• Title/Summary/Keyword: 워드 네트워크 분석

Search Result 86, Processing Time 0.026 seconds

Study of Policy on Seowon's Preservation·Support : Focusing on Big Data Analysis on Laws (한국 서원의 보존·지원 정책에 관한 연구 : 법률에 대한 빅데이터 분석을 중심으로)

  • Bang, Mee Young
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.875-883
    • /
    • 2023
  • In Korea, the number of preservation and management entities to connect the traditional cultural heritage to next generations is rapidly decreasing. Building an infrastructure to pass on traditional cultural heritage to the next generation and to pay attention to the preservation and management of the next generation is important including the 'Seowon', a World Cultural Heritage listed by UNESCO. This study is based on the laws that regulates the preservation and support of traditional cultural assets and 'Seowon, through Big Data analysis techniques. The main keywords in each law were extracted, schematized, and a mutual Word Network was constructed and policy advice was derived. As policy advice, it is necessary to establish and implement policies to nurture and support businesses specialized in the region for the preservation·utilization, preservation·management and preservation·support of Seowons.

Ad-hoc Security Authentication Technique based on Verifier (검증자 기반 Ad-hoc 보안 인증기법)

  • Lee, Cheol-Seung;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.713-716
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on Ad-hoc Networks and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier.

  • PDF

The Effects of User's Security Awareness on Password Security Behavior (정보보안의식이 패스워드 보안행동에 미치는 영향에 관한 연구)

  • Ha, Sang-Won;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.179-189
    • /
    • 2013
  • With the rapid development of information technology in 21st century, networks are being used with various devices. Most human actions are processed through cyber space, and it is no longer separate from daily life; it has changed into one of the most important aspects of human life. Unfortunately, in cyber space, certification method has not only technical problems, but also ethological problems. Many users seemed to use the same password throughout several sites. And for a long period they refused to change it or made a small change from the earlier password. This research aims to discuss general factors of choosing and using passwords within information security through statistical analysis.

SNS Analysis Related to Presidential Election Using Text Mining (텍스트 마이닝을 활용한 대선 관련 SNS 분석)

  • Kwon, Young-Woo;Jung, Deok-Gil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.361-363
    • /
    • 2017
  • 최근 소셜 미디어의 이용률이 폭발적으로 증가함에 따라, 방대한 데이터가 네트워크로 쏟아져 나오고 있다. 이들 데이터는 기존의 정형 데이터뿐만 아니라 이미지, 동영상 등의 비정형 데이터가 있으며, 이들을 포괄하여 빅데이터라고 불린다. 이러한 빅데이터는 오피니언 마이닝, 테스트 마이닝 등의 기술적인 분석 기법과 빅데이터 요약 및 효과적인 표현방법에 대한 시각화 기법에 대하여 활발한 연구가 이루어지고 있다. 이 논문은 인기 있는 사회연결망 서비스인 Twitter의 트윗을 수집하고, 빅데이터 분석 기법인 텍스트 마이닝을 활용하여 2017년 대선에 대하여 분석하였다. 또한 분석된 자료의 효과적인 전달을 위해 워드 클라우드 진행하였다. 이 논문을 위하여 인기 있는 SNS인 Twitter의 최근 7일간 트윗(tweet)을 수집하고 분석하였다.

  • PDF

Network Analysis between Uncertainty Words based on Word2Vec and WordNet (Word2Vec과 WordNet 기반 불확실성 단어 간의 네트워크 분석에 관한 연구)

  • Heo, Go Eun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.3
    • /
    • pp.247-271
    • /
    • 2019
  • Uncertainty in scientific knowledge means an uncertain state where propositions are neither true or false at present. The existing studies have analyzed the propositions written in the academic literature, and have conducted the performance evaluation based on the rule based and machine learning based approaches by using the corpus. Although they recognized that the importance of word construction, there are insufficient attempts to expand the word by analyzing the meaning of uncertainty words. On the other hand, studies for analyzing the structure of networks by using bibliometrics and text mining techniques are widely used as methods for understanding intellectual structure and relationship in various disciplines. Therefore, in this study, semantic relations were analyzed by applying Word2Vec to existing uncertainty words. In addition, WordNet, which is an English vocabulary database and thesaurus, was applied to perform a network analysis based on hypernyms, hyponyms, and synonyms relations linked to uncertainty words. The semantic and lexical relationships of uncertainty words were structurally identified. As a result, we identified the possibility of automatically expanding uncertainty words.

Implementation of FTP Proxy Security Models for firewall Systems (침입 차단 시스템을 위한 FTP 프록시 보안 모델의 구현)

  • 이문구
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.2
    • /
    • pp.67-78
    • /
    • 2000
  • 인터넷의 급속한 발전으로 학교나 기업체 등의 네트워크가 인터넷을 통해 공유되면서 누구에게나 접속이 허용되어 많은 보안상의 문제가 발생하게 되었다 이러한 문제점을 해결하기 위해서 기존의 호스트 기반 보안 정책에서 네트워크 기반의 보안 시스템으로 침입차단 시스템을 설치하지만 침입차단 시스템은 보안을 위하여 최소 권한만을 인정하므로 사용자에게 투명한 서비스를 제공해주지 못한다. 따라서 본 논문에서는 침입차단 시스템에 프록시를 두어서 서비스의 투명성을 제공하고 강력한 보안 기능을 갖는 FTP 프록시 보안모델(FTP-PSM : FTP Proxy Security Model)을 설계 및 구현을 하고 원격 보안 탐색 도구인 SAINT를 이용하여 FTP-PSM의 안전에 대한취약성 여부를 분석하고 보안기능과 성능과의 관계를 응답시간 측정을 통해 측정함으로써 평가하였다 FTP-PSM은 강한 인증 기능을 위하여 일회용패스워드기능을 제공하고 정당한 사용자에게 서비스 제공여부를 결정하기 위해 강제적 접근제어와 임의적 접근제어 기능 그리고 FTP 명령어 사용 권한을 사용자 그룹별로 인증하는 기능을 제공하여 FTP 보안의 문제점을 해결한다.

Renewable energy trends and relationship structure by SNS big data analysis (SNS 빅데이터 분석을 통한 재생에너지 동향 및 관계구조)

  • Jong-Min Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.55-60
    • /
    • 2022
  • This study is to analyze trends and relational structures in the energy sector related to renewable energy. For this reason, in this study, we focused on big data including SNS data. SNS utilizes the Instagram platform to collect renewable energy hash tags and use them as a word embedding method for big data analysis and social network analysis, and based on the results derived from this research, it will be used for the development of the renewable energy industry. It is expected that it can be utilized.

News Big Data Analysis of Media Companies related to Lifelong Education for the Disabled (장애인 평생교육 관련 언론사 뉴스 빅데이터 분석)

  • Kwon, Choong-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.01a
    • /
    • pp.183-184
    • /
    • 2022
  • 본 연구는 장애인 평생교육 관련 언론사 뉴스 빅데이터를 한국언론재단의 빅카인즈(BIGKinds) 시스템을 이용하여 분석하였다. 본 연구에서는 2000년 1월 1일부터 2020년 12월 31일까지 20년간, 총 54개 언론사에서 보도한 '장애인 평생교육' 관련 뉴스 기사들을 추출하였다. 그 분석대상 뉴스 빅데이터를 대상으로 키워드 트렌드 분석, 언어 네트워크 지도 구현, 연관어 분석(워드클라우드 제시) 등을 진행하였다. 본 연구 결과는 장애인 평생교육 관련 정책 입안 연구 및 실증적인 연구(평생교육 참여 요인 및 효과 등)의 기초자료로 활용될 수 있을 것으로 기대된다.

  • PDF

Vulnerability Attack for Mutual Password Authentication Scheme with Session Key agreement (세션 키 동의를 제공하는 상호인증 패스워드 인증 스킴에 대한 취약점 공격)

  • Seo Han Na;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.179-188
    • /
    • 2022
  • Password authentication schemes (PAS) are the most common mechanisms used to ensure secure communication in open networks. Mathematical-based cryptographic authentication schemes such as factorization and discrete logarithms have been proposed and provided strong security features, but they have the disadvantage of high computational and message transmission costs required to construct passwords. Fairuz et al. therefore argued for an improved cryptographic authentication scheme based on two difficult fixed issues related to session key consent using the smart card scheme. However, in this paper, we have made clear through security analysis that Fairuz et al.'s protocol has security holes for Privileged Insider Attack, Lack of Perfect Forward Secrecy, Lack of User Anonymity, DoS Attack, Off-line Password Guessing Attack.

Content Analysis of Food and Nutrition Unit in High School Textbooks of Home Economics: Focus on the National Curriculums from 7th to 2015 Revised (고등학교 '기술·가정' 교과 식생활 영역의 교육내용 분석: 제7차 교육과정부터 2015 개정 교육과정까지의 교과서 내용을 중심으로)

  • Park, Chae Eun;Kim, Yoo Kyeong
    • Journal of Korean Home Economics Education Association
    • /
    • v.31 no.4
    • /
    • pp.97-113
    • /
    • 2019
  • This study is focused on the examination of changes in textbooks of Home Economics in High school from 7st to 2015 curriculum, especially the 'Food and Nutrition section. We investigated the content elements of the National Curriculum Guide, the changes in learning contents, and the number of pages of Food and Nutrition section. The key words were extracted and the connective relationships between words were visualized using a method of language network analysis through word cloud and Semantic Network Analysis. According to the results of the research, the portion of the Food and Nutrition section has been gradually decreased on the Technology·Home Economics, following the development of the curriculum. Through the whole curriculum, 'invitation', 'Korean food', 'baby·nutrition' are appeared as key words. The education contents of Food and Nutrition section from the 7th to 2015 revised have been developed and advanced with the changes of social needs. However, the reduction of portion and insufficiency of content elements of Food and Nutrition section bring concerns toward the decline of the quality of education on dietary life.