• Title/Summary/Keyword: Network Convergence

Search Result 4,073, Processing Time 0.028 seconds

The Influence of Social Factors of Acceptance of Cloud Services on Consumer Usage Intentions (클라우드 서비스의 수용 관련 사회적 요인이 소비자의 이용의도에 미치는 영향)

  • Chen, Yu-Fei;Nie, Xin-Yu;Quan, Dong-mei
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.173-178
    • /
    • 2022
  • With the development of information technology, the popularization of 5G and cloud computing has accelerated the circulation and digital transformation of information. In the network information society where information is rapidly increasing, it is very important to have the ability to manage and collect the required information. In particular, the information storage and management functions of cloud services are widely used among young people. This research takes the social factors of accepting cloud services as the breakthrough point, and takes young consumers aged 20-30 as the survey object, and designs a research model according to the development of cloud computing technology. The findings verify the influence of social factors on cloud service acceptance and 20-30-year-old consumers' intention to use cloud services. The partial and complete mediating effects of perceived ease of use were verified from the influence relationship between social factors and exploitation intention. Finally, this study provides inspiration for the development direction of cloud computing technology through empirical analysis.

How to Identify Critical Nodes of National Infrastructure Systems in Megacities (메가시티 국가기반체계의 핵심노드 식별 방법)

  • Sim, Jun Hak;Jang, chan Kyu;Park, Sung Jun;Kim, Ki Won;Cho, Sang Keun;Park, Sang Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.531-536
    • /
    • 2022
  • Megacities are emerging all over the world and gradually becoming the center of an country. Therefore, Megacities are inevitably exposed to various threats such as existing, potential, supra-national, and non-military. In particular, as seen in the recent Ukraine-Russia war, national infrastructure systems has become a major target of enemies. However, considering the size of Megacities, various types of threats, and limited resources, it is impossible to completely protect all national infrastructure systems. Therefore, wisdom is necessary to identify and protect critical nodes. The critical node is the vital point to which the national infrastructure is connected. To this end, in this study, as a method for logically and systematically identifying critical nodes, Node centrality analysis method, which is a network theory, and the Center of Gravity analysis method, which is a military theory, were presented.

Analysis of Public Perception and Policy Implications of Foreign Workers through Social Big Data analysis (소셜 빅데이터분석을 통한 외국인근로자에 관한 국민 인식 분석과 정책적 함의)

  • Ha, Jae-Been;Lee, Do-Eun
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.1-10
    • /
    • 2021
  • This paper aimed to look at the awareness of foreign workers in social platforms by using text mining, one of the big data techniques and draw suggestions for foreign workers. To achieve this purpose, data collection was conducted with search keyword 'Foreign Worker' from Jan. 1, to Dec. 31, 2020, and frequency analysis, TF-IDF analysis, and degree centrality analysis and 100 parent keywords were drawn for comparison. Furthermore, Ucinet6.0 and Netdraw were used to analyze semantic networks, and through CONCOR analysis, data were clustered into the following eight groups: foreigner policy issue, regional community issue, business owner's perspective issue, employment issue, working environment issue, legal issue, immigration issue, and human rights issue. Based on such analyzed results, it identified national awareness of foreign workers and main issues and provided the basic data on policy proposals for foreign workers and related researches.

Modeling Species Distributions to Predict Seasonal Habitat Range of Invasive Fish in the Urban Stream via Environmental DNA

  • Kang, Yujin;Shin, Wonhyeop;Yun, Jiweon;Kim, Yonghwan;Song, Youngkeun
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.3 no.1
    • /
    • pp.54-65
    • /
    • 2022
  • Species distribution models are a useful tool for predicting future distribution and establishing a preemptive response of invasive species. However, few studies considered the possibility of habitat for the aquatic organism and the number of target sites was relatively small compared to the area. Environmental DNA (eDNA) is the emerging tool as the methodology obtaining the bulk of species presence data with high detectability. Thus, this study applied eDNA survey results of Micropterus salmoides and Lepomis macrochirus to species distribution modeling by seasons in the Anyang stream network. Maximum Entropy (MaxEnt) model evaluated that both species extended potential distribution area in October compared to July from 89.1% (12,110,675 m2) to 99.3% (13,625,525 m2) for M. salmoides and 76.6% (10,407,350 m2) to 100% (13,724,225 m2) for L. macrochirus. The prediction value by streams was varied according to species and seasons. Also, models elucidate the significant environmental variables which affect the distribution by seasons and species. Our results identified the potential of eDNA methodology as a way to retrieve species data effectively and use data for building a model.

A Study on Backend as a Service for the Internet of Things (사물인터넷을 위한 백앤드 서비스에 관한 연구)

  • Choi, Shin-Hyeong
    • Advanced Industrial SCIence
    • /
    • v.1 no.1
    • /
    • pp.23-31
    • /
    • 2022
  • Cloud services, which started in the early 2000s as a method of using idle servers, are more active with the advent of the 4th industrial revolution, and are being used in many fields as an optimal platform that can be used for business by collecting and analyzing data. On the other hand, the Internet of Things is an environment in which all surrounding objects can freely connect to the Internet network anytime and anywhere to transmit sensed data. In the Internet of Things, data is transmitted in real time, so BaaS, that is, a cloud service for data only has been added. In this paper, among BaaS services for the Internet of Things, a back-end service method that manages data based on Parse Server is explained, and a service that helps patients in rehabilitation is presented using this. For this, a Raspberry Pi is used as a hardware environment, and it is connected to the Internet, collects patient movement information in real time, and manages it through the Parse Server.

Assessment and Analysis of Fidelity and Diversity for GAN-based Medical Image Generative Model (GAN 기반 의료영상 생성 모델에 대한 품질 및 다양성 평가 및 분석)

  • Jang, Yoojin;Yoo, Jaejun;Hong, Helen
    • Journal of the Korea Computer Graphics Society
    • /
    • v.28 no.2
    • /
    • pp.11-19
    • /
    • 2022
  • Recently, various researches on medical image generation have been suggested, and it becomes crucial to accurately evaluate the quality and diversity of the generated medical images. For this purpose, the expert's visual turing test, feature distribution visualization, and quantitative evaluation through IS and FID are evaluated. However, there are few methods for quantitatively evaluating medical images in terms of fidelity and diversity. In this paper, images are generated by learning a chest CT dataset of non-small cell lung cancer patients through DCGAN and PGGAN generative models, and the performance of the two generative models are evaluated in terms of fidelity and diversity. The performance is quantitatively evaluated through IS and FID, which are one-dimensional score-based evaluation methods, and Precision and Recall, Improved Precision and Recall, which are two-dimensional score-based evaluation methods, and the characteristics and limitations of each evaluation method are also analyzed in medical imaging.

A Study on Humanities Healing - Student Pre-Survey Analysis - (인문치유 연구 -학생 사전 설문조사 분석-)

  • Park, Hae Rang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.229-234
    • /
    • 2022
  • This study conducted a preliminary survey to study humanities healing methods for college students. Based on the student survey, we would like to present the research direction of humanities healing and find an appropriate humanities healing method. For quantitative analysis, 10 questions were constructed, focusing on BPS-Modell, Bio, Psycho, and Sozio of life. In the question of the Bio, 50% of the students said they understood their body, mind, and will and acted accordingly, but 20% of the students showed that their actions according to their body, mind, and will did not fit. In the question of Psycho, more than 50% of students said they communicated well with their inner selves, but less than 20% of students did not. In the question of Sozio of life, more than 60% of students form a social network well, but about 10% of students have very low attitudes or meanings toward life. The ultimate purpose of humanities is 'happiness', and the purpose of human life is also 'happiness'. We hope that the power of positivity to realize a stable future society and improve the quality of life will be expanded through humanities healing.

Digital Twin Model Design And Implementation Using UBS Process Data (UBS공정 데이터를 활용한 디지털트윈 모델 설계 및 구현)

  • Park, Seon-Hui;Bae, Jong-Hwan;Ko, Ho-Jeong
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.3
    • /
    • pp.63-68
    • /
    • 2022
  • Due to COVID-19, many paradigm shifts in existing manufacturing facilities and the expansion of non-face-to-face services are accelerating worldwide. A representative technology is digital twin technology. Such digital twin technology, which existed only conceptually in the past, has recently become feasible with the construction of a 5G-based network. Accordingly, this paper designed and implemented a part of the USB process to enable digital twins based on OPC UA communication, which is a standard interlocking structure, between real object objects and virtual reality-based USB process in accordance with this paradigm change. By reflecting the physical characteristics of real objects together, it is possible to simulate real-time synchronization of these with real objects. In the future, this can be applied to various industrial fields, and it is expected that it will be possible to reduce costs for decision-making and prevent dangerous accidents.

Lexical Sophistication Features to Distinguish the English Proficiency Level Using a Discriminant Function Analysis (판별분석을 통해 살펴본 영어 능력 수준을 구별하는 어휘의 정교화 특성)

  • Lee, Young-Ju
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.691-696
    • /
    • 2022
  • This study explored the lexical sophistication features to distinguish the group membership of English proficiency, using the automatic analysis program of lexical sophistication. A total of 600 essays written by 300 Korean college students were extracted from the ICNALE (International Corpus Network of Asian Learners of English) corpus and a discriminant function analysis was performed using SPSS program. Results showed that the lexical features to distinguish three groups of English proficiency are SUBTLEXUS frequency content words, age of acquisition content words, lexical decision mean reaction time function words, and hypernymy verbs. High-level Korean students used frequent content words from SUBTLEXUS corpus to a lesser degree and produced more sophisticated words that can be learned at a later age and take longer reaction time in lexical decision task, and more concrete verbs.

How to Prove the Identity of Artist When Creating Non-fungible Tokens (대체불가능 토큰을 생성할 때 어떻게 예술가의 신원을 증명할까?)

  • Kim, Taekyung;Yang, Ji Yeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.669-676
    • /
    • 2022
  • Non-fungible tokens (NFTs) have the advantage of being able to reliably manage details after minting, but how can ideas be protected before being converted to NFTs? The use of NFTs to increase the value of digital assets is increasing, but the problem of creating and selling NFTs without the consent of the creator is also increasing. Existing methods for protecting creators include a method of using a traditional authentication system and a method of using a social network, but each has limitations. Therefore, in this study, an identity token utilization method is proposed as a way to supplement the existing limitations. When an identity token is used, a certified NFT is issued through an existing identity authentication authority, so the verification of the authenticity of the token becomes clear. In addition, in inheritance and transfer, it becomes possible to respond to legal problems related to the transfer of creative rights.