Lee;Hoanh-Su Le;Philjoo Choi;Suk-Hwan Lee;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.528-529
    • /
    • 2023
  • Due to vast points and irregular structure, labeling full points in large-scale point clouds is highly tedious and time-consuming. To resolve this issue, we propose a novel point-based transformer network in weakly-supervised semantic segmentation, which only needs 0.1% point annotations. Our network introduces general local features, representing global factors from different neighborhoods based on their order positions. Then, we share query point weights to local features through point attention to reinforce impacts, which are essential in determining sparse point labels. Geometric encoding is introduced to balance query point impact and remind point position during training. As a result, one point in specific local areas can obtain global features from corresponding ones in other neighborhoods and reinforce from its query points. Experimental results on benchmark large-scale point clouds demonstrate our proposed network's state-of-the-art performance.

Convergence Security Approach for Motor Vehicle Communication Network Hacking Attack Prevention: Focus on Bluetooth Cases (자동차 내부망 통신네트워크 해킹범죄예방을 위한 융합보안적 대응방안: Bluetooth 활용사례를 중심으로)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.99-107
    • /
    • 2016
  • The purpose of this study is to analyse motor vehicle communication network hacking attacks and to provide its prevention. First, the definition of motor vehicle communication network was provided and types of in-vehicle communication network were discussed. Also, bluetooth hacking attack cases were analysed in order to illustrate dangers of hacking attacks. Based on the analysis, two preventive measures were provided. First, Motor Vehicle Safety Standard Law should be revised. Although the law provides the definition of electronic control system and its standards as well as manufacturing and maintenance for safe driving standards, the law does not have standards for electronic control system hacking prevention and defensive security programs or firmware. Second, to protect motor vehicle communication network, it is necessary to create new laws for motor vehicle communication network protection.

Address Auto-configuration in Broadband Convergence Networks for Supporting Multi-Hop User Access Networks (BcN에서 멀티 홉 사용자 액세스 망 수용을 위한 자동 주소 설정)

  • Park, Il-Kyun;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.809-816
    • /
    • 2005
  • MANET(mobile ad hoc network) cn be one of the access networks of BcN(broadband convergence network), and an user node requires address auto-configuration protocol for mu14i-hop environment. Some address auto-configuration protocols are proposed for independent MANET, but they don't consider BcN-accessable MANET environment. In this paper, new address auto-configuration protocol for wireless nodes is proposed. With this proposal, they ran configure their global addresses automatically in hybrid MANETs as BcN access networks. The autoconfiguration protocol modifies IPv6 NDP(neighbor discovery protocol) messages to deliver global prefix information to all wireless nodes, and avoids message boradcasting to minimize network overhead.

Defeating IP Source Address Spoofing with Foreign Agent Care-of-Address in Mobile IPv4 (Mobile IPv4 네트워크에서 접속제어리스트와 역터널링을 이용한 IP Spoofing 제거 방안)

  • Kim, Han-Lim;Kim, Sung-Il;Kim, Sang-Eun;Park, Se-Jun
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.313-317
    • /
    • 2005
  • The network ingress filtering is a simple and efficient method for preventing IP source spoofing of fixed nodes. Since mobile hosts cannot communicate with its correspondent nodes if the network ingress filtering is configured in mobile IPv4 network, reverse tunneling was considered as a method for avoiding network ingress filtering. But, unfortunately this method does not solve IP source spoofing of mobile nodes. In this paper, we propose a simple and efficient method for preventing IP source spoofing of mobile nodes assuming that only the mobile hosts connected to foreign agents and the network that foreign agent manages is small.

  • PDF

Analysis of National R&D Patent Performance Network in Bio-Healthcare Sector (바이오 헬스케어 분야 국가연구개발 특허성과 네트워크 분석)

  • Kwon, Young-Eun;Kim, Jaesoo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.17-24
    • /
    • 2018
  • This study attempted to analyze technology convergence structure and key technology research sectors in bio-health. For this, network analysis was performed based on the patent outcomes achieved through national R&Ds. Then, a patent network was analyzed to derive problems and collect data from the National Science & Technology Information Service. With the five groups obtained through the analysis of IPC network and national R&D patents in bio-health based on a research frame network, topics were chosen based on the bio-healthcare technology system. Then, the technology with the greatest ripple effects was derived and compared to other sectors, suggesting a direction for national R&D investments. It is anticipated that this study would make a contribution to a search for R&D investment direction by additionally analyzing overseas patent data and improving correlation analysis between technology convergence and government-led R&D expenses.

Developement Strategy for the National Research Network and Next Generation Network Security (국가연구망의 발전방향 및 차세대 국가연구망 보안)

  • Lee, Myoungsun;Cho, Buseung;Park, Hyoungwoo;Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.3-11
    • /
    • 2016
  • With repid development of optical networking technology, Software-Defined Network (SDN) and Network Function Virtualization (NFV), high performance networking service, collaboration platform that enables collaborative research globally, drastically National Research Network (NRN) including Internet Service has changed. Therefore we compared and analyzed several world-class NRNs and took a view of future development strategy of the NRN. Also we suggest high speed security environment in super high bandwidth network with 40Gbps and 100Gbps optical transmission technology, network separation of NRN with Science DMZ to support high performance network transmission for science big data, building security environment for last-mile in campus network that supports programmability of IDS using BRO framework.

Priority-Based Duplicate Burst Transmission Mechanism in Optical Burst Switching Networks

  • Um, Tai-Won;Vu, Hai-L.;Choi, Jun-Kyun;Ryu, Won
    • ETRI Journal
    • /
    • v.30 no.1
    • /
    • pp.164-166
    • /
    • 2008
  • This paper proposes a priority-based duplicate burst transmission mechanism in an optical burst switching network to enhance the probability of successful reception of bursts. The performance of the proposed mechanism is evaluated by NS2 simulations. Our results show that the burst loss rate is improved especially under light traffic loads.

  • PDF