• Title/Summary/Keyword: Information Network

Search Result 31,326, Processing Time 0.055 seconds

A Content Analysis of Public Information using Language Network Analysis: Focused on Contents of Twitters of Metropolitans (언어네트워크 분석방법을 활용한 공공정보 내용분석 - 광역도시 대표 트위터 내용을 중심으로 -)

  • Kim, Ji-Hyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.151-171
    • /
    • 2016
  • This study investigated the contents of twitters of metropolitans by year and city using language network analysis. The possibility of twitter as a medium of information provision was also explored. This study employed KrKwic, Ucinet6, and Netdraw programs to conduct language network analysis. As the results, the network was mainly formed with information about civic administration (citizen, management, opening service, participation) and information about citizens living (cultural events, parks, way to work) in 2014. However, information about civic service and announcement (citizen, civic opinion, opening service, civic service, events) occupied a central role in the network of 2015. The results showed that different keywords were derived by year and city in network analysis by city.

Verifying Active Network Applications (액티브 네트워크 응용의 검증)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

Development of the Broadband PLC Home Controller using JINI Surrogate

  • Kim, Yong-Seok;Kim, Hee-Sun;Lee, Chang-Goo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1563-1567
    • /
    • 2005
  • The Home network system means that information appliances, Home PCs, etc., using wired or wireless network method enable to control and share with peripheral devices such as internet, shared data, a scanner and a printer, and it is networking solution, which intelligent communication will be possible as the system which can do a remote control such as TV Set, refrigerators, air conditioners, DVD players, digital camcorders based on external network using an internet, a potable information terminal and a mobile phone whenever, wherever and freely. In this study, the home network interface solution is used one of the wired network standards, PLC (Power-Line Communication) technology, so we can construct of intelligent home network's home controller without re-build a network at home. On keeping with current waves of thought, we will focus on a home controller development with great interest which is enabled to do an effective managed control, applying intelligent home network technology which can be new paradigm like a cyber apartment.

  • PDF

Design and implementation of wireless home network system using Home Network Control Protocol

  • Yoon, Dae-Kil;Lee, Kam-Rok;Myoung, Kwan-Joo;Kwon, Wook-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1558-1562
    • /
    • 2005
  • This paper describes the design and implementation of a wireless home network system using Home Network Control Protocol (HNCP) called the wireless HNCP home network system. For wireless interfaces of HNCP, IEEE 802.11b and IEEE 802.15.4 standard protocols are considered. With the implementation of the wireless HNCP home network system, a simple analysis about coexistence between IEEE 802.11b and IEEE 802.15.4 is achieved. Through the implemented wireless HNCP home network system and the analytical results about the coexistence between both two different wireless protocols, the feasibility of the wireless HNCP home network system is shown.

  • PDF

Load Balancing with Network Information for Multimedia Service

  • Kang, Shin-Woo;Chansu Yu;Kim, Myungchul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.439-441
    • /
    • 2002
  • The number of users and applications of the Internet is increasing and network traffic is increased in proportion to that enormous]y. Application and services, which are provided from a relatively long distance away, running on wide area network are not independent of the current network state. As a multimedia service is provided to a lot of users over the Internet, network status is one of factors to be considered in providing high quality of multimedia service. In this parer, one of methods to get network information is discussed and it is applied to a multimedia service.

  • PDF

Personalizing Information Using Users' Online Social Networks: A Case Study of CiteULike

  • Lee, Danielle
    • Journal of Information Processing Systems
    • /
    • v.11 no.1
    • /
    • pp.1-21
    • /
    • 2015
  • This paper aims to assess the feasibility of a new and less-focused type of online sociability (the watching network) as a useful information source for personalized recommendations. In this paper, we recommend scientific articles of interests by using the shared interests between target users and their watching connections. Our recommendations are based on one typical social bookmarking system, CiteULike. The watching network-based recommendations, which use a much smaller size of user data, produces suggestions that are as good as the conventional Collaborative Filtering technique. The results demonstrate that the watching network is a useful information source and a feasible foundation for information personalization. Furthermore, the watching network is substitutable for anonymous peers of the Collaborative Filtering recommendations. This study shows the expandability of social network-based recommendations to the new type of online social networks.

Virtual Network Embedding based on Node Connectivity Awareness and Path Integration Evaluation

  • Zhao, Zhiyuan;Meng, Xiangru;Su, Yuze;Li, Zhentao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3393-3412
    • /
    • 2017
  • As a main challenge in network virtualization, virtual network embedding problem is increasingly important and heuristic algorithms are of great interest. Aiming at the problems of poor correlation in node embedding and link embedding, long distance between adjacent virtual nodes and imbalance resource consumption of network components during embedding, we herein propose a two-stage virtual network embedding algorithm NA-PVNM. In node embedding stage, resource requirement and breadth first search algorithm are introduced to sort virtual nodes, and a node fitness function is developed to find the best substrate node. In link embedding stage, a path fitness function is developed to find the best path in which available bandwidth, CPU and path length are considered. Simulation results showed that the proposed algorithm could shorten link embedding distance, increase the acceptance ratio and revenue to cost ratio compared to previously reported algorithms. We also analyzed the impact of position constraint and substrate network attribute on algorithm performance, as well as the utilization of the substrate network resources during embedding via simulation. The results showed that, under the constraint of substrate resource distribution and virtual network requests, the critical factor of improving success ratio is to reduce resource consumption during embedding.

A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style (한국형 네트워크 보안 시스템 성능 평가 방법론 실계)

  • Ju, Seung Hwan;Seo, Hee Suk;Kim, Sang Youn
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.97-105
    • /
    • 2011
  • With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

A Water-saving Irrigation Decision-making Model for Greenhouse Tomatoes based on Genetic Optimization T-S Fuzzy Neural Network

  • Chen, Zhili;Zhao, Chunjiang;Wu, Huarui;Miao, Yisheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.2925-2948
    • /
    • 2019
  • In order to improve the utilization of irrigation water resources of greenhouse tomatoes, a water-saving irrigation decision-making model based on genetic optimization T-S fuzzy neural network is proposed in this paper. The main work are as follows: Firstly, the traditional genetic algorithm is optimized by introducing the constraint operator and update operator of the Krill herd (KH) algorithm. Secondly, the weights and thresholds of T-S fuzzy neural network are optimized by using the improved genetic algorithm. Finally, on the basis of the real data set, the genetic optimization T-S fuzzy neural network is used to simulate and predict the irrigation volume for greenhouse tomatoes. The performance of the genetic algorithm improved T-S fuzzy neural network (GA-TSFNN), the traditional T-S fuzzy neural network algorithm (TSFNN), BP neural network algorithm(BPNN) and the genetic algorithm improved BP neural network algorithm (GA-BPNN) is compared by simulation. The simulation experiment results show that compared with the TSFNN, BPNN and the GA-BPNN, the error of the GA-TSFNN between the predicted value and the actual value of the irrigation volume is smaller, and the proposed method has a better prediction effect. This paper provides new ideas for the water-saving irrigation decision in greenhouse tomatoes.

Decomposing Twitter Network in Tourism Marketing

  • Kim, Wonsik;Kim, Daegeun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.80-85
    • /
    • 2021
  • This study is to analyze the structure of the networks of tourism marketing on Twitter, identifying the most prominent users, the flow of information about tourism marketing, and the interaction between the users posting tweets. This study employs NodeXL pro as a visualization software package for social network analysis. The number of vertices or nodes is 171, and the number of the unique edges or links is 128, but there are 101 edges with duplicates, so the total links are 229, which means that there are fewer Twitter accounts in the social network on tourism marketing, but they have a few close relationships by sharing information. The research can map the social network of communicators of tourism marketing using Twitter data. The network has a complicated pattern, including one independent network and some connected networks. Some mediators connect each network and can control the information flow of tourism marketing. More communicators are getting the information than the ones providing it, which means that there is likely to be the dependence of information among communicators that can cause an obstacle and distortion of the information flow system, especially in the independent network.