• Title/Summary/Keyword: Key Node Recognition

Search Result 8, Processing Time 0.024 seconds

Software Key Node Recognition Algorithm for Defect Detection based on Node Expansion Degree and Improved K-shell Position

  • Wanchang Jiang;Zhipeng Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1817-1839
    • /
    • 2024
  • To solve the problem of insufficient recognition of key nodes in the existing software defect detection process, this paper proposes a key node recognition algorithm based on node expansion degree and improved K-shell position, shortened as SDD_KNR. Firstly, the calculation formula of node expansion degree is designed to improve the degree that can measure the local defect propagation capability of nodes in the software network. Secondly, the concept of improved K-shell position of node is proposed to obtain the improved K-shell position of each node. Finally, the measurement of node defect propagation capability is defined, and the key node recognition algorithm is designed to identify the key function nodes with large defect impact range in the process of software defect detection. Using real software systems such as Nano, Cflow and Tar to design three sets of experiments. The corresponding directed weighted software function invoke networks are built to simulate intentional attack and defect source infection. The proposed SDD_KNR algorithm is compared with the BC algorithm, K-shell algorithm, KNMWSG algorithm and NMNC algorithm. The changing trend of network efficiency and the strength of node propagation force are analyzed to verify the effectiveness of the proposed SDD_KNR algorithm.

Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall (지문인식 모듈 기반의 FIDO 사용자 인증기술을 이용한 쇼핑몰에서 블록체인 활용 설계)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, a USB module with fingerprint recognition was designed as a distributed node of blockchain on distributed ID (DID, distributed ID) for user identification. This biometric-linked fingerprint recognition device was verified for the real-time authentication process of authentication transaction with FIDO(Fast IDentity Online) server. Blockchain DID-based services were proposed like as a method of individual TV rating survey, and recommending service for customized shopping channels, and crypto-currency, too. This DID based remote service can be improved by recognizing of channel-changing information through personal identification. The proposed information of production purchase can be shared by blockchain. And customized service can be provided for the utilization of purchase history in shoppingmall using distributed ID. As a result, this blockchain node-device and Samsung S10 Key-srore with FIDO service can be certified for additional transactions through various biometric authentication like fingerprint, and face recognition.

A City-Level Boundary Nodes Identification Algorithm Based on Bidirectional Approaching

  • Tao, Zhiyuan;Liu, Fenlin;Liu, Yan;Luo, Xiangyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2764-2782
    • /
    • 2021
  • Existing city-level boundary nodes identification methods need to locate all IP addresses on the path to differentiate which IP is the boundary node. However, these methods are susceptible to time-delay, the accuracy of location information and other factors, and the resource consumption of locating all IPes is tremendous. To improve the recognition rate and reduce the locating cost, this paper proposes an algorithm for city-level boundary node identification based on bidirectional approaching. Different from the existing methods based on time-delay information and location results, the proposed algorithm uses topological analysis to construct a set of candidate boundary nodes and then identifies the boundary nodes. The proposed algorithm can identify the boundary of the target city network without high-precision location information and dramatically reduces resource consumption compared with the traditional algorithm. Meanwhile, it can label some errors in the existing IP address database. Based on 45,182,326 measurement results from Zhengzhou, Chengdu and Hangzhou in China and New York, Los Angeles and Dallas in the United States, the experimental results show that: The algorithm can accurately identify the city boundary nodes using only 20.33% location resources, and more than 80.29% of the boundary nodes can be mined with a precision of more than 70.73%.

Implementation of a Non-Invasive Sensor System for Differentiating Human Motions on a Bed (침대에서 동작 식별을 위한 비침습식 센서 시스템의 구현)

  • Cho, Seung Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.39-48
    • /
    • 2014
  • In this paper, we propose an efficient dynamic workload balancing strategy which improves the performance of high-performance computing system. The key idea of this dynamic workload balancing strategy is to minimize execution time of each job and to maximize the system throughput by effectively using system resource such as CPU, memory. Also, this strategy dynamically allocates job by considering demanded memory size of executing job and workload status of each node. If an overload node occurs due to allocated job, the proposed scheme migrates job, executing in overload nodes, to another free nodes and reduces the waiting time and execution time of job by balancing workload of each node. Through simulation, we show that the proposed dynamic workload balancing strategy based on CPU, memory improves the performance of high-performance computing system compared to previous strategies.

Design of Remote Control UI Application for Support of Silver Generation's Smartphone Uses (실버세대의 스마트폰 사용 지원을 위한 원격제어 UI 어플리케이션 설계)

  • Yu, Jae-Hyeong;Yun, Jong-Won;Han, Chang-Hee;Kwon, Myeong-Jun;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.709-711
    • /
    • 2018
  • Although the supply of smartphones by the silver generation has increased in recent years, low learning, experience levels and understanding make it difficult to use them. In thid paper, we proposes remote control UI applications to support the use of smartphones by the silver generation. For the proposed application, the key features of the feature phone are arranged in a $3{\times}2$ arrangement on the Home screen to enable quick recognition and proposed application provides remote control via Node.js server and socket communication, in case of difficulties in the use of incidental function, increases the understanding and availability levels of the silver generation using smart phones by providing support through remote control.

  • PDF

Two Cases of Malignant Melanoma at Scalp (두피에 발생한 악성흑색종 2례)

  • Park D.H.;Whang J.W.;Jang K.S.;Han D.G.;An K.Y.;Oh H.K.;Kim Y.J.
    • Korean Journal of Head & Neck Oncology
    • /
    • v.11 no.2
    • /
    • pp.178-184
    • /
    • 1995
  • Melanoma of the scalp is rare condition and seems to be to have a poor prognosis than melanoma of other portion of the body. We had 2 patients suffering from malignant melanoma of scalp. Their charts were reviewed for epidemiologic data, location, Breslow thickness, lymph node involvement and outcome. The therapeutic treatment was wide excision and skin grafting or free flap reconstruction. The early recognition of all the nevi at scalp and proper follow-up of the lesion are key stones to eradicating the changing mole and to preventing this thread to life.

  • PDF

Actantial Model-based Character Role Recognition using Emotional Flow Graph among Characters in Text Stories (텍스트 스토리에서 등장인물간 감정 흐름 그래프를 이용한 행위소 모델 기반의 등장인물 역할 인식)

  • Yu, Hye-Yeon;Kim, Moon-Hyun;Bae, Byung-Chull
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.51-63
    • /
    • 2021
  • Identifying characters who appear in a story and analyzing their relationships is essential to understanding the story. This paper aims to identify the two actants (or character roles) as Helper and Opponent in Greimas's Actantial model by identifying Subject (i.e., protagonist) and analyzing the emotional interactions between the Subject and the two actants (Helper/Opponent). Our proposed method consists of three steps. First, we identify objects (i.e., characters) appearing in the text story. Next, we extract relational information through the interaction of the characters, and then classify emotions in the text expressed as relational information. Finally, we represent the flow of emotional relations among characters as a directed graph. The node with the highest degree is considered as the Subject because it includes the most relational information. The node that sends the most positive/negative emotions to the Subject is considered as the Helper/Oppenent, respectively. Our research contributes to the computer-based narrative understanding by providing a computational method that automatically extracts the three key character roles (Subject, Helper, and Opponent) from the text story.

Analysis of Qualitative Research on Science Education Trend in Korea Using Semantic Network Analysis (네트워크 분석을 통한 국내 과학교육 질적 연구동향 분석)

  • Lee, Sanggyun;Kim, Soonshik;Chae, Donghyun
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.10 no.3
    • /
    • pp.290-307
    • /
    • 2017
  • The purpose of this study is to analyze the research trends related to qualitative research on science education, to provide basic data of qualitative research on science education and to select the direction of follow-up research. The subject of the study is the level of Korean Citation Index (KCI-listed, KCI listing candidates), that can be searched by the key phrase, 'qualitative research', 'science education' in Korean language through the RISS service. In this study, the Descriptive Statistical Analysis Method is utilized to discover the number of research articles, classifying them by year and by journal. Also, the Sementic Network Analysis was conducted to the frequency of key words, Centrality Analysis throughout a variety of research articles using krkwic and Ucinet6.0. The results show that first, 138 research papers were published in 14 journals from 2005 to 2017. Second,, the analysis showed the highest frequency of appearance keyword in each article, 'elementary school teacher', 'gifted student', 'science teacher', 'class' were higher than others. third, according to the results of the whole Network Analysis, 'Analysis', 'elementary school', 'class' were analyzed as a highly influential node. And 'Comparison', 'inquiry', 'recognition', 'gifted students' were not close to the center of network. Fourth, keywords that appear in all sections are analysis, gifted students, and elementary school students, and can be analyzed continuously based on studies, lessons or recognition, and characteristics. Based on the results of this study, we explored the past and present of the study subjects related to the study of science education quality and discussed future direction of study.