• 제목/요약/키워드: Network Measures

Search Result 1,076, Processing Time 0.027 seconds

A Comparison Study on the Weighted Network Centrality Measures of tnet and WNET (tnet과 WNET의 가중 네트워크 중심성 지수 비교 연구)

  • Lee, Jae Yun
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.4
    • /
    • pp.241-264
    • /
    • 2013
  • This study compared and analyzed weighted network centrality measures supported by Opsahl's tnet and Lee's WNET, which are free softwares for weighted network analysis. Three node centrality measures including weighted degree, weighted closeness, and weighted betweenness are supported by tnet, and four node centrality measures including nearest neighbor centrality, mean association, mean profile association, triangle betweenness centrality are supported by WNET. An experimental analysis carried out on artificial network data showed tnet's high sensitiveness on linear transformations of link weights, however, WNET's centrality measures were insensitive to linear transformations. Seven centrality measures from both tools, tnet and WNET, were calculated on six real network datasets. The results showed the characteristics of weighted network centrality measures of tnet and WNET, and the relationships between them were also discussed.

Centrality Measures for Bibliometric Network Analysis (계량서지적 네트워크 분석을 위한 중심성 척도에 관한 연구)

  • Lee Jae-Yun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.3
    • /
    • pp.191-214
    • /
    • 2006
  • Recently, some bibliometric researchers tried to use the centrality analysis methods and the centrality measures which are standard tools in social network analysis. However the traditional centrality measures originated from social network analysis could not deal with weighted networks such as co-citation networks. In this study. new centrality measures for analyzing bibliometric networks with link weights are suggested and applied to three real network data, including an author co-citation network, a co-word network, and a website co-link network. The results of centrality analyses in these three cases can be regarded as Promising the usefulness of suggested centrality measures, especially in analyzing the Position and influence of each node in a bibliometric network.

Developing Measures for Empirical Research on Economic Activities of the Convergence Generation: Exploratory Approach

  • Park, Ki-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.61-70
    • /
    • 2011
  • Ultimately, this research will focus on the activity traits of future customers in the convergence age. To accomplish that, firstly, researcher develop measures for assessing the convergence level of digital devices and digital services. Next, this will investigate the behavioral traits of people who use specific devices or services on the internet or mobile networks. This study proposed five convergence measures each for devices and services. For digital devices, measures such as converged functions, accessibility to network, portability, immediate communicability, and expandibility of functions were utilized. For digital measures such as scope of users, newness, social network level, ease-of use on mobile networks, and expandibility of information were used. We believe that the research results can provide insights for those wishing to explore the convergence level of devices and services and those developing high-level converged devices and digital services.

Invulnerability analysis of nuclear accidents emergency response organization network based on complex network

  • Wen Chen;Shuliang Zou;Changjun Qiu;Jianyong Dai;Meirong Zhang
    • Nuclear Engineering and Technology
    • /
    • v.56 no.8
    • /
    • pp.2923-2936
    • /
    • 2024
  • Modern risk management philosophy emphasizes the invulnerability of human beings to cope with all kinds of emergencies. The Nuclear Accidents Emergency Response Organization (NAERO) of Nuclear Power Plant (NPP) is the primary body responsible for nuclear accidents emergency response. The invulnerability of the organization to disturbance or attack from internal and external sources is crucial in the completion of its response missions, reduction of severity of accidents, and assurance of public and environmental safety. This paper focused on the NAERO of a certain NPP in China, and applied the complex network theory to construct the network model of the organization. The topological characteristics of the network were analyzed. Four importance evaluation indexes of network nodes including Degree Centrality (DC), Betweeness Centrality (BC), Closeness Centrality (CC) and Eigenvector Centrality (EC), along with Pearson coefficient correlation among the indexes were calculated and analyzed. Size of the Largest Connected Component (LCC) and Network Efficiency were used as measures regarding the invulnerability of the network. Simulation experiments were conducted to assess the invulnerability of network against various attack strategies. These experiments were conducted both in the absence of node protection measures and under protection measures with different node protection rates. This study evaluated the invulnerability of the NAERO network, and provided significant decision-making basis for the enhancement of the network's invulnerability.

Measures to Activate the Community Network of Community Child Centers Based on the Systems Thinking (시스템사고에 근거한 지역아동센터의 지역사회 연계 활성화방안)

  • Cho, Sungsook
    • Korean System Dynamics Review
    • /
    • v.16 no.2
    • /
    • pp.33-52
    • /
    • 2015
  • This study aims to comprehensively understand the dynamics of the community network of Community Child Centers and further find out the measures to activate its community network based on the Systems Thinking. The contents of the study are as follows. Firstly, it examines the existing studies on the community network of Community Child Centers and presents the major variables to understand the situation of its community network. Secondly, it analyzes the structure of its causation in order to understand the dynamics of its community network. Lastly, it concludes with the suggestions to activate its community network based on its feedback structure presented in the causal loop diagrams. This study is expected to make a useful and basic material as the first research to dynamically understand the community network issue of the Community Child Centers.

A Social Network Analysis of a Virtual Community of Practice

  • JO, Il-Hyun
    • Educational Technology International
    • /
    • v.9 no.2
    • /
    • pp.39-56
    • /
    • 2008
  • This paper investigates the relationship between the structural characteristics of a virtual CoP and the measures of social network analysis. Several implications were developed by the results of the study First, the study, based on reviews of both the CoP and SNA literature, identified specific structural measures of SNA; connectedness, geodesic distance, and density. Second, the formal CoP investigated in this study showed greater development that the classic, informal CoP in terms of the structural dimension of a CoP. The results show that those measures of social network analysis provide an illuminating way to better understand the structural properties of CoP's. Implications of the study with some suggestions for future research are provided.

Pricing in ATM network with feedback

  • Kim, Hyoun-Jong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.186-189
    • /
    • 1996
  • In most of the recent research literature, network performance is expressed in terms of network engineering measures such as delay or loss. These performance measures are important to network owners and operators, but it is believed that user preferences should be the primary consideration which drives the resource allocation scheme. A network is only as valuable as its users perceive it to be. Therefore, it is advocated that the users themselves determine relative traffic priorities. This paper describes the role of feedback in network resource allocation, which could be part of a user-oriented framework for network operation and control. Feedback mechanism can also be used to improve the two types of efficiency in the network; network efficiency and economic efficiency.

  • PDF

A Proposal of Combat Power Measurement Model of Army Warfare Information System Using Network Power based on Social Network Analysis (SNA 기반 네트워크 파워를 이용한 지상전장정보체계 전투력 효과측정 모델제안)

  • Jung, Chi-Young;Lee, Jae-Yeong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.36 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • It is important not only to introduce the C4I(Command and Control, Communication, Computer, Intelligence) system for realizing the NCW(Network Centric Warfare) but also to evaluate the synergistic effect by the C4I system. However, the study effort for evaluating the system's synergistic effect is insufficient compared with introducing the system. Therefore, in this paper, we proposed a model that measures the synergistic effect of combat power by the warfare information system. To measure the synergistic effect of warfare information system, the network power must be considered, so we also proposed a new methodology for measurement of network power based on SNA(Social Network Analysis), not Metcalfe's law. A model we proposed is a model that measures the raised combat power by the network effectiveness. The methodology and model we proposed in this paper will be used usefully to analyze the practical effect of constructing future warfare information system.

Using Ant Colony Optimization to Find the Best Precautionary Measures Framework for Controlling COVID-19 Pandemic in Saudi Arabia

  • Alshamrani, Raghad;Alharbi, Manal H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.352-358
    • /
    • 2022
  • In this paper, we study the relationship between infection rates of covid 19 and the precautionary measures and strict protocols taken by Saudi Arabia to combat the spread of the coronavirus disease and minimize the number of infected people. Based on the infection rates and the timetable of precautionary measures, the best framework of precautionary measures was identified by applying the traveling salesman problem (TSP) that relies on ant colony optimization (ACO) algorithms. The proposed algorithm was applied to daily infected cases data in Saudi Arabia during three periods of precautionary measures: partial curfew, whole curfew, and gatherings penalties. The results showed the partial curfew and the whole curfew for some cities have the minimum total cases over other precautionary measures. The gatherings penalties had no real effect in reducing infected cases as the other two precautionary measures. Therefore, in future similar circumstances, we recommend first applying the partial curfew and the whole curfew for some cities, and not considering the gatherings penalties as an effective precautionary measure. We also recommend re-study the application of the grouping penalty, to identify the reasons behind the lack of its effectiveness in reducing the number of infected cases.

Detection of Network Attack Symptoms Based on the Traffic Measurement on Highspeed Internet Backbone Links (고속 인터넷 백본 링크상에서의 트래픽 측정에 의한 네트워크 공격 징후 탐지 방법)

  • Roh Byeong-hee
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.23-33
    • /
    • 2004
  • In this paper, we propose a novel traffic measurement based detection of network attack symptoms on high speed Internet backbone links. In order to do so, we characterize the traffic patterns from the normal and the network attacks appeared on Internet backbone links, and we derive two efficient measures for representing the network attack symptoms at aggregate traffic level. The two measures are the power spectrum and the ratio of packet counts to traffic volume of the aggregate traffic. And, we propose a new methodology to detect networks attack symptoms by measuring those traffic measures. Experimental results show that the proposed scheme can detect the network attack symptoms very exactly and quickly. Unlike existing methods based on Individual packets or flows, since the proposed method is operated on the aggregate traffic level. the computational complexity can be significantly reduced and applicable to high speed Internet backbone links.

  • PDF