• Title/Summary/Keyword: 워드 네트워크 분석

Search Result 85, Processing Time 0.023 seconds

An OpenAPI based Security Framework for Privacy Protection in Social Network Service Environment (소셜 네트워크 서비스 환경에서 개인정보보호를 위한 OpenAPI기반 보안 프레임워크)

  • Yoon, Yongseok;Kim, Kangseok;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1293-1300
    • /
    • 2012
  • With the rapid evolution of mobile devices and the development of wireless networks, users of mobile social network service on smartphone have been increasing. Also the security of personal information as a result of real-time communication and information-sharing are becoming a serious social issue. In this paper, a framework that can be linked with a social network services platform is designed using OpenAPI. In addition, we propose an authentication and detection mechanism to enhance the level of personal information security. The authentication scheme is based on an user ID and password, while the detection scheme analyzes user-designated input patterns to verify in advance whether personal information protection guidelines are met, enhancing the level of personal information security in a social network service environment. The effectiveness and validity of this study were confirmed through performance evaluations at the end.

A study of user authentication protocol considering the mobility based on IPv6 in wireless LAN environment (무선랜 환경에서 IPv6기반의 이동성을 고려한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Yi-Kang;Kim, Tea-Sub;Oh, Ryong;Lee, Sang-Jun;Cho, Choong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.218-223
    • /
    • 2008
  • 최근 홈, 오피스 및 핫스팟 영역에서 초고속 멀티미디어의 서비스 수요가 많아짐에 따라 고속의 안정 적인 무선랜에 대한 수요도 증가하고 있다. Access Point 를 이용한 네트워크를 하는 무선랜은 네트워크 에 접근하는 사용자에 대한 인증 프로토콜을 통한 보안이 필요로 하며, 무선랜의 특성상 단말의 이동으로 인해, 핸드오프 시마다 반복되는 사용자 인증은 또 다른 문제를 야기한다. 또, 차세대 인터넷 프로토콜 IPv6는 현재의 주소체계인 IPv4 가 인터넷에 접속된 컴퓨터 수의 기하급수적으로 증가로 인해 빠른 속 도로 고갈되는 상황에서의 대안이다. 따라서 본 논문에서는 이동성을 고려하여 무선랜 환경에서 안전하게 사용자를 인증하고 서비스를 제공하기 위한 패스워드 기반의 사용자 인증 프로토콜을 제안한다. 또한 본 논문에서 제안한 프로토콜을 차세대 주소체계인 IPv6 환경을 바탕으로 구현하였고, 제안한 프로토콜에 대한 다양한 공격으로부터의 안전성을 분석 하였다.

  • PDF

Digtal Healthcare Research Trend based on Social Media Data (소셜미디어 데이터에 기반한 디지털 헬스케어 연구 동향)

  • Lee, Taekkyeun
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.515-526
    • /
    • 2020
  • Digital healthcare is a combined area of medical field and IT and various information on digital healthcare is provided in social media. This study aims to find the research trend of digital healthcare by collecting and analyzing data related to digital healthcare through the social media. The data were collected from Naver and Daum's news and blogs from January 2008 to June 2019. Major keywords with high frequency were extracted and visualized with wordcloud and network analysis was used to analyze the relationship between major keywords. Research combining medical field and IT from 2008 to 2001, various convergence research based on medical field and IT from 2012 to 2015, convergence research that applied the 4th industrial revolution technologies such as big data, blockchain and AI were actively conducted from 2016 to June 2019.

Broadband Optical Transmitter using Feedforward Compensation Circuit (피드포워드 보상회로를 이용한 광대역 광송신기)

  • Yun, Young-Seol;Lee, Joon-Jae;Moon, Yon-Tae;Kim, Do-Gyun;Choi, Young-Wan
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.4
    • /
    • pp.1-9
    • /
    • 2007
  • Linearity is the one of the most important features for analog-optic transmission system. In our research, the available bandwidth for the feed-forward compensation circuit is enhanced by using a 180 hybrid coupler in the circuit. The bandwidth having the decreased 3rd-order intermodulation distortion(IMD3) over 10 dB is extended over 200 MHz with the center frequency of 1.6 GHz. We performed an efficient bandwith measurement for the feed-forward compensation system, which uses the network analyzer instead of the traditional measuring system that uses two RF signal generators and the spectrum analyzer. We identify the usefulness of this method from experimental results. In this study, we used cheap digital-purpose laser diodes for economical aspect, which proves the efficiency of the proposed analog system. The spurious-free dynamic range is improved about 6 dB/Hz.

The Research Features Analysis of Leisure and Recreation based on Co-authors Network and Topic Model (공저자 네트워크 및 토픽 모델링 기반 여가레크리에이션 학술 연구 특징 분석)

  • Park, SungGeon;Park, Kwang-Won;Kang, Hyun-Wook
    • 한국체육학회지인문사회과학편
    • /
    • v.57 no.2
    • /
    • pp.279-289
    • /
    • 2018
  • The purpose of this study is to investigate features of leisure and recreation scholarship study in The Korean Journal of physical education based on co-authors network and topic modeling through using Word Cloud and LDA Topic Modeling(Latent Dirichlet Allocation). The data collected for this study are 2,697 papers published online from January 2008 to March 2017 on the Korean journal of physical education. Respectively ordered analysis targets are the major author, author of correspondence, co-author 1, co-author 2, co-author n in related document to explore studies' trends using the 369 documents. As a result, the co-author network analysis result found that 451 were linked to the research network, on average researchers had 1.52 relationships and the average distance between researchers was 2.33. The Representative author's concentration of connection was ranked high in the order of the following, Lee. K. M., Hwang. S. H., H., Lee. C. S., and proximity centers were shown in Seo K. B., Han. J. H., Kim. K. J. Finally, parameter-centric features appeared in order of Lee. C. W. and Seo. K. B. was most actively connected between the researchers of the leisure-related academic papers. Future research needs discussions among scholars regarding the trend and direction of future leisure research.

Analysis of Research Trends in Home Economics Education by Language Network Analysis: Focused on the KCI Journals (2000-2019) (언어 네트워크 분석에 기반 한 가정과교육 연구 동향 분석: 2000-2019년 KCI 등재지를 중심으로)

  • Gham, Kyoung Won;Park, Mi Jeong
    • Journal of Korean Home Economics Education Association
    • /
    • v.32 no.3
    • /
    • pp.179-197
    • /
    • 2020
  • This study analyzed the trends in home economics education research using the language network analysis method, focusing on papers published in the KCI list for 20 years from 2000 to 2019. A total of 501 home economics education papers analyzed through word cloud, centrality analysis, and topic modeling using NetMiner 4.4, and the results are as follows. First, the number of papers in home economics education published in the KCI listing increased gradually to 186 in the 2000s and 315 in the 2010s. The academic journals in which home economics education papers were published have been diversified to 16 in the 2000s and 22 in the 2010s. 60% of all papers were published in the 'Journal of Korean Home Economics Education Association', and since 2018, the number of papers published in the 'Journal of Learner-Centered Curriculum and Instruction' has increased dramatically. Second, in the 2000s and 2010s, home economics education studies published in KCI were categorized into home economics education content analysis, home economics educational program development & application, curriculum analysis, perception survey & direction exploration. In the 2000s, 'Home Economics Teacher' appeared as the main keyword, and a lot of perception survey & direction exploration were conducted. Relatively, the influence of 'development' increased in the 2010s, and many studies were conducted to analyze home economics education contents and develop and apply home economics programs. This study has significance in that it analyzed the research trend of HEE by expanding the analysis target and analysis period of the existing studies.

Investigations on Techniques and Applications of Text Analytics (텍스트 분석 기술 및 활용 동향)

  • Kim, Namgyu;Lee, Donghoon;Choi, Hochang;Wong, William Xiu Shun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.2
    • /
    • pp.471-492
    • /
    • 2017
  • The demand and interest in big data analytics are increasing rapidly. The concepts around big data include not only existing structured data, but also various kinds of unstructured data such as text, images, videos, and logs. Among the various types of unstructured data, text data have gained particular attention because it is the most representative method to describe and deliver information. Text analysis is generally performed in the following order: document collection, parsing and filtering, structuring, frequency analysis, and similarity analysis. The results of the analysis can be displayed through word cloud, word network, topic modeling, document classification, and semantic analysis. Notably, there is an increasing demand to identify trending topics from the rapidly increasing text data generated through various social media. Thus, research on and applications of topic modeling have been actively carried out in various fields since topic modeling is able to extract the core topics from a huge amount of unstructured text documents and provide the document groups for each different topic. In this paper, we review the major techniques and research trends of text analysis. Further, we also introduce some cases of applications that solve the problems in various fields by using topic modeling.

Vulnerability Analysis for Industrial Control System Cyber Security (산업제어시스템의 사이버보안을 위한 취약점 분석)

  • Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.1
    • /
    • pp.137-142
    • /
    • 2014
  • Industrial control system (ICS) is a computer based system which are typically used in nation-wide critical infra-structure facilities such as electrical, gas, water, wastewater, oil and transportation. In addition, ICS is essentially used in industrial application domain to effectively monitor and control the remotely scattered systems. The highly developed information technology (IT) and related network techniques are continually adapted into domains of industrial control system. However, industrial control system is confronted significant side-effects, which ICS is exposed to prevalent cyber threats typically found in IT environments. Therefore, cyber security vulnerabilities and possibilities of cyber incidents are dramatically increased in industrial control system. The vulnerabilities that may be found in typical ICS are grouped into Policy and Procedure, Platform, and Network categories to assist in determining optimal mitigation strategies. The order of these vulnerabilities does not necessarily reflect any priority in terms of likelihood of occurrence or severity of impact. Firstly, corporate security policy can reduce vulnerabilities by mandating conduct such as password usage and maintenance or requirements for connecting modems to ICS. Secondly, platfom vulnerabilities can be mitigated through various security controls, such as OS and application patching, physical access control, and security software. Thirdly, network vulnerabilities can be eliminated or mitigated through various security controls, such as defense-in-depth network design, encrypting network communication, restricting network traffic flows, and providing physical access control for network components.

Vulnerability Analysis on the Strong-Password Mutual Authentication Protocols (강력한 패스워드 상호인증 프로토콜 취약점 분석)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.722-728
    • /
    • 2011
  • Most services need to have authentication protocols to verify users' eligibility in the network environment. For this, a lot of user authentication protocols have been researched and developed. Two of them, SPMA and I-SPMA protocols, introduced the lack of mutual authentication and vulnerability to the reply attack of the prior protocols and suggested revised protocols. Nevertheless, these protocols did not mention about the critical problem caused when the server and the client lose synchronization on the secret information between them. Therefore, in this paper, we analyze the security characteristics of the existing protocols and prove the vulnerability to the synchronization of the protocols.

Research Trends of Middle-aged Women' Health in Korea Using Topic Modeling and Text Network Analysis (텍스트네트워크분석과 토픽모델링을 활용한 국내 중년여성 건강 관련 연구 동향 분석)

  • Lee, Do-Young;Noh, Gie-Ok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.163-171
    • /
    • 2022
  • This study was conducted to understand the research trends and central concepts of middle-aged women' health in Korea. For the analysis of this study, target papers published from 2012 to 2021 were collected by entering the keywords of 'middle-aged woman' or 'menopausal woman'. 1,116 papers were used for analysis. The co-occurrence network of key words was developed and analyzed, and the research trends were analyzed through topic modeling of the LSD by dividing it into five-year units (2012-2016, 2017-2021), and visualized word cloud and sociogram were used. The keywords that appeared the most during the last 10 years were obesity, depression, body composition, stress, and menopause symptom. Five topics analyzed in the thesis data for 5 years from 2012 to 2016 were 'postmenopausal self-efficacy and satisfaction enhancement strategy', 'exercise to manage obesity and risk factors', 'intervention for obesity and stress', 'promotion of happiness and life management' and 'menopausal depression and quality of life' were confirmed. Five topics of research conducted for the next five years (2017-2021) were 'menopausal depression and quality of life', 'management of obesity and cardiovascular risk factors', 'life experience as a middle-aged woman', and 'life satisfaction and psychological well-being' and 'menopausal symptom relief strategy'. Through the results, the trend of research topics related to middle-aged women's health over the past 10 years have been identified, and research on health of middle-aged women that reflects the trend of the future should be continued.