• Title/Summary/Keyword: Correspondent Analysis

Search Result 69, Processing Time 0.031 seconds

Reinterpretation of Multiple Correspondence Analysis using the K-Means Clustering Analysis

  • Choi, Yong-Seok;Hyun, Gee Hong;Kim, Kyung Hee
    • Communications for Statistical Applications and Methods
    • /
    • v.9 no.2
    • /
    • pp.505-514
    • /
    • 2002
  • Multiple correspondence analysis graphically shows the correspondent relationship among categories in multi-way contingency tables. It is well known that the proportions of the principal inertias as part of the total inertia is low in multiple correspondence analysis. Moreover, although this problem can be overcome by using the Benzecri formula, it is not enough to show clear correspondent relationship among categories (Greenacre and Blasius, 1994, Chapter 10). In addition, they show that Andrews' plot is useful in providing the correspondent relationship among categories. However, this method also does not give some concise interpretation among categories when the number of categories is large. Therefore, in this study, we will easily interpret the multiple correspondence analysis by applying the K-means clustering analysis.

Analysis of the IPsec Internet Key Exchange (IKE) Protocol (IPsec의 키 교환 방식에 대한 안전성 분석)

  • 주한규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.33-46
    • /
    • 2000
  • IPsec is a protocol suite to protect the data communication between computers on internet and many VPNs(Virtual Private Networks) use IPsec protocol. IKE protocol is used to exchange keys in IPsec. Formal analysis method is used increasingly in computer science to increase the reliability of a system. In this paper, the IKE protocol is analyzed formally. This paper shows that IKE with Authentication with Signature and Authentication with Pre-Shared Key is safe, but Authentication with Public Key Encryption and A Revised Method of Authentication with Public Key Encryption are safe only with the assumption that a participant has the correct public key of the correspondent. To make sure that a participant has the correct public key of the correspondent, the usage of certificate is recommended.

Comparison and Analysis of Protocols for the Secure Binding Updates in MIPv6 (MIPv6의 안전한 바인딩 갱신을 위한 프로토콜 비교 분석)

  • Won, You-Seuk;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.755-762
    • /
    • 2003
  • For the route optimization in the MIPv6, MN(Mobile Node) sends CN(Correspondent Node) a binding update message to notify the binding of is HoA(Home Address) with its new CoA(Care-of Address). However, unautenticated binding updates expose the involved MN and CM to various sucurity attacks. Thus, protecting the binding update process becomes of paramount importance in the MIPv6, and several secure binding update protocols, and the performance of packet exchanges and cryptographic operations. Then, we analyze the four typical binding update protocols based on the presented criterions. In addition, we propose some improvement tips for secure binding updates.

Differences in Perception towards Career Problems of Adolescents with Multicultural Backgrounds using Correspondence Analysis (대응분석을 통한 다문화 청소년의 진로문제에 대한 인식 차이 연구)

  • Kim, Sora
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.346-361
    • /
    • 2019
  • The purpose of this study is to compare perceptions toward multicultural adolescents' career problems between multicultural adolescents and parents with multicultural backgrounds and youth and parents in non-multicultural families and to discuss their differences. For this purpose, the data from 825 respondents were analyzed using correspondent analysis. The results follow as: first, multicultural adolescents tended to agree very much with the difficulties of interpersonal relations, distance from appearance, and economic difficulties while non-multicultural adolescents tended to disagree with. Second, both multicultural and non-multicultural adolescents disagreed with the confusion about identity as Koreans, but parents of non-multicultural adolescents showed a negative perception. Third, in terms of education and institutions, multicultural adolescents recognized the strong need for expanding career education opportunities for multicultural students, supporting employment, strengthening access to career information, and professional help for careers compared to non-multicultural adolescents.

The Analysis of the security requirements for a circulation of the classified documents (비밀문서유통을 위한 보안 요구사항 분석)

  • Lee, Ji-Yeong;Park, Jin-Seop;Kang, Seong-Ki
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.361-390
    • /
    • 2003
  • In this paper, we analyze the security requirement for a circulation of the classified documents. During the whole document process phases, including phases of drafting, sending/receiving messages, document approval, storing and saving, reading, examining, out-sending and canceling a document, we catch hold of accompanied threat factors and export every threat factors of security. We also propose an appropriate and correspondent approach for security in a well-prepared way. Last, we present the security guidelines for security architecture of the classified documents circulation.

  • PDF

Performance Analysis using Markov chain in WiBro (WiBro에서 마코프 체인을 이용한 성능분석)

  • Park, Won-Gil;Kim, Hyoung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.190-197
    • /
    • 2010
  • The ACR (Access Control Router) of WiBro processes location registration of the Correspondent Node and Home Agent as the Correspondent Node moves between ACRs. Therefore, the location update cost is low compared with MIPv6. However, all packets which are sent and received are sent through the ACR, so as the number of mobile nodes that are managed by the ACR increases, the cost of packet delivery also increases. Therefore, the communication state of the ACR domain remains smooth when the ACR which manages the mobile node in the ACR domain has good performance. However, network delays occur unless the ACR performs well, so the role of the ACR is important. In this paper, we analysis performance of the ACR for efficient realization of the WiBro standard. By using the Deny Probability and the Total Profit of ACR performance and apply it to the Random Walk Mobility model as the mobility model.

Classification of the Somatotype and Characteristics for the Construction of Obese Boy's Clothing(Part II) (비만아동의 의복설계를 위한 체형분류 및 특성연구(제 2보))

  • 조윤주;이정란
    • The Research Journal of the Costume Culture
    • /
    • v.7 no.3
    • /
    • pp.122-133
    • /
    • 1999
  • The purpose of this study was to classify the somatotype on obese boys of 9 to 11 years old and to make an offer the basis which would be suitable for basic pattern construction by studying of their characteristics, forms and shapes. For this study, data were analyzed by using of photographic measurements in regard to 40 variables. The factor scores used in factor analysis become the basis of determining the value of each variable of the cluster analysis. 1) Eight main factors were extracted from factor analysis. 2) Three types were classified by cluster analysis. 3) Correspondent analysis was applied to data of 4 types in anthropometry between 3 types in photometry.

  • PDF

The Effect of Clothing Appropriateness on Person Perception (의복의 적절성이 대인지각에 미치는 영향에 관한 연구 -이화여대 학생의 캠퍼스 웨어를 중심으로-)

  • 박성은;임숙자
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.19 no.2
    • /
    • pp.264-277
    • /
    • 1995
  • is designed to study the college women's desirable clothing behavior in campus, and to find out the difference in person perception according to appropriate or inappropriate clothing. Detailed object is to find out the following differences according to appropriate and inappropriate clothing in campus: 1) formation of impression 2) inference of value. Addi\ulcorner tionally the difference in person perception according to major, grade and preference group are studied. For data collection, 460 college women who are attending Ewha Woman's University are included, and convenience sampling method is used. Frequency, percentage, mean, factor analysis, t-test, ANDV A. duncan test, correspondent analysis are used for data analysis. The result are as follows: 1) Wearer's impression is devided into four factors: appearence evaluation, personality evaluation, ability and activity. 2) There are significant differences in impression formation and value inference according to situational appropriateness. 3) There are significant differences in person perception according to major, grade and preference group.

  • PDF

Performance Enhancement of Proxy Mobile IPv6 using Binding Query (Binding Query를 활용한 Proxy Mobile IPv6의 성능 향상 기법)

  • Park, Jae-Wan;Kim, Ji-In;Koh, Seok-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1269-1276
    • /
    • 2011
  • In the Proxy Mobile IPv6 (PMIPv6), the data transmission performance may be degraded when the two communicating hosts are located within the same mobile domain, since all the data packet shall be delivered by way of Local Mobility Anchor (LMA). In this paper we propose an extensional scheme of PMIPv6 using binding query. In the proposed Query-based PMIPv6 (Q-PMIPv6) scheme, the Mobile Access Gateway (NAG) of Correspondent Node (CN) sends a binding query to LMA to obtain the Proxy Care-of-Address of Mobile Node (MN). Since then, CN and MN can communicate with each other by using an optimized data path. For comparison, we performed the numerical analysis and the ns-2 simulations for the proposed Q-PMIPv6 scheme and the existing PMIPv6 and PMIPv6 Localized Routing (PMIPv6-LR). From the results, we can see that the proposed scheme outperforms the existing PMIPv6 and PMIPv6-LR schemes in terms of the signaling control and data delivery costs.

Set the Cut Off Values for Diagnosing Heart Weak Children ; By Using K-CBCL Total Behavior Problems Score (심계 허약아 진단을 위한 절단값의 산정 ; K-CBCL 총문제행동점수를 기준으로)

  • Jeong, Min-Jeong;Lim, Jung-Hwa;Hwang, Bo-Min;Yun, Young-Ju;Kim, Ki-Bong
    • The Journal of Pediatrics of Korean Medicine
    • /
    • v.24 no.3
    • /
    • pp.58-67
    • /
    • 2010
  • Objectives: The objective of this study was to evaluate the correlations between the Weak Children Questionnaire result and K-CBCL score. Also, this study was designed to define the cut off values of Heart Weak Scores by using 'K-CBCL' which represents the total behavior problems scores 50T in order to detect Heart Weak in Children Methods: 271 elementary school students in Daejeon answered the questionnaire and the data was analyzed. Results: There were high correlations between Heart Weak Score and K-CBCL which in a total behavior problems scores. The cut off values of Heart Weak Score, K-CBCL, a total behavior problems scores 50T, were calculated by ROC curve analysis. To diagnose as a Heart Weak Children, the correspondent cut off values for Heart Weak Score were 11 in boys and 8 in girls. Conclusions: To diagnose as a Heart Weak in Children, the correspondent cut off values for Heart Weak Score were 11 in boys and 8 in girls.