• Title/Summary/Keyword: 네트워크 지도

Search Result 12,175, Processing Time 0.033 seconds

Analysis of Web Customers Using Bayesian Belief Networks (베이지안 네트워크를 이용한 전자상거래 고객들의 성향 분석)

  • 양진산;장병탁
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.1
    • /
    • pp.16-21
    • /
    • 2001
  • 전자 상거래에서 고객의 성향을 이해하기 위해서는 일반적으로 판매 실무에서의 경험과 전문적인 지식을 필요로 하게 된다. 데이터 마이닝은 고객들에 대한 데이터의 분석을 통해서 이러한 성향들을 알아내는 것을 목표로 한다. 베이지안 네트워크는 DAG(Directed Acyclic Graph)를 이용하여 데이터의 구조를 시각적으로 표현하여 주는 확률모형으로 변수사이의 종속관계를 밝히고 데이터 마이닝의 기법으로 이용할 수 있다. 본 논문에서는 베이지안 네트워크를 사용하여 전자 상거래 고객들의 성향을 분석하기 위한 방법을 제시한다. 또한 고객성향에 대한 주요 요인을 분석하기 위해 Discriminant 모형을 이용하고 그 유용성을 다른 방법들과 비교하였다.

  • PDF

보안 이벤트 시각화를 이용한 보안 상황 인지 기술

  • Jang Beom-Hwan;Na Jung-Chan;Jang Jong-Su
    • Review of KIISC
    • /
    • v.16 no.2
    • /
    • pp.18-25
    • /
    • 2006
  • 네트워크 보안 상황인지 기술이란 현재 네트워크에서 보안과 관련하여 무슨 일이 발생하고 있는 지를 관리자에게 인지시켜 주는 기술이다. 이는 침입탐지시스템이나 방화벽에서 수행하는 잠재적인 공격자의 패킷을 필터링하거나 보고하는 것과는 달리 현재 네트워크에서 발생하고 있는 상황(침입 또는 공격 등)을 알려주는 것에 초점을 맞춘다. 네트워크 보안 상황인지 기술에는 데이터 선정 및 수집, 특성 인자 추출, 연관성 분석, 데이터마이닝, 패턴분석, 이벤트시각화 등과 같이 매우 다양한 세부 기술들이 있지만, 본 고에서는 이벤트 종류에 따른 시각화 기술들의 현황과 ETRI에서 개발한 Visual Scope에 대해 살펴보고자 한다.

A Study on Co-author Networks in the Journal of a Branch of Computers (컴퓨터 분야의 공저자 소셜 네트워크 분석)

  • Jang, Hee-suk;Park, Yoo-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.295-301
    • /
    • 2018
  • In various disciplines, researchers, not single researchers, tend to cooperate to study the same topic. There are many studies to analyze the collaborative form of various researchers through the social network analysis method, but there are few such studies in the computer field. In this paper, we analyze the characteristics of network and various groups of researchers through the social network analysis technique of the co-authors of the Journal of Korea Institute of Information and Communication Engineering, and analyze the degree centrality, the between centrality and edge weight. As a result of the analysis, many groups were extracted from the co-author's network, but the top 20 groups accounted for more than 50% of the total, also, we could find a pair of researchers who do joint research with a very high frequency. These Co-author networks are expected to be the basis for in-depth research on the subject and direction of research through future researches.

Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance System (CCTV 대체용 네트워크 카메라의 보안 강화를 위한 다중 접근권한 프락시 서버 구현)

  • Bae, Kwang-Jin;Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.123-133
    • /
    • 2011
  • This paper introduces security problems on the video surveillance systems where the network cameras are equipped at remote places and isolated from the updated and secure environment and proposes a framework for a proxy server that is delegated to connect to network cameras by providing a secure connections from the clients. The server in the framework is deployed within a secure network, secretes the information for connection to cameras and authenticates the clients. Additionally, it provides a secure video service incorporating multi-level privileges for both images and clients through a encryption key distribution and management facility. Through an implementation of the server and a its deployment, it was proved that In this server implement to multi network camera and we confirm compare direct access to network camera equal video quality of service and it can be protection network camera. We expect that can be secure and integral management about traditional network camera through experimental result.

An Analysis on Development of Shipping and Inland Networks of Gwangyang Container Port (광양항 해운과 내륙 네트워크 발달에 대한 고찰)

  • Park, YongAn
    • Journal of Korea Port Economic Association
    • /
    • v.28 no.3
    • /
    • pp.215-234
    • /
    • 2012
  • Since ports play a role of gateway to the sea and hinterlands, it is essential to analyse the networks of shipping and inland when evaluating the function and development of a port. The container port of Gwangyang, starting to operate its facilities in 1998, has developed itself as a hub port. Using the data of shipping schedules of Korean ports and the measurement of centrality in sociology, this study analyses the process of world-wide shipping network expansion in Gwangyang and concludes some implications including earlier development of shipping networks due to incentives to shipping companies. Although Gwangyang port also has been expanding its inland network through developing trucking, railway transport, and coastal shipping, it has weakness in inland network as in the cases of interruption in 2004, resumption in 2009 and re-interruption in 2012 at coastal shipping. In 2000s the expansion of shipping and inland networks at the newly built container ports such as Pyungtaek, Ulsan, and Gunsan has enticed the competition among Korean ports at each hinterland. Nevertheless, the operation of Gwangyang container port is considered to affect indirectly the relocation of some manufacturers including Samsung Electronics. Studies on interrelation between development of container port and geographical demography of manufacturers are needed to assess the effects of container port on regional economy.

Performance Evaluation of Finite Field Arithmetic Implementations in Network Coding (네트워크 코딩에서의 유한필드 연산의 구현과 성능 영향 평가)

  • Lee, Chul-Woo;Park, Joon-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.193-201
    • /
    • 2008
  • Using Network Coding in P2P systems yields great benefits, e.g., reduced download delay. The core notion of Network Coding is to allow encoding and decoding at intermediate nodes, which are prohibited in the traditional networking. However, improper implementation of Network Coding may reduce the overall performance of P2P systems. Network Coding cannot work with general arithmetic operations, since its arithmetic is over a Finite Field and the use of an efficient Finite Field arithmetic algorithm is the key to the performance of Network Coding. Also there are other important performance parameters in Network Coding such as Field size. In this paper we study how those factors influence the performance of Network Coding based systems. A set of experiments shows that overall performance of Network Coding can vary 2-5 times by those factors and we argue that when developing a network system using Network Coding those performance parameters must be carefully chosen.

  • PDF

Family Member Network of Kings in Chosun Dynasty (조선왕조 가계 인물 네트워크)

  • Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.476-484
    • /
    • 2012
  • Family member network of kings in Chosun dynasty shows scale free network properties as if most social networks do. One of distinct topological properties of the network is relatively high diameter that reflects dataset composed of the one generation continuously falling to next one. When k-core algorithm as a useful tool for obtaining a core network from the complex family member network was employed, it is possible to obtain hidden and valuable information from a complex network. Unfortunately, it is found that k-core algorithm is not useful tool for applying narrow and deep structural network. The family member network is composed of kings, queens, princes, and princesses. It is possible to separate sub-family members and to construct sub-family member networks such as queen-centered, prince-centered, and princess-centered networks. Sub-family member networks provide an useful and hidden information. These results provide new insight that is analyzed by network-based approaches for the family member of the kings in the Chosun dynasty.

Keyword-based networked knowledge map expressing content relevance between knowledge (지식 간 내용적 연관성을 표현하는 키워드 기반 네트워크형 지식지도 개발)

  • Yoo, Keedong
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.119-134
    • /
    • 2018
  • A knowledge map as the taxonomy used in a knowledge repository should be structured to support and supplement knowledge activities of users who sequentially inquire and select knowledge for problem solving. The conventional knowledge map with a hierarchical structure has the advantage of systematically sorting out types and status of the knowledge to be managed, however it is not only irrelevant to knowledge user's process of cognition and utilization, but also incapable of supporting user's activity of querying and extracting knowledge. This study suggests a methodology for constructing a networked knowledge map that can support and reinforce the referential navigation, searching and selecting related and chained knowledge in term of contents, between knowledge. Regarding a keyword as the semantic information between knowledge, this research's networked knowledge map can be constructed by aggregating each set of knowledge links in an automated manner. Since a keyword has the meaning of representing contents of a document, documents with common keywords have a similarity in content, and therefore the keyword-based document networks plays the role of a map expressing interactions between related knowledge. In order to examine the feasibility of the proposed methodology, 50 research papers were randomly selected, and an exemplified networked knowledge map between them with content relevance was implemented using common keywords.

A Study on the Possibility of Utilizing Both Biotope Maps and Land Cover Maps on the Calculation of the Ecological Network Indicator of City Biodiversity Index (도시생물다양성 지수(CBI) 중 생태네트워크 산정을 위한 도시생태현황지도 및 토지피복지도 활용 가능성 연구)

  • Park, Seok-Cheol;Han, Bong-Ho;Park, Min-Jin;Yun, Hyerngdu;Kim, Myungjin
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.6
    • /
    • pp.73-83
    • /
    • 2016
  • This study modified and applied the ecological network(Indicator 2) from the City Biodiversity Index(CBI) to be tailored to Korea. It is calculated by utilizing a biotope map and a land cover map. The ecological network of Gyeryong-Si was 13,713,703(33.8%) with the biotope map and 17,686,966(37.9%) with the land cover map. The result of the biotope map was lower than the land cover map. The ecological network of Goyang-Si was 4,961,922(4.9%) with the biotope map and 4,383,207(3.7%) with the land cover map. The result of the land cover map was lower than the biotope map. As a main result of the research, an error was discovered in which, when calculating the ecological network, the types of the military unit facilities were distinguished into a special area on the biotope map and into an urbanization promotion area and a forest area on the land cover map. In the case of a middle-classified, land cover map, the land use in the surroundings of the forest area was not subdivided. An error in the development area expressed as a forest green was discovered. When selecting the natural elements, too, regarding the types of artificially-created rivers, artificial ponds, and artificial grasslands, etc. on a biotope map, the exclusions were necessary. Regarding the natural, bare ground on a land cover map, there was a need to calculate by including the natural elements. It was judged that, in the future, the ecological network in the unit of the entire nation can be analyzed roughly by utilizing a land cover map. It was judged that, in a city having a biotope map, the calculation of the ecological network utilizing a map of the present situation of the urban ecology will be a more accurate diagnosis of the present situation.

Advanced ICMP Traceback Mechanism Against DDoS Attack in Router (DDoS 공격에 대한 개선된 라우터 기반 ICMP Traceback iT법)

  • 이형우
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.173-186
    • /
    • 2003
  • Distributed Denial-of-Service(DDoS) attack prevent users from accessing services on the target network by spoofing its origin source address with a large volume of traffic. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Existing IP Traceback methods can be categorized as proactive or reactive dating. Proactive tracing(such as packet marking and messaging) prepares information for tracing when packets are in transit. Reactive tracing starts tracing after an attack is detected. In this paper, we propose a 'advanced ICW Traceback' mechanism, which is based on the modified pushback system with secure router mechanism. Proposed mechanism can detect and control DDoS traffic on router and can generate ICMP Traceback message for reconstructing origin attack source, by which we can diminish network overload and enhance Traceback performance.