• Title/Summary/Keyword: Network Centric

Search Result 444, Processing Time 0.026 seconds

Personalized Diabetes Risk Assessment Through Multifaceted Analysis (PD- RAMA): A Novel Machine Learning Approach to Early Detection and Management of Type 2 Diabetes

  • Gharbi Alshammari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.17-25
    • /
    • 2023
  • The alarming global prevalence of Type 2 Diabetes Mellitus (T2DM) has catalyzed an urgent need for robust, early diagnostic methodologies. This study unveils a pioneering approach to predicting T2DM, employing the Extreme Gradient Boosting (XGBoost) algorithm, renowned for its predictive accuracy and computational efficiency. The investigation harnesses a meticulously curated dataset of 4303 samples, extracted from a comprehensive Chinese research study, scrupulously aligned with the World Health Organization's indicators and standards. The dataset encapsulates a multifaceted spectrum of clinical, demographic, and lifestyle attributes. Through an intricate process of hyperparameter optimization, the XGBoost model exhibited an unparalleled best score, elucidating a distinctive combination of parameters such as a learning rate of 0.1, max depth of 3, 150 estimators, and specific colsample strategies. The model's validation accuracy of 0.957, coupled with a sensitivity of 0.9898 and specificity of 0.8897, underlines its robustness in classifying T2DM. A detailed analysis of the confusion matrix further substantiated the model's diagnostic prowess, with an F1-score of 0.9308, illustrating its balanced performance in true positive and negative classifications. The precision and recall metrics provided nuanced insights into the model's ability to minimize false predictions, thereby enhancing its clinical applicability. The research findings not only underline the remarkable efficacy of XGBoost in T2DM prediction but also contribute to the burgeoning field of machine learning applications in personalized healthcare. By elucidating a novel paradigm that accentuates the synergistic integration of multifaceted clinical parameters, this study fosters a promising avenue for precise early detection, risk stratification, and patient-centric intervention in diabetes care. The research serves as a beacon, inspiring further exploration and innovation in leveraging advanced analytical techniques for transformative impacts on predictive diagnostics and chronic disease management.

Leadership Development in Students as Part of Attitude Development

  • Zhou Yongjun;Viktoriia O. Anishchenko;Olena V. Vasylenko;Nataliia V. Iaremenko;Mykhailo V. Fomin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.79-90
    • /
    • 2023
  • Leadership development corresponds to the focus on the individual's success and competitiveness strategy. This is the optimal direction of the organization of attitude development because it covers two aspects of the student's personality development, professionally-oriented and self-centric. The aim of the study is to identify and compare the leadership level in second-and fourth-year students to see dynamics of development and implementation of the leadership phenomenon in the professional and personal making up of future specialists. Based on the theoretical analysis of the issue, the authors developed an objective and subjective diagnostic model for leadership skills. In this study, data of the objective diagnostic technique are the key. Subjective diagnostic technique for leadership skills provides insights for problem interpretation. At the level of the first group of respondents, the average Leadership Skills Level of the second-year students was quite low and was found within the medium level. The second group of respondents consisting of the fourth-year students showed a slight but effective improvement. The Leadership Skills of this group were found at a sufficient level. Positive dynamics was revealed for all criteria of leadership skills as a result of applying objective diagnostic methods: decreased percentage of students with negative and relatively low markers of Leadership Skills Level and corresponding increase in percentage of applicants with positive markers of Leadership Skills Level. Further research can be organized in the direction of identifying and developing successful universal and professionally-oriented tactics for leadership development in students as part of attitude development.

Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study

  • Youngho Kim;Seon-Gyoung Sohn;Kyeong Tae, Kim;Hae Sook Jeon;Sang-Min Lee;Yunkyung Lee;Jeongnyeo Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2665-2691
    • /
    • 2024
  • The philosophy of Zero Trust in cybersecurity lies in the notion that nothing assumes to be trustworthy by default. This drives defense organizations to modernize their cybersecurity architecture through integrating with the zero-trust principles. The enhanced architecture is expected to shift protection strategy from static and perimeter-centric protection to dynamic and proactive measures depending on the logical contexts of users, assets, and infrastructure. Given the domain context of defense environment, we aim three challenge problems to tackle and identify four technical approaches by the security capabilities defined in the Zero Trust Architecture. First approach, dynamic access control manages visibility and accessibility to resources or services with Multi Factor Authentication and Software Defined Perimeter. Logical network separation approach divides networks on a functional basis by using Software Defined Network and Micro-segmentation. Data-driven analysis approach enables machine-aided judgement by utilizing Artificial Intelligence, User and Entity Behavior Analytics. Lastly, Security Awareness approach observes fluid security context of all resources through Continuous Monitoring and Visualization. Based on these approaches, a comprehensive study of modern technologies is presented to materialize the concept that each approach intends to achieve. We expect this study to provide a guidance for defense organizations to take a step on the implementation of their own zero-trust architecture.

The Research Features Analysis of Leisure and Recreation based on Co-authors Network and Topic Model (공저자 네트워크 및 토픽 모델링 기반 여가레크리에이션 학술 연구 특징 분석)

  • Park, SungGeon;Park, Kwang-Won;Kang, Hyun-Wook
    • 한국체육학회지인문사회과학편
    • /
    • v.57 no.2
    • /
    • pp.279-289
    • /
    • 2018
  • The purpose of this study is to investigate features of leisure and recreation scholarship study in The Korean Journal of physical education based on co-authors network and topic modeling through using Word Cloud and LDA Topic Modeling(Latent Dirichlet Allocation). The data collected for this study are 2,697 papers published online from January 2008 to March 2017 on the Korean journal of physical education. Respectively ordered analysis targets are the major author, author of correspondence, co-author 1, co-author 2, co-author n in related document to explore studies' trends using the 369 documents. As a result, the co-author network analysis result found that 451 were linked to the research network, on average researchers had 1.52 relationships and the average distance between researchers was 2.33. The Representative author's concentration of connection was ranked high in the order of the following, Lee. K. M., Hwang. S. H., H., Lee. C. S., and proximity centers were shown in Seo K. B., Han. J. H., Kim. K. J. Finally, parameter-centric features appeared in order of Lee. C. W. and Seo. K. B. was most actively connected between the researchers of the leisure-related academic papers. Future research needs discussions among scholars regarding the trend and direction of future leisure research.

Increased Utilization of LTE-Maritime Networks Based on User Requirements (사용자 요구사항 기반 초고속 해상무선통신망 활용성 증대 방안에 대한 연구)

  • Sangjin JANG;Bu-Young KIM;Si-Hwan LEE;Hyo-Jeong KIM;Taehan SONG;Woo-Seong Shim
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.812-818
    • /
    • 2023
  • During the years 2016 to 2020, the Ministry of Oceans and Fisheries embarked on a strategic initiative to develop a comprehensive Korean e-navigation system, which encompassed the establishment of an 'Long Term Evolution for Maritime (LTE-M).' The primary objectives were to proactively align with international navigation standards and enhance maritime safety for small vessels, particularly fishing boats. However, limitations were identified in the utilization of this network, primarily its constrained application for specific purposes. In response to these limitations, this study delves into user-centric investigations through surveys and interviews, with the goal of expanding the horizon of network utilization. User requirements emerged as the result of study, emphasizing the need for broader network applications, a wider range of target users, diverse network utilization methods, and regulatory streamlining. The user-driven insights gleaned from this study hold the potential to inform and shape future legislative measures, fostering more versatile and inclusive LTE-M network utilization for enhanced maritime safety.

A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System (NCW 환경에서 C4I 체계 전투력 상승효과 평가 알고리즘 : 기술 및 인적 요소 고려)

  • Jung, Whan-Sik;Park, Gun-Woo;Lee, Jae-Yeong;Lee, Sang-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.55-72
    • /
    • 2010
  • Recently, the battlefield environment has changed from platform-centric warfare(PCW) which focuses on maneuvering forces into network-centric warfare(NCW) which is based on the connectivity of each asset through the warfare information system as information technology increases. In particular, C4I(Command, Control, Communication, Computer and Intelligence) system can be an important factor in achieving NCW. It is generally used to provide direction across distributed forces and status feedback from thoseforces. It can provide the important information, more quickly and in the correct format to the friendly units. And it can achieve the information superiority through SA(Situational Awareness). Most of the advanced countries have been developed and already applied these systems in military operations. Therefore, ROK forces also have been developing C4I systems such as KJCCS(Korea Joint Command Control System). And, ours are increasing the budgets in the establishment of warfare information systems. However, it is difficult to evaluate the C4I effectiveness properly by deficiency of methods. We need to develop a new combat effectiveness evaluation method that is suitable for NCW. Existing evaluation methods lay disproportionate emphasis on technical factors with leaving something to be desired in human factors. Therefore, it is necessary to consider technical and human factors to evaluate combat effectiveness. In this study, we proposed a new Combat Effectiveness evaluation algorithm called E-TechMan(A Combat Effectiveness Evaluation Algorithm Considering Technical and Human Factors in C4I System). This algorithm uses the rule of Newton's second law($F=(m{\Delta}{\upsilon})/{\Delta}t{\Rightarrow}\frac{V{\upsilon}I}{T}{\times}C$). Five factors considered in combat effectiveness evaluation are network power(M), movement velocity(v), information accuracy(I), command and control time(T) and collaboration level(C). Previous researches did not consider the value of the node and arc in evaluating the network power after the C4I system has been established. In addition, collaboration level which could be a major factor in combat effectiveness was not considered. E-TechMan algorithm is applied to JFOS-K(Joint Fire Operating System-Korea) system that can connect KJCCS of Korea armed forces with JADOCS(Joint Automated Deep Operations Coordination System) of U.S. armed forces and achieve sensor to shooter system in real time in JCS(Joint Chiefs of Staff) level. We compared the result of evaluation of Combat Effectiveness by E-TechMan with those by other algorithms(e.g., C2 Theory, Newton's second Law). We can evaluate combat effectiveness more effectively and substantially by E-TechMan algorithm. This study is meaningful because we improved the description level of reality in calculation of combat effectiveness in C4I system. Part 2 will describe the changes of war paradigm and the previous combat effectiveness evaluation methods such as C2 theory while Part 3 will explain E-TechMan algorithm specifically. Part 4 will present the application to JFOS-K and analyze the result with other algorithms. Part 5 is the conclusions provided in the final part.

An Origin-Centric Communication Scheme to Support Sink Mobility for Continuous Object Detection in IWSNs (산업용 무선 센서망을 이용한 연속개체 탐지에서 이동 싱크 지원을 위한 발원점 중심의 통신방안)

  • Kim, Myung-Eun;Kim, Cheonyong;Yim, Yongbin;Kim, Sang-Ha;Son, Young-Sung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.12
    • /
    • pp.301-312
    • /
    • 2018
  • In industrial wireless sensor networks, the continuous object detection such as fire or toxic gas detection is one of major applications. A continuous object occurs at a specific point and then diffuses over a wide area. Therefore, many studies have focused on accurately detecting a continuous object and delivering data to a static sink with an energy-efficient way. Recently, some applications such as fire suppression require mobile sinks to provide real-time response. However, the sink mobility support in continuous object detection brings challenging issues. The existing approaches supporting sink mobility are designed for individual object detection, so they establish one-to-one communication between a source and a mobile sink for location update. But these approaches are not appropriate for a continuous object detection since a mobile sink should establish one-to-many communication with all sources. The one-to-many communication increases energy consumption and thus shortens the network lifetime. In this paper, we propose the origin-centric communication scheme to support sink mobility in a continuous object detection. Simulation results verify that the proposed scheme surpasses all the other work in terms of energy consumption.

Component Grid: A Developer-centric Environment for Defense Software Reuse (컴포넌트 그리드: 개발자 친화적인 국방 소프트웨어 재사용 지원 환경)

  • Ko, In-Young;Koo, Hyung-Min
    • Journal of Software Engineering Society
    • /
    • v.23 no.4
    • /
    • pp.151-163
    • /
    • 2010
  • In the defense software domain where large-scale software products in various application areas need to be built, reusing software is regarded as one of the important practices to build software products efficiently and economically. There have been many efforts to apply various methods to support software reuse in the defense software domain. However, developers in the defense software domain still experience many difficulties and face obstacles in reusing software assets. In this paper, we analyze practical problems of software reuse in the defense software domain, and define core requirements to solve those problems. To meet these requirements, we are currently developing the Component Grid system, a reuse-support system that provides a developer-centric software reuse environment. We have designed an architecture of Component Grid, and defined essential elements of the architecture. We have also developed the core approaches for developing the Component Grid system: a semantic-tagging-based requirement tracing method, a reuse-knowledge representation model, a social-network-based asset search method, a web-based asset management environment, and a wiki-based collaborative and participative knowledge construction and refinement method. We expect that the Component Grid system will contribute to increase the reusability of software assets in the defense software domain by providing the environment that supports transparent and efficient sharing and reuse of software assets.

  • PDF

Trends in disaster safety research in Korea: Focusing on the journal papers of the departments related to disaster prevention and safety engineering

  • Kim, Byungkyu;You, Beom-Jong;Shim, Hyoung-Seop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.43-57
    • /
    • 2022
  • In this paper, we propose a method of analyzing research papers published by researchers belonging to university departments in the field of disaster & safety for the scientometric analysis of the research status in the field of disaster safety. In order to conduct analysis research, the dataset constructed in previous studies was newly improved and utilized. In detail, for research papers of authors belonging to the disaster prevention and safety engineering type department of domestic universities, institution identification, cited journal identification of references, department type classification, disaster safety type classification, researcher major information, KSIC(Korean Standard Industrial Classification) mapping information was reflected in the experimental data. The proposed method has a difference from previous studies in the field of disaster & safety and data set based on related keyword searches. As a result of the analysis, the type and regional distribution of organizations belonging to the department of disaster prevention and safety engineering, the composition of co-authored department types, the researchers' majors, the status of disaster safety types and standard industry classification, the status of citations in academic journals, and major keywords were identified in detail. In addition, various co-occurrence networks were created and visualized for each analysis unit to identify key connections. The research results will be used to identify and recommend major organizations and information by disaster type for the establishment of an intelligent crisis warning system. In order to provide comprehensive and constant analysis information in the future, it is necessary to expand the analysis scope and automate the identification and classification process for data set construction.

A Searching Technique of the Weak Connectivity Boundary using Small Unmanned Aerial Vehicle in Wireless Tactical Data Networks (무선 전술 데이터 네트워크에서 소형 무안항공기를 이용한 연결성 약화 지역 탐색 기법)

  • Li, Jin;Song, Ju-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.89-96
    • /
    • 2012
  • Since tactical robots are going to be grown and tactical data communications will be more network-centric, the reliability of wireless tactical data networks is going to be very important in the future. However, the connectivity of such wireless tactical data networks can be extremely uncertain in practical circumstances. In this paper, we propose a searching technique to find out the weak boundary area of the network connectivity using a small UAV(unmanned aerial vehicle) which has a simple polling access function to wireless nodes on the ground in wireless tactical data networks. The UA V calculates the network topology of the wireless tactical data networks and coverts it to the Lapalcian matrix. In the proposed algorithm, we iteratively search the eigenvalues and find a minimum cut in the network resulting in finding the weak boundary of the connectivity for the wireless tactical data networks. If a UAV works as a relay nodes for the weak area, we evaluate that the throughput performance of the proposed algorithm outperforms star connection method and MST(minimum Spanning Tree) connection method. The proposed algorithm can be applied for recovering the connectivity of wireless tactical data networks.