• Title/Summary/Keyword: Internal Network Information

Search Result 504, Processing Time 0.03 seconds

The Effects of Team Network Characteristics and Boundary Spanning Activities on Knowledge Management Performances: The Mediating Role of Trust (팀 네트워크 특성과 경계관리 활동이 지식경영 성과에 미치는 영향: 팀 신뢰의 매개역할)

  • Goh, Yumi;Kim, Jee-Young;Chung, Myung-Ho
    • Knowledge Management Research
    • /
    • v.14 no.5
    • /
    • pp.101-120
    • /
    • 2013
  • The effective management of knowledge has become one of the critical success factors in current organizations. In spite of the extensive use of Knowledge Management System (KMS), useful information and knowledge resources are still transmitted through personal networks among people in organizations. Thus, social network theory which focuses on social relationships in organization can be a fruitful theoretical resource for enhancing Knowledge Management (KM) performances. In this study, we investigate the effects of intra-team network characteristics (i.e., group density and degree of centralization) and external boundary spanning activities on knowledge management performances of a team. We also acknowledge that all group members do not necessarily agree on the team goal and actively disseminate useful information and knowledge. Drawing on the political perspective on KM which emphasizes the role of trust among group members, we examine the mediating effects of team trust between internal/external network characteristics and KM performances. From the data of 220 teams in financial companies in Korea, we found that: (1) group density had positive effects on KM performances (i.e., knowledge creation, sharing, and use). (2) However, centralization was not significantly associated with KM performances. (3) Team trust was found to be an important factor mediating the relationship between intra-team network characteristics, boundary spanning activities, and KM performances. Based on these results, we discuss and suggest possible implications of the findings when designing and implementing KM practices.

  • PDF

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

Visualization method of User Hierarchy of among SNS users (소셜 네트워크 서비스 사용자의 계층 시각화 방법)

  • Park, Sun;Jeong, Jong-Geun;Yeu, Moo-Song;Lee, Seong-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1717-1724
    • /
    • 2012
  • Information of social relationship of users on online is useful information for other services such as recommend information of commercial activity. So, there is a lot of studies analysis with connection to visualization of social network. Most of the previous works of visualization focus on representing user's relationship on social network by a complex multi dimension graph. However, this method is difficult to identify the important of relationship to focus on personal user intuitively. In order to resolve above problem, this paper proposes a new visualization method using the user's correlation and user relationship of network node. The proposed method visualizes the hierarchy relationship of users using the internal relation of network reflecting user's message and external relation of network nodes.

Visual Analysis of Deep Q-network

  • Seng, Dewen;Zhang, Jiaming;Shi, Xiaoying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.853-873
    • /
    • 2021
  • In recent years, deep reinforcement learning (DRL) models are enjoying great interest as their success in a variety of challenging tasks. Deep Q-Network (DQN) is a widely used deep reinforcement learning model, which trains an intelligent agent that executes optimal actions while interacting with an environment. This model is well known for its ability to surpass skilled human players across many Atari 2600 games. Although DQN has achieved excellent performance in practice, there lacks a clear understanding of why the model works. In this paper, we present a visual analytics system for understanding deep Q-network in a non-blind matter. Based on the stored data generated from the training and testing process, four coordinated views are designed to expose the internal execution mechanism of DQN from different perspectives. We report the system performance and demonstrate its effectiveness through two case studies. By using our system, users can learn the relationship between states and Q-values, the function of convolutional layers, the strategies learned by DQN and the rationality of decisions made by the agent.

Securing C.I.A for Autonomous Vessels through the Application of VDI (VDI 적용을 통한 자율운항선박의 C.I.A 확보 방안 연구)

  • Choi, Youngryul;Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.4
    • /
    • pp.41-46
    • /
    • 2022
  • In the fourth industrial era, when various technologies are fused and combined, new and advanced technologies from other industries are used extensively in the maritime industry field. New security threats are also increasing along with the development of new technologies. In addition, in incorporating convergence technologies into the maritime industry, various problems, such as communication definitions and procedures between technologies and customer-customized delays, occur. In this paper, for the problems mentioned above, research results on the network configuration of safer autonomous vessels by supplementing and fusing existing solutions rather than developing new technologies are proposed. In conclusion, the entire network consists of VDI and presents additional configurations to ensure confidentiality, integrity, and availability, which are the three security elements. According to the composition of such a convergence network, it is intended to help prepare countermeasures to protect internal data from external threats.

A Study on Strategies for Applying Zero Trust (제로 트러스트 적용 전략에 관한 연구)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.461-463
    • /
    • 2021
  • With the recent increase in remote access due to network expansion, cloud infrastructure expansion, and telecommuting, the need to be vigilant not only from external access but also from internal access is increasing. Because of this, a new network security model called zero trust is attracting attention. In this paper, we will briefly introduce the concept of zero trust and examine strategies for applying zero trust according to various business environments.

  • PDF

An Effective WSSENet-Based Similarity Retrieval Method of Large Lung CT Image Databases

  • Zhuang, Yi;Chen, Shuai;Jiang, Nan;Hu, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2359-2376
    • /
    • 2022
  • With the exponential growth of medical image big data represented by high-resolution CT images(CTI), the high-resolution CTI data is of great importance for clinical research and diagnosis. The paper takes lung CTI as an example to study. Retrieving answer CTIs similar to the input one from the large-scale lung CTI database can effectively assist physicians to diagnose. Compared with the conventional content-based image retrieval(CBIR) methods, the CBIR for lung CTIs demands higher retrieval accuracy in both the contour shape and the internal details of the organ. In traditional supervised deep learning networks, the learning of the network relies on the labeling of CTIs which is a very time-consuming task. To address this issue, the paper proposes a Weakly Supervised Similarity Evaluation Network (WSSENet) for efficiently support similarity analysis of lung CTIs. We conducted extensive experiments to verify the effectiveness of the WSSENet based on which the CBIR is performed.

Study of Information System Model in University (대학 정보시스템 모델연구)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • This paper is presented a model of management and application of PC, one of the most important computer resources and software and a model for optimal speed of network to organize information budget of University. I propose strategies to promote utilization degree of existing PCs, problems and strategies to maintain PC, effective strategies to expand PC and change into new models, and strategies to utilize effectively and purchase softwares. Also, I propose an optimal model for network environment and management, which is core to establish master plan of information system. Network is divided into internal and external network and formula model is proposed to calculate optimal speed of these. And strategy is proposed to maintain security of University preserving its characteristics.

  • PDF

Camera Calibration And Lens of Distortion Model Constitution for Using Artificial Neural Networks (신경망을 이용한 렌즈의 왜곡모델 구성 및 카메라 보정)

  • Kim, Min-Suk;Nam, Chang-Woo;Woo, Dong-Min
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.2923-2925
    • /
    • 1999
  • The objective of camera calibration is to determine the internal optical characteristics of camera and 3D position and orientation of camera with respect to the real world. Calibration procedure applicable to general purpose cameras and lenses. The general method to revise the accuracy rate of calibration is using mathematical distortion of lens. The effective og calibration show big difference in proportion to distortion of camera lens. In this paper, we propose the method which calibration distortion model by using neural network. The neural network model implicity contains all the distortion model. We can predict the high accuracy of calibration method proposed in this paper. Neural network can set properly the distortion model which has difficulty to estimate exactly in general method. The performance of the proposed neural network approach is compared with the well-known Tsai's two stage method in terms of calibration errors. The results show that the proposed approach gives much more stable and acceptabke calibration error over Tsai's two stage method regardless of camera resolution and camera angle.

  • PDF

On Designing a Intelligent Control System using Immunized Neural Network (면역화된 귀환 신경망을 이용한 지능형 제어 시스템 설계)

  • Won, Kyoung-Jae;Seo, Jae-Yong;Yon, Jung-Heum;Kim, Seong-Hyun;Jeon, Hong-Tae
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.12
    • /
    • pp.27-35
    • /
    • 1998
  • In this paper we will develope the immunized recurrent neural network control system with high robustness in dynamically changing environmental conditions. The variation of internal parameters of a system and external(or internal) disturbances can be considered as antigen, and the control input which can be regarded as antibody can be generated against uncertainties. The antibody will be generated from previous control informations and if a antibody for an antigen can not be generated from the corresponding information. the immune system produces another antibody by genetic operations. We apply this concept to a robot manipulator and evaluate the effectiveness of the above proposed system.

  • PDF