• Title/Summary/Keyword: network information theory

Search Result 961, Processing Time 0.022 seconds

Knowledge Management Research Based on Social Network Theories: A Review with Future Directions

  • Tae Hun Kim
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.168-190
    • /
    • 2022
  • This review aims to synthesize social network theories by drawing on the importance of social network perspectives in understanding knowledge management with technology in organizations. I provide an overview of prior social network research with the following core ideas: the primacy of relations between organizational actors, the utility of actors' embeddedness in social fields, the social utility of network connections, and the structural patterning of social life. On top of that, I summarize critical social perspectives (the social capital theory, the structural hole theory, the embeddedness perspective, the social exchange theory, the organizational learning theory, and the innovation diffusion theory) to suggest potential research questions for future studies in social network research in the knowledge management discipline.

The use of network theory to model disparate ship design information

  • Rigterink, Douglas;Piks, Rebecca;Singer, David J.
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.6 no.2
    • /
    • pp.484-495
    • /
    • 2014
  • This paper introduces the use of network theory to model and analyze disparate ship design information. This work will focus on a ship's distributed systems and their intra- and intersystem structures and interactions. The three system to be analyzed are: a passageway system, an electrical system, and a fire fighting system. These systems will be analyzed individually using common network metrics to glean information regarding their structures and attributes. The systems will also be subjected to community detection algorithms both separately and as a multiplex network to compare their similarities, differences, and interactions. Network theory will be shown to be useful in the early design stage due to its simplicity and ability to model any shipboard system.

MFSC: Mean-Field-Theory and Spreading-Coefficient Based Degree Distribution Analysis in Social Network

  • Lin, Chongze;Zheng, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3630-3656
    • /
    • 2018
  • Degree distribution can provide basic information for structural characteristics and internal relationship in social network. It is a critical procedure for social network topology analysis. In this paper, based on the mean-field theory, we study a special type of social network with exponential distribution of time intervals. First of all, in order to improve the accuracy of analysis, we propose a spreading coefficient algorithm based on intimate relationship, which determines the number of the joined members through the intimacy among members. Then, simulation show that the degree distribution of follows the power-law distribution and has small-world characteristics. Finally, we compare the performance of our algorithm with the existing algorithms, and find that our algorithm improves the accuracy of degree distribution as well as reducing the time complexity significantly, which can complete 29.04% higher precision and 40.94% lower implementation time.

Asymptotics in Load-Balanced Tandem Networks

  • Lee, Ji-Yeon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.3
    • /
    • pp.715-723
    • /
    • 2003
  • A tandem network in which all nodes have the same load is considered. We derive bounds on the probability that the total population of the tandem network exceeds a large value by using its relation to the stationary distribution. These bounds imply a stronger asymptotic limit than that in the large deviation theory.

  • PDF

Uplinks Analysis and Optimization of Hybrid Vehicular Networks

  • Li, Shikuan;Li, Zipeng;Ge, Xiaohu;Li, Yonghui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.473-493
    • /
    • 2019
  • 5G vehicular communication is one of key enablers in next generation intelligent transportation system (ITS), that require ultra-reliable and low latency communication (URLLC). To meet this requirement, a new hybrid vehicular network structure which supports both centralized network structure and distributed structure is proposed in this paper. Based on the proposed network structure, a new vehicular network utility model considering the latency and reliability in vehicular networks is developed based on Euclidean norm theory. Building on the Pareto improvement theory in economics, a vehicular network uplink optimization algorithm is proposed to optimize the uplink utility of vehicles on the roads. Simulation results show that the proposed scheme can significantly improve the uplink vehicular network utility in vehicular networks to meet the URLLC requirements.

A Novel Kernel SVM Algorithm with Game Theory for Network Intrusion Detection

  • Liu, Yufei;Pi, Dechang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4043-4060
    • /
    • 2017
  • Network Intrusion Detection (NID), an important topic in the field of information security, can be viewed as a pattern recognition problem. The existing pattern recognition methods can achieve a good performance when the number of training samples is large enough. However, modern network attacks are diverse and constantly updated, and the training samples have much smaller size. Furthermore, to improve the learning ability of SVM, the research of kernel functions mainly focus on the selection, construction and improvement of kernel functions. Nonetheless, in practice, there are no theories to solve the problem of the construction of kernel functions perfectly. In this paper, we effectively integrate the advantages of the radial basis function kernel and the polynomial kernel on the notion of the game theory and propose a novel kernel SVM algorithm with game theory for NID, called GTNID-SVM. The basic idea is to exploit the game theory in NID to get a SVM classifier with better learning ability and generalization performance. To the best of our knowledge, GTNID-SVM is the first algorithm that studies ensemble kernel function with game theory in NID. We conduct empirical studies on the DARPA dataset, and the results demonstrate that the proposed approach is feasible and more effective.

Application of information theory to wireless cooperative communications (정보이론의 협력무선통신에의 응용)

  • Kim, Yoon-Hyun;Yang, Jae-Soo;Ha, Kwang-Jun;Kim, Jin-Young
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.337-343
    • /
    • 2009
  • Information theory is one field of the applied mathematics quantitating the data in order to store data as many as in the medium or communicate through channel. it was released on the Shannon's paper, in 1948. With basis on this paper, It has been achieved dramatically development for communication, signal processing, and date procedure and transmission in the network In this paper, the basic concept of information theory is described through dealing with contents about meaning of information, entropy, and channel capacity. It is also handled how information theory is applied to the fields of sensor network, relay channel, MIMO system, and others.

  • PDF

Network Security Situation Assessment Method Based on Markov Game Model

  • Li, Xi;Lu, Yu;Liu, Sen;Nie, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2414-2428
    • /
    • 2018
  • In order to solve the problem that the current network security situation assessment methods just focus on the attack behaviors, this paper proposes a kind of network security situation assessment method based on Markov Decision Process and Game theory. The method takes the Markov Game model as the core, and uses the 4 levels data fusion to realize the evaluation of the network security situation. In this process, the Nash equilibrium point of the game is used to determine the impact on the network security. Experiments show that the results of this method are basically consistent with the expert evaluation data. As the method takes full account of the interaction between the attackers and defenders, it is closer to reality, and can accurately assess network security situation.

A Customer Value Theory Approach to the Engagement with a Brand: The Case of KakaoTalk Plus in Korea

  • So-Hyun Lee;ji-eun Lee;Hee-Woong Kim
    • Asia pacific journal of information systems
    • /
    • v.28 no.1
    • /
    • pp.36-60
    • /
    • 2018
  • As an increasing number of people gained access to social network services (SNS), organizations started to use SNS as a channel for marketing and promotional purposes. The online advertising market has significant growth potential. Brand engagement is a key motive for online advertising, but how SNS users engage with brands, particularly in terms of the promotion of organizations, is poorly understood. This study uses customer value theory to examine brand engagement of users in terms of promoting companies in the context of Korean SNS marketing. This study identifies the antecedents of brand engagement based on customer value theory. Our findings show the significance of three factors of SNS marketing, namely, price discount, relationship support, and convenience, on brand engagement. We further show the consequences of brand engagement, namely, purchase decisions and word-of-mouth activities. These findings help advance customer value theory and offer practical insights into the use of information systems and marketing in the context of SNS.

Evaluation of Information Dissemination Methods in a Communication Network (통신망에서의 정보전파 방법의 평가에 관한 연구)

  • 고재문
    • The Journal of Information Systems
    • /
    • v.8 no.1
    • /
    • pp.109-129
    • /
    • 1999
  • This study deals with the problem of information dissemination in a communication network, which is defined to be the process whereby a set of messages, generated by an originator, is transmitted to all the members within the network. Since this type of message generally includes control data to manage the network or global information that all members should know, it is to be required to transmit it to all the members as soon as possible. In this study, it is assumed that a member can either transmit or receive a message and an informed member can transmit it to only one of its neighbors at time. This type of transmission is called 'local broadcasting' Several schemes of call sequencing are designed for a general-type network with nonuniform edge transmission times, and then computer simulations are performed. Some heuristics for information dissemination are proposed and tested. For this, optimal call sequence in a tree-type network, sequencing theory and graph theory are applied. The result shows that call sequencing based on the shortest path tree is the most desirable.

  • PDF