• Title/Summary/Keyword: formal networks

Search Result 83, Processing Time 0.029 seconds

Characteristics and Operational Mechanism of Sino-South Korean Cross-Border Small-Scale Trade (한.중 소무역의 성격과 운영 메커니즘)

  • Jang, Young-Jin
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.568-582
    • /
    • 2011
  • This study aims to discover the characteristics of Sino-South Korean cross-border small-scale trade, which involves various players. Through this characteristics, this study ultimately intends to identify an operational mechanism of Sino-South Korean cross-border small-scale trade by investigating social capital as mobilized by small-scale traders. The results of this study can be expected to help understand how small-scale merchants address the uncertainty or risks surrounding their trade. Although it is an informal economic activity, the cross-border small-scale trade between South Korea and China is related to issues of the formal economy, such as job creation, benefits for local economies, and profit-seeking. Owing to this characteristics, small-scale trade is being conducted with the connivance of, or even with the tacit support from formal organizations, including municipal governments, customs, corporations, and shipping companies. Like trade in other countries, Sino-South Korean cross-border small-scale trade also requires different types of social capital, such as family networks, ethnic networks, social networks, and trust.

  • PDF

Building Concept Networks using a Wikipedia-based 3-dimensional Text Representation Model (위키피디아 기반의 3차원 텍스트 표현모델을 이용한 개념망 구축 기법)

  • Hong, Ki-Joo;Kim, Han-Joon;Lee, Seung-Yeon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.9
    • /
    • pp.596-603
    • /
    • 2015
  • A concept network is an essential knowledge base for semantic search engines, personalized search systems, recommendation systems, and text mining. Recently, studies of extending concept representation using external ontology have been frequently conducted. We thus propose a new way of building 3-dimensional text model-based concept networks using the world knowledge-level Wikipedia ontology. In fact, it is desirable that 'concepts' derived from text documents are defined according to the theoretical framework of formal concept analysis, since relationships among concepts generally change over time. In this paper, concept networks hidden in a given document collection are extracted more reasonably by representing a concept as a term-by-document matrix.

A Study on the Design Method of the Integrative Intelligent Model for Educational System (지능형 교육 시스템의 통합 모형 탐색 연구)

  • Heo, Gyun;Kang, Seung-Hee
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.20 no.3
    • /
    • pp.462-472
    • /
    • 2008
  • Education is a field that has tried to make use of the advantages of computers since they were introduced to the world. Intelligent Tutoring System and multimedia have become methods of teaching students of Computer Science, Education, Psychology, and Cognitive Science. Until now, they have been designed and produced only on the basis of a very specific domain and format. However, in the education field, most learners ask for integrated service that is practical, realizable, and sensitive to technological change. Therefore, in this study, we would like to present the technological and formal integration model as an ITS model which acknowledges changes in the fields of technology and education. As a technological integration model, the integration model of traditional Symbolic Artificial Intelligence and Artificial Neural Networks was presented. As a formal integration model, three integration models were presented according to (a) the process of learning diagnosis (b) learners' action behaviors (c) intelligence service respectively.

Stakeholder Networks Supplying Rural Tourism in The Mekong Delta, Vietnam: The Case of Thoi Son Islet, Tien Giang Province (메콩델타지역 농촌관광의 공급자 네트워크: 티엔장성(省) 터이선 섬을 사례로)

  • Hoang, Chau Ngoc Minh;Kim, Doo-Chul
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.16 no.3
    • /
    • pp.423-444
    • /
    • 2013
  • Tourism in Thoi Son Islet has been the advanced model for rural tourism in the Mekong Delta region since the 1990s. The continuously rising number of tourists, however, has also created problems that affect sustainable rural development. To understand these problems, this research analyzed how rural tourism has been operated through the methodology of a stakeholder network. After investigating the network among key stakeholders (Ho Chi Minh travel agencies (HCMTAs), local travel agencies (LTAs), and local residents, the result showed that in the current model, HCMTAs and LTAs have played the role of connectors, working as hubs to shift tourists (demand) to match local residents (supply), with the networking being dominated by signed contracts (formal networks). The networks between LTAs and local residents are both formal and informal. Inter- and intra-networks among local residents are dominated by informal networks of established working relationships based on networks of family, friends, and neighbors. Moreover, this research has found that there is no cooperating network among LTAs. Among owners of tourist sites was not also found cooperating network. The primary motivating factor for these stakeholders is price competition; this has led to a disproportionately small share of revenue for local stakeholders, with most tourism revenue going to HCMTAs. Additionally, because of the high competition among local stakeholders, this results in local stakeholders having little or no negotiating power when conducting business with HCMTAs. Meanwhile the Tien Giang Tourism Association is inefficient in fostering cooperation among local stakeholders to increase their negotiating power.

  • PDF

Effective Intrusion Detection using Evolutionary Neural Networks (진화신경망을 이용한 효과적 인 침입탐지)

  • Han Sang-Jun;Cho Sung-Bae
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.301-309
    • /
    • 2005
  • Learning program's behavior using machine learning techniques based on system call audit data is an effective intrusion detection method. Rule teaming, neural network, statistical technique, and hidden Markov model are representative methods for intrusion detection. Among them neural networks are known for its good performance in teaming system call sequences. In order to apply it to real world problems successfully, it is important to determine their structure. However, finding appropriate structure requires very long time because there are no formal solutions for determining the structure of networks. In this paper, a novel intrusion detection technique using evolutionary neural networks is proposed. Evolutionary neural networks have the advantage that superior neural networks can be obtained in shorter time than the conventional neural networks because it leams the structure and weights of neural network simultaneously Experimental results against 1999 DARPA IDEVAL data confirm that evolutionary neural networks are effective for intrusion detection.

A Biometric-based User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks

  • Chen, Ying;Ge, Yangming;Wang, Wenyuan;Yang, Fengyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1779-1798
    • /
    • 2018
  • Heterogeneous wireless sensor networks (HEWSN) is a kind of wireless sensor networks (WSN), each sensor may has different attributes, HEWSN has been widely used in many aspects. Due to sensors are deployed in unattended environments and its resource constrained feature, the design of security and efficiency balanced authentication scheme for HEWSN becomes a vital challenge. In this paper, we propose a secure and lightweight user authentication and key agreement scheme based on biometric for HEWSN. Firstly, fuzzy extractor is adopted to handle the user's biometric information. Secondly, we achieve mutual authentication and key agreement among three entities, which are user, gateway and cluster head in the four phases. Finally, formal security analysis shows that the proposed scheme defends against various security pitfalls. Additionally, comparison results with other surviving relevant schemes show that our scheme is more efficient in term of computational cost, communication cost and estimated time. Therefore, the proposed scheme is well suitable for practical application in HEWSN.

The influence of employees' social networks on organization's communication and innovativeness (조직원의 사회적 네트워크가 의사소통 및 혁신능력에 미치는 영향)

  • Jin, Dongcheol;Hong, Ah Jeong
    • Knowledge Management Research
    • /
    • v.13 no.2
    • /
    • pp.1-18
    • /
    • 2012
  • This article describes how attributes of social network contribute to enhance innovativeness of corporation which is considered to be one of the competitive factors in this global market. The study especially focused on employees' formal and informal communication that is expected to play a mediating role between the factors. 211 employees were randomly selected to participate in an online survey. The result has shown that the static correlation exists between social network, communication, and innovativeness. Closeness of social network was the only influencing factor on communication and innovativeness, and had a partial mediated effect between social network and innovativeness. Based on the suggested contribution for HRD intervention, various communication channels should be developed and supported in order to enhance innovation among social networks in organizations.

  • PDF

The Shwedagon in Sumatra: Transnational Buddhist Networks in Contemporary Myanmar and Indonesia

  • Aung-Thwin, Maitrii
    • SUVANNABHUMI
    • /
    • v.4 no.2
    • /
    • pp.1-16
    • /
    • 2012
  • In 2010, nearly thirteen hundred Buddhist monks from all over the world converged on to the small Indonesian resort town of Berastagi to celebrate the inauguration of the Taman AlamLumbini, a replica of Myanmar's most iconic Theravada Buddhist temple, the ShwedagonPaya. Nestled on Christian lands within a predominantly Muslim country, the building of the Taman AlamLumbini marked several years of negotiation amongst various religious communities, local government mediators, and patrons. This study makes a preliminary assessment of the ways in which cultural and historical discourses were used by participants to evoke a sense of transnational connectedness outside the realm of formal bilateral diplomacy. Through particular Buddhist ceremonies, rituals, and imagery, Myanmar sponsors and Indonesian patrons promoted a sense of broad pan-Asianism that linked monks, state officials, and local lay practitioners into a single community. A brief examination of the key speeches during the opening ceremony reveals that national interest and identity were still very much in play.

  • PDF

Social Network and Social Services Accessibility of Migrant Workers (이주노동자의 사회적 서비스에 대한 접근성과 사회연결망)

  • Lee, Soo-Sang;Jang, Im-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.42 no.4
    • /
    • pp.243-268
    • /
    • 2008
  • This study considers the availability, accessibility, and efficacy of social services for migrant workers. First, it examines migrant workers needs and how they choose to fulfill these. Second, this study grasps about how they can connect the social services and what constructive peculiarities social networks they have by using SNA(Social Network Analysis) it is revealed that migrant workers rely more on informal support groups such as family, friends, co-workers, etc. rather than formal support networks, e.g. those provided by the state. This tendency is demonstrated especially, Libraries as formal supporting organization have no connection related with other organizations. It shows that they have role limited as a supporter of giving information and knowledge in a public.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.