• Title/Summary/Keyword: Core Network

Search Result 1,515, Processing Time 0.026 seconds

Analysis of Extension Pattern for Network of Movie Stars from Korea Movies 100 (한국영화 100선에 등장하는 영화배우 네트워크 확장 패턴 분석)

  • Ryu, Jea-Woon;Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.420-428
    • /
    • 2010
  • The advancement of the Science for complex systems enables the analysis of many social networks. We constructed and analyzed a Korean movie star network as one of social networks, based on the 100 Korean movie selection for a main data source. Until now, the research trend has been the structural analysis of network, focused on link numbers, such as degree, betweenness and clustering coefficient. But it is time that the research is not limited by the structural analysis of networks only. Rather, the research goal should be aimed to an information analysis, performed by identifying and analyzing central modules that are regarded as the core of complex networks, using k-core analysis method. In this research, we constructed a network of movie stars who have appeared in 100 Korean movie selection, provided by Korean movie database, also we analyzed its core modules with and without weights, and the trend of seasonal expansion of the network. We expect our findings can be used as the basic data applicable to a model for understanding of the expansion and evolution of networks.

Pattern Analysis of Core Competency Model for Subcontractors of Construction Companies Using Fuzzy TAM Network (퍼지 TAM 네트워크를 이용한 건설협력업체 핵심역량모델의 패턴분석)

  • Kim, Sung-Eun;Hwang, Seung-Gook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.1
    • /
    • pp.86-93
    • /
    • 2006
  • The TAM(Topographic Attentive Mapping) network based on a biologically-motivated neural network model is an especially effective one for pattern analysis. It is composed of of input layer, category layer, and output layer. Fuzzy rule, for input and output data are acquired from it. The TAM network with three pruning rules for reducing links and nodes at the layer is called fuzzy TAM network. In this paper, we apply fuzzy TAM network to pattern analysis of core competency model for subcontractors of construction companies and show its usefulness.

Establishment of a Forest Network in the Western Geum River Basin using the Nearest Feature Model (최근린사상법을 활용한 금강서해유역 녹지네트워크 구축에 관한 연구)

  • Jang, Gab-Sue
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.35 no.5
    • /
    • pp.56-63
    • /
    • 2007
  • This study used the nearest feature model to connect forest patches within the western Geum River Basin. Due to many different forest patch sizes, 3 alternative methods were tested to determine the best way to establish an ecological network with forest patches. Alternative 1 used all forest patches to determine whether patches were large enough. Alternative 2 used forest patches over 10 ha in size. Alternative 3 used natural conservation indices to select forest patches containing better qualities in the natural conservation level. As a result 635 out of 724 patches of over 10 ha were selected for comparison. Alternative 1 showed that forest patches of less than 10 ha were outliers interrupting the establishment of the ecological network. They generated an unnecessary ecological network to link core areas to comparison features. The ecological network was improved by using forest patches greater than 10 ha in size(Alternative 2). Each comparison feature was much more hierarchically connected to core areas in Alternative 2 than in Alternative 1. Forest patches filtered by natural conservation indices were useful for obtaining the best ecological network. Alternative 3 clearly showed the connections in the ecological network between core areas and forest.

Trends of Broadcast Core Network Standardization (방송 코어 망(BCN) 표준화 동향)

  • Kim, S.C.;Lee, J.;Hur, N.;Choi, D.J.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.25-35
    • /
    • 2021
  • ATSC 3.0 is a next-generation terrestrial broadcasting standard that provides various functions and improved performance compared to the existing ATSC 1.0 High Definition standard. Based on the ATSC 3.0 broadcast system with IP-centric transport and coherence, it can provide personalized and personalized interactive services to TV viewers. However, the broadcasting system still has a structural limitation in that the service is deployed separately from broadcasters who are allocated a specific frequency and is expected to have different spectrum allocation for each market. To overcome this structural limitation and provide improved services compared with the current ATSC 3.0, preliminary studies were conducted to apply the core network concept of a communication network (particularly 5G) to ATSC 3.0 broadcasting. Finally, in february of this year, the ATSC TG3/S43 group for the development of the ATSC 3.0 Broadcast Core Network (BCN) standard was launched. This paper describes the background and current status of BCN standardization by ATSC TG3/S43, and future standardization prospects.

Supporting Real-Time Service and Scalability of Network based on SCORE (Scalable CORE) network model (SCORE (Scalable CORE) 네트워크 모델을 기초로한 망의 확장성 및 실시간 서비스 지원에 대한 연구)

  • 홍흥표;석정봉
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.402-405
    • /
    • 2003
  • 본 논문은 인터넷에서 실시간 서비스를 효과적으로 지원하면서도 망의 확장성을 제공하는 방법을 제안하였다. 이를 위해 코어노드에서 각 플로우의 상태 정보를 관리하지 않는 SCORE (Scalable CORE) 네트워크 모델 [1]과 종단간 딜레이 보장이 우수한 QoS (Qualify of Service) 스케줄링 방법중 하나인 WF²Q+ (Worst-case Fair weight Fair Queuing+) [2]에 대해서 기술하고 구현하였다. 이러한 개념을 바탕으로 새로운 망의 구조를 제안하였으며 시뮬레이션을 통한 성능분석을 수행하였다.

  • PDF

Analysis of Scientific Item Networks from Science and Biology Textbooks (고등학교 과학 및 생물교과서 과학용어 네트워크 분석)

  • Park, Byeol-Na;Lee, Yoon-Kyeong;Ku, Ja-Eul;Hong, Young-Soo;Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.427-435
    • /
    • 2010
  • We extracted core terms by constructing scientific item networks from textbooks, analyzing their structures, and investigating the connected information and their relationships. For this research, we chose three high-school textbooks from different publishers for each three subjects, i.e, Science, Biology I and Biology II, to construct networks by linking scientific items in each sentence, where used items were regarded as nodes. Scientific item networks from all textbooks showed scare-free character. When core networks were established by applying k-core algorithm which is one of generally used methods for removing lesser weighted nodes and links from complex network, they showed the modular structure. Science textbooks formed four main modules of physics, chemistry, biology and earth science, while Biology I and Biology II textbooks revealed core networks composed of more detailed specific items in each field. These findings demonstrate the structural characteristics of networks in textbooks, and suggest core scientific items helpful for students' understanding of concept in Science and Biology.

Technology Convergence Analysis Using Social Network k-Core: Focusing on Company Technologies of Defense Industry (사회연결망 k-코어를 활용한 기술융합 분석: 방위산업 기업의 보유기술 중심)

  • Park, Dong-Soo;Yoon, Han-Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.83-95
    • /
    • 2022
  • A technology can be newly formed through technological convergence achieved by the intersection of two or more technological fields. As the complexity of technology development increases, related interest is increasing. Researches have been carried out on the concept, related indicators and analysis of technology convergence including method of social networks. This paper intends to suggest an analysis method of technology convergence using social networks based on the company's possessing technologies. According to the similarity of technologies among companies, a social network was constructed and the technology convergence was analyzed using k-core, a social network subgroup method. Using the result of k-core, base and element technologies for convergence was identified with their relations. Using the suggested method, technology convergence was analyzed on real technology data of defense-industry companies. When the minimum technology similarity is 0, the overall technology convergence relations between technology elements can be identified. In the scope of data in this paper, technologies of defense S/W, aircraft structure and structural materials are identified as important base technology for convergence.

Network Potential Analysis among Agricultural Villages based on Landscape Resources - Focused on Dangjin, Seosan, and Taean in Chungchungnam-do Region- (경관자원을 중심으로 한 농촌마을들 간의 네트워크 잠재력 분석 - 충청남도 당진군, 서산시, 태안군을 중심으로 -)

  • Lee, Sang-Woo;Chon, Jinhyung;Kim, Sang-Bum;Kim, Eujin Julia
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2017
  • The purpose of this study is to reveal network potential among agricultural villages focused on landscape and amenity resources. For this study, we conducted Social Network Analysis (SNA) utilizing existing landscape resource database. As a result of the study, major landscape types shared among villages were found for each city. For example, agricultural and residential landscapes were identified as major types for Danjin city. Add to major landscape resources, in Dangjin city, Habduk village were recognized as a core. Seokmun, Daehoji, Woogang, and Sunseong villages were widely found as the sub core group. For Seosan city, Jigok, Palbong, and Kobuk villages were widely recognized as core group. Most of villages which indicated the highest degree centrality were superior in terms of the number of total landscape resources as well as landscape type diversity. These results can be useful for initial planning process when considering major theme for landscape-based network organization. Also, this information will be helpful for planning stage through the specification of the potential role of each village in overall network.

SD-ICN: Toward Wide Area Deployable Software Defined Information Centric Networking

  • Xing, Changyou;Ding, Ke;Hu, Chao;Chen, Ming;Xu, Bo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2267-2285
    • /
    • 2016
  • Information Centric Networking that uses content name instead of IP address as routing identifier can handle challenges such as traffic explosion and user mobility, but it also suffers from scalability and incompatibility problems. In this paper by combining the concept of software defined networking and Internet end to end arguments, we propose a wide area deployable software defined information centric networking service model named SD-ICN. SD-ICN employs a dual space structure that separates edge service network and core transmission network. The enhanced SDN techniques are used in edge service network in order to implement intelligent data routing and caching, while traditional IP technique is reserved in core transmission network so as to provide wide area high speed data transmission. Besides, a distributed name resolution system based on the cooperation of different controllers is also presented. The prototype experiments in our campus network show that SD-ICN can be deployed in a scalable and incremental way with no modification of the core network, and can support typical communication modes such as multicast, mobility, multihoming, load balancing, and multipath data transmission effectively.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.