• Title/Summary/Keyword: Information Network Analysis

Search Result 7,095, Processing Time 0.038 seconds

Outage Analysis of a Cooperative Multi-hop Wireless Network for Rayleigh Fading Environment

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2A
    • /
    • pp.133-138
    • /
    • 2011
  • This paper presents an information theoretic outage analysis for physical layer of a cooperative multihop wireless network. Our analysis shows that cooperation by selecting a proper relay at each hop increases the coverage or data rate of the network. In our analysis we consider both symmetric and asymmetric network model. We also investigate the availability of cooperative relay at each hop and show that end-to-end performance of the network depends on the relay selection procedure at each hop. We also verify our analytical results with simulations.

Big Data Patent Analysis Using Social Network Analysis (키워드 네트워크 분석을 이용한 빅데이터 특허 분석)

  • Choi, Ju-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.2
    • /
    • pp.251-257
    • /
    • 2018
  • As the use of big data is necessary for increasing business value, the size of the big data market is getting bigger. Accordingly, it is important to apply competitive patents in order to gain the big data market. In this study, we conducted the patent analysis based keyword network to analyze the trend of big data patents. The analysis procedure consists of big data collection and preprocessing, network construction, and network analysis. The results of the study are as follows. Most of big data patents are related to data processing and analysis, and the keywords with high degree centrality and between centrality are "analysis", "process", "information", "data", "prediction", "server", "service", and "construction". we expect that the results of this study will offer useful information in applying big data patent.

MFSC: Mean-Field-Theory and Spreading-Coefficient Based Degree Distribution Analysis in Social Network

  • Lin, Chongze;Zheng, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3630-3656
    • /
    • 2018
  • Degree distribution can provide basic information for structural characteristics and internal relationship in social network. It is a critical procedure for social network topology analysis. In this paper, based on the mean-field theory, we study a special type of social network with exponential distribution of time intervals. First of all, in order to improve the accuracy of analysis, we propose a spreading coefficient algorithm based on intimate relationship, which determines the number of the joined members through the intimacy among members. Then, simulation show that the degree distribution of follows the power-law distribution and has small-world characteristics. Finally, we compare the performance of our algorithm with the existing algorithms, and find that our algorithm improves the accuracy of degree distribution as well as reducing the time complexity significantly, which can complete 29.04% higher precision and 40.94% lower implementation time.

Centrality Measures for Bibliometric Network Analysis (계량서지적 네트워크 분석을 위한 중심성 척도에 관한 연구)

  • Lee Jae-Yun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.3
    • /
    • pp.191-214
    • /
    • 2006
  • Recently, some bibliometric researchers tried to use the centrality analysis methods and the centrality measures which are standard tools in social network analysis. However the traditional centrality measures originated from social network analysis could not deal with weighted networks such as co-citation networks. In this study. new centrality measures for analyzing bibliometric networks with link weights are suggested and applied to three real network data, including an author co-citation network, a co-word network, and a website co-link network. The results of centrality analyses in these three cases can be regarded as Promising the usefulness of suggested centrality measures, especially in analyzing the Position and influence of each node in a bibliometric network.

Deep Learning-based Tourism Recommendation System using Social Network Analysis

  • Jeong, Chi-Seo;Ryu, Ki-Hwan;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.113-119
    • /
    • 2020
  • Numerous tourist-related data produced on the Internet contain not only simple tourist information but also diverse ideas and opinions from users. In order to derive meaningful information about tourist sites from such big data, the social network analysis of tourist keywords can identify the frequency of keywords and the relationship between keywords. Thus, it is possible to make recommendations more suitable for users by utilizing the clear recommendation criteria of tourist attractions and the relationship between tourist attractions. In this paper, a recommendation system was designed based on tourist site information through big data social network analysis. Based on user personality information, the types of tourism suitable for users are classified through deep learning and the network analysis among tourist keywords is conducted to identify the relationship between tourist attractions belonging to the type of tourism. Tour information for related tourist attractions shown on SNS and blogs will be recommended through tagging.

Designing Neural Network Using Genetic Algorithm (유전자 알고리즘을 이용한 신경망 설계)

  • Park, Jeong-Sun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2309-2314
    • /
    • 1997
  • The study introduces a neural network to predict the bankruptcy of insurance companies. As a method to optimize the network, a genetic algorithm suggests optimal structure and network parameters. The neural network designed by genetic algorithm is compared with discriminant analysis, logistic regression, ID3, and CART. The robust neural network model shows the best performance among those models compared.

  • PDF

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

An Empirical Study on the Sub-factors of Middle School Character Education using Social Network Analysis (사회 네트워크 분석을 이용한 중등 인성 교육의 세부요인에 관한 실증 연구)

  • Kim, Hyojung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.87-98
    • /
    • 2017
  • The advancements in scientific technology and information network in the 21st century allow us to easily acquire a desired knowledge. In the midst of today's informatization, globalization, and cultural diversification, adolescents experience emotional confusion while accommodating diverse cultures and information. This study aimed at examining three aspects of character suggested by the Ministry of Education, which are ethics, sociality, and emotion, and the actual sub-factors required for character education. To that end, a survey was conducted with adolescents who were at a character-building age, and social network analysis (SNA) was performed to determine the effect of character education on the sub-factors. The statistics program SPSS was used to investigate the general traits of the subjects and the validity of the research variables. The 2-mode data that were finally selected were converted to 2-mode data using NetMinder 4, which is a network analysis tool. Furthermore, a data network was established based on a quasi-network that represents the relationships between ethics, sociality, and emotion. The results of this study showed that the subjects considered honesty and justice to be the sub-domains of the ethics domain. In addition, they identified sympathy, communication, consideration for others, and cooperation as the sub-domains of the sociality domain. Finally, they believed that self-understanding and self-control were the sub-domains of the emotion domain.

Availability Analysis of Computer Network using Petri-Nets

  • Ro, Cheul Woo;Pak, Artem
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.699-705
    • /
    • 2009
  • This paper reviews methods used to perform reliability and availability analysis of the network system composed by nodes and links. The combination of nodes and links forms virtual connections (VC). The failure of several VCs cause failure of whole network system. Petri Net models are used to analyze the reliability and availability. Stochastic reward nets (SRN) is an extension of stochastic Petri nets provides modelling facilities for network system analysis.

  • PDF

The Analysis on the KAIE Articles using Social Network Analysis (사회연결망 분석을 활용한 정보교육학회 논문 분석)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.6
    • /
    • pp.543-552
    • /
    • 2016
  • Recently, a number of researches focus on social network analysis and it is applied to various fields not only in social science area but also in natural science area. Therefore, the social network analysis and the text analysis were conducted in order to analyze the current trend of the theses in information education field. The result indicated that the most frequently mentioned words were consistent with the development of information technology and the change in information education curriculum. That is, the mentioned words were computer aided instruction (CAI) and courseware for period 1, ICT for period 2, smart and scratch for period 3, and in period 4, computational thinking ability and coding appeared for the first time. Moreover, as the result of social network analysis, it concluded the research topics became more complicated and detailed as the words diversified throughout the period in which the simplified network in period 1 changed its configuration into a structure with more diversified words of higher centrality.