• Title/Summary/Keyword: Multiple Target

Search Result 1,478, Processing Time 0.033 seconds

A Study on the fantasy of Disney animation (<겨울왕국>을 통해 본 디즈니 애니메이션의 환상성)

  • Lee, Hye-Won;Kim, Min-Jung
    • Cartoon and Animation Studies
    • /
    • s.35
    • /
    • pp.107-128
    • /
    • 2014
  • Cultural Content industries based on imagination and creativity are attracting attention and the animation high value-added industry is still spotlighted. Among them, Disney Studios make money through using their professional skills. There are the know-how has developed for a long time, and there are timeless strategy. This study is analyzing by fantasy elements for knowing the messages of Disney animation. Fantasy defined as genre of literature by Todorov and Jackson emphasized its social role and significance. Hume expanded the area of fantasy and Tolkein Jahoriski and Boyer classified the fantasy according to the purpose. Through the analyzing Disney animation , Disney's fantasy show the specific expression depending on the target. Disney is based on the three types of fantasy depending on the growth of the journey. The first area is composed of the main character's growth and satisfy the desire and escapism, The second is the word of antagonist who opposed to reality and break the rules of the dominant ideology. The last area is the utopia provided after hero beat the antagonist. Disney characters give the messages by using the fantasy like the transformation or alter ego. That show the subject of the main character's growth and the supporting characters as the expression of the multiple personality of main. These emphasize the hero's growth and give the fun. Also, in the subject of the otherness, the hero always destroy the evil who broke the rules of reality. In this way, the fantasy offered by Disney give the messages of sacrifice and family from true love. Disney has the support of their target audiences continue to be able to convey ideology.

Automated Analyses of Ground-Penetrating Radar Images to Determine Spatial Distribution of Buried Cultural Heritage (매장 문화재 공간 분포 결정을 위한 지하투과레이더 영상 분석 자동화 기법 탐색)

  • Kwon, Moonhee;Kim, Seung-Sep
    • Economic and Environmental Geology
    • /
    • v.55 no.5
    • /
    • pp.551-561
    • /
    • 2022
  • Geophysical exploration methods are very useful for generating high-resolution images of underground structures, and such methods can be applied to investigation of buried cultural properties and for determining their exact locations. In this study, image feature extraction and image segmentation methods were applied to automatically distinguish the structures of buried relics from the high-resolution ground-penetrating radar (GPR) images obtained at the center of Silla Kingdom, Gyeongju, South Korea. The major purpose for image feature extraction analyses is identifying the circular features from building remains and the linear features from ancient roads and fences. Feature extraction is implemented by applying the Canny edge detection and Hough transform algorithms. We applied the Hough transforms to the edge image resulted from the Canny algorithm in order to determine the locations the target features. However, the Hough transform requires different parameter settings for each survey sector. As for image segmentation, we applied the connected element labeling algorithm and object-based image analysis using Orfeo Toolbox (OTB) in QGIS. The connected components labeled image shows the signals associated with the target buried relics are effectively connected and labeled. However, we often find multiple labels are assigned to a single structure on the given GPR data. Object-based image analysis was conducted by using a Large-Scale Mean-Shift (LSMS) image segmentation. In this analysis, a vector layer containing pixel values for each segmented polygon was estimated first and then used to build a train-validation dataset by assigning the polygons to one class associated with the buried relics and another class for the background field. With the Random Forest Classifier, we find that the polygons on the LSMS image segmentation layer can be successfully classified into the polygons of the buried relics and those of the background. Thus, we propose that these automatic classification methods applied to the GPR images of buried cultural heritage in this study can be useful to obtain consistent analyses results for planning excavation processes.

Quantitative Evaluation of the Corticospinal Tract Segmented by Using Co-registered Functional MRI and Diffusion Tensor Tractography (정상인에서 기능적 뇌 자기공명영상과 확산텐서영상 합성기법을 이용한 피질척수로의 위치에 따른 정량적 분석)

  • Jang, Sung-Ho;Hong, Ji-Heon;Byun, Woo-Mok;Hwang, Chang-Ho;Yang, Dong-Seok
    • Investigative Magnetic Resonance Imaging
    • /
    • v.13 no.1
    • /
    • pp.40-46
    • /
    • 2009
  • Purpose : The purpose of this study was to investigate the quantitative evaluation of the corticospinal tract (CST) at the multiple levels by using functional MRI (fMRI) co-registered to diffusion tensor tractography (DTT). Materials and Methods : Ten normal subjects without any history of neurological disorder participated in this study. fMRI was performed at 1.5 T MR scanner using hand grasp-release movement paradigm. DTT was performed by using DtiStudio on the basis of fiber assignment continuous tracking algorithm (FACT). The seed region of interest (ROI) was drawn in the area of maximum fMRI activation during the motor task of hand grasp-release movement on a 2-D fractional anisotropy (FA) color map, and the target ROI was drawn in the cortiocospinal portion of anterior lower pons. We have drawn five ROIs for the measurement of FA and apparent diffusion coefficient (ADC) along the corona radiata (CR) down to the medulla. Results : The contralateral primary sensorimotor cortex (SM1) was mainly found to be activated in all subjects. DTT showed that tracts originated from SM1 and ran to the medulla along the known pathway of the CST. In all subjects, FA values of the CST were higher at the level of the midbrain and posterior limb of internal capsule (PLIC) than the level of others. Conclusion : Our study showed that co-registered fMRI and DTT has elucidated the state of CST on 3-D and analyzed the quantitative values of FA and ADC at the multiple levels. We conclude that co-registered fMRI and DTT may be applied as a useful tool for clarifying and investigating the state of CST in the patients with brain injury.

  • PDF

The Individual Discrimination Location Tracking Technology for Multimodal Interaction at the Exhibition (전시 공간에서 다중 인터랙션을 위한 개인식별 위치 측위 기술 연구)

  • Jung, Hyun-Chul;Kim, Nam-Jin;Choi, Lee-Kwon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.19-28
    • /
    • 2012
  • After the internet era, we are moving to the ubiquitous society. Nowadays the people are interested in the multimodal interaction technology, which enables audience to naturally interact with the computing environment at the exhibitions such as gallery, museum, and park. Also, there are other attempts to provide additional service based on the location information of the audience, or to improve and deploy interaction between subjects and audience by analyzing the using pattern of the people. In order to provide multimodal interaction service to the audience at the exhibition, it is important to distinguish the individuals and trace their location and route. For the location tracking on the outside, GPS is widely used nowadays. GPS is able to get the real time location of the subjects moving fast, so this is one of the important technologies in the field requiring location tracking service. However, as GPS uses the location tracking method using satellites, the service cannot be used on the inside, because it cannot catch the satellite signal. For this reason, the studies about inside location tracking are going on using very short range communication service such as ZigBee, UWB, RFID, as well as using mobile communication network and wireless lan service. However these technologies have shortcomings in that the audience needs to use additional sensor device and it becomes difficult and expensive as the density of the target area gets higher. In addition, the usual exhibition environment has many obstacles for the network, which makes the performance of the system to fall. Above all these things, the biggest problem is that the interaction method using the devices based on the old technologies cannot provide natural service to the users. Plus the system uses sensor recognition method, so multiple users should equip the devices. Therefore, there is the limitation in the number of the users that can use the system simultaneously. In order to make up for these shortcomings, in this study we suggest a technology that gets the exact location information of the users through the location mapping technology using Wi-Fi and 3d camera of the smartphones. We applied the signal amplitude of access point using wireless lan, to develop inside location tracking system with lower price. AP is cheaper than other devices used in other tracking techniques, and by installing the software to the user's mobile device it can be directly used as the tracking system device. We used the Microsoft Kinect sensor for the 3D Camera. Kinect is equippedwith the function discriminating the depth and human information inside the shooting area. Therefore it is appropriate to extract user's body, vector, and acceleration information with low price. We confirm the location of the audience using the cell ID obtained from the Wi-Fi signal. By using smartphones as the basic device for the location service, we solve the problems of additional tagging device and provide environment that multiple users can get the interaction service simultaneously. 3d cameras located at each cell areas get the exact location and status information of the users. The 3d cameras are connected to the Camera Client, calculate the mapping information aligned to each cells, get the exact information of the users, and get the status and pattern information of the audience. The location mapping technique of Camera Client decreases the error rate that occurs on the inside location service, increases accuracy of individual discrimination in the area through the individual discrimination based on body information, and establishes the foundation of the multimodal interaction technology at the exhibition. Calculated data and information enables the users to get the appropriate interaction service through the main server.

우리나라 농촌지역의 출산조절행태 및 출산조절행위의 결정요인 분석

  • Chung, Kyung-Hee;Han, Seung-Hyun;Bang, Sook
    • Korea journal of population studies
    • /
    • v.11 no.2
    • /
    • pp.33-53
    • /
    • 1988
  • This study aimed at developing a desirable family planning policy and strategy by examining the current status of family planning practice in rural Korea and by indentifying the crucial factors which affect fertility control behavior. For this purpose, an analytical study was conducted, using the survey data collected in July 1985, on an interview basis, on 1, 440 married women living in the Soyi, Wonnam and Maingdong townships of Eumseong County(in North Chungcheong Province). This study population has the typical characteristics of rural areas, and the results of the analysis can be summarized as follows: 1. In regard to the demographic characteristics of the study population : their average age at marriage was 23.7, they had an average of 2.6 children( 1.3 boys, 1.3 girls) :10% experienced the death of their child (ren) :14% had spontaneous abortion(s) :4% weathered stillbirth(s) :35% went through induced abortion (s) : and 5.5% were currently pregnant. The average of their ideal numbers of children was 2.2, while 44% felt that they must have a son. 2. Looking at the contact rate with medical & health institutions, over the past 1 year, the visit rate to health subcenters was 43.7%, while 26.9% visited the (county) health center :59.6% had been to private clinics : and 41.5% went to the Soonchunhyang - Eumsung hospital : thus showing a relatively high rate of accessibility. 3. The utilization rate of family planning services was 76.5%, with tubectomy being the most prominent method at 52.3%, while the informants were health workers in 54.2% of the acceptors. Of the 8.4% who discontinued the use of contraceptive methods, only 26% did so due to want for pregnancy, natural infertility (meno - pause), or other reasons, while the remaining 74% stopped usage on account of side effects, failure in the methods themselves, and inconvenience of use, thus pointing to a situation where the proper choice of family planning methods have not yet been made. It can be noted that there is a strong motivation for early birth stopping as 35.3% practice family planning even with only one child, of which 38.3% have had sterilization operations. According to results of a multiple regression analysis, among the variables affecting contraception usage the most significant variable was the number of sons. 4. 34.8% experienced induced abortions. It was shown as a result of multiple regression analysis that the number of children and attitudes toward induced abortions extensively affected their frequency of abortions conducted. 5. In the regard to the relation between family planning and induced abortions, 33.7% of the women used both, while 52.0% of them used only the former(family planning), with only 1.4 % utilizing solely the latter(abortion), and 12.9% totally abstaining from fertility regulation : again, the discriminant analysis indicated that the choice of family planning and/or induced abortion was determined by the number of children and attitudes toward induced abortion. In view of the above mentioned results, the following are some comments and suggestions concerning problems related to the current family planning policies, in Korea : 1. It is difficult to expect a further quantitative expansion in family planning program operations, as there has been an excessive supply of target-oriented sterilization operations on women. From a maternal and child health care point of view, it will be desirable to have a diversification of service points in the future where family planning methods may be properly chosen, so that choices of methods which suit the mothers' characteristics and tastes may be made by the individuals themselves by strengthening their quality of family planning information services. 2. Along with the strengthening of the qualitative improvement of family planning services policies must be implemented to effectively promote the moral (ethical) deterrents to induced abortions and to preference for sons. From a maternal care standpoint, the social permissive norm toward induced abortion must be modified, and the bias towards son must be analyzed as the women with more daughters have a lower rate of family planning acceptance. Such changes in attitudes, however, can not be hoped to be accomplished with ad hoc policies, but will only be possible when an enhancement of the women's status(within the society) is brought about in a long - term perspective.

  • PDF

Incidence and Procedure-Related Risk Factors of Delirium in Patients Admitted to an Intensive Care Unit (중환자실 입원 환자의 섬망 발생과 처치 관련 위험인자)

  • Ahn, Jee Seon;Oh, Jooyoung;Park, Jaesub;Kim, Jae-Jin;Park, Jin Young
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.27 no.1
    • /
    • pp.35-41
    • /
    • 2019
  • Objectives : Although delirium is a common complication among patients hospitalized in intensive care units(ICUs), little is known about the roles that diagnostic and therapeutic procedures play in its development. This study investigates the procedure-related risk factors of delirium in ICU patients. Methods : All the consecutive patients admitted to the ICU between June 2016 and May 2017 were routinely evaluated for delirium by psychiatrists. In total, 1156 patients met the inclusion criteria and were retrospectively analyzed. A multiple logistic regression analysis was conducted to investigate independent risk factors of delirium development while adjusting for other characteristics. Results : The age, Acute Physiology and Chronic Health Evaluation (APACHE II) score, proportion of patients who had undergone an operation, and proportion of patients who were foley catheterized, mechanically ventilated, and physically restrained were higher in the delirium group. The multiple logistic regression analysis confirmed that the use of restraint was an independent risk factor of delirium (odds ratio : 10.006 ; 95% confidence interval : 6.120-16.360 ; p<0.001). The patient factors independently associated with delirium were an advanced age and a higher APACHE II score. The incidence of delirium was 15.3%. Conclusions : There is a high prevalence of delirium influenced by potentially harmful procedures in patients in ICU settings. The use of physical restraint had the strongest association with the development of delirium. These findings advocate the need to target procedure-related risk factors such as the use of restraints as preventive intervention measures for ICU delirium.

Relationship between health behaviors and high level of low density lipoprotein-cholesterol applying cardiovascular risk factors among Korean adults: based on the sixth Korea National Health and Nutrition Examination Survey (KNHANES VI), 2013 ~ 2015 (성인의 심혈관계 위험인자를 적용한 고저밀도지단백-콜레스테롤혈증과 건강행태의 관련성 연구 : 국민건강영양조사 제6기 (2013 ~ 2015) 자료 이용)

  • Cha, Bo-Kyoung
    • Journal of Nutrition and Health
    • /
    • v.51 no.6
    • /
    • pp.556-566
    • /
    • 2018
  • Purpose: This study was designed to determine the relationship between health behaviors and high levels of low-density lipoprotein-cholesterol (LDL-cholesterol) according to cardiovascular risk factors among Korean adults. Methods: This cross-sectional study was based on the sixth Korea national health and nutrition examination survey (KNHANES VI). Participants were 13,841 adults aged 19 years and older. Cardiovascular risk factors were stroke, myocardial infarction or angina, diabetes mellitus, smoking, hypertension, aging, high density lipoprotein-cholesterol (HDL-cholesterol) under 40 mg/dL and HDL-cholesterol over 60 mg/dL. Cardiovascular risk groups were classified as very high risk (stroke, myocardial infarction or angina), high risk (diabetes mellitus), moderate risk (over 2 risk factors), and low risk (below 1 risk factor). The prevalence of high LDL-cholesterol was calculated using the LDL-cholesterol target level according to cardiovascular risk group. Results: The prevalence of high LDL-cholesterol was 25.5% in males and 21.7% in females. Complex sample cross tabulation demonstrated that the high LDL-cholesterol and normal groups differed significantly according to age, education, body mass index, percentage of energy from carbohydrate, fat, saturated fat and n-6 in males and females. These two groups were also significantly different according to smoking in males and the percentage of energy from n-3 in females. Complex sample multiple logistic regression analysis adjusted for multiple confounding factors demonstrated that the probability of high LDL-cholesterol was significantly associated with current smoking (OR: 1.66, 95% CI: 1.40-1.99), obesity (OR: 1.95, 95% CI: 1.64-2.31) in males, and current smoking (OR: 1.73, 95% CI: 1.19-2.52), obesity (OR: 1.63, 95% CI: 1.39-1.90), percentage of energy from n-3 (quartile 1 vs. quartile 2; OR: 0.77, 95% CI: 0.62-0.96; quartile 1 vs. quartile 3; OR: 0.73, 95% CI: 0.56-0.94; quartile 1 vs. quartile 4: OR: 0.67, 95% CI: 0.51-0.87) in females. Conclusion: This study reveals the impact of smoking, obesity, energy percentage of nutrient intake on LDL-cholesterol.

Development of a complex failure prediction system using Hierarchical Attention Network (Hierarchical Attention Network를 이용한 복합 장애 발생 예측 시스템 개발)

  • Park, Youngchan;An, Sangjun;Kim, Mintae;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.127-148
    • /
    • 2020
  • The data center is a physical environment facility for accommodating computer systems and related components, and is an essential foundation technology for next-generation core industries such as big data, smart factories, wearables, and smart homes. In particular, with the growth of cloud computing, the proportional expansion of the data center infrastructure is inevitable. Monitoring the health of these data center facilities is a way to maintain and manage the system and prevent failure. If a failure occurs in some elements of the facility, it may affect not only the relevant equipment but also other connected equipment, and may cause enormous damage. In particular, IT facilities are irregular due to interdependence and it is difficult to know the cause. In the previous study predicting failure in data center, failure was predicted by looking at a single server as a single state without assuming that the devices were mixed. Therefore, in this study, data center failures were classified into failures occurring inside the server (Outage A) and failures occurring outside the server (Outage B), and focused on analyzing complex failures occurring within the server. Server external failures include power, cooling, user errors, etc. Since such failures can be prevented in the early stages of data center facility construction, various solutions are being developed. On the other hand, the cause of the failure occurring in the server is difficult to determine, and adequate prevention has not yet been achieved. In particular, this is the reason why server failures do not occur singularly, cause other server failures, or receive something that causes failures from other servers. In other words, while the existing studies assumed that it was a single server that did not affect the servers and analyzed the failure, in this study, the failure occurred on the assumption that it had an effect between servers. In order to define the complex failure situation in the data center, failure history data for each equipment existing in the data center was used. There are four major failures considered in this study: Network Node Down, Server Down, Windows Activation Services Down, and Database Management System Service Down. The failures that occur for each device are sorted in chronological order, and when a failure occurs in a specific equipment, if a failure occurs in a specific equipment within 5 minutes from the time of occurrence, it is defined that the failure occurs simultaneously. After configuring the sequence for the devices that have failed at the same time, 5 devices that frequently occur simultaneously within the configured sequence were selected, and the case where the selected devices failed at the same time was confirmed through visualization. Since the server resource information collected for failure analysis is in units of time series and has flow, we used Long Short-term Memory (LSTM), a deep learning algorithm that can predict the next state through the previous state. In addition, unlike a single server, the Hierarchical Attention Network deep learning model structure was used in consideration of the fact that the level of multiple failures for each server is different. This algorithm is a method of increasing the prediction accuracy by giving weight to the server as the impact on the failure increases. The study began with defining the type of failure and selecting the analysis target. In the first experiment, the same collected data was assumed as a single server state and a multiple server state, and compared and analyzed. The second experiment improved the prediction accuracy in the case of a complex server by optimizing each server threshold. In the first experiment, which assumed each of a single server and multiple servers, in the case of a single server, it was predicted that three of the five servers did not have a failure even though the actual failure occurred. However, assuming multiple servers, all five servers were predicted to have failed. As a result of the experiment, the hypothesis that there is an effect between servers is proven. As a result of this study, it was confirmed that the prediction performance was superior when the multiple servers were assumed than when the single server was assumed. In particular, applying the Hierarchical Attention Network algorithm, assuming that the effects of each server will be different, played a role in improving the analysis effect. In addition, by applying a different threshold for each server, the prediction accuracy could be improved. This study showed that failures that are difficult to determine the cause can be predicted through historical data, and a model that can predict failures occurring in servers in data centers is presented. It is expected that the occurrence of disability can be prevented in advance using the results of this study.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

Improved Social Network Analysis Method in SNS (SNS에서의 개선된 소셜 네트워크 분석 방법)

  • Sohn, Jong-Soo;Cho, Soo-Whan;Kwon, Kyung-Lag;Chung, In-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.117-127
    • /
    • 2012
  • Due to the recent expansion of the Web 2.0 -based services, along with the widespread of smartphones, online social network services are being popularized among users. Online social network services are the online community services which enable users to communicate each other, share information and expand human relationships. In the social network services, each relation between users is represented by a graph consisting of nodes and links. As the users of online social network services are increasing rapidly, the SNS are actively utilized in enterprise marketing, analysis of social phenomenon and so on. Social Network Analysis (SNA) is the systematic way to analyze social relationships among the members of the social network using the network theory. In general social network theory consists of nodes and arcs, and it is often depicted in a social network diagram. In a social network diagram, nodes represent individual actors within the network and arcs represent relationships between the nodes. With SNA, we can measure relationships among the people such as degree of intimacy, intensity of connection and classification of the groups. Ever since Social Networking Services (SNS) have drawn increasing attention from millions of users, numerous researches have made to analyze their user relationships and messages. There are typical representative SNA methods: degree centrality, betweenness centrality and closeness centrality. In the degree of centrality analysis, the shortest path between nodes is not considered. However, it is used as a crucial factor in betweenness centrality, closeness centrality and other SNA methods. In previous researches in SNA, the computation time was not too expensive since the size of social network was small. Unfortunately, most SNA methods require significant time to process relevant data, and it makes difficult to apply the ever increasing SNS data in social network studies. For instance, if the number of nodes in online social network is n, the maximum number of link in social network is n(n-1)/2. It means that it is too expensive to analyze the social network, for example, if the number of nodes is 10,000 the number of links is 49,995,000. Therefore, we propose a heuristic-based method for finding the shortest path among users in the SNS user graph. Through the shortest path finding method, we will show how efficient our proposed approach may be by conducting betweenness centrality analysis and closeness centrality analysis, both of which are widely used in social network studies. Moreover, we devised an enhanced method with addition of best-first-search method and preprocessing step for the reduction of computation time and rapid search of the shortest paths in a huge size of online social network. Best-first-search method finds the shortest path heuristically, which generalizes human experiences. As large number of links is shared by only a few nodes in online social networks, most nods have relatively few connections. As a result, a node with multiple connections functions as a hub node. When searching for a particular node, looking for users with numerous links instead of searching all users indiscriminately has a better chance of finding the desired node more quickly. In this paper, we employ the degree of user node vn as heuristic evaluation function in a graph G = (N, E), where N is a set of vertices, and E is a set of links between two different nodes. As the heuristic evaluation function is used, the worst case could happen when the target node is situated in the bottom of skewed tree. In order to remove such a target node, the preprocessing step is conducted. Next, we find the shortest path between two nodes in social network efficiently and then analyze the social network. For the verification of the proposed method, we crawled 160,000 people from online and then constructed social network. Then we compared with previous methods, which are best-first-search and breath-first-search, in time for searching and analyzing. The suggested method takes 240 seconds to search nodes where breath-first-search based method takes 1,781 seconds (7.4 times faster). Moreover, for social network analysis, the suggested method is 6.8 times and 1.8 times faster than betweenness centrality analysis and closeness centrality analysis, respectively. The proposed method in this paper shows the possibility to analyze a large size of social network with the better performance in time. As a result, our method would improve the efficiency of social network analysis, making it particularly useful in studying social trends or phenomena.