• Title/Summary/Keyword: Technology network analysis

Search Result 3,920, Processing Time 0.034 seconds

Influencing Factors on the Acceptance of Blockchain Technology in Capturing and Sharing Project Knowledge: A Grounded Theory Study

  • Bardesy, Waseem S.;Alsereihy, Hassan A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.262-270
    • /
    • 2022
  • In the past two decades, there has been an increasing interest in project knowledge management, as knowledge is a crucial resource for project management success. Knowledge capture and sharing are two effective project management practices. Capturing and sharing project knowledge has become more efficient due to technological advances. Nevertheless, present technologies face several technical, functional, and usage obstacles and constraints. Thus, Blockchain technology might provide promising answers, yet, there is still a dearth of understanding regarding the technology's proper and practical application. Consequently, the goal of this study was to fill the gap in the literature about the adoption of Blockchain technology and to investigate the project stakeholders' acceptance and willingness to utilize the technology for capturing and sharing project knowledge. Due to this inquiry's exploratory and inductive characteristics, qualitative research methodology was used, namely the Grounded Theory research approach. Accordingly, eighteen in-depth, semi-structured interviews were conducted to collect the data. Concurrent data collection and analysis were undertaken, with findings emerging after three coding steps. Four influencing factors and one moderating factor were identified as affecting users' acceptance of Blockchain technology for capturing and sharing project knowledge. Consequently, the results of the study aimed to fill a gap in the existing literature by undertaking a comprehensive analysis of the unrealized potential of Blockchain technology to improve knowledge capture and sharing in the project management environment.

Methods of Automated Analysis of Curricula According to the Higher Education Standard

  • Liudmyla Omelchuk;Andrii Kryvolap;Taras Panchenko;Nataliia Rusina;Olena Shyshatska;Oleksii Tkachenko
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.32-42
    • /
    • 2023
  • The paper describes the new approaches to the automated analysis of curricula according to the higher education standard. The analysis process is proposed to carry out in two ways: (a) the analysis of completeness and sufficiency of curricula according to the standard of higher education; (b) the comparison of curricula of the same qualification and specialty. The problem of improving the quality of university students' training launches the process of monitoring and analyzing educational curricula and their correspondence to the higher education standard. We developed the rules and methods to compare curricula. In addition, we implemented the automated system of curricula comparison. The paper reveals the use of these methods based on the analysis of the curriculum bachelor level of higher education "Informatics", specialty "Computer science", at the Faculty of Computer Science and Cybernetics of the Taras Shevchenko National University of Kyiv. The findings put towards the idea that the implementation of developed methods as well as the automated system of curricula analysis will improve the educational services by higher education institutions.

On the QoS Behavior of Self-Similar Traffic in a Converged ONU-BS Under Custom Queueing

  • Obele, Brownson Obaridoa;Iftikhar, Mohsin;Kang, Min-Ho
    • Journal of Communications and Networks
    • /
    • v.13 no.3
    • /
    • pp.286-297
    • /
    • 2011
  • A novel converged optical network unit (ONU)-base station (BS) architecture has been contemplated for next-generation optical-wireless networks. It has been demonstrated through high quality studies that data traffic carried by both wired and wireless networks exhibit self-similar and long range dependent characteristics; attributes that classical teletraffic theory based on simplistic Poisson models fail to capture. Therefore, in order to apprehend the proposed converged architecture and to reinforce the provisioning of tightly bound quality of service (QoS) parameters to end-users, we substantiate the analysis of the QoS behavior of the ONU-BS under self-similar and long range dependent traffic conditions using custom queuing which is a common queuing discipline. This paper extends our previous work on priority queuing and brings novelty in terms of presenting performance analysis of the converged ONU-BS under realistic traffic load conditions. Further, the presented analysis can be used as a network planning and optimization tool to select the most robust and appropriate queuing discipline for the ONU-BS relevant to the QoS requirements of different applications.

Study on the Prevention of Patent Disputes through Network Analysis - Focusing on NPEs in Smart Car Industry - (스마트카 특허분쟁 네트워크분석을 통한 특허분쟁예방에 관한 연구)

  • Ryu, ChangHan;Suh, Minsuk
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.23 no.3
    • /
    • pp.315-325
    • /
    • 2015
  • Smart Car market has been experiencing continuous growth to drive leading companies in automotive and IT industries to focus on advancing related technologies. As the IT technologies fuse into automotive technologies, the patent litigation has been showing changes. One of the prominent changes in patent litigation pattern of Smart Car field is the increased activities of the Non-Practicing Entities (NPEs), whose main field has been the IT area. However, the automotive companies have been mainly focusing on preventing patent disputes against competitors through trend analysis, which caused them to become relatively vulnerable to the attacks from NPEs. In this study, we developed a methodology for monitoring and analyzing the activities of NPEs using network analysis tools to suggest effective strategies for manufacturing companies to fortify their ability to respond against unanticipated attacks. Our methodology, which is developed for the Smart Car field, can also be useful for other fields such as IT and electronics.

Trend Analysis of the Technological Innovation Context in South Korea using Network Analysis: Focusing on Science and Technology Published by the Korean Federation of Science and Technology Societies, 1968-2017 (한국 과학기술계 기술혁신 논의의 흐름과 변화 : 한국과학기술단체총연합회의 『과학과 기술』을 중심으로, 1968-2017)

  • Lee, Juyoung;Jung, Hyojung
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.4
    • /
    • pp.1015-1035
    • /
    • 2017
  • This paper analyzes how the concept of 'technological innovation' has changed in South Korea. We conducted keyword co-occurrence network analysis on articles in Science and Technology, a magazine published by the Korean Federation of Science and Technology Societies since 1968. With writers and readership from professional science and technology communities, government officers, as well as citizens, Science and Technology is a suitable archival source to represent discourses relating to South Korean use of the term 'technological innovation'. We used all the articles from 1968 to 2017 that include the term 'technological innovation' in their title. Also, we analyzed the keywords that co-occur with 'technological innovation' by the frame divided into three periods. The following conclusions were elicited: The term 'technological innovation' has been understood as a leading factor for government-driven industrial development since the 1960s. Nevertheless, the meaning of the term evolved over time. In the 1960s and 70s, 'technological innovation' referred to the introduction, assimilation, and transfer of technology. However, since the 1980s it has acquired a more multilateral meaning, connecting various industrial sectors and interest groups. This conclusion reveals that the meaning of 'technological innovation' is not static, but rather it is constructed over time. This study is expected to contribute to research on the direction of the technological innovation policy of Korea.

Performance Analysis of CAN-FD Based Network Against Network Topology (네트워크 토폴로지에 따른 CAN-FD 통신 영향성 분석)

  • Seo, Sukhyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.351-358
    • /
    • 2017
  • The most common communication interface for automotive electronic control devices is CAN (Controller Area Network). Sine CAN was first adopted to Daimler vehicles in 1991, all of automobile manufacturers use the CAN communication for in-vehicle networks. However, as the number of electronic control devices connected to the CAN network rapidly increases, the CAN protocol reaches the limit of technology. To overcome this limitation, Bosch introduced the new communication protocol, that is CAN-FD (Flexible Data-rate). In this paper, we analyze the characteristics and limitations of CAN-FD communication according to the topology under the in-vehicle wiring harness environment designed based on the existing classic CAN communication.

Optimal Stochastic Policies in a network coding capable Ad Hoc Networks

  • Oh, Hayoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4389-4410
    • /
    • 2014
  • Network coding is a promising technology that increases system throughput by reducing the number of packet transmissions from the source node to the destination node in a saturated traffic scenario. Nevertheless, some packets can suffer from end-to-end delay, because of a queuing delay in an intermediate node waiting for other packets to be encoded with exclusive or (XOR). In this paper, we analyze the delay according to packet arrival rate and propose two network coding schemes, iXOR (Intelligent XOR) and oXOR (Optimal XOR) with Markov Decision Process (MDP). They reduce the average delay, even under an unsaturated traffic load, through the Holding-${\chi}$ strategy. In particular, we are interested in the unsaturated network scenario. The unsaturated network is more practical because, in a real wireless network, nodes do not always have packets waiting to be sent. Through analysis and extensive simulations, we show that iXOR and oXOR are better than the Distributed Coordination Function (DCF) without XOR (the general forwarding scheme) and XOR with DCF with respect to average delay as well as delivery ratio.

SDN-based wireless body area network routing algorithm for healthcare architecture

  • Cicioglu, Murtaza;Calhan, Ali
    • ETRI Journal
    • /
    • v.41 no.4
    • /
    • pp.452-464
    • /
    • 2019
  • The use of wireless body area networks (WBANs) in healthcare applications has made it convenient to monitor both health personnel and patient status continuously in real time through wearable wireless sensor nodes. However, the heterogeneous and complex network structure of WBANs has some disadvantages in terms of control and management. The software-defined network (SDN) approach is a promising technology that defines a new design and management approach for network communications. In order to create more flexible and dynamic network structures in WBANs, this study uses the SDN approach. For this, a WBAN architecture based on the SDN approach with a new energy-aware routing algorithm for healthcare architecture is proposed. To develop a more flexible architecture, a controller that manages all HUBs is designed. The proposed architecture is modeled using the Riverbed Modeler software for performance analysis. The simulation results show that the SDN-based structure meets the service quality requirements and shows superior performance in terms of energy consumption, throughput, successful transmission rate, and delay parameters according to the traditional routing approach.

Theoretical Aspects Of Innovation Processes In The Holistic Educational Process

  • Prokopenko, Alona;Chukhrai, Liubov;Behal, Tetiana;Pustovalov, Sergii;Kliuchko, Yuliia;Khimchuk, Liliana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.382-389
    • /
    • 2022
  • The article is devoted to the research and search for effective pedagogical technologies. The definitions of "innovation", "technologicalization", "pedagogical technology" are analyzed. "Innovative pedagogical technology". The blocks that make up the innovative processes in education are studied. The importance and role of innovations in education (vocational education) are clarified. The components of pedagogical technology are studied: conceptual, content-procedural and professional. The signs of classifications of pedagogical technologies are investigated. The stages of evolution of the definition of "pedagogical technology", as well as the levels of its application in pedagogical science are highlighted. Criteria of manufacturability and signs of pedagogical technology are investigated.The algorithm for the analysis of pedagogical technology is investigated: identification of technology; name of technology; conceptual principles; the content of education; activity characteristics; organizational and methodological support of the educational process. Pedagogical technologies that should be implemented in vocational education institutions are analyzed.

Damage localization and quantification of a truss bridge using PCA and convolutional neural network

  • Jiajia, Hao;Xinqun, Zhu;Yang, Yu;Chunwei, Zhang;Jianchun, Li
    • Smart Structures and Systems
    • /
    • v.30 no.6
    • /
    • pp.673-686
    • /
    • 2022
  • Deep learning algorithms for Structural Health Monitoring (SHM) have been extracting the interest of researchers and engineers. These algorithms commonly used loss functions and evaluation indices like the mean square error (MSE) which were not originally designed for SHM problems. An updated loss function which was specifically constructed for deep-learning-based structural damage detection problems has been proposed in this study. By tuning the coefficients of the loss function, the weights for damage localization and quantification can be adapted to the real situation and the deep learning network can avoid unnecessary iterations on damage localization and focus on the damage severity identification. To prove efficiency of the proposed method, structural damage detection using convolutional neural networks (CNNs) was conducted on a truss bridge model. Results showed that the validation curve with the updated loss function converged faster than the traditional MSE. Data augmentation was conducted to improve the anti-noise ability of the proposed method. For reducing the training time, the normalized modal strain energy change (NMSEC) was extracted, and the principal component analysis (PCA) was adopted for dimension reduction. The results showed that the training time was reduced by 90% and the damage identification accuracy could also have a slight increase. Furthermore, the effect of different modes and elements on the training dataset was also analyzed. The proposed method could greatly improve the performance for structural damage detection on both the training time and detection accuracy.