• Title/Summary/Keyword: Public Network

Search Result 2,438, Processing Time 0.031 seconds

User Information Collection of Weibo Network Public Opinion under Python

  • Changhua Liu;Yanlin Han
    • Journal of Information Processing Systems
    • /
    • v.19 no.3
    • /
    • pp.310-322
    • /
    • 2023
  • Although the network environment is gradually improving, the virtual nature of the network is still the same fact, which has brought a great influence on the supervision of Weibo network public opinion dissemination. In order to reduce this influence, the user information of Weibo network public opinion dissemination is studied by using Python technology. Specifically, the 2019 "Ethiopian air crash" event was taken as the research subject, the relevant data were collected by using Python technology, and the data from March 10, 2019 to June 20, 2019 were constructed by using the implicit Dirichlet distribution topic model and the naive Bayes classifier. The Weibo network public opinion user identity graph model under the "Ethiopian air crash" on June 20 found that the public opinion users of ordinary netizens accounted for the highest proportion and were easily influenced by media public opinion users. This influence is not limited to ordinary netizens. Public opinion users have an influence on other types of public opinion users. That is to say, in the network public opinion space of the "Ethiopian air crash," media public opinion users play an important role in the dissemination of network public opinion information. This research can lay a foundation for the classification and identification of user identity information types under different public opinion life cycles. Future research can start from the supervision of public opinion and the type of user identity to improve the scientific management and control of user information dissemination through Weibo network public opinion.

A Study on Finding the K Shortest Paths for the Multimodal Public Transportation Network in the Seoul Metropolitan (수도권 복합 대중교통망의 복수 대안 경로 탐색 알고리즘 고찰)

  • Park, Jong-Hoon;Sohn, Moo-Sung;Oh, Suk-Mun;Min, Jae-Hong
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.607-613
    • /
    • 2011
  • This paper reviews search methods of multiple reasonable paths to implement multimodal public transportation network of Seoul. Such a large scale multimodal public transportation network as Seoul, the computation time of path finding algorithm is a key and the result of path should reflect route choice behavior of public transportation passengers. Search method of alternative path is divided by removing path method and deviation path method. It analyzes previous researches based on the complexity of algorithm for large-scale network. Applying path finding algorithm in public transportation network, transfer and loop constraints must be included to be able to reflect real behavior. It constructs the generalized cost function based on the smart card data to reflect travel behavior of public transportation. To validate the availability of algorithm, experiments conducted with Seoul metropolitan public multimodal transportation network consisted with 22,109 nodes and 215,859 links by using the deviation path method, suitable for large-scale network.

  • PDF

Public Participation in the Process of Local Public Health Policy, Using Policy Network Analysis

  • Park, Yukyung;Kim, Chang-Yup;You, Myoung Soon;Lee, Kun Sei;Park, Eunyoung
    • Journal of Preventive Medicine and Public Health
    • /
    • v.47 no.6
    • /
    • pp.298-308
    • /
    • 2014
  • Objectives: To assess the current public participation in-local health policy and its implications through the analysis of policy networks in health center programs. Methods: We examined the decision-making process in sub-health center installations and the implementation process in metabolic syndrome management program cases in two districts ('gu's) of Seoul. Participants of the policy network were selected by the snowballing method and completed self-administered questionnaires. Actors, the interactions among actors, and the characteristics of the network were analyzed by Netminer. Results: The results showed that the public is not yet actively participating in the local public health policy processes of decision-making and implementation. In the decision-making process, most of the network actors were in the public sector, while the private sector was a minor actor and participated in only a limited number of issues after the major decisions were made. In the implementation process, the program was led by the health center, while other actors participated passively. Conclusions: Public participation in Korean public health policy is not yet well activated. Preliminary discussions with various stakeholders, including civil society, are needed before making important local public health policy decisions. In addition, efforts to include local institutions and residents in the implementation process with the public officials are necessary to improve the situation.

The Study on Strategic Coalition Modeling using Social Network Analysis for B2B Activation in Public Oriented e-Marketplace -An Application of Public Parts of Cybercity Reference Model- (공적 e-Marketplace에서 사회관계망 분석을 이용한 기업간 전자상거래 활성화를 위한 전략적 제휴모형에 관한 연구 - 사이버시티 참조모델의 공적부문을 중심으로 -)

  • 정석찬;박기남
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.2
    • /
    • pp.113-128
    • /
    • 2002
  • This paper proposes a public oriented e-Marketplace that induces strategic coalition using database in which detail information about each firm is contained. A public oriented e-Marketplace links each firm through the type of Internet business model and constructs a trading community. We introduce a design methodology of public oriented e-Marketplace called as social network analysis. Social network analysis helps each firm's network easily visualized and completely modeled. Additionally, this paper tries to analyze the relationship among the level of competition, potential of strategic coalition, and financial performance. We demonstrate the firm to easily accept various strategic coalitions can make higher financial performance under the more competitive condition. This implies that strategic coalition through public oriented e-Marketplace provide the each firm with various opportunities.

  • PDF

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

Analyzing Public Transport Network Accessibility

  • Jun, Chulmin
    • Korean Journal of Geomatics
    • /
    • v.4 no.2
    • /
    • pp.53-57
    • /
    • 2004
  • Due to the traffic congestion and public-oriented transportation policies of Seoul, public transportation is receiving attention and being used increasingly. However, current transport routes configuration is showing unbalanced accessibility throughout the city area creating differences in time, expenses and metal burden of users who travel the same distances. One of the reasons is that transport route planning has been partially empirical and non-quantitative tasks due to lack of relevant methods for assessing the complexity of the transport routes. This paper presents a method to compute the connectivity of public transport system based on the topological structure of the network of transport routes. The main methodological issue starts from the fact that the more transfers take place, the deeper the connectivity becomes making that area evaluated as less advantageous as for public transport accessibility. By computing the connectivity of each bus or subway station with all others in a city, we can quantify the differences in the serviceability of city areas based on the public transportation. This paper is based on the topological interpretation of the routes network and suggests an algorithm that can automate the computation process. The process is illustrated using a simple artificial network data built in a GIS.

  • PDF

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.

Survey of Algorithms and Techniques Used to Improve the Security of A Public Wi-Fi Network

  • Aloufi, Hanouf;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.194-202
    • /
    • 2022
  • The use of public Wi-Fi has increased in recent years with many people like to spend their time outside in malls or café shops which provide public Wi-Fi for their customers. However, since the public Wi-Fi can be accessed from any device the security of public Wi-Fi plays a big role to prevent the stealing of information by an attacker with methods and techniques such as WPA, WPA2 and WPA3. However, it is well known to the attackers that these methods are not difficult to get hacked by the attacker device to take the client precious information. Some researches were done in increasing the security of public Wi-Fi each with their own different technique or algorithm to provide more secure connection to the public Wi-Fi and prevent any unauthorized user to connect to avoid stealing the data of another legal user. Theses research paper are evaluated to learn which method excel in protecting the public Wi-Fi security by giving an analysis to the methods provided by the research paper with comparing the pros and cons of each algorithm. Moreover, the research displays that there are methods to actually provide security to the public Wi-Fi with each being very different in implementation.

Examining Public Responses to Transgressions of CEOs on YouTube: Social and Semantic Network Analysis

  • Jin-A Choi;Sejung Park
    • Journal of Contemporary Eastern Asia
    • /
    • v.23 no.1
    • /
    • pp.18-34
    • /
    • 2024
  • In what was labeled the "nut rage" incident, the vice president of Korean Air, Hyun-Ah Cho (Heather Cho), demonstrated behavior that exemplifies corporate transgression and deviation from societal moral standards toward a flight attendant aboard a flight. Such behavior instigated the public to express negative sentiment on various social media platforms. This study investigates word-of-mouth network on YouTube in response to the crisis, patterns of co-commenting activities across selected YouTube videos, as well as public responses to the incident by employing social and semantic network analysis. A total of 512 YouTube videos featuring the crisis from December 8, 2014 through November 11, 2018, and 52,772 public comments to the videos were collected. The central videos in the network successfully attracted the public's attention and engagements. The results suggest that the video network was decentralized, with multiple videos acting as hubs in the network. The public commented on various videos instead of focusing on a few. The contents of influential videos uploaded by popular news organizations revealed not only Cho's behaviors related to the nut rage crisis but also unrelated illegal behaviors and the moral violations committed by the family members of Korean Air. The public attached derogatory remarks to Cho and her family, and the comments also addressed ethical concerns, management issues of the company, and boycott intentions. The results imply that adverse public reaction was related to the long-standing problem caused by family ownership and governance in large Korean corporations. This Korean Air scandal illustrates backlash toward a leadership breakdown by the family business conglomerate prevalent in the Korean society. This study provides insights for effective handling of similar crises.

Investigating Journal Citation Network with Centrality Measures in the Public Administration and Policy Field (중심성지수를 이용한 행정학·정책학 관련 학술지의 상호인용 네트워크 분석)

  • Choe, Jong-Mook
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.301-308
    • /
    • 2016
  • Writing high-quality papers and publishing them at prestigious academic journals would be something that every scholar strives for. This study made a network with nine academic journals in South Korea in the field of public administration and public policy and analyzed the influence of academic journals through social network analysis. Using centrality measures, such as degree centrality, beta centrality, and eigenvector centrality, this study found that Korean Public Administration Review has the highest influence on the journal network, followed by Korean Public Studies Review. However, different choice of centrality measure led to different ranking of journals in terms of their influence.