• Title/Summary/Keyword: Network분석

Search Result 14,370, Processing Time 0.041 seconds

Supervised Learning Artificial Neural Network Parameter Optimization and Activation Function Basic Training Method using Spreadsheets (스프레드시트를 활용한 지도학습 인공신경망 매개변수 최적화와 활성화함수 기초교육방법)

  • Hur, Kyeong
    • Journal of Practical Engineering Education
    • /
    • v.13 no.2
    • /
    • pp.233-242
    • /
    • 2021
  • In this paper, as a liberal arts course for non-majors, we proposed a supervised learning artificial neural network parameter optimization method and a basic education method for activation function to design a basic artificial neural network subject curriculum. For this, a method of finding a parameter optimization solution in a spreadsheet without programming was applied. Through this training method, you can focus on the basic principles of artificial neural network operation and implementation. And, it is possible to increase the interest and educational effect of non-majors through the visualized data of the spreadsheet. The proposed contents consisted of artificial neurons with sigmoid and ReLU activation functions, supervised learning data generation, supervised learning artificial neural network configuration and parameter optimization, supervised learning artificial neural network implementation and performance analysis using spreadsheets, and education satisfaction analysis. In this paper, considering the optimization of negative parameters for the sigmoid neural network and the ReLU neuron artificial neural network, we propose a training method for the four performance analysis results on the parameter optimization of the artificial neural network, and conduct a training satisfaction analysis.

A Study on the Analysis and Classification of Cyber Threats Accor ding to the Characteristics of Computer Network of National·Public Organizations (국가·공공기관 전산망 특성에 따른 사이버 위협 분석 및 분류에 관한 연구)

  • Kim, Minsu;Park, Ki Tae;Kim, Jongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.197-208
    • /
    • 2020
  • Based on the network infrastructure advanced in the information knowledge society, the structure of computer net work is operated by establishing the composition of network in various forms that have secured the security. In case of computer network of national/public organizations, it is necessary to establish the technical and managerial securit y environment even considering the characteristics of each organization and connected organizations. For this, the im portance of basic researches for cyber training by analyzing the technical/managerial vulnerability and cyber threats based on the classification and map of cyber threats according to the characteristics of each organization is rising. T hus, this study aims to analyze each type of external/internal cyber threats to computer network of national/public o rganizations established based on the dualistic infrastructure network of internet and national information network, a nd also to present the cyber threat framework for drawing the elements of cyber security training, by drawing and analyzing the actual elements of cyber threats through the case-based scenario.

A Study on Analysis of the Trend of Blockchain by Key Words Network Analysis (키워드 네트워크 분석 방법을 활용한 블록체인 트렌드 분석에 관한 연구)

  • Cho, Seong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.550-555
    • /
    • 2018
  • This study aims to identify and compare contents and keywords used in articles related to blockchain applications to various industries. The text mining and Semantic Network Analysis, as methods of keyword network analysis, were used to analyze articles including terms of 'finance' 'energy' and 'logistics', which media and government frequently mentioned as areas that can apply blockchain technologies. For this study, data were collected from 43,093 articles from January, 2017 through July, 2018. Data crawling was carried out by using Python BeautifulSoup and data cleaning was performed in order to eliminate mutual redundancies of the three terms. After that, text mining and semantic network analysis were performed using Textom and UCInet for network analysis between keywords. The results showed that all the three terms were similar in terms of 'technology', but there were differences in the contents of 'government policy' or 'industry' issues. In addition, there were differences in frequencies and centralities of these terms.

A Network Analysis on Industry-University Cooperation based on Big Data Analytics (빅데이터 기반 산학협력 네트워크 분석)

  • Dae-Hee Kang;Hyunchul Ahn
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.109-124
    • /
    • 2021
  • In this paper, the structural characteristics of Industry-University cooperation networks are analyzed using network analysis. Recent studies have shown that technological cooperation and joint research has a positive effect on R&D performance. In order to boost innovation performance, various types of cooperative activities and governmental policy supports for major R&D stakeholders(i.e. universities, laboratories, etc.) are provided. However, despite these efforts, the outcome is still insufficient, so it is time to prepare for a plan to build an innovative network to strengthen university-centered Industry-University cooperation activities. Specifically, this study builds the networks according to the form of Industry-University cooperations(i.e. patent, paper, joint research, and technology transfer), and different types of Industry-University cooperation networks are analyzed from a statistical viewpoint by using QAP correlation and regression analyses. The analysis results show that joint research network is closely related to paper network, and is related to other Industry-University cooperation networks. This study is expected to shed a light on supporting innovation activities such as establishing Industry-University cooperation strategies and discovering cooperative partners necessary for creating new growth engines for universities.

Transmission Performance of VoIP Traffics on Underwater MANET (수중 MANET에서 VoIP 트래픽의 전송 성능)

  • Kim, Young-Dong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.12
    • /
    • pp.1187-1192
    • /
    • 2016
  • Performance analysis results are limited to of network level, because network level transmission parameters are used for performance measure and analysis of network design, construction and operation on underwater MANET, With this way of performance analysis based on network level, it is not easy to analyze transmission performance related with user level transmission quality. In this paper, transmission performance focused on application traffic be required by user is investigated to supplement weakness of performance analysis based on network level. Voice traffic, which is expected to be increasingly used on underwater MANET, is considered as application service, Some conditions for underwater MANET will be proposed to support transmission quality, MOS, CCR and EED, etc.. A computer simulation based on NS-2 is used for performance measure, voice traffic is generated as VoIP specification.

Investigating Journal Citation Network with Centrality Measures in the Public Administration and Policy Field (중심성지수를 이용한 행정학·정책학 관련 학술지의 상호인용 네트워크 분석)

  • Choe, Jong-Mook
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.301-308
    • /
    • 2016
  • Writing high-quality papers and publishing them at prestigious academic journals would be something that every scholar strives for. This study made a network with nine academic journals in South Korea in the field of public administration and public policy and analyzed the influence of academic journals through social network analysis. Using centrality measures, such as degree centrality, beta centrality, and eigenvector centrality, this study found that Korean Public Administration Review has the highest influence on the journal network, followed by Korean Public Studies Review. However, different choice of centrality measure led to different ranking of journals in terms of their influence.

A Development of Hydrologic Risk Analysis Model for Small Reservoirs Based on Bayesian Network (Bayesian Network 기반 소규모 저수지의 수문학적 위험도 분석 모형 개발)

  • Kim, Jin-Guk;Kim, Jin-Young;Gwon, Hyeon-Han;Kwon, Hyun-Han
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.105-105
    • /
    • 2017
  • 최근 우리나라에서는 국지성호우로 인해 발생하는 돌발홍수에 방어하지 못하는 소규모 저수지에 대한 붕괴사고가 빈발하고 있다. 붕괴된 저수지를 살펴보면, 대체적으로 규모가 작아 체계적인 안전관리가 이루어지지 않거나 경과연수가 50년 이상인 필댐(fill dam) 형식으로 축조된 노후저수지로서 갑작스러운 홍수를 대응하는데 있어 매우 취약한 상태이다. 체계적으로 운영되는 대형댐에 비해 축조기간이 오래된 소규모 저수지의 경우, 저수지에 대한 수문학적 정보가 거의 없거나 미계측되어 보수보강이 필요한 저수지를 선정하거나 정량적인 위험도를 분석하는데 매우 어려운 실정이다. 이러한 이유로 본 연구에서는 노후된 소규모 저수지에 대한 수문학적 파괴인자들을 선정하여 Bayesian Network기반의 소규모 저수지 위험도 분석 모형을 구축하였다. 구축된 모형을 기준으로 고려될 수 있는 다양한 위험인자 및 이들 인자간의 연관성을 평가하였으며, 각각의 노드에 파괴인자를 노드로 할당하여 소규모 저수지의 위험도를 분석하였다. Bayesian Network기법의 도입으로 불확실한 상황을 확률로 표시하고, 복잡한 추론을 정량화된 노드의 관계로 단순화시켜 노드의 연결 관계로 표현하였다. 본 연구에서 제안된 모형은 노후된 소규모 저수지의 수문학적 위험도를 정량으로 분석하는 모형으로서 활용성이 높을 것으로 기대된다.

  • PDF

Bibliometric Network Analysis on Supply Chain Risk Management Research (공급사슬 리스크 관리 연구동향 분석: 네트워크 분석을 중심으로)

  • Pyun, Jebum;Rha, Jin Sung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.6
    • /
    • pp.125-138
    • /
    • 2018
  • Recently, most firms have difficulties in predicting business context due to uncontrollable factors such as natural disasters, terrorism, social and political interests, as well as market factors such as rapid technological change, diversification of customer needs, and intensification of competition with competitors, thereby increasing the importance of risk management. The purpose of this study is to analyze trends of the risk management field concentrating on SCM, which is increasingly interested, and to identify key researches in this field and provide useful academic information. This study collected the information of the articles published in journals using the Scopus database, and analyzed both the network generated by keywords proposed in the articles and the network generated by the information for citations and co-authorship.

A Study on the Current Status of Supply Chain Risks after COVID-19: Focusing on Network Analysis (코로나19 이후 공급사슬 리스크에 대한 현황연구: 네트워크 분석을 중심으로)

  • EuiBeom Jeong;Keontaek Oh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.4
    • /
    • pp.77-92
    • /
    • 2023
  • In this study, keyword network analysis was performed based on global and domestic journals, and network text analysis was conducted for news and articles to examine major issues and research trends on supply chain risks after COVID-19. As a result of analyzing the supply chain risk, after COVID-19 which was relatively insufficient in previous studies, research trends and topics such as supply chain risk recovery, response and public welfare, which are different from previous previous studies, were found in global and domestic journals, news and articles and it was possible to suggest practical strategies and insights for supply chain risk strategies for firms.

A Design and Analysis on Network Architecture for Interactive VOD Services (대화형 VOD 서비스 구축을 위한 네트워크 구조 설계 및 분석)

  • 정승욱;정수환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1080-1087
    • /
    • 1999
  • High-speed network resources and large storage devices on video servers are necessary to Provide interactive VOD services to subscribers, therefore, building networks for VOD services requires a huge amount of cost. A number of studies on network hierarchy for distributed tree architecture, on optimized server allocation with a given network topology, and on program caching etc, are currently in progress. In this study, given specific network resources, a cost effective network architecture including the optimal number of tree levels and the optimal number of branches at a node are designed by modeling cost functions, and some restrictions on network design are discussed. The results of this study are expected to be applied to network architecture design for interactive VOD services

  • PDF