• Title/Summary/Keyword: Hierarchical Network

Search Result 975, Processing Time 0.022 seconds

Task-Biased Technological Change, Occupational Structural Change, and Wage Premium in Local Labor Market Areas, Korea (업무편향적 기술변화에 따른 지역노동시장에서의 일자리 구조 변화와 임금 프리미엄 영향요인)

  • Changhyun Song;Up Lim
    • Journal of the Korean Regional Science Association
    • /
    • v.39 no.4
    • /
    • pp.33-51
    • /
    • 2023
  • This study aims to investigate the changes in the employment structure of occupational groups by job characteristics and analyze the factors influencing wage premiums in local labor markets from 2010 to 2020. This study's analysis involves three primary steps. First, the occupational characteristics data from the Korea Network for Occupations and Workers are subjected to an exploratory factor analysis, and then a non-routine task intensity index is calculated by each occupations. Then, we conduct an exploratory analysis of changes in the distribution of employment by occupation from 2010 to 2020 by combining data from the Population Census with data from the Korean Labor and Income Panel Study to construct individual-level and regional-level data. Thirdly, we employ a hierarchical linear model to examine the individual-level and regional-level factors influencing wage premiums. Since 2010, the proportion of employment in occupations requiring non-routine task has continued to rise and now dominates the metropolitan labor market. Moreover, agglomeration effects resulting from urbanization produce a substantial wage premium for wage workers in occupations requiring non-routine tasks. This study seeks to provide policy implications to mitigate inequality and polarization in local labor markets by empirically analyzing the transition of occupational structure and wage inequality in relation to the local labor market context.

Role of Project Owner in OSS Project: Based on Impression Formation and Social Capital Theory (오픈소스 소프트웨어 운영자 역할이 성과에 미치는 영향: 인상형성과 사회적 자본 이론을 중심으로)

  • Lee, Saerom;Baek, Hyunmi;Jahng, Jungjoo
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.23-46
    • /
    • 2016
  • With the increasing socio-economic value of an open collaboration over the Internet, it has become significantly important to successfully manage open source software development program. Most of the previous research have focused on various factors that influence the performance of the project, but studies on how the project owners recognized as "leader" affect the outcome of the project are very limited. This research investigates how individual and governance characteristics of an owner influences the performance of project based on impression formation and social capital theory. For a data set, we collect 611 Repositories and the owner's data from the open source development platform Github, and we form knowledge sharing network of an each repository by using social network analysis. We use hierarchical regression analysis, and our results show that a leader, who exposes a lot of one's personal information or who has actively followed and showed interests to communicate with other developers, affects positive impacts on project performance. A leader who has a high centrality in knowledge sharing network also positively affects on project performance. On the other hand, if a leader was highly willing to accept external knowledge or is recognized as an expert in the community with large numbers of followers, the result show negative impacts on project performance. The research may serve as a useful guideline not only for the future open source software projects but also for the effective management of different types of open collaboration.

Design and Implementation of Receiver's Buffer Model for Stably Receiving a Hierarchically Encoded UHD Content Based on MMT (MMT 기반 계층 부호화된 UHD 콘텐츠의 안정적인 수신을 위한 수신 버퍼 모델 설계 및 구현)

  • Song, SeulKi;Bang, JongHo;Paik, JongHo
    • Journal of Broadcast Engineering
    • /
    • v.22 no.5
    • /
    • pp.570-577
    • /
    • 2017
  • Recently, with the development of broadcasting communication, users expect to receive high quality and various broadcasting services anytime, anywhere. In the case of terrestrial broadcasting, HD broadcasting and mobile broadcasting are provided at different frequencies. In the case of terrestrial UHD, which recently started trial broadcasting, 700MHz frequency is used which is different from the existing one. If the contents of the same contents are transmitted at different frequencies, it can be considered ineffective in terms of the use efficiency of the terrestrial broadcast frequency. As a method to solve this problem, a transmission system model and a service have been proposed for transmitting the hierarchical encoded UHD contents by SHVC on the basis of the multimedia transmission technology MMT in a heterogeneous network environment combining broadcast network and communication network. However, it is still in the initial stage of study the receiving model that can reliably receive various quality UHD contents in various environments such as mobile and fixed environment. Therefore, in this paper, we propose a receive buffer model that can reliably receive UHD contents layered on SHVC based on MMT.

R-Tree Construction for The Content Based Publish/Subscribe Service in Peer-to-peer Networks (피어투피어 네트워크에서의 컨텐츠 기반 publish/subscribe 서비스를 위한 R-tree구성)

  • Kim, Yong-Hyuck;Kim, Young-Han;Kang, Nam-Hi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.11
    • /
    • pp.1-11
    • /
    • 2009
  • A content based pub/sub (Publish/subscribe) services at the peer-to-peer network has the requirements about how to distribute contents information of subscriber and to delivery the events efficiently. For satisfying the requirements, a DHT(Distributed Hash Table) based pub/sub overlay networking and tree type topology based network construction using filter technique have been proposed. The DHT based technique is suitable for topic based pub/sub service but it's not good contents based service that has the variable requirements. And also filter based tree topology networking is not efficient at the environment where the user requirements are distributed. In this paper we propose the R-Tree algorithm based pub/sub overlay network construction method. The proposed scheme provides cost effective event delivery method by mapping user requirement to multi-dimension and hierarchical grouping of the requirements. It is verified by simulation at the variable environment of user requirements and events.

Security Design for Efficient Detection of Misbehavior Node in MANET (MANET에서 비정상 노드를 효율적으로 탐지하기 위한 보안 설계)

  • Hwang, Yoon-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.408-420
    • /
    • 2010
  • On a Mobile Ad hoc NETwork(MANET), it is difficult to detect and prevent misbehaviors nodes existing between end nodes, as communication between remote nodes is made through multiple hop routes due to lack of a fixed networked structure. Therefore, to maintain MANET's performance and security, a technique to identify misbehaving middle nodes and nodes that are compromise by such nodes is required. However, previously proposed techniques assumed that nodes comprising MANET are in a friendly and cooperative relationship, and suggested only methods to identify misbehaving nodes. When these methods are applied to a larger-scale MANET, large overhead is induced. As such, this paper suggests a system model called Secure Cluster-based MANET(SecCBM) to provide secure communication between components aperANET and to ensure eed. As such, this pand managems suapemisbehavior nodes. SecCBM consists apetwo stages. The first is the preventis pstage, whereemisbehavior nodes are identified when rANET is comprised by using a cluster-based hierarchical control structure through dynamic authentication. The second is the post-preventis pstage, whereemisbehavior nodes created during the course apecommunication amongst nodes comprising the network are dh, thed by using FC and MN tables. Through this, MANET's communication safety and efficiency were improved and the proposed method was confirmed to be suitable for MANET through simulation performance evaluation.

QoS-Guaranteed IP Mobility Management For Fast Moving Vehicles Using Multiple Tunnels (멀티 터널링을 이용한 고속 차량에서 QoS 보장 IP 이동성 관리 방법)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.44-52
    • /
    • 2011
  • In this article, we present a QoS-guaranteed IP mobility management scheme of Internet service for fast moving vehicles with multiple wireless network interfaces. The idea of the proposed mechanism consists of two things. One is that new wireless connections are established to available wireless channels whenever the measured data rate at the vehicle equipped with mobile gateway drops below to the required data rate of the user requirement. The other is that parallel distribution packet tunnels between an access router and the mobile gateway are dynamically constructed using multiple wireless network interfaces in order to guarantee the required data rate during the mobile gateway's movement. By doing these methods, the required data rate of the mobile gateway can be preserved while eliminating the possible delay and packet loss during handover operation, thus resulting in the guaranteed QoS. The architecture of the IETF standard HMIPv6 has been extended to realize the proposed scheme, and detailed algorithms for the extension of HMIPv6 has been designed. Finally, simulation has been done for performance evaluation, and the simulation results show that the proposed mechanism demonstrates guaranteed QoS during the handover with regard to the handover delay, packet loss and throughput.

An Authentication and Handoff Mechanism using AAA and HMIPv6 on NEMO Environment (이동 네트워크(NEMO)에서 HMIPv6를 적용한 AAA 인증 방안 연구)

  • Choi, Kyung;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.165-182
    • /
    • 2009
  • Mobile IPv6 spends considerable bandwidth considering that its signal volume is proportional to the mobile and also it should be strengthened to support the binding signal volume, the traffic, and effective mobility. So, the study in NEMO(Network Mobility), an extended version of Mobile IPv6, has been conducted. NEMO provides its mobility by putting several mobiles and more than one portable router into one unit called as mobile network. Because nodes access Internet via the portable router at this time, it receives transparency without any additional work and that much reduces binding signal while solving binding storm. By supporting mobility, NEMO is able to have various mobile structures which realize several networks hierarchically and it is necessary to improve its safety and security by authenticating among the upper networks or the lower ones while moving. Also, it is extremely required to begin a study in the device to improve efficiency accompanied with mobility, which is executed by the fast hand-off as well as the safe authentication. For those reasons, this paper not only classifies various NEMO mobile scenarios into 7 ways, but also provides AAA authentication of each scenario, the authentication through the safety authentication and fast handoff authentication using F+HMIPv6 and the way to reduce both signaling volume and packet delays efficiently during the handoff.

Efficient Feature Selection Based Near Real-Time Hybrid Intrusion Detection System (근 실시간 조건을 달성하기 위한 효과적 속성 선택 기법 기반의 고성능 하이브리드 침입 탐지 시스템)

  • Lee, Woosol;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.471-480
    • /
    • 2016
  • Recently, the damage of cyber attack toward infra-system, national defence and security system is gradually increasing. In this situation, military recognizes the importance of cyber warfare, and they establish a cyber system in preparation, regardless of the existence of threaten. Thus, the study of Intrusion Detection System(IDS) that plays an important role in network defence system is required. IDS is divided into misuse and anomaly detection methods. Recent studies attempt to combine those two methods to maximize advantagesand to minimize disadvantages both of misuse and anomaly. The combination is called Hybrid IDS. Previous studies would not be inappropriate for near real-time network environments because they have computational complexity problems. It leads to the need of the study considering the structure of IDS that have high detection rate and low computational cost. In this paper, we proposed a Hybrid IDS which combines C4.5 decision tree(misuse detection method) and Weighted K-means algorithm (anomaly detection method) hierarchically. It can detect malicious network packets effectively with low complexity by applying mutual information and genetic algorithm based efficient feature selection technique. Also we construct upgraded the the hierarchical structure of IDS reusing feature weights in anomaly detection section. It is validated that proposed Hybrid IDS ensures high detection accuracy (98.68%) and performance at experiment section.

An Analysis on Collection Profiles of Western Monographs with ILL Data for Academic Libraries (대학도서관 상호대차 장서 프로파일 분석 연구)

  • Choi, Wonsil;Chung, EunKyung
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.3
    • /
    • pp.109-129
    • /
    • 2019
  • Since the recent financial crisis in universities has caused the decrease of academic library budget, the resource sharing has been considered by utilizing inter-library loan (ILL) data for solving the financial deficit. This study aims to identify the collection profiles of western monographs' ILL data among 4-year academic libraries. In order to achieve the purpose of this study, this study analyzes ILL data from 2011 to 2017 using the bibliographic data and ILL transactions of the KERIS union catalog. The findings of the study show that the western monographs was significantly provided by large-scale academic libraries in 2011, however, the extent of major regions expanded, and the number of influential institutions rose in 2016. Second, in 2012, the influence in the ILL network increased in the quantity of western monographs holdings and the proportion of common collections. On the other hand, in 2016, it was also shown that the influence in terms of provision in the ILL network increased in the proportion of unique collections. Lastly, the ILL participating academic libraries were classified into six clusters by a hierarchical clustering analysis of holdings and ILL indexes.

Proteomic analysis for the effects of non-saponin fraction with rich polysaccharide from Korean Red Ginseng on Alzheimer's disease in a mouse model

  • Sujin Kim;Yunkwon Nam;Min-jeong Kim;Seung-hyun Kwon;Junhyeok Jeon;Soo Jung Shin;Soyoon Park;Sungjae Chang;Hyun Uk Kim;Yong Yook Lee;Hak Su Kim;Minho Moon
    • Journal of Ginseng Research
    • /
    • v.47 no.2
    • /
    • pp.302-310
    • /
    • 2023
  • Background: The most common type of dementia, Alzheimer's disease (AD), is marked by the formation of extracellular amyloid beta (Aβ) plaques. The impairments of axons and synapses appear in the process of Aβ plaques formation, and this damage could cause neurodegeneration. We previously reported that non-saponin fraction with rich polysaccharide (NFP) from Korean Red Ginseng (KRG) showed neuroprotective effects in AD. However, precise molecular mechanism of the therapeutic effects of NFP from KRG in AD still remains elusive. Methods: To investigate the therapeutic mechanisms of NFP from KRG on AD, we conducted proteomic analysis for frontal cortex from vehicle-treated wild-type, vehicle-treated 5XFAD mice, and NFP-treated 5XFAD mice by using nano-LC-ESI-MS/MS. Metabolic network analysis was additionally performed as the effects of NFP appeared to be associated with metabolism according to the proteome analysis. Results: Starting from 5,470 proteins, 2,636 proteins were selected for hierarchical clustering analysis, and finally 111 proteins were further selected for protein-protein interaction network analysis. A series of these analyses revealed that proteins associated with synapse and mitochondria might be linked to the therapeutic mechanism of NFP. Subsequent metabolic network analysis via genome-scale metabolic models that represent the three mouse groups showed that there were significant changes in metabolic fluxes of mitochondrial carnitine shuttle pathway and mitochondrial beta-oxidation of polyunsaturated fatty acids. Conclusion: Our results suggested that the therapeutic effects of NFP on AD were associated with synaptic- and mitochondrial-related pathways, and they provided targets for further rigorous studies on precise understanding of the molecular mechanism of NFP.