• Title/Summary/Keyword: Technology network analysis

Search Result 3,917, Processing Time 0.037 seconds

선박사고 기인 해양재난 피해축소를 위한 해양과학기술 개발수요 도출

  • Jang, Deok-Hui;Gang, Gil-Mo
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.508-525
    • /
    • 2015
  • The purpose of this study is to derive the demands to develop marine science technology to reduce damage of disasters caused by boating accidents. This study analyzed the press release to identify the factors of damages that can result from boating accidents and derive the demands for technology development to approach from the perspective of marine science technology to avoid the elements of damage. For this purpose, this study analyzed the contents of about 77,000 articles posted for a month after the tragedy of the Sewol (April 16 - May 15) to derive the keywords and used SNA for the network analysis of each keyword. The findings of the analysis showed that there were five networks and each network consisted of different aspects of technology development to prepare for the marine disasters. Based on these findings, this study derived the demands for technology development from the perspective of marine science technology required to prepare for the possible marine disasters caused by vessels in the future.

  • PDF

Effects of Network Externality on Perceived Value and Adoption of High-tech Products : Focusing on Convergence Products (네트워크 외부성이 첨단기술제품에 대한 가치와 채택의도에 미치는 영향: 컨버전스제품을 중심으로)

  • Park, Kyung Ja
    • The Journal of Information Systems
    • /
    • v.24 no.4
    • /
    • pp.21-42
    • /
    • 2015
  • Purpose The high-technology market shows characteristics of a highly interdependent network market in both supply-side and demand-side, compared to other markets. Particularly, for convergence products, connectivity with related elements, as well as characteristics of innovation itself, is relatively important to the extent that they combine functions provided by several devices into a single device. Therefore, this study aims to identify whether network externality exists in value and adoption of a convergence product and discover a source of network externality, if any. Design/methodology/approach: Through a preceding research analysis and a literature review, 'social influence' and 'network size' have been drawn as direct network elements. On the other hand, general (comprehensive) concept compatibilities including 'intra-technology compatibility', 'inter-technology compatibility' and 'complementary-technology compatibility' are regarded as indirect network elements. Findings: Major findings are as followed;- First, it is shown that the factors influencing on perceived value of a convergence products are 'social influence' and 'network size' as the direct network elements and 'complementary-compatibility' among indirect network elements. Second, it is also found that 'intra-technology compatibility', 'inter-technology compatibility', 'complementary-compatibility' and 'perceived value' have significant effects on adoption of a convergence product. Particularly, it is known that 'complementary-compatibility' is an important source of network externality as it plays a decisive role in value judgment and has significant effects on perceived value. It is worthwhile to notice that this study comprehensively explains effects of network on high-tech products by structuring comparability as a multi-dimensional concept, as well as direct network elements.

A Study on the Impact of Applying Network Address Mutation Technology within the Network Protection System (네트워크 보호체계에서 네트워크 주소변이 기술 적용에 대한 영향성 연구)

  • Suwon Lee;Seyoung Hwang;SeukGue Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.939-946
    • /
    • 2023
  • In the hyper-connected network, which network equipment is diverse and network structure is complex, the attack surface has also increased. In this environment, MTD(Moving Target Defense) technology is being researched as a method to fundamentally defend against cyber attacks by actively changing the attack surface. network-based MTD technologies are being widely studied. However, in order for network address mutation technology to be applied within the existing fixed IP-based system, research is needed to determine what impact it will have. In this paper, we studied the impact of applying network address mutation technology to the existing network protection system. As a result of the study, factors to be considered when firewall, NAC, IPS, and network address mutation technologies are operated together were derived, and elements that must be managed in network address mutation technology for interoperability with the network analysis system were suggested.

The Performance Analysis of CPU scheduling Algorithms in Operating Systems

  • Thangakumar Jeyaprakash;Ranjana P;Sambath M
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.165-170
    • /
    • 2023
  • Scheduling algorithms plays a significant role in optimizing the CPU in operating system. Each scheduling algorithms schedules the processes in the ready queue with its own algorithm design and its properties. In this paper, the performance analysis of First come First serve scheduling, Non preemptive scheduling, Preemptive scheduling, Shortest Job scheduling and Round Robin algorithm has been discussed with an example and the results has been analyzed with the performance parameters such as minimum waiting time, minimum turnaround time and Response time.

The Role of SMT and Business Network Accentuation on Value Distribution and Performance Consequences

  • GALIB, Mukhtar;HAERANI, Siti;MAMIMG, Jumidah;RAZAK MUNIR, Abdul
    • Journal of Distribution Science
    • /
    • v.20 no.5
    • /
    • pp.97-104
    • /
    • 2022
  • Purpose: This study intends to analyze the effect of competitor pressure and customer pressure on social media technology use and the value of the business network and their implications for marketing performance. Research design, and methodology: A constructed questionnaire was conducted with 90 respondents of MSME's Business Actors in South Sulawesi Partial Least Square (PLS) analysis was applied to analyze and verify all the data. Results: Competitor pressure has a significant effect on social media technology, Competitor pressure has a positive and significant impact on business network accentuation. Customer pressure has a positive and significant impact on social media technology. Customer pressure has a positive and significant impact on business network accentuation. Social media technology utilization has a significant impact on Business Network Accentuation. Social media technology utilization has a significant effect on Marketing Performance. Business Network has a significant effect on Marketing Performance. Conclusions: It is an important thing for MSMEs to increase the use of social media technology to meet the demands of consumers and pressure from competitors. The use of social media technology must be implemented effectively and efficiently so that it can be utilized as an effective tool for distributing the value that own by a company to improve the company's marketing performance.

Routing protocol Analysis in Low Power Sensor Network For Energy Efficiency (에너지 효율성을 고려한 저 전력 센서 네트워크에서의 라우팅 프로토콜 분석)

  • Kim, Dong-il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.777-780
    • /
    • 2014
  • The sensor network technology for core technology of ubiquitous computing is in the spotlight recently, the research on sensor network is proceeding actively which is composed many different sensor node. The major traffic patterns of plenty of sensor networks are composed of collecting types of single directional data, which is transmitting packets from several sensor nodes to sink node. One of the important condition for design of sensor node is to extend for network life which is to minimize power-consumption under the limited resources of sensor network. In this work, we analysis adapted routing protocols using the network simulation that was used exiting network and network provider needs will be able to solve the problem.

  • PDF

Burmese Sentiment Analysis Based on Transfer Learning

  • Mao, Cunli;Man, Zhibo;Yu, Zhengtao;Wu, Xia;Liang, Haoyuan
    • Journal of Information Processing Systems
    • /
    • v.18 no.4
    • /
    • pp.535-548
    • /
    • 2022
  • Using a rich resource language to classify sentiments in a language with few resources is a popular subject of research in natural language processing. Burmese is a low-resource language. In light of the scarcity of labeled training data for sentiment classification in Burmese, in this study, we propose a method of transfer learning for sentiment analysis of a language that uses the feature transfer technique on sentiments in English. This method generates a cross-language word-embedding representation of Burmese vocabulary to map Burmese text to the semantic space of English text. A model to classify sentiments in English is then pre-trained using a convolutional neural network and an attention mechanism, where the network shares the model for sentiment analysis of English. The parameters of the network layer are used to learn the cross-language features of the sentiments, which are then transferred to the model to classify sentiments in Burmese. Finally, the model was tuned using the labeled Burmese data. The results of the experiments show that the proposed method can significantly improve the classification of sentiments in Burmese compared to a model trained using only a Burmese corpus.

Hierarchical Structure in Semantic Networks of Japanese Word Associations

  • Miyake, Maki;Joyce, Terry;Jung, Jae-Young;Akama, Hiroyuki
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2007.11a
    • /
    • pp.321-329
    • /
    • 2007
  • This paper reports on the application of network analysis approaches to investigate the characteristics of graph representations of Japanese word associations. Two semantic networks are constructed from two separate Japanese word association databases. The basic statistical features of the networks indicate that they have scale-free and small-world properties and that they exhibit hierarchical organization. A graph clustering method is also applied to the networks with the objective of generating hierarchical structures within the semantic networks. The method is shown to be an efficient tool for analyzing large-scale structures within corpora. As a utilization of the network clustering results, we briefly introduce two web-based applications: the first is a search system that highlights various possible relations between words according to association type, while the second is to present the hierarchical architecture of a semantic network. The systems realize dynamic representations of network structures based on the relationships between words and concepts.

  • PDF

Design and Analysis of Search and Rescue System using MANET (MANET를 이용한 등산객 조난 구조 시스템 설계 및 분석)

  • Lee, Dong-Eun;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.37-42
    • /
    • 2007
  • A mobile ad hoc network (MANET) is a kind of wireless ad hoc network. It is a self-configuring network of mobile nodes connected by wireless links. Infostation is a lower cost and low power system that provides very high bit rate with limited coverage. In this study, we propose search and rescue system that combines MANET of climbers with Infostations. A climber shares location information of climbers with other climbers while climbing, and delivers the information to Infostations. This system is an intermittent network due to the mobility of nodes. From the system, we can track the locations of missing climbers. Ultimately, proposed system achieves low cost and reduces memory requirement using Infestations. We also analyze the performance of the proposed system by simulation. From the performance analysis results, we expect that the proposed system will be very useful to early detect climbers' locations in emergency situations in Korea mountain areas.

  • PDF

A Novel Method for Survivability Test Based on End Nodes in Large Scale Network

  • Ming, Liang;Zhao, Gang;Wang, Dongxia;Huang, Minhuan;Li, Xiang;Miao, Qing;Xu, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.620-636
    • /
    • 2015
  • Survivability is a necessary property of network system in disturbed environment. Recovery ability is a key actor of survivability. This paper concludes network survivability into a novel composite metric, i.e. Network Recovery Degree (NRD). In order to measure this metric in quantity, a concept of Source-Destination Pair (SD Pair), is created to abstract end-to-end activity based on end nodes in network, and the quality of SD Pair is also used to describe network performance, such as connectivity, quality of service, link degree, and so on. After that, a Survivability Test method in large scale Network based on SD pairs, called STNSD, is provided. How to select SD Pairs effectively in large scale network is also provided. We set up simulation environment to validate the test method in a severe destroy scenario and evaluate the method scalability in different large scale network scenarios. Experiment and analysis shows that the metric NRD correctly reflects the effort of different survivability strategy, and the proposed test method STNSD has good scalability and can be used to test and evaluate quantitative survivability in large scale network.