• Title/Summary/Keyword: Research Network

Search Result 14,427, Processing Time 0.034 seconds

Review of Biological Network Data and Its Applications

  • Yu, Donghyeon;Kim, MinSoo;Xiao, Guanghua;Hwang, Tae Hyun
    • Genomics & Informatics
    • /
    • v.11 no.4
    • /
    • pp.200-210
    • /
    • 2013
  • Studying biological networks, such as protein-protein interactions, is key to understanding complex biological activities. Various types of large-scale biological datasets have been collected and analyzed with high-throughput technologies, including DNA microarray, next-generation sequencing, and the two-hybrid screening system, for this purpose. In this review, we focus on network-based approaches that help in understanding biological systems and identifying biological functions. Accordingly, this paper covers two major topics in network biology: reconstruction of gene regulatory networks and network-based applications, including protein function prediction, disease gene prioritization, and network-based genome-wide association study.

Network intruder trace back mechanism in a Policy-based network security management framework (정책기반 네트워크보안 프레임워크에서의 네트워크 침입자 역 추적 메커니즘)

  • Bang, Hyo-Chan;Na, Jung-Chan;Jang, Jong-Su;Son, Sung-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.899-902
    • /
    • 2002
  • 본 논문에서는 정책기반의 네트워크 보안 프레임워크 내에서 동작하는 침입자 역 추적 방안을 제안하고, 필요한 기능 구성요소에 대해 논한다. 제안한 역 추적 방안에서는 라우터, 스위치 등과 같은 기존의 네트워크 노드에서 tracing 기능을 직접 수행하지 않고도 위조된 유해 패킷의 송신 근원지 파악이 가능하다. 특히 정책기반의 네트워크 보안 프레임워크 내의 구성요소(보안제어서버, 보안게이트웨이)만으로 근원지 주소를 파악할 수 있기 때문에 망 구성 환경에 영향을 받지 않으며 네트워크 서비스 성능에 영향을 끼치지 않고도 침입 근원지를 파악하여 대응 할 수 있는 능동적인 보안 기능이 가능하다.

  • PDF

Time-varying Network Model of Conveyor Systems

  • Kang, Maing-Kyu
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.7 no.2
    • /
    • pp.5-29
    • /
    • 1982
  • This paper presents the network models for general dynamic conveyor systems which are characterized by transporting and storing materials between work stations over time. With an appropriate choice of time-slice the conveyor system can be represented exactly as a dynamic flow network which can be solved by an efficient pure network algorithm.

  • PDF

Network Based Diffusion Model (네트워크 기반 확산모형)

  • Joo, Young-Jin
    • Korean Management Science Review
    • /
    • v.32 no.3
    • /
    • pp.29-36
    • /
    • 2015
  • In this research, we analyze the sensitivity of the network density to the estimates for the Bass model parameters with both theoretical model and a simulation. Bass model describes the process that the non-adopters in the market potential adopt a new product or an innovation by the innovation effect and imitation effect. The imitation effect shows the word of mouth effect from the previous adopters to non-adopters. But it does not divide the underlying network structure from the strength of the influence over the network. With a network based Bass model, we found that the estimate for the imitation coefficient is highly sensitive to the network density and it is decreasing while the network density is decreasing. This finding implies that the interpersonal influence can be under-looked when the network density is low. It also implies that both of the network density and the interpersonal influence are important to facilitate the diffusion of an innovation.

A Study on Anti-Sway of Crane using Neural Network Predictive PID Controller (Anti-Sway에 관한 연구)

  • 손동섭;이진우;민정탁;이권순
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2002.03a
    • /
    • pp.219-227
    • /
    • 2002
  • In this paper, we designed neural network predictive PID controller to control sway happened in transfer of trolley for automatic travel control system. We include dynamic character of nonlinear system, and mathematical expression veny simple used neural network. When various establishment location and surrounding disturbance were approved based on mathematical modelling of crane, controller designed to become effective control location error and vibration angle of two control variables that simultaneously can predictive control. Neural network predictive PID controller produced parameter of PID controller using neural network self-tuner. Neural network self-tuner's input used crane's output and neural network predictive output. Neural network self-tuner using error back propagation algorithm. We analyzed control performance comparison through computer simulation when applied disturbance about sway of location and angle in transfer of crane. The results show that the proposed neural network predictive PID controller has better performances than general PID controller, neural network PID controller.

  • PDF

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

Language network analysis of make-up behavior research (언어 네트워크 분석을 통한 화장행동 연구동향 분석)

  • Baek, Kyoungjin
    • The Research Journal of the Costume Culture
    • /
    • v.27 no.3
    • /
    • pp.274-284
    • /
    • 2019
  • Research on cosmetic behavior has developed significantly since the 2000s. Reviewing cosmetic behavior research can be meaningful because it can grasp trends in the domestic cosmetics market, and it can also illuminate how domestic consumers' interest in makeup has changed over time. The purpose of this study is to investigate the links between major keywords and the keywords which affect makeup behavior of different age groups through network analysis. In this study we analyzed thesis and journal data based on makeup behavior through network analysis using Nodexl. We analyzed 10 years of journals and theses - from 2000 to 2017, and investigated age-related differences in variables related to makeup behavior. Research subjects were divided into age-based groups: 10, 20-40, and over 50. The total number of theses collected was 82. In order to perform network analysis using the Nodexl program, we extracted the frequency of representative words using the KrKwic program. The extracted core words were analyzed for degree centrality, betweenness centrality and eigenvector centrality using Nodexl. The expected result is that the network analysis using keywords will lead to different variables depending on age and the main goal of the cosmetics market, and it is expected to be used as the basis for follow-up research related to cosmetic behavior.

FDVRRP: Router implementation for fast detection and high availability in network failure cases

  • Lee, Changsik;Kim, Suncheul;Ryu, Hoyong
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.473-482
    • /
    • 2019
  • High availability and reliability have been considered promising requirements for the support of seamless network services such as real-time video streaming, gaming, and virtual and augmented reality. Increased availability can be achieved within a local area network with the use of the virtual router redundancy protocol that utilizes backup routers to provide a backup path in the case of a master router failure. However, the network may still lose a large number of packets during a failover owing to a late failure detections and lazy responses. To achieve an efficient failover, we propose the implementation of fast detection with virtual router redundancy protocol (FDVRRP) in which the backup router quickly detects a link failure and immediately serves as the master router. We implemented the FDVRRP using open neutralized network operating system (OpenN2OS), which is an open-source-based network operating system. Based on the failover performance test of OpenN2OS, we verified that the FDVRRP exhibits a very fast failure detection and a failover with low-overhead packets.

Distributed and Virtual Network Operations and Contents Management Based on Hybrid Research Networks (하이브리드 연구망 기반의 분산 가상형 네트워크 운영 및 리소스 정보 관리 기술 연구)

  • Kim, Dong-Kyun;Lee, Myung-Sun;Byeon, Ok-Hwan;Kim, Seung-Hae
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.11-21
    • /
    • 2012
  • Hybrid network infrastructure has been deployed as the most important technology for the advanced research networking community such as Internet2, SURFnet, etc. However, further research needs to be performed in terms of feasible design and implementation of architecture for inter-domain collaborative network infrastructure, which is essential to end-to-end collaborative research based on high-end applications. In this paper, we suggest a framework for distributed and virtual network operations based on hybrid research networks and efficient cooperation between multi-domain hybrid networks, which aims to provide collaborative network environment for high-end applications. Suggested framework is designed to adopt decentralized model of multi-domain hybrid research network management. A collaborative and distributed virtual model that is characterized by cooperation among hybrid research networks that insist on maintaining their autonomy and control, can also contribute for researchers and other end-users to manage and operate their own virtual networks.

Study on Design Research using Semantic Network Analysis

  • Chung, Jaehee;Nah, Ken;Kim, Sungbum
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.563-581
    • /
    • 2015
  • Objective: This study was conducted to investigate the potential of sematic network analysis for design research. Background: As HCD (Human-Centered Design) was emphasized, lots of design research methodologies were developed and used in order to find user needs. However, it is still difficult to discover users' latent needs. This study suggests the semantic network analysis as a complementary means for design research, and proved its potential through the practical application, which compares multi-screen purchase and usage behaviors between America and China. Method: We conducted an in-depth interview with 32 consumers from USA and China, and analyzed interview texts through semantic network analysis. Cross cultural differences in purchase and usage behaviors were investigated, based on measuring centrality and community modularity of devices, functions, key buying factors and brands. Results: Americans use more services and functions in the multi-screen environment, compared to Chinese. As a device substitutes other devices, traditional boundaries of the devices are disappearing in the USA. Americans consider function to recall Apple, but Chinese consider function, design and brand to recall Apple, Sony and Samsung as an important brand at the time of their purchase. Conclusion: This study shows the potential of semantic network analysis for design research through the practical application. Semantic network analysis presents how the concepts regarding a theme are structured in the cognitive map of users with visual images and quantitative data. Therefore, it can complement the qualitative analysis of the existing design research. Application: As the design environment becomes more and more complicated like multi-screen environment, semantic network analysis, which is able to provide design insights in the intuitive and holistic perspective, will be acknowledged as an effective tool for further design research.