• Title/Summary/Keyword: 네크워크분석

Search Result 74, Processing Time 0.019 seconds

Investigating the Behavior of College Students in Class Registration using Social Network Analysis (사회 네크워크 분석으로 본 수강신청 행태)

  • Lim, Sung-Min;Kim, Jinheum
    • The Korean Journal of Applied Statistics
    • /
    • v.26 no.4
    • /
    • pp.661-674
    • /
    • 2013
  • We investigate the class registration behavior of college students with data collected from the spring semester of 2012. The network originally consists of a 2-mode network between a student and class subjects. We first transform the 2-mode network into 1-mode network of students. We also subdivide it into a smaller network such as components and communities to understand the detailed behavior of students in class registration. Finally, the relationship between GPA and the centrality measures, gender, and grade of students is analyzed using a multiple regression analysis.

Social Network Service how to take advantage of Social Commerce?: Focus on Distribution implications (소셜네크워크 서비스를 소셜커머스 유통시장에 어떻게 활용할 것인가?: 정책적 함의를 중심으로)

  • Kim, Koosung
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.261-269
    • /
    • 2012
  • The purpose of this study was to suggest policies that take advantage of social networking services in the field of social commerce. Presented it, in order for the concept of a social network service for the first time, were examined by four representative types of social network services, and analyzed the characteristics of each. Domestic current status and concepts presented and the addition of social commerce, and analyzed the characteristics of each type proposed six kinds. Utilizing social network services to the end, was to suggest measures that can be incorporated into the social commerce business. The results of this study suggested that the marketing implications for how social network services in the social commerce business that can be utilized in companies that will say that its worth.

A spreadsheet modeling for network analysis (네크워크분석을 위한 계산지모형)

  • 이호창
    • Korean Management Science Review
    • /
    • v.11 no.1
    • /
    • pp.59-72
    • /
    • 1994
  • In this paper we examine potentials of a spreadsheet program, one of the most widly available software system, as a mathematical optimization modeling tool. For an illustrative example, a shortest path problem is modeled on Lotus-123 for practical use and an implementational framework and a general guide to the spreadsheet modeling of network analysis is provided.

  • PDF

The Network Designs And Traffic Grooming Algorithm to Maximize the Throughput in WDM Ring Networks (WDM 링에서 트래픽 전송효율을 최대화하기 위한 네크워크 설계방법 및 트래픽 그루밍 알고리즘)

  • Yoon, Seung-Jin
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.200-207
    • /
    • 2009
  • In this paper, novel traffic gromming algorithms are proposed with a primary goal of maximize the throughput in WDM(Wavelength Division Multiplexing) ring networks. To achieve this goal, we analyze two network designs that are Lightpath Designs and Virtual Topology Designs and simulate the throughput in various traffic environments. From this methods, we propose novel traffic gromming algorithms to maximize the throughput.

  • PDF

Technical Trends of Optical Components for WDM-PON (WDM-PON 광부품 기술동향)

  • Jeong, J.S.;Kwon, O.K.
    • Electronics and Telecommunications Trends
    • /
    • v.27 no.1
    • /
    • pp.86-92
    • /
    • 2012
  • 스마트폰, IPTV, 클라우딩 서비스 등의 새로운 서비스 등장으로 유발된 데이터 통신량의 폭주는 초고속/대용량 차세대 액세스 네크워크 구현을 필요로 하고 있다. 본고에서는 차세대 액세스 네트워크 방식에서 가장 유력한 후보인 WDM-PON 구현을 위한 주요 광부품인 AWG, 비주입형 광송신기 광원, 주입형 광송신기 광원에 대한 발전 현황을 기술하였다. 광부품 기술의 발전 방향은 시장 경쟁력 강화를 위한 저가화, 대단위 포설을 대비한 소형화, 네트워크의 소비 전력 폭주를 대처하는 저전력화 등으로 요약된다.

  • PDF

A PCA-based Data Stream Reduction Scheme for Sensor Networks (센서 네트워크를 위한 PCA 기반의 데이터 스트림 감소 기법)

  • Fedoseev, Alexander;Choi, Young-Hwan;Hwang, Een-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.35-44
    • /
    • 2009
  • The emerging notion of data stream has brought many new challenges to the research communities as a consequence of its conceptual difference with conventional concepts of just data. One typical example is data stream processing in sensor networks. The range of data processing considerations in a sensor network is very wide, from physical resource restrictions such as bandwidth, energy, and memory to the peculiarities of query processing including continuous and specific types of queries. In this paper, as one of the physical constraints in data stream processing, we consider the problem of limited memory and propose a new scheme for data stream reduction based on the Principal Component Analysis (PCA) technique. PCA can transform a number of (possibly) correlated variables into a (smaller) number of uncorrelated variables. We adapt PCA for the data stream of a sensor network assuming the cooperation of a query engine (or application) with a network base station. Our method exploits the spatio-temporal correlation among multiple measurements from different sensors. Finally, we present a new framework for data processing and describe a number of experiments under this framework. We compare our scheme with the wavelet transform and observe the effect of time stamps on the compression ratio. We report on some of the results.

  • PDF

Pattern Analysis of Organizational Leader Using Fuzzy TAM Network (퍼지TAM 네트워크를 이용한 조직리더의 패턴분석)

  • Park, Soo-Jeom;Hwang, Seung-Gook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.2
    • /
    • pp.238-243
    • /
    • 2007
  • The TAM(Topographic Attentive Mapping) network neural network model is an especially effective one for pattern analysis. It is composed of of Input layer, category layer, and output layer. Fuzzy rule, lot input and output data are acquired from it. The TAM network with three pruning rules for reducing links and nodes at the layer is called fuzzy TAM network. In this paper, we apply fuzzy TAM network to pattern analysis of leadership type for organizational leader and show its usefulness. Here, criteria of input layer and target value of output layer are the value and leadership related personality type variables of the Egogram and Enneagram, respectively.

A semantic network analysis of news reports on an emerging infectious disease by multidrug-resistant microorganism (언어 네트워크 분석을 이용한 신종 감염병 보도 분석: 다제내성균 보도 사례를 중심으로)

  • Park, Kisoo;Lee, Guiohk;Choi, Myung-Il
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.343-351
    • /
    • 2014
  • The present study performed semantic network analysis of the keywords in the headlines of newspapers to investigate the media coverage of the multidrug-resistant microorganisms(MDROs) which is resistant to antibiotics. For this purpose, 229 news stories on MDROs in 28 newspapers from June 1, 2010 to December 31, 2011 were analyzed. The news stories were gathered from the Korea Press Foundation's news database, KINDS (www.kinds.or.kr) and websites of Korean newspapers. The analysis of the keywords revealed 'superbacteria' appeared most frequently (n=155) followed by 'infection' (n=63) which arouses fear among readers. While network was structured with the keywords such as 'domestic', 'multidrug-resistant microorganisms', 'first', 'antibiotics', 'outbreak' and 'infection', the keywords such as 'MDROs related stocks', 'medical staff', and 'safety' were on the periphery of the network.

Security and Hacking on Wireless Networking for Small and Medium Business: Survey (중소기업형 무선 네트워크의 해킹과 보안)

  • Shin, Pan-Seop;Kim, Jeong-Min
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.15-20
    • /
    • 2014
  • Wireless network is convenient as compared to the wire, and it is also easy. Therefore, SMEs in the country is the trend that many SMEs prefer the radio using a lot of radio as an extension of the wired network modification felt the burden of fixed installations. Wireless networks are vulnerable to security together than a wired network, since it passes the packet through the broadcasting. Therefore, analyzing the vulnerability of wireless networks, and proposes countermeasures about wireless network security in small and medium-sized businesses.

  • PDF

A Workflow-based Affiliation Network Knowledge Discovery Algorithm (워크플로우 협력네트워크 지식 발견 알고리즘)

  • Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.109-118
    • /
    • 2012
  • This paper theoretically derives an algorithm to discover a new type of workflow-based knowledge from workflow models, which is termed workflow-based affiliation network knowledge. In general, workflow intelligence (or business process intelligence) technology consists of four types of techniques that discover, analyze, monitor and control, and predict a series of workflow-based knowledge from workflow models and their execution histories. So, this paper proposes a knowledge discovery algorithm which is able to discover workflow-based affiliation networks that represent the association and participation relationships between activities and performers defined in ICN-based workflow models. In order particularly to prove the correctness and feasibility of the proposed algorithm, this paper tries to apply the algorithm to a specific workflow model and to show that it is able to derive its corresponding workflow-based affiliation network knowledge.