• Title/Summary/Keyword: Technology network analysis

Search Result 3,917, Processing Time 0.038 seconds

Semantic Network Analysis for the President Directions Item : Focusing on Patterns(2001~2009) (대통령 지시사항에 대한 의미연결망 분석 : 2001년~2009년의 정권별 패턴을 중심으로)

  • Jung, Yuiryong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.129-137
    • /
    • 2018
  • The aim of this study is to analyze the President Directions Item using Semantic Network Analysis. This study has three contributions. First, this study shows the difference of policy directions through the frequency and contents of key words. Second, this study suggest patterns changes of decision-making of the president and bureaucracy through the key words network structure. Third, this study infers the interaction between the president's will and context of institutions.

Bibliometric Analysis of Collaboration Network and the Role of Research Station in Antarctic Science

  • Kim, Hyunuk;Jung, Woo-Sung
    • Industrial Engineering and Management Systems
    • /
    • v.15 no.1
    • /
    • pp.92-98
    • /
    • 2016
  • Due to the large scale of Antarctic science, scientific collaboration is required for conducting scientific research. In this study, we attempted to investigate collaboration network and the role of research station in Antarctic science based on bibliometric data from 1995 to 2014. We confirmed that geographical proximity tends to be important for scientific collaboration by employing community detection in the network. This result raises the question about what the role of research station in Antarctica is. We tried to reveal its role by focusing on five countries, Belgium, China, Czech Republic, India, and Korea that constructed new research stations during the last decade. Relative growth rate, a value to measure the growth of publications, didn't differ much around the construction period compared to those in other periods for these countries except Belgium. However, we found geographical keywords emerged around the construction for all five countries. These keywords were utilized to observe national research activities in Antarctica. They show where countries started to be concerned about after the construction.

Analysis of Seoul Metropolitan Subway Network Characteristics Using Network Centrality Measures (네트워크 중심성 지표를 이용한 서울 수도권 지하철망 특성 분석)

  • Lee, Jeong Won;Lee, Kang Won
    • Journal of the Korean Society for Railway
    • /
    • v.20 no.3
    • /
    • pp.413-422
    • /
    • 2017
  • In this study we investigate the importance of the subway station using network centrality measures. For centrality measures, we have used betweenness centrality, closeness centrality, and degree centrality. A new measure called weighted betweenness centrality is proposed, that combines both traditional betweenness centrality and passenger flow between stations. Through correlation analysis and power-law analysis of passenger flow on the Seoul metropolitan subway network, we have shown that weighted betweenness centrality is a meaningful and practical measure. We have also shown that passenger flow between any two stations follows a highly skewed power-law distribution.

Performance Analysis of Grid Resolution and Storm Sewage Network for Urban Flood Forecasting (지표격자해상도 및 우수관망 간소화 수준에 따른 도시홍수 예측 성능검토)

  • Sang Bo Sim;Hyung-Jun Kim
    • Journal of the Korean Society of Safety
    • /
    • v.39 no.1
    • /
    • pp.70-81
    • /
    • 2024
  • With heavy rainfall due to extreme weather causing increasing damage, the importance of urban flood forecasting continues to grow. To forecast urban flooding accurately and promptly, a sewer network and surface grid with appropriate detail are necessary. However, for urban areas with complex storm sewer networks and terrain structures, high-resolution grids and detailed networks can significantly prolong the analysis. Therefore, determining an appropriate level of network simplification and a suitable surface grid resolution is essential to secure the golden time for urban flood forecasting. In this study, InfoWorks ICM, a software program capable of 1D-2D coupled simulation, was used to examine urban flood forecasting performance for storm sewer networks with various levels of simplification and different surface grid resolutions. The inundation depth, inundation area, and simulation time were analyzed for each simplification level. Based on the analysis, the simulation time was reduced by up to 65% upon simplifying the storm sewer networks and by up to 96% depending on the surface grid resolution; further, the inundation area was overestimated as the grid resolution increased. This study provides insights into optimizing the simplification level and surface grid resolution for storm sewer networks to ensure efficient and accurate urban flood forecasting.

A Study on the Analysis of Security Requirements through Literature Review of Threat Factors of 5G Mobile Communication

  • DongGyun Chu;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.38-52
    • /
    • 2024
  • The 5G is the 5th generation mobile network that provides enhanced mobile broadband, ultra-reliable & low latency communications, and massive machine-type communications. New services can be provided through multi-access edge computing, network function virtualization, and network slicing, which are key technologies in 5G mobile communication. However, these new technologies provide new attack paths and threats. In this paper, we analyzed the overall threats of 5G mobile communication through a literature review. First, defines 5G mobile communication, analyzes its features and technology architecture, and summarizes possible security issues. Addition, it presents security threats from the perspective of user devices, radio access network, multi-access edge computing, and core networks that constitute 5G mobile communication. After that, security requirements for threat factors were derived through literature analysis. The purpose of this study is to conduct a fundamental analysis to examine and assess the overall threat factors associated with 5G mobile communication. Through this, it will be possible to protect the information and assets of individuals and organizations that use 5G mobile communication technology, respond to various threat situations, and increase the overall level of 5G security.

Exploring Potential Application Industry for Fintech Technology by Expanding its Terminology: Network Analysis and Topic Modelling Approach (용어 확장을 통한 핀테크 기술 적용가능 산업의 탐색 :네트워크 분석 및 토픽 모델링 접근)

  • Park, Mingyu;Jeon, Byeongmin;Kim, Jongwoo;Geum, Youngjung
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.1
    • /
    • pp.1-28
    • /
    • 2021
  • FinTech has been discussed as an important business area towards technology-driven financial innovation. The term fintech is a combination of finance and technology, which means ICT technology currently associated with all finance areas. The popularity of the fintech industry has significantly increased over time, with full investment and support for numerous startups. Therefore, both academia and practice tried to analyze the trend of the fintech area. Despite the fact, however, previous research has limitations in terms of collecting relevant databases for fintech and identifying proper application areas. In response, this study proposed a new method for analyzing the trend of Fintech fields by expanding Fintech's terminology and using network analysis and topic modeling. A new Fintech terminology list was created and a total of 18,341 patents were collected from USPTO for 10 years. The co-classification analysis and network analysis was conducted to identify the technological trends of patent classification. In addition, topic modeling was conducted to identify the trends of fintech in order to analyze the contents of fintech. This study is expected to help both managers and investors who want to be involved in technology-driven financial services seize new FinTech technology opportunities.

Adaptive Time Delay Compensation Process in Networked Control System

  • Kim, Yong-Gil;Moon, Kyung-Il
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.34-46
    • /
    • 2016
  • Networked Control System (NCS) has evolved in the past decade through the advances in communication technology. The problems involved in NCS are broadly classified into two categories namely network issues due to network and control performance due to system network. The network problems are related to bandwidth allocation, scheduling and network security, and the control problems deal with stability analysis and delay compensation. Various delays with variable length occur due to sharing a common network medium. Though most delays are very less and mostly neglected, the network induced delay is significant. It occurs when sensors, actuators, and controllers exchange data packet across the communication network. Networked induced delay arises from sensor to controller and controller to actuator. This paper presents an adaptive delay compensation process for efficient control. Though Smith predictor has been commonly used as dead time compensators, it is not adaptive to match with the stochastic behavior of network characteristics. Time delay adaptive compensation gives an effective control to solve dead time, and creates a virtual environment using the plant model and computed delay which is used to compensate the effect of delay. This approach is simulated using TrueTime simulator that is a Matlab Simulink based simulator facilitates co-simulation of controller task execution in real-time kernels, network transmissions and continuous plant dynamics for NCS. The simulation result is analyzed, and it is confirmed that this control provides good performance.

PERFORMANCE ANALYSIS OF THE PARALLEL CUPID CODE IN DISTRIBUTED MEMORY SYSTEM BASED ETHERNET AND INFINIBAND NETWORK (이더넷과 인피니밴드 네트워크 기반의 분산 메모리 시스템에서 병렬성능 분석)

  • Jeon, B.J.;Choi, H.G.
    • Journal of computational fluids engineering
    • /
    • v.19 no.2
    • /
    • pp.24-29
    • /
    • 2014
  • In this study, a parallel performance of CUPID-code has been investigated for both Ethernet and Infiniband network system to examine the effect of cache memory and network-speed. Bi-conjugate gradient solver of CUPID-code has been parallelised by using domain decomposition method and message passing interface (MPI). It is shown that the parallel performance of Ethernet-network system is worse than that of Infiniband-network system due to the slow network-speed and a small cache memory. It is also found that the parallel performance of each system deteriorates for a small problem due to the communication overhead, but the performance of Infiniband-network system is better than Ethernet-network system due to a much faster network-speed. For a large problem, the parallel performance depends less on network system.

Implementation of ML Algorithm for Mung Bean Classification using Smart Phone

  • Almutairi, Mubarak;Mutiullah, Mutiullah;Munir, Kashif;Hashmi, Shadab Alam
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.89-96
    • /
    • 2021
  • This work is an extension of my work presented a robust and economically efficient method for the Discrimination of four Mung-Beans [1] varieties based on quantitative parameters. Due to the advancement of technology, users try to find the solutions to their daily life problems using smartphones but still for computing power and memory. Hence, there is a need to find the best classifier to classify the Mung-Beans using already suggested features in previous work with minimum memory requirements and computational power. To achieve this study's goal, we take the experiments on various supervised classifiers with simple architecture and calculations and give the robust performance on the most relevant 10 suggested features selected by Fisher Co-efficient, Probability of Error, Mutual Information, and wavelet features. After the analysis, we replace the Artificial Neural Network and Deep learning with a classifier that gives approximately the same classification results as the above classifier but is efficient in terms of resources and time complexity. This classifier is easily implemented in the smartphone environment.