• Title/Summary/Keyword: Information Network Analysis

Search Result 7,095, Processing Time 0.045 seconds

In-network Distributed Event Boundary Computation in Wireless Sensor Networks: Challenges, State of the art and Future Directions

  • Jabeen, Farhana;Nawaz, Sarfraz
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2804-2823
    • /
    • 2013
  • Wireless sensor network (WSN) is a promising technology for monitoring physical phenomena at fine-grained spatial and temporal resolution. However, the typical approach of sending each sensed measurement out of the network for detailed spatial analysis of transient physical phenomena may not be an efficient or scalable solution. This paper focuses on in-network physical phenomena detection schemes, particularly the distributed computation of the boundary of physical phenomena (i.e. event), to support energy efficient spatial analysis in wireless sensor networks. In-network processing approach reduces the amount of network traffic and thus achieves network scalability and lifetime longevity. This study investigates the recent advances in distributed event detection based on in-network processing and includes a concise comparison of various existing schemes. These boundary detection schemes identify not only those sensor nodes that lie on the boundary of the physical phenomena but also the interior nodes. This constitutes an event geometry which is a basic building block of many spatial queries. In this paper, we introduce the challenges and opportunities for research in the field of in-network distributed event geometry boundary detection as well as illustrate the current status of research in this field. We also present new areas where the event geometry boundary detection can be of significant importance.

Integrated Water Distribution Network System using the Mathematical Analysis Model and GIS (수리해석 모형과 GIS를 이용한 통합 용수배분 시스템)

  • Kwon, Jae-Seop;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.4
    • /
    • pp.21-28
    • /
    • 2001
  • In this study, GNLP(GIS linked non-linear network analysis program) for pipeline system analysis has been developed. This GNLP gets the input data for pipeline analysis from existing GIS(geographic information system) data automatically, and has GUI(graphic user interface) for user. Non-Linear Method was used for hydraulic analysis of pipe network based on Hazen-Williams equation, and Microsoft Access of relational database management system(RDBMS) was used for the framework of database applied program. GNLP system environment program was improved so that a pipe network designer can input information data for hydraulic analysis of pipeline system more easily than that of existing models. Furthermore this model generate output such as pressure and water quantities in the form of a table and a chart, and also produces output data in Excel file. This model is also able to display data effectively for analysed data confirmation and query function which is the core of GIS program.

  • PDF

Design and Implementation of Quantitative Risk Analysis System for ISP Network (ISP(Internet Service Provider) 네트워크의 정량적인 위험분석을 위한 시스템 설계 및 구현)

  • 문호건;최진기;김형순
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.101-111
    • /
    • 2004
  • Risk analysis process, which identifies vulnerabilities and threat causes of network assets and evaluates expected loss when some of network assets are damaged, is essential for diagnosing ISP network security levels and response planning. However, most existing risk analysis systems provide only methodological analysis procedures, and they can not reflect continually changing vulnerabilities and threats information of individual network system on real time. For this reason, this paper suggests new system design methodology which shows a scheme to collects and analyzes data from network intrusion detection system and vulnerability analysis system and estimate quantitative risk levels. Additionally, experimental performance of proposed system is shown.

Research on the Discourse of Libraries During COVID-19 in YouTube Videos Using Topic Modeling and Social Network Analysis

  • Euikyung Oh;Ok Nam Park
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.3
    • /
    • pp.29-42
    • /
    • 2023
  • This study explored issues related to the library in the COVID-19 era in YouTube videos in Korea. This study performed social network analysis and topic modeling analysis by collecting 479 YouTube videos, 20,545 words, and 8,379 channels related to COVID-19 and the library from 2019 to 2020. The study results confirmed that YouTube, a social media platform, was used as an important medium to connect users and physical libraries and provide/promote online library services. In the study, major topics and keywords such as quarantine, vlog, and library identity during the COVID-19 pandemic, library services and functions, and introductions and user guides of libraries were derived. Additionally, it was identified that videos about COVID-19 and the library are being produced by various actors (news and media channels, libraries, government agencies, librarians, and individual users). However, the study also identified that the actor network is fragmented through the channel network, showing a low density or weak linkage, and that the centrality of the library in the actor network is weak.

Effective Feature Selection Model for Network Data Modeling (네트워크 데이터 모델링을 위한 효과적인 성분 선택)

  • Kim, Ho-In;Cho, Jae-Ik;Lee, In-Yong;Moon, Jong-Sub
    • Journal of Broadcast Engineering
    • /
    • v.13 no.1
    • /
    • pp.92-98
    • /
    • 2008
  • Network data modeling is a essential research for the evaluation for intrusion detection systems performance, network modeling and methods for analyzing network data. In network data modeling, real data from the network must be analyzed and the modeled data must be efficiently composed to reflect a sufficient amount of the original data. In this parer the useful elements of real network data were quantified from packets captured from a huge network. Futhermore, a statistical analysis method was used to find the most effective element for efficiently classifying the modeled data.

Effects of Centrality on IT Usage Capability : A Perspective of Social Networks (조직 내 중심성이 IT활용능력에 미치는 영향: 소셜네트워크 관점)

  • Kim, Hyo-Jun;Kwahk, Kee-Young
    • The Journal of Information Systems
    • /
    • v.20 no.1
    • /
    • pp.147-169
    • /
    • 2011
  • In organizations, evaluating the competency of individuals through the position or status has many limitations. To overcome these limitations, this study analyzes the organization's informal network using social network analysis. We measured out-degree centrality and in-degree centrality by making use of social network analysis technique. Out-degree centrality is interpreted as 'madangbal' in that actors actively help other people, while in-degree centrality is interpreted as 'prestige' in that other people want to have a relationship with. This research examines the effects of individual's 'prestige' and 'madangbal' in the instrumental network and communication network on IT competency. We carried out empirical analysis using social network data that were collected from undergraduate students. The result reveals that relationship between IT competency and centrality in the instrumental network is statistically significant, while relationship between IT competency and centrality in the communication network does not show significant results.

Real-Time Network Traffic Monitoring System using SNMP (SNMP를 이용한 실시간 네트워크 트래픽 모니터링 시스템)

  • 박진호;정진욱
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.69-75
    • /
    • 2002
  • In this paper, we propose the realtime network traffic monitoring system usin SNMP that can supported network and system operation, management, expansion, and design using network analysis and diagnosis to a network administrator. The proposed system consists of two parts: analysis server for collection and analysis of the network information, and supports real-time monitoring of network traffic, and client system shows user a graphical data that analyzed a returned result from the server. This system implements web-based technology using Java and contributes to enhance the effectiveness of network administrator's management.

  • PDF

Improvement of Network Traffic Monitoring Performance by Extending SNMP Function

  • Youn Chun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.171-175
    • /
    • 2004
  • Network management for detail analysis can cause speed decline of application in case of lack band width by traffic increase of the explosive Internet. Because a manager requests MIB value for the desired objects to an agent by management policy, and then the agent responds to the manager. Such processes are repeated, so it can cause increase of network traffic. Specially, repetitious occurrence of sending-receiving information is very inefficient for a same object when a trend analysis of traffic is performed. In this paper, an efficient SNMP is proposed to add new PDUs into the existing SNMP in order to accept time function. Utilizing this PDU, it minimizes unnecessary sending-receiving message and collects information for trend management of network efficiently. This proposed SNMP is tested for compatibility with the existing SNMP and decreases amount of network traffic largely

  • PDF

A STRUCTURAL ANALYSIS OF INTER-LIBRARY NETWORKS: A REGIONAL ILL NETWORK IN THE WESTERN NEW YORK 3Rs REGION (도서관 네트워크의 구조적 분석)

  • 유사라
    • Journal of the Korean Society for information Management
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 1989
  • This study is a structural analysis of a multi-type and multi-level library network within the framework of a regional interlibrary loan (ILL) system. The study monitored to information network structure for resource sharing of academic and research library materials transmitted through the ILL. The local flow of academic and research information was measured by a survey of the filled ILL transactions by individual libraries in the Western 3Rs region. The major findings were as follows: 1) the regional ILL network showed less than half of participation of the total subject libraries, 2) existing structure surveyed was identified as a composite centralized network with three communication groups, 3) depending on the types of materials transacted, the structure were changed, 4) statewide and multi-state library cooperatives had direct interactions with some of the local libraries, 5) individual libraries participated in the ILL network more for periodicals than book materials, 6) academic libraries throughout the total six structure analyzed showed the highest percentage of participation.

  • PDF

The Design of IPv6 Traffic Analysis Tool for Detecting Network Attacks (네트워크 공격을 탐지하기 위한 IPv6 트래픽 분석 도구)

  • Oh, Seung-Hee;Oh, Jin-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.848-851
    • /
    • 2005
  • The BcN is applying from public networks to local networks and each terminal step by step until 2007. By IPv6 network introduction, IP address lack problem can be solved. However, the threats that network attacks of another method can be caused with new problem of network security in IPv6 networks. In this paper, we suggest the traffic analysis tool which analyze IPv6 traffic efficiently to detect/response network attack in IPv6 environment. The implemented IPv6 traffic analysis tool uses IPv6 header to analyze traffic and detect network attacks. Also, we also propose detection algorithm to detect network attacks in IPv6 networks.

  • PDF