• Title/Summary/Keyword: Convergence Network

Search Result 4,061, Processing Time 0.034 seconds

Trends in the Study of Nursing Professionals in Korea: A Convergence Study of Text Network Analysis and Topic Modeling (국내 간호전문직관 연구 주제 동향: 텍스트네트워크분석과 토픽모델링의 융합)

  • Park, Chan-Sook
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.295-305
    • /
    • 2021
  • The purpose of this study is to explore the trend of nursing professional research topics published domestically through quantitative content analysis. The research method performed procedures for collecting academic papers, refining and extracting words, and data analysis. A text network was developed by collecting 351 papers and extracting words from the abstract, and network analysis and topic modeling were performed. The core-topics were nurses, nursing professionalism, nursing students, nursing care, professional self-concept, health care professionals, satisfaction, clinical competence, and self-efficacy. Through topic modeling, topic groups of nurse's professionalism, nursing students' professionalism, nursing professional identity, and nursing competency were identified. Over time, core-topics remained unchanged, but topics such as role conflict and ethical values in the 1990s, self-leadership and socialization in the 2000s, and clinical practice stress and support systems in the 2010s have emerged. In conclusion, it is necessary to facilitate multidimensional interventional research to improve nursing professionalism of clinical nurses and nursing students.

A New Face Morphing Method using Texture Feature-based Control Point Selection Algorithm and Parallel Deep Convolutional Neural Network (텍스처 특징 기반 제어점 선택 알고리즘과 병렬 심층 컨볼루션 신경망을 이용한 새로운 얼굴 모핑 방법)

  • Park, Jin Hyeok;Khan, Rafiul Hasan;Lim, Seon-Ja;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.176-188
    • /
    • 2022
  • In this paper, we propose a compact method for anthropomorphism that uses Deep Convolutional Neural Networks (DCNN) to detect the similarities between a human face and an animal face. We also apply texture feature-based morphing between them. We propose a basic texture feature-based morphing system for morphing between human faces only. The entire anthropomorphism process starts with the creation of an animal face classifier using a parallel DCNN that determines the most similar animal face to a given human face. The significance of our network is that it contains four sets of convolutional functions that run in parallel, allowing it to extract more features than a linear DCNN network. Our employed texture feature algorithm-based automatic morphing system recognizes the facial features of the human face and takes the Control Points automatically, rather than the traditional human aiding manual morphing system, once the similarity was established. The simulation results show that our suggested DCNN surpasses its competitors with a 92.0% accuracy rate. It also ensures that the most similar animal classes are found, and the texture-based morphing technology automatically completes the morphing process, ensuring a smooth transition from one image to another.

Technology convergence analysis of e-commerce(G06Q) related patents with Artificial Intelligence (인공지능 기술이 포함된 전자상거래(G06Q) 관련 특허의 기술 융복합 분석)

  • Jaeruen Shim
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • This study is about the technology convergence analysis of e-commerce related patents containing Artificial Intelligence applied for in Korea. The relationships between core technologies were analyzed and visualized using social network analysis. As a result of social network analysis, the core IPC codes that make up the mutual technology network in e-commerce related patents containing Artificial Intelligence were found to be G06Q, G06F, G06N, G16H, G10L, H04N, G06T, and A61B. In particular, it can be confirmed that there is an important convergence of data processing-related technologies such as [G06Q-G06F], [G06Q-G06N], and voice and image signals such as [G06Q-G10L], [G06Q-H04N], and [G06Q-G06T]. Using this research method, it is possible to identify future technology trends in e-commerce related patents and create new Business Models.

Design and Application of a LonRF Device based Sensor Network for an Ubiquitous Home Network (유비쿼터스 홈네트워크를 위한 LonRF 디바이스 기반의 센서 네트워크 설계 및 응용)

  • Ro Kwang-Hyun;Lee Byung-Bog;Park Ae-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.3
    • /
    • pp.87-94
    • /
    • 2006
  • For realizing an ubiquitous home network(uHome-net), various sensors should be able to be connected to an integrated wire/wireless sensor network. This paper describes an application case of applying LonWorks technology being widely used in control network to wire/wireless sensor network in uHome-net and the design and application of LonRF device that consists of a neuron chip including LonTalk protocol, a 433.92MHz RF transceiver, a sensor, and application programs. As an application example of the LonRF device, the LonRF smart badge that can measure the 3D location of objects in indoor environment and interwork with the uHome-net was developed. LonRF device based home network services were realized on the uHome-net testbed such as indoor positioning service, remote surveillance service and remote metering service were realized. This research shows that LonWorks technology based sensor network could be applicable to the control network in an ubiquitous home network and the LonRF device can be used as a wireless node in various sensor networks.

  • PDF

A Study on NAS-Linked Network Separation System Using AHP (AHP를 이용한 NAS 연동형 망분리 시스템에 관한 연구)

  • Kim, Min Su;Shin, Sang Il;Lee, Dong Hwi;Kim, Kui Nam J.
    • Convergence Security Journal
    • /
    • v.13 no.3
    • /
    • pp.85-90
    • /
    • 2013
  • To provide high-quality services, national public institutions and companies have provided information and materials over the internet network. However, a risk of malware infection between transmission and reception of data leads to exposure to various security threats. For this reason, national institutions have proceeded with projects for network separation since 2008, and data linkage has been made using network connection storage through network separation technologies, along with physical network separation. However, the network connection storage has caused waste of resources and problems with data management due to the presence of the same data in internal network storage and external network storage. In this regard, this study proposes a method to connect internal and external network data using NAS storage as a way to overcome the limitations of physical network separation, and attempts to verify the priority of items for the optimization of network separation by means of AHP techniques.

Intrusion detection agents on the wireless network design (무선네트워크 상에서의 침입탐지 에이전트 설계)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.59-70
    • /
    • 2013
  • Along with the rapid development of the wireless network (Wireless Network) technology for secure wireless communications, security problems have emerged as an important issue. In order to operate the wireless network intrusion detection system detects the agent installed on each wireless node should be. Ad-hoc network structures scattered in the AP over a wireless network without the node is a structure that makes it possible to communicate to connect. Intrusion detection agent to be installed on the node, and the corresponding energy consumption occurs when the survival time is reduced. On a node that can monitor a lot of traffic in order to increase the effect of intrusion detection, an intrusion detection agent should be placed. Therefore, in this paper, by taking advantage of the structure of Ad-hoc wireless network, considering the maximum living time of the network, while at the same time, the effectiveness of intrusion detection and intrusion detection by proposing a plan for installing the agent. Also improve the system performance by reducing the network load on each network, a system designed for data aggregation to reduce data redundancy, network energy consumption by reducing.

Electric Vehicle Technology Trends Forecast Research Using the Paper and Patent Data (논문 및 특허 데이터를 활용한 전기자동차 기술 동향 예측 연구)

  • Gu, Ja-Wook;Lee, Jong-Ho;Chung, Myoung-Sug;Lee, Joo-yeoun
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.165-172
    • /
    • 2017
  • In this paper, we analyze the research / technology trends of electric vehicles from 2001 to 2014, through keyword analysis using paper data published in SCIE or SSCI Journal on electric vehicles, time series analysis using patent data by IPC, and network analysis using nodeXL. also we predicted promising technologies of electric vehicles using one of the prediction methods, weighted moving average method. As a result of this study, battery technology among the electric vehicle component technologies appeared as a promising technology.

A Study of object analysis in safety zone (센서 네트워크 기반 객체 검지를 위한 연구)

  • Park, Sang-Joon;Lee, Jong-Chan;Jang, Dae-Sik;Shin, Sung-Yun;Park, Ki-Hong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.659-661
    • /
    • 2011
  • In this paper, we propose a study of scheme to detect mobile object. In special zone needed detection, sensor network based system development can provide safety of pedestrian. Instead current CCTV, intelligent sensor network and service can provide reliability to guarantee safe zone. Base on pedestrian characteristic, if unusual situation is detected and it is included in previous agreed scenario, safety service can be provided.

  • PDF

A Method to reduce transaction endorsement time based on network latency in Hyperledger Fabric (하이퍼레저 패브릭에서 네트워크 지연 시간 기반 트랜잭션 보증 시간 감소 방법)

  • Kim, Ji-Yong;Kwon, Jae-Hwan;Jang, Sung-Il;Kim, Young-Kook;Son, Min-Ji;Kim, Myung-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.41-44
    • /
    • 2020
  • 최근 허가형 블록체인 기반 프로젝트가 늘어남에 따라, 블록체인 솔루션과 여러 응용 프로그램을 개발하기 위한 플랫폼인 하이퍼레저 패브릭을 도입하는 회사들이 많아지고 있다. 그러나 하이퍼레저 패브릭 네트워크 구성 시, 각 구성요소의 네트워크 지연 시간을 고려하지 않고 네트워크를 구성하면 트랜잭션 보증 시간이 늘어날 수 있다. 본 논문에서는 하이퍼레저 패브릭 네트워크에서 각 구성요소 간 네트워크 지연 시간 차이를 고려하여 트랜잭션 보증 시간을 줄이는 방법을 제안한다. 라우팅 테이블을 수정하여 네트워크 지연 시간 차이를 발생시켰고, 지연 시간과 트랜잭션 보증 시 걸리는 시간을 합산하여 트랜잭션 보증 시간을 측정하였다. 실험을 통해, 기존 방법의 트랜잭션 보증 시간보다 제안한 방법의 트랜잭션 보증 시간이 약 1/3 정도 감소하는 것을 확인하였다.

  • PDF

A Study on WB(Water-Bubble) Based Highly Secure Flexible Network Section (WB(Water-Bubble) 기반의 강한 보안성을 갖는 탄력적 네트워크 구간에 관한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.737-746
    • /
    • 2017
  • In 2017, amid changes in the security market such as integrated security (IS) and convergence security (CS), a variety of security paradigms in terms of operation and management have been suggested. Rather than changing existing network infrastructure and bringing about fluid, multi-dimensional changes, these solutions and technologies focus entire security capacity on a primary protection, leading to network infrastructure suffering from unexpected inherent violations and problems in a continued manner. Therefore, it is time to propose and develop a flexible network section that can protect from attacks of similar pattern and concentrated traffic attacks by applying a new concept of WB (Water-Bubble) to network infrastructure and analyzing on the basis of experiment and installation. Methodology of the WB-based highly secure flexible network section proposed in this study is expected to provide materials for studies on how to achieve network section security taking into account three major limitations and security standards: fluidity, unpredictability, and non-area scalability by contact point ratio, by changing a network area predicted to be the final target of attack into resonant network section (area) with flexible area changes.