• Title/Summary/Keyword: Public Network

Search Result 2,447, Processing Time 0.041 seconds

A Text Mining Study on Endangered Wildlife Complaints - Discovery of Key Issues through LDA Topic Modeling and Network Analysis - (멸종위기 야생생물 민원 텍스트 마이닝 연구 - LDA 토픽 모델링과 네트워크 분석을 통한 주요 이슈 발굴 -)

  • Kim, Na-Yeong;Nam, Hee-Jung;Park, Yong-Su
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.26 no.6
    • /
    • pp.205-220
    • /
    • 2023
  • This study aimed to analyze the needs and interests of the public on endangered wildlife using complaint big data. We collected 1,203 complaints and their corresponding text data on endangered wildlife, pre-processed them, and constructed a document-term matrix for 1,739 text data. We performed LDA (Latent Dirichlet Allocation) topic modeling and network analysis. The results revealed that the complaints on endangered wildlife peaked in June-August, and the interest shifted from insects to various endangered wildlife in the living area, such as mammals, birds, and amphibians. In addition, the complaints on endangered wildlife could be categorized into 8 topics and 5 clusters, such as discovery report, habitat protection and response request, information inquiry, investigation and action request, and consultation request. The co-occurrence network analysis for each topic showed that the keywords reflecting the call center reporting procedure, such as photo, send, and take, had high centrality in common, and other keywords such as dung beetle, know, absence and think played an important role in the network. Through this analysis, we identified the main keywords and their relationships within each topic and derived the main issues for each topic. This study confirmed the increasing and diversifying public interest and complaints on endangered wildlife and highlighted the need for professional response. We also suggested developing and extending participatory conservation plans that align with the public's preferences and demands. This study demonstrated the feasibility of using complaint big data on endangered wildlife and its implications for policy decision-making and public promotion on endangered wildlife.

The Construction of Logical, Physical Network Separation by Virtualization (가상화를 이용한 논리적, 물리적 망분리 구축)

  • Lee, YongHui;Yoo, SeungJae
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • With the development of information and communication, public institutions and enterprises utilize the business continuity using the Internet and Intranet. In this environment, public institutions and enterprises is to be introduced the number of solutions and appliances equipment to protect the risk of leakage of inside information. However, this is also the perfect external network connection is not enough to prevent leakage of information. To overcome these separate internal and external networks are needed. In this paper, we constructed the physical and logical network separation is applied to the network using the virtualization and thus the network configuration and network technical review of the various schemes were proposed for the separation.

A Study on "A Public Key Cryptosystem for Computer Communication Networks" ("컴퓨터 통신 NETWORK를 위한 공개키 암호 시스템"에 관한 고찰)

  • 권창영;장청룡;원동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.8
    • /
    • pp.1051-1058
    • /
    • 1993
  • This paper points out some weakpoints in the "A Study on Public Key Cryptosystem for Computer Communication Networks" proposed by Gi Jun Ku at KICS 92-22('92-3 Vol.17 No.3) . This public key cryptosystem based on polynomials over finite rings is not strong against cipertext-only-attack. This paper indicate the insecureness of the proposed a public key cryptosystem.ptosystem.

  • PDF

A Study on Scheme of Automatical Security Analysis Tools for Information Security System (정보보호 시스템 보안성 자동 분석 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.117-127
    • /
    • 2008
  • The backwardness of Domestic security management system tend to depend on foreign security companies which have advanced technology. The appearance risk to flow out confidential affairs of domestic enterprises and public organizations to foreign countries. In this regard, this paper is implement and designed automatic security analysis system for secure public network. This system is to offer enhanced security quality of public organizations and reducing the dependence on foreign companies. And maintains security analysis technique for public network.

  • PDF

Assessing Knowledge Structures for Public Research Institutes

  • Yang, Hyeonchae;Jung, Woo-Sung
    • Journal of Contemporary Eastern Asia
    • /
    • v.15 no.1
    • /
    • pp.27-40
    • /
    • 2016
  • This study uses a network approach to investigate the structural characteristics of sub-organizations within public research institutes in order to obtain their implications for organizational structures. We construct a network based on research similarities between sub-organizations because sub-organizations generally build their own research portfolios. We examine how sub-units are organized based on their structural features. The structural features are compared between three public research institutes in different countries: the Korean the Government-funded Research Institutes (GRIs), the Max-Planck-Gesellschaft in Germany, and the National Laboratories (NLs) in the United States. The structural comparison helps to identify organizational characteristics and to differentiate between them. We found little common ground in the research areas between the GRIs because individual sub-organizations have distinct research portfolios. Therefore, the organizational hierarchy of research in the GRIs is less matured than it is in other public research institutes. This study suggests that the GRIs need to establish integrated strategies in order to strengthen the common knowledge base.

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

Information and Legal Support for the Implementation of a Gender Approach to Public Administration

  • Goshovska, Valentyna;Balasynovuch, Nataliia;Hryhorovych, Liliia;Goshovskyi, Volodymyr;Danylenko, Lydiia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.150-158
    • /
    • 2021
  • The study identifies the importance of informational and legislative support in ensuring gender equality. It determines the relevance of gender inequality, the main problem, which is confirmed by research and statistical information. The study aims to determine the methods of collecting information and legal regulation of gender issues and the possibility of solving them by public authorities. The main methods of gathering information are census surveys, questionnaires, surveys on public service websites, work with local communities, surveys in nursing homes and orphanages, special survey programs, and election polls. The paper considers the legal regulation of gender inequalities at the international, state, local and organizational levels. According to the analysis of the problem of gender inequality, it is established that the problem is practically eliminated in many developed countries, while countries with low incomes face gender inequality constantly.

We Love or Hate When Celebrities Speak Up about Climate Change: Receptivity to Celebrity Involvement in Environmental Campaigns

  • Park, Sejung
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.1
    • /
    • pp.175-188
    • /
    • 2019
  • This study investigates public receptivity to celebrity's climate change advocacy on YouTube through a semantic network analysis. The results of this study suggest that the YouTube video generated a number of viewers' responses. Celebrity endorsement not only leaded public voices on climate change issue, but also their opinions on the celebrity endorser. This study found that most of viewers were polarized in their judgment and attitude toward the celebrity advocate either positively or negatively. This study offers an exploratory examination of the perceived star power and the role of celebrities as spokespersons for social causes. This study contributes to the theoretical foundation of the role of celebrity advocacy using social media. In addition, this study offers methodological insights into how to detect public perceptions and attitudes toward celebrity endorsement of social causes by analyzing public comments.

A Study on Model for Developing SOP with Public Safety Communications (재난통신 표준운영절차(SOP) 개발 모델 연구)

  • Park, Seong-Gyoon
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.214-223
    • /
    • 2019
  • This paper presents methodologies and strategies for developing standard operating procedures (SOPs) that are essential for practical use of disaster communication systems. Therefore, the various factors related to the SOP of the public safety network(SafeNet) are identified and analyzed, and the processes and strategies for the effective development of the SOP are developed and presented based on the analysis. In addition, the proposed SOP is reflected in LTE, which is public safety network implementation technology, and suggests how priority and QoS that are the basis of radio resource allocation should be operated.

The Impact of Digital Technologies on Environmental Management in the Public Administration System of the Regions

  • Rudenko, Olha;Koltun, Victoriia;Shcherbak, Nataliya;Kononenko, Inna;Konoplia, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.235-241
    • /
    • 2022
  • The main purpose of the article is to analyze the features of the impact of digital technologies on environmental management in the public administration system of the regions. The revival of the economy and its digitalization, which emerged after the first wave of the economic crisis, is already fraught with an aggravation of the ecological situation in the region. Of course, the conventional model of economic growth has by now exhausted its capabilities and can be characterized as environmentally unsustainable. Digital technologies bring changes that cannot be ignored. Based on the results of the study, key aspects of the impact of digital technologies on environmental management in the public administration system of the regions were identified.