• Title/Summary/Keyword: Technology network analysis

Search Result 3,917, Processing Time 0.045 seconds

Social Network Analysis of Professional Groups based on Co-author and Review Networks (전문가 그룹의 소셜 네트워크 분석: 국내 학술지 공저자 및 심사자 네트워크를 중심으로)

  • Kim, Injai;Choi, Jaewon;Kim, Kihwan;Min, Geumyoung
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.181-196
    • /
    • 2014
  • Many studies have been studied in the Information Technology (IT) area such as Information Systems, Business, Industrial Engineering, Computer Science, Data Analytics and so on. Although various fields for IT exist, searching experts and reviewers in IT journals are subjective. The related journals have made efforts to assign experts for the qualified review. This study conducted developing the framework for understanding and evaluating the experts among co-authors and reviewers through social network analysis. To explore the findings, we collected data of the co-authored network and the reviewer network of the Korea Society of IT Services Journal. Totally, 545 authors for submissions and 314 co-authors were used for analyzing the co-authored network. To analyze the network, we divided two networks as a network for 545 papers and a network of 316 papers excluded 229 single authored-papers. In the findings, we found out various researchers published their papers with collaborations. Also, authors who have high scores of centrality can be said as experts for specific fields. In addition, we analyzed 358 data of reviewers from 2005 to 2011. About 50 reviewers have reviewed the submitted papers based on their expertise since 2005. Peculiarly, the expertise and the qualified review in Korea Society of IT Services Journal were identified in that almost reviewers do not review various papers at a time based on low degree measures and network density.

An Analysis on the Trends and Issues of Convergence Technology Research (네트워크 분석을 통한 국내 융합기술 연구동향 분석)

  • Lim, Jung-Yeon
    • Journal of Internet of Things and Convergence
    • /
    • v.4 no.1
    • /
    • pp.23-29
    • /
    • 2018
  • The purpose of study was to analyze the trends of 2005 to 2018 revised 'convergence technology research' through text network analysis using NetMiner4.0 program. Data analysis was conducted by using keyword analysis, centrality analysis of 653 authors' keyword from 177 journals. The results of the study are as follows. First, Research on Converging Technology has been studied steadily over the past 13 years in Department of Industry Convergence. Second, the results of the search term frequency analysis show that the 'convergence technology', 'technology convergence', 'convergence', 'design', 'convergence education', 'STEAM', 'convergence research' were used as the main keywords of convergence technology research. Third, Community analysis results show that five communities have been classified five categories according to the characteristics of the search terms 'only IT', 'Cultural industry utilizing Convergence contents', 'Technology innovation and research analysis' And patent development'. Based on these results, we proposed the future directions of convergence technology research.

Tour Social Network Service System Using Context Awareness (상황인식 기반의 관광 소셜 네트워크 서비스 응용)

  • Jang, Min-seok;Kim, Su-gyum;Choi, Jeong-pil;Sung, In-tae;Oh, Young-jun;Shim, Jang-sup;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.573-576
    • /
    • 2014
  • In this paper, it provides social network service using context-aware for tourism. For this the service requires Anthropomorphic natural process. The service object need to provide the function analyzing, storing and processing user action. In this paper, it provides an algorithm to analysis with personalized context aware for users. Providing service is an algorithm providing social network, helped by 'Friend recommendation algorithm' which to make relations and 'Attraction recommendation algorithm' which to recommend somewhere significant. Especially when guide is used, server analysis history and location of users to provide optimal travel path, named 'Travel path recommendation algorithm'. Such as this tourism social network technology can provide more user friendly service. This proposed tour guide system is expected to be applied to a wider vary application services.

  • PDF

Technological Convergence and Knowledge Network in Rural Area: Fermented Soy Product Manufacturing Industry in Sunchang, Korea (농촌지역 산업 기술지식의 융합과 지식 네트워크: 순창군 장류산업을 중심으로)

  • Huh, Dongsuk;Park, Sohyun;Koo, Yangmi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.3
    • /
    • pp.566-582
    • /
    • 2016
  • This study aims to analyze knowledge extension and diffusion trend among industries through technological convergence in non-Capital rural areas. A case of Sunchang, Korea examines knowledge extension trend of fermented soy product manufacturing industry. Patent application data are used to make technology convergence analysis and knowledge network analysis. Patent analysis results show that there are differences of knowledge extension trend between the whole country and Sunchang. Technologies of fermented soy product manufacturing in Sunchang is inclined to extend toward technologies related to fermented microorganism. Contrary to the whole country, knowledge extension in rural area like Sunchang is converged to technologies suitable for specialized but limited regional assets and human resources. Core actors of knowledge network of fermented soy product manufacturing in Sunchang are mainly public organizations such as local government, universities, and agencies or institutes. Recently technology sharing and extension is likely to occur through the cooperation between associative corporations and public organizations.

  • PDF

Analysis on Big data, IoT, Artificial intelligence using Keyword Network (빅데이터, IoT, 인공지능 키워드 네트워크 분석)

  • Koo, Young-Duk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1137-1144
    • /
    • 2020
  • This paper aims to provide strategic suggestions by analyzing technology trends related to big data, IoT, and artificial intelligence. To this end, analysis was performed using the 2018 national R&D information, and major basic analysis and language network analysis were performed. As a result of the analysis, research and development related to big data, IoT, and artificial intelligence are being conducted by focusing on the basic and development stages, and it was found that universities and SMEs have a high proportion. In addition, as a result of the language network analysis, it is judged that the related fields are mainly research for use in the smart farm and healthcare fields. Based on these research results, first, big data is essential to use artificial intelligence, and personal identification research should be conducted more actively. Second, they argued that full-cycle support is needed for technology commercialization, not simple R&D activities, and the need to expand application fields.

A Novel Framework for APT Attack Detection Based on Network Traffic

  • Vu Ngoc Son
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.52-60
    • /
    • 2024
  • APT (Advanced Persistent Threat) attack is a dangerous, targeted attack form with clear targets. APT attack campaigns have huge consequences. Therefore, the problem of researching and developing the APT attack detection solution is very urgent and necessary nowadays. On the other hand, no matter how advanced the APT attack, it has clear processes and lifecycles. Taking advantage of this point, security experts recommend that could develop APT attack detection solutions for each of their life cycles and processes. In APT attacks, hackers often use phishing techniques to perform attacks and steal data. If this attack and phishing phase is detected, the entire APT attack campaign will be crash. Therefore, it is necessary to research and deploy technology and solutions that could detect early the APT attack when it is in the stages of attacking and stealing data. This paper proposes an APT attack detection framework based on the Network traffic analysis technique using open-source tools and deep learning models. This research focuses on analyzing Network traffic into different components, then finds ways to extract abnormal behaviors on those components, and finally uses deep learning algorithms to classify Network traffic based on the extracted abnormal behaviors. The abnormal behavior analysis process is presented in detail in section III.A of the paper. The APT attack detection method based on Network traffic is presented in section III.B of this paper. Finally, the experimental process of the proposal is performed in section IV of the paper.

Sliding mode control based on neural network for the vibration reduction of flexible structures

  • Huang, Yong-An;Deng, Zi-Chen;Li, Wen-Cheng
    • Structural Engineering and Mechanics
    • /
    • v.26 no.4
    • /
    • pp.377-392
    • /
    • 2007
  • A discrete sliding mode control (SMC) method based on hybrid model of neural network and nominal model is proposed to reduce the vibration of flexible structures, which is a robust active controller developed by using a sliding manifold approach. Since the thick boundary layer will reduce the virtue of SMC, the multilayer feed-forward neural network is adopted to model the uncertainty part. The neural network is trained by Levenberg-Marquardt backpropagation. The design objective of the sliding mode surface is based on the quadratic optimal cost function. In course of running, the input signal of SMC come from the hybrid model of the nominal model and the neural network. The simulation shows that the proposed control scheme is very effective for large uncertainty systems.

Interconnection Pricing for Mobile Internet Network (무선인터넷 망 접속료 산정 방안)

  • Kim Tae-Sung;Kim Min-Jeong;Byun Jae-Ho
    • Journal of Korea Technology Innovation Society
    • /
    • v.8 no.3
    • /
    • pp.1139-1156
    • /
    • 2005
  • The explosive growth in wireless networks and Internet services has created considerable demand for mobile Internet services based on the mobile phone. Mobile Internet has become the new business model in telecommunication market, therefore the open network policy for mobile Internet has been formulated and implemented by the government in Korea. In spite of the open network policy for mobile Internet, there has been no systematic analysis of the various interconnection issues, including pricing, in mobile Internet network. This paper aims to suggest the interconnection pricing methods for mobile Internet network by reviewing the current pricing models for various communications services, and adapting them to mobile Internet communications circumstances. Results of this paper can be used as a guideline for government policy directions and management decision making after the introduction of the open network policy for mobile Internet.

  • PDF

Topology Characteristics and Generation Models of Scale-Free Networks

  • Lee, Kang Won;Lee, Ji Hwan
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.4
    • /
    • pp.205-213
    • /
    • 2021
  • The properties of a scale-free network are little known; its node degree following a power-law distribution is among its few known properties. By selecting real-field scale-free networks from a network dataset and comparing them to other networks, such as random and non-scale-free networks, the topology characteristics of scale-free networks are identified. The assortative coefficient is identified as a key metric of a scale-free network. It is also identified that most scale-free networks have negative assortative coefficients. Traditional generation models of scale-free networks are evaluated based on the identified topology characteristics. Most representative models, such as BA and Holme&Kim, are not effective in generating real-field scale-free networks. A link-rewiring method is suggested that can control the assortative coefficient while preserving the node degree sequence. Our analysis reveals that it is possible to effectively reproduce the assortative coefficients of real-field scale-free networks through link-rewiring.

A Study on Activation of Network through the Ba of Knowledge Sharing : The case of NPOs Network (지식공유의 장(場)을 통한 협력네트워크 활성화에 대한 연구 : 비영리조직 네트워크를 중심으로)

  • Jin, Ho-Seok;Park, Sang-Hyeok;Park, Jeong-Seon
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.85-104
    • /
    • 2017
  • Purpose The purpose of this study is to improve the efficiency of the activities of loosely connected network organization through the platform(Ba) of knowledge sharing. Loosely connected network organizations have been tried to promote new work and complement the scarce resources through collaborations. NPO(Non-Profit Organization) is essential to establish cooperation networks in order to achieve the public interest on the basis of scarce resources. This study interpreted the Ba on the 'Change-On' program and analyzed the social networks of regional organizations through the activation of the Ba. The 'Change-On' program is conducted for several years to promote the efficiency of the NPO network by Daum Generation Foundation. Design/methodology/approach This study made a design to organize the Ba concept of Nonaka & Konno and presented a case of the Ba activated based on the NPO network of regional order. According to the social network analysis of regional cooperation within the network of participating organizations was extended, it was found that the principal plays a significant role as a central hub made. Findings According to the empirical analysis, this study illustrated that various types of network were formed among NPOs based on the 'Change-On'. Furthermore, the networks surrounding NPOs are extended to the other people connected to them. This means that the network of NPOs had been diversified via the facilitation of the Ba. This study throws new highlights on the new role for the Ba as a network promoter in addition to the partner as a technology-provider in the NPO ecosystem. Moreover, the network analysis between before-and-after can be used for the evaluation of the effectiveness of the various Ba programs.