• 제목/요약/키워드: 네트워크분석법

검색결과 473건 처리시간 0.034초

An Analysis of News Report Characteristics on Archives & Records Management for the Press in Korea: Based on 1999~2018 News Big Data (뉴스 빅데이터를 이용한 우리나라 언론의 기록관리 분야 보도 특성 분석: 1999~2018 뉴스를 중심으로)

  • Han, Seunghee
    • Journal of the Korean Society for information Management
    • /
    • 제35권3호
    • /
    • pp.41-75
    • /
    • 2018
  • The purpose of this study is to analyze the characteristics of Korean media on the topic of archives & records management based on time-series analysis. In this study, from January, 1999 to June, 2018, 4,680 news articles on archives & records management topics were extracted from BigKinds. In order to examine the characteristics of the media coverage on the archives & records management topic, this study was analyzed to the difference of the press coverage by period, subject, and type of the media. In addition, this study was conducted word-frequency based content analysis and semantic network analysis to investigate the content characteristics of media on the subject. Based on these results, this study was analyzed to the differences of media coverage by period, subject, and type of media. As a result, the news in the field of records management showed that there was a difference in the amount of news coverage and news contents by period, subject, and type of media. The amount of news coverage began to increase after the Presidential Records Management Act was enacted in 2007, and the largest amount of news was reported in 2013. Daily newspapers and financial newspapers reported the largest amount of news. As a result of analyzing news reports, during the first 10 years after 1999, news topics were formed around the issues arising from the application and diffusion process of the concept of archives & records management. However, since the enactment of the Presidential Records Management Act, archives & records management has become a major factor in political and social issues, and a large amount of political and social news has been reported.

A study on the legal structure of the nuclear law system using social network analysis (사회 연결망분석을 활용한 법제 네트워크 구조에 관한 연구: 원자력산업의 관계 법령정보를 중심으로)

  • Jeon, Jieun;Lee, Sanghoon
    • Journal of Digital Convergence
    • /
    • 제17권8호
    • /
    • pp.47-60
    • /
    • 2019
  • The purpose of this study is to explore the overall structural relationship between the statutory provisions of nuclear energy legislation and to identify the coherence of the nuclear law system using social network analysis. In particular, we analyze the legal structure of the "Nuclear Safety Act", which plays a central role in nuclear safety regulation, to examine the key provisions in legal network structure of Nuclear Safety Act. Therefore, we found the structural problems of the nuclear legal system and suggest the legislative improvement plan for reducing excessive legislative activity and determining the need for legal amendments in nuclear safety management and regulation. This study is expected to provide a analytical framework for making legal system of further policy in other science and technology industries as well as nuclear energy related industries.

Accuracy Comparisons between Traditional Adjustment and Least Square Method (최소제곱법을 적용한 지적도근점측량 계산의 정확도 분석)

  • Lee, Jong-Min;Jung, Wan-Suk;Lee, Sa-Hyung
    • Journal of Cadastre & Land InformatiX
    • /
    • 제45권2호
    • /
    • pp.117-130
    • /
    • 2015
  • A least squares method for adjusting the horizontal network satisfies the conditions which is minimizing the sum of the squares of errors based on probability theory. This research compared accuracy of 3rd cadastral control points adjusted by traditional and least square method with respect to the result of Network-RTK. Test results showed the least square method more evenly distribute closure error than traditional method. Mean errors of least square and traditional adjusting method are 2.7cm, 2.2cm respectively. In addition, blunder in angle observations can be detected by comparing position errors which calculated by forward and backward initial coordinates. However, distance blunder cannot offer specific observation line occurred mistake because distance error propagates several observation lines which have similar directions.

Optimal Selection Model of Technology Transferor in Technology Trade Network (기술거래 네트워크에서의 기술제공자 선택 모델)

  • Lee, Jong-Il;Jeong, Bong-Ju;Noh, Ka-Yeon;Sim, Seung-Bae
    • Journal of Technology Innovation
    • /
    • 제18권2호
    • /
    • pp.221-252
    • /
    • 2010
  • This study presents a concept of technology trade network and management, and proposes a procedural method for optimally selecting the technology transferor when a technology transferee needs to buy a specific technology. We develop a technology trade network where technology supplier, technology marketer, and technology transferee are informatively linked. And a technology trade management consists of three step of estimating technology, trading technology, and commercialization technology. Technology transferees could import the best appropriate technology which they want through these technology network method and cost optimization method. And we hope that these methodologies can be used in selecting new technology. A methodology can be classified into an estimating technology process and a choice of technology supplier process. In an estimating technology process, we calculate the technology similarity quantitatively through developing method of estimating technology which is focused on its technological characteristics. After defining the related cost of technology introduction, we suggest goal programming model to find a solution which can be acceptable both maximizing the technology similarity and minimizing the cost of technology. And suggested model is verified with a supplier selection problem of next generation tanks.

  • PDF

Design of Networked based Control Systems using Pade Approximation and Reduction of Higher-order Transfer Function (Pade 근사법과 전달함수 축소기법을 이용한 네트워크 기반 제어 시스템 설계)

  • Shin, Dong-Gi;Cho, Hyun-Cheol;Han, Hyun-Tae;Lee, Jin-Woo;Lee, Kwon-Soon
    • Proceedings of the KIEE Conference
    • /
    • 대한전기학회 2008년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.39-40
    • /
    • 2008
  • 본 논문은 네트워크 기반 제어시스템(NCS: Networked Control Systems)모델매칭 제어기법을 적용한 효율적인 제어알고리즘을 제안한다. 비선형의 특징을 가지는 제어기 및 관측기의 시간지연을 Pade 근사법으로 선형화하여 선형시스템 이론을 적용한 모델매칭 제어기를 설계하였다. 또한, 제어기의 차수를 줄이기 위하여 저차시스템으로 근사화하여 그 타당성을 검증하였다. 제안한 제어알고리즘의 타당성 및 신뢰성을 검증하기 위하여 컴퓨터 시뮬레이션을 실시하였으며 기존의 PID 제어기법과 비교분석하였다.

  • PDF

Analysis of International Research Trends in Metaverse: Focusing on the Publications in Web of Science Indexed Journals

  • Jang, Phil-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • 제27권10호
    • /
    • pp.155-162
    • /
    • 2022
  • In this paper, we examined the research trends and characteristics related to the metaverse in global journals published between 2000 and 2022 from the Web of Science database. The analysis included descriptive statistics, multidimensional scaling, keyword network analysis, and visualization. In addition, semantic network models were constructed, and centrality (betweenness and degree) analysis was performed using R and KH coder in two separate categories based on the trends and aspects of the publication: analysis period 1 (Jan 2000 to Dec 2020) and period 2 (Jan 2021 to Jun 2022). The results showed that the recent global research trends related to the metaverse could be quantitatively characterized using the semantic network analysis. Also, the results could be applied to suggest future research topics in the field of metaverse based on quantitative and empirical data.

A Method for Malware Similarity Analysis based on Behavior Pattern Graph (행위 그래프를 이용한 악성코드 유사도 판별법)

  • Kim, Ji-Hun;Son, Kang-Won;Cho, Doosan;Youn, JongHee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.501-503
    • /
    • 2015
  • Malicious(악의적인) + Code 즉, 악의적인코드를 포함한 소프트웨어라는 의미로 줄여 Malware(Malicious + Software) 라고 불리는 악성코드는 최근 네트워크와 컴퓨터의 급속한 발전에 따라 기하급수적으로 증가하고 있는 추세이다. 폭발적인 증가율 추세를 보이고 있는 악성코드의 위협을 대비하기 위해 악성코드에 대한 분석이 필요한데 그 분석의 종류로는 초기분석, 동적 분석, 정적분석으로 나누고 장, 단점을 정리하였다. 또한 악성코드 대량화에 따른 효율적인 분석과 빠른 의사결정을 위한 악성코드 유사도에 대한 연구를 소개하고 API Call Sequence와 분류된 API를 이용한 악성행위 유사도 판별법을 제시하고 실험하였다.

A Study on the Agenda-Setting Process for Alternatives in Application of Fixed Book Price Policy to Libraries: Based on the Policy Network Model (도서정가제의 도서관 적용에 대한 대안 정책 의제화 과정 연구 - 정책네트워크 모형을 적용하여 -)

  • Heo, Go Eun;Kim, Giyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • 제49권4호
    • /
    • pp.289-315
    • /
    • 2015
  • The Fixed book price policy, a portion of publication and printing promotion act applied from February 2003 in the South Korea, is a system of fixed book prices that administered by a government body. The publishing industries had been attempted to lower the discount rate and to extend the application scope. The amendment for the attempts was passed in April 2014, and implemented from November 2014. From the library point of view, this amendment caused a reduction of buying library materials. For this reason, the agenda about expansion of material budget in libraries has been recognized as the alternative. The purpose of this study is to analyze the stance and role of libraries as actors in the policy process. Based on this, this study also attempt to identify usefulness and improvement point of Policy Network Model. For this purpose, this study identifies actor's internal characteristics as an improvement point that previous studies did not identified.

Hierarchy Visualization method of SNS User using Fuzzy Relational (퍼지 연관 곱을 이용한 SNS 사용자의 계층적 시각화 방법)

  • Park, Sun;Kwon, JangWoo;Jeong, Min-A;Lee, Yeonwoo;Lee, Seong Ro
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • 제49권9호
    • /
    • pp.76-84
    • /
    • 2012
  • Visualizations have played an important role in understanding new insights of users of social network for social network analysis. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. Besides, the user's messages to reflect the interrelation between users is insufficient, since most of visualization methods represent the user relationship using information of interaction between nodes on networks. In order to resolve above problem, this paper proposes a new visualization method to visualize user based hierarchy that uses internal relationship of users by fuzzy relational product and external access information of network.

Analytical Approach of Cross-Layer-Based Handoff Scheme in Heterogeneous Mobile Networks (이종의 모바일 네트워크에서 크로스 레이어 기반 핸드오버 기법의 분석적 접근법)

  • Kim, DongHwi;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제13권6호
    • /
    • pp.1-16
    • /
    • 2013
  • Smartphones and tablets including phone, calendar are the necessities of modern man. They are one of the MN(Mobile Node), each with wireless network capabilities. Necessities of modern human MNs are almost included cellular module available in LTE/3G and Wi-Fi module for high-speed Internet. Until now, MN mobility management is handled, but using network-based mobility management in this paper. Then, carriers can manage and maintain the network for low-cost. In addition, it was considered that use a lot of modern people with Wi-Fi and LTE/3G, and using Cross-Layer-Based handoff.