• Title/Summary/Keyword: network information theory

Search Result 964, Processing Time 0.03 seconds

The Antecedent Factors Affecting Knowledge Transfer of ITO Organizational Members : Triandis Model and Social Capital Theory Perspective (정보시스템 아웃소싱 조직구성원의 지식이전 선행요인 ; Triandis 모델 및 사회적 자본 이론 관점)

  • Kim, Chang Sik;Kwahk, Kee Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.157-167
    • /
    • 2014
  • Increasing productivity of knowledge workers is a significant issue in the 21st century referred as knowledge-based society. The core key word is behavior of knowledge transfer among members of an organization. The objective of this study is to investigate a model based on Triandis theory and Social Capital theory. This explored the antecedent factors of knowledge Transfer in ITO(Information Technology Outsourcing) Organization. Data were derived from 42 respondents working IT Cooperation in Seoul, Korea. In this paper, we introduce the research model for the knowledge transfer. In order to validate the proposed research model, social network analysis tool, UCINET, a structural equation modeling tool, SmartPLS, was utilized. The empirical result showed that, all antecedent factors (intention of knowledge sharing, anticipated reciprocal relationships, subjective norm, closeness network centrality) of knowledge transfer behavior were significant. In conclusion, findings and implications were discussed and limitations of the study and future research directions were suggested.

SuperDepthTransfer: Depth Extraction from Image Using Instance-Based Learning with Superpixels

  • Zhu, Yuesheng;Jiang, Yifeng;Huang, Zhuandi;Luo, Guibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.4968-4986
    • /
    • 2017
  • In this paper, we primarily address the difficulty of automatic generation of a plausible depth map from a single image in an unstructured environment. The aim is to extrapolate a depth map with a more correct, rich, and distinct depth order, which is both quantitatively accurate as well as visually pleasing. Our technique, which is fundamentally based on a preexisting DepthTransfer algorithm, transfers depth information at the level of superpixels. This occurs within a framework that replaces a pixel basis with one of instance-based learning. A vital superpixels feature enhancing matching precision is posterior incorporation of predictive semantic labels into the depth extraction procedure. Finally, a modified Cross Bilateral Filter is leveraged to augment the final depth field. For training and evaluation, experiments were conducted using the Make3D Range Image Dataset and vividly demonstrate that this depth estimation method outperforms state-of-the-art methods for the correlation coefficient metric, mean log10 error and root mean squared error, and achieves comparable performance for the average relative error metric in both efficacy and computational efficiency. This approach can be utilized to automatically convert 2D images into stereo for 3D visualization, producing anaglyph images that are visually superior in realism and simultaneously more immersive.

Word Network Analysis based on Mutual Information for Ontology of Korean Rural Planning (한국농촌계획 온톨로지 구축을 위한 상호정보 기반 단어연결망 분석)

  • Lee, Jemyung
    • Journal of Korean Society of Rural Planning
    • /
    • v.23 no.3
    • /
    • pp.37-51
    • /
    • 2017
  • There has been a growing concern on ontology especially in recent knowledge-based industry and defining a field-customized semantic word network is essential for building it. In this paper, a word network for ontology is established with 785 publications of Korean Society of Rural Planning(KSRP), from 1995 to 2017. Semantic relationships between words in the publications were quantitatively measured with the 'normalized pointwise mutual information' based on the information theory. Appearance and co-appearance frequencies of nouns and adjectives in phrases are analyzed based on the assumption that a 'noun phrase' represents a single 'concept'. The word network of KSRP was compared with that of $WordNet^{TM}$, a world-wide thesaurus network, for the verification. It is proved that the KSRP's word network, established in this paper, provides words' semantic relationships based on the common concepts of Korean rural planning research field. With the results, it is expecting that the established word network can present more opportunity for preparation of the fourth industrial revolution to the field of the Korean rural planning.

Conflict Resolution: Analysis of the Existing Theories and Resolution Strategies in Relation to Face Recognition

  • A. A. Alabi;B. S. Afolabi;B. I. Akhigbe;A. A. Ayoade
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.166-176
    • /
    • 2023
  • A scenario known as conflict in face recognition may arise as a result of some disparity-related issues (such as expression, distortion, occlusion and others) leading to a compromise of someone's identity or contradiction of the intended message. However, addressing this requires the determination and application of appropriate procedures among the various conflict theories both in terms of concepts as well as resolution strategies. Theories such as Marxist, Game theory (Prisoner's dilemma, Penny matching, Chicken problem), Lanchester theory and Information theory were analyzed in relation to facial images conflict and these were made possible by trying to provide answers to selected questions as far as resolving facial conflict is concerned. It has been observed that the scenarios presented in the Marxist theory agree with the form of resolution expected in the analysis of conflict and its related issues as they relate to face recognition. The study observed that the issue of conflict in facial images can better be analyzed using the concept introduced by the Marxist theory in relation to the Information theory. This is as a result of its resolution strategy which tends to seek a form of balance as result as opposed to the win or lose case scenarios applied in other concepts. This was also consolidated by making reference to the main mechanisms and result scenario applicable in Information theory.

Social-Aware Resource Allocation Based on Cluster Formation and Matching Theory in D2D Underlaying Cellular Networks

  • Zhuang, Wenqin;Chen, Mingkai;Wei, Xin;Li, Haibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.1984-2002
    • /
    • 2020
  • With the appearance of wireless spectrum crisis in traditional cellular network, device-to-device (D2D) communication has been regarded as a promising solution to ease heavy traffic burden by enabling precise content delivery among mobile users. However, due to the channel sharing, the interference between D2D and cellular users can affect the transmission rate and narrow the throughput in the network. In this paper, we firstly present a weighted interference minimization cluster formation model involving both social attribute and physical closeness. The weighted-interference, which is evaluated under the susceptible-infected(SI) model, is utilized to gather user in social and physical proximity. Then, we address the cluster formation problem via spectrum clustering with iterative operation. Finally, we propose the stable matching theory algorithm in order to maximize rate oriented to accomplish the one-to-one resource allocation. Numerical results show that our proposed scheme acquires quite well clustering effect and increases the accumulative transmission rate compared with the other two advanced schemes.

Adaptive Power Control Algorithm based on the Evolutionary Game Theory (진화게임이론을 이용한 적응적 전력제어 알고리즘)

  • Kim, Deok-Joo;Kim, Sung-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.3
    • /
    • pp.228-233
    • /
    • 2010
  • During wireless network operations, adaptive power control is an effective way to enhance the network performance. In this paper, a new online power control scheme is proposed based on the evolutionary game theory. To converge a desirable network equilibrium, the proposed scheme adaptively adjusts a transmit power level in a distributed online manner. With a simulation study, we demonstrate that the proposed scheme improves network performance under widely diverse network environments.

Knowledge Contribution through online Relationship in Social Network Site: Personal Relationship Theory Perspective (소셜 네트워크 사이트에서 온라인 관계를 통한 지식공헌: 개인관계이론 관점)

  • Chung, Namho;Han, Heejeong;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.12 no.5
    • /
    • pp.25-40
    • /
    • 2011
  • Today, Internet users start off using heavily SNS(Social Network Site) such like, Facebook, Twitter. The reason of the growth of using SNS would be closely related to the various services of gaming, playing, entertainment items, sharing information etc., provided by the SNS, technically, the most important one out of the services provided would be behaving of sharing knowledge among people who connected and networked in the site. In sum, we assume that the users may communicate well each other and pay attention to build closely a social network using that kind of activities. However, nevertheless the new trends of communications and sharing knowledge become popular, researchers have just began the research issues in explaining why Internet user rush into SNS and enjoy the time in there. Therefore, we investigate on the reasons of posting knowledge voluntarily in the SNS and how others response to the posted information and actually affected by the behavior. We appled personal relation and social identity theory for this study, which personal relation in SNS may affect on social identity and make them produce knowledge generation. We found that social identity and involvement in SNS is closely related and influence knowledge creation and generation. This empirical study resulted in the importance of social relations in SNS, which leads to a sharing knowledge.

  • PDF

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

Adaptive Cross-Layer Resource Optimization in Heterogeneous Wireless Networks with Multi-Homing User Equipments

  • Wu, Weihua;Yang, Qinghai;Li, Bingbing;Kwak, Kyung Sup
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.784-795
    • /
    • 2016
  • In this paper, we investigate the resource allocation problem in time-varying heterogeneous wireless networks (HetNet) with multi-homing user equipments (UE). The stochastic optimization model is employed to maximize the network utility, which is defined as the difference between the HetNet's throughput and the total energy consumption cost. In harmony with the hierarchical architecture of HetNet, the problem of stochastic optimization of resource allocation is decomposed into two subproblems by the Lyapunov optimization theory, associated with the flow control in transport layer and the power allocation in physical (PHY) layer, respectively. For avoiding the signaling overhead, outdated dynamic information, and scalability issues, the distributed resource allocation method is developed for solving the two subproblems based on the primal-dual decomposition theory. After that, the adaptive resource allocation algorithm is developed to accommodate the timevarying wireless network only according to the current network state information, i.e. the queue state information (QSI) at radio access networks (RAN) and the channel state information (CSI) of RANs-UE links. The tradeoff between network utility and delay is derived, where the increase of delay is approximately linear in V and the increase of network utility is at the speed of 1/V with a control parameter V. Extensive simulations are presented to show the effectiveness of our proposed scheme.

The WeChat Mini Program for Smart Tourism

  • Ao Cheng;Gang Ren;Taeho Hong;Chulmo Koo
    • Asia pacific journal of information systems
    • /
    • v.29 no.3
    • /
    • pp.489-502
    • /
    • 2019
  • The WeChat mini program is an application embedded in WeChat that users can use without downloading and installing. After it was officially released in 2017, many travel enterprises have launched their own mini programs on the WeChat platform. This study applies affordance theory to investigate the WeChat mini program's role in tourism activities through social network analysis using the R programming language. The authors searched the topic of "how do you perceive the travel-related WeChat mini program" and then crawled the 200 comments found; 180 comments were analyzed after data cleansing. The results show that travel-related WeChat mini programs play a very important role in Chinese social network tourism activities. This paper found that WeChat played a more active role in various tourism-related interactions with Chinese social networks. Moreover, the results show how affordance theory is applied to the use of WeChat mini programs.