• Title/Summary/Keyword: Network program

Search Result 2,259, Processing Time 0.037 seconds

Analysis of Articles Related STEAM Education using Network Text Analysis Method (네트워크 텍스트 분석법을 활용한 STEAM 교육의 연구 논문 분석)

  • Kim, Bang-Hee;Kim, Jinsoo
    • Journal of Korean Elementary Science Education
    • /
    • v.33 no.4
    • /
    • pp.674-682
    • /
    • 2014
  • This study aims to analyze STEAM-related articles and to look into the trend of research to present implications for research directions in the future. To achieve the research purpose, the researcher searched by key words, 'STEAM' and 'Convergence Education' through the RISS. Subjects of analysis were titles of 181 articles in journal articles and conference papers published from 2011 through 2013. Through an analysis of the frequency of the texts that appeared in the titles of the papers, key words were selected, the co-occurrence matrix of the key words was established, and using network maps, degree centrality and betweenness centrality, and structural equivalence, a network text analysis was carried out. For the analysis, KrKwic, KrTitle, UCINET and NetMiner Program were used, and the results were as follows: in the result of the text frequency analysis, the key words appeared in order of 'program', 'development', 'base' and 'application'. Through the network among the texts, a network built up with core hubs such as 'program', 'development', 'elementary' and 'application' was found, and in the degree centrality analysis, 'program', 'elementary', 'development' and 'science' comprised key issues at a relatively high value, which constituted the pivot of the network. As a result of the structural equivalence analysis, regarding the types of their respective relations, it was analyzed that there was a similarity in four clusters such as the development of a program (1), analysis of effects (2) and the establishment of a theoretical base (1).

User Preference Prediction & Personalized Recommendation based on Item Dependency Map (IDM을 기반으로 한 사용자 프로파일 예측 및 개인화 추천 기법)

  • 염선희
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.211-214
    • /
    • 2003
  • In this paper, we intend to find user's TV program choosing pattern and, recommend programs that he/she wants. So we suggest item dependency map which express relation between chosen program. Using an algorithm that we suggest, we can recommend an program, which a user has not saw yet but maybe is likely to interested in. Item dependency map is used as patterns for association in hopfield network so we can extract users global program choosing pattern only using users partial information. Hopfield network can extract global information from sub-information. Our algorithm can predict user's inclination and recommend an user necessary information.

  • PDF

Adaptive analysis of characteristic nodes using prediction method in DTN (DTN에서 예측 기반한 적응적 노드 속성 분석)

  • Dho, Yoon-Hyung;Jeon, Il-Kyu;Oh, Young-Jun;Lee, Kang-Whan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2771-2778
    • /
    • 2014
  • In this paper, we propose an algorithm that select efficient relay nodes using information of network environment and nodes. The proposed algorithm can be used changeable weight factors as following network environment in node density. The routing protocols adopting store-carry-forward method are used for solving network problems occurred by unstable end-to-end connection in Delay Tolerant Networks(DTNs). Exiting DTN routing algorithms have problems that large latency and overhead because of deficiency of network informations. The proposed algorithm could be provide a solution this problems using changeable weight factor and prediction of network environment. Thus, selected relay nodes work efficiently in unstable and stressed network environment. Simulation results show that enhancement performance as overhead, delivery ratio, average latency compared to exiting DTN routing algorithm.

Verifying Active Network Applications (액티브 네트워크 응용의 검증)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

Big Data Analysis of the Women Who Score Goal Sports Entertainment Program: Focusing on Text Mining and Semantic Network Analysis.

  • Hyun-Myung, Kim;Kyung-Won, Byun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.222-230
    • /
    • 2023
  • The purpose of this study is to provide basic data on sports entertainment programs by collecting data on unstructured data generated by Naver and Google for SBS entertainment program 'Women Who Score Goal', which began regular broadcast in June 2021, and analyzing public perceptions through data mining, semantic matrix, and CONCOR analysis. Data collection was conducted using Textom, and 27,911 cases of data accumulated for 16 months from June 16, 2021 to October 15, 2022. For the collected data, 80 key keywords related to 'Kick a Goal' were derived through simple frequency and TF-IDF analysis through data mining. Semantic network analysis was conducted to analyze the relationship between the top 80 keywords analyzed through this process. The centrality was derived through the UCINET 6.0 program using NetDraw of UCINET 6.0, understanding the characteristics of the network, and visualizing the connection relationship between keywords to express it clearly. CONCOR analysis was conducted to derive a cluster of words with similar characteristics based on the semantic network. As a result of the analysis, it was analyzed as a 'program' cluster related to the broadcast content of 'Kick a Goal' and a 'Soccer' cluster, a sports event of 'Kick a Goal'. In addition to the scenes about the game of the cast, it was analyzed as an 'Everyday Life' cluster about training and daily life, and a cluster about 'Broadcast Manipulation' that disappointed viewers with manipulation of the game content.

Design and Implementation of NMEA 2000 Based Universal Gateway (NMEA 2000 범용 게이트웨이 설계 및 구현)

  • Kim, Ki-Young;Shin, Soo-Young;Bae, Kwang-Su;Chae, Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.2
    • /
    • pp.191-198
    • /
    • 2014
  • As an NMEA 2000 is a standard for communicate to other electronic equipment, it implemented a Universal gateway based on this ship's network. To implement a NMEA 2000 based Universal gateway, it is porting a NMEA 2000 stack source and CAN device driver source to board, and then it connected a board that equip with various communication protocol(CAN, RS232, USB, Ethernet port). To verify converted ship's data to a developed gateway, it connected pc based simulater program and monitoring program to a developed board. so we can see a ship's data through NEMA 2000 network. We verified a gateway performance and analyzed a generated ship's data from simulator program through a monitoring program that was connected a gateway and NMEA 2000 network. so it was designed, implemented to allow monitoring through utilizing a communication method that user wants.

Integrated Water Distribution Network System using the Mathematical Analysis Model and GIS (수리해석 모형과 GIS를 이용한 통합 용수배분 시스템)

  • Kwon, Jae-Seop;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.4
    • /
    • pp.21-28
    • /
    • 2001
  • In this study, GNLP(GIS linked non-linear network analysis program) for pipeline system analysis has been developed. This GNLP gets the input data for pipeline analysis from existing GIS(geographic information system) data automatically, and has GUI(graphic user interface) for user. Non-Linear Method was used for hydraulic analysis of pipe network based on Hazen-Williams equation, and Microsoft Access of relational database management system(RDBMS) was used for the framework of database applied program. GNLP system environment program was improved so that a pipe network designer can input information data for hydraulic analysis of pipeline system more easily than that of existing models. Furthermore this model generate output such as pressure and water quantities in the form of a table and a chart, and also produces output data in Excel file. This model is also able to display data effectively for analysed data confirmation and query function which is the core of GIS program.

  • PDF

Modificated Intrusion Pattern Classification Technique based on Bayesian Network (베이지안 네트워크 기반의 변형된 침입 패턴 분류 기법)

  • Cha Byung-Rae;Park Kyoung-Woo;Seo Jae-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.4 no.2
    • /
    • pp.69-80
    • /
    • 2003
  • Program Behavior Intrusion Detection Technique analyses system calls that called by daemon program or root authority, constructs profiles, and detectes modificated anomaly intrusions effectively. In this paper, the relation among system calls of processes is represented by bayesian network and Multiple Sequence Alignment. Program behavior profiling by Bayesian Network classifies modified anomaly intrusion behaviors, and detects anomaly behaviors. we had simulation by proposed normal behavior profiling technique using UNM data.

  • PDF

Study on Automatic Generation of Platform Configuration Register in FlexRay Protocol (FlexRay 프로토콜에서 플랫폼 구성 변수의 자동 생성에 관한 연구)

  • Yang, Jae-Sung;Park, Jee-Hun;Lee, Suk;Lee, Kyung-Chang;Choi, GwangHo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.1
    • /
    • pp.41-52
    • /
    • 2012
  • Recently, FlexRay was developed to replace controller area network (CAN) protocol in chassis networking systems, to remedy the shortage of transmission capacity and unsatisfactory real-time transmission delay of conventional CAN. FlexRay network systems require correct synchronization and complex scheduling parameters. However, because platform configuration register (PCR) setting and message scheduling is complex and bothersome task, FlexRay is more difficult to implement in applications than CAN protocol. To assist a network designer for implementing FlexRay cluster, this paper presents an analysis of FlexRay platform configuration register and automatic generation program of PCR. To demonstrate the feasibility of the automatic generation program, we evaluated its performance using experimental testbed.

Groundwaterflow analysis of discontinuous rock mass with probabilistic approach (통계적 접근법에 의한 불연속암반의 지하수 유동해석)

  • 장현익;장근무;이정인
    • Tunnel and Underground Space
    • /
    • v.6 no.1
    • /
    • pp.30-38
    • /
    • 1996
  • A two dimensional analysis program for groundwater flow in fractured network was developed to analyze the influence of discontinuity characteristics on groundwater flow. This program involves the generation of discontinuities and also connectivity analysis. The discontinuities were generated by the probabilistic density function(P.D.F.) reflecting the characteristics of discontinuities. And the fracture network model was completed through the connectivity analysis. This program also involves the analysis of groundwater flow through the discontinuity network. The result of numerical experiment shows that the equivalent hydraulic conductivity increased and became closer to isotropic as the density and trace length increased. And hydraulic head decreased along the fracture zone because of much water-flow. The grouting increased the groundwater head around cavern. An analysis of groundwater flow through discontinuity network was performed around underground oil storage cavern which is now under construction. The probabilistic density functions(P.D.F) were obtained from the investigation of the discontinuity trace map. When the anisotropic hydraulic conductivity is used, the flow rate into the cavern was below the acceptable value to maintain the hydraulic containment. But when the isotropic hydraulic conductivity is used, the flow rate was above the acceptable value.

  • PDF