• Title/Summary/Keyword: Network theory

Search Result 1,835, Processing Time 0.032 seconds

Development of Composite Deprivation Index for Korea: The Correlation with Standardized Mortality Ratio (표준화사망비와 지역결핍지수의 상관관계: 지역사회 통합결핍지수 개발)

  • Shin, Ho-Sung;Lee, Sue-Hyung;Chu, Jang-Min
    • Journal of Preventive Medicine and Public Health
    • /
    • v.42 no.6
    • /
    • pp.392-402
    • /
    • 2009
  • Objectives : The aims of this paper were to develop the composite deprivation index (CDI) for the sub-district (Eup-Myen-Dong) levels based on the theory of social exclusion and to explore the relationship between the CDI and the standardized mortality ratio (SMR). Methods : The paper calculated the age adjusted SMR and we included five dimensions of social exclusion for CDI; unemployment, poverty, housing, labor and social network. The proxy variables of the five dimensions were the proportion of unemployed males, the percent of recipients receiving National Basic Livelihood Security Act benefits, the proportion of households under the minimum housing standard, the proportion of people with a low social class and the proportion of single-parent household. All the variables were standardized using geometric transformation and then we summed up them for a single index. The paper utilized the 2004-2006 National Death Registry data, the 2003-2006 national residents' registration data, the 2005 Population Census data and the 2005-2006 means-tested benefit recipients' data. Results : The figures were 115.6, 105.8 and 105.1 for the CDI of metropolitan areas (big cities), middle size cities and rural areas, respectively. The distributional variation of the CDI was the highest in metropolitan areas (8.9 - 353.7) and the lowest was in the rural areas (26.8 - 209.7). The extent and relative differences of deprivation increased with urbanization. Compared to the Townsend and Carstairs index, the CDI better represented the characteristics of rural deprivation. The correlation with the SMR was statistically significant and the direction of the CDI effects on the SMR was in accordance with that of the previous studies. Conclusions : The study findings indicated mortality inequalities due to the difference in the CDI. Despite the attempt to improve deprivation measures, further research is warranted for the consensus development of a deprivation index.

Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks

  • Huang, Xiaoge;Chen, Liping;Chen, Qianbin;Shen, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4661-4680
    • /
    • 2016
  • Cognitive radio (CR) technology is an effective solution to the spectrum scarcity issue. Collaborative spectrum sensing is known as a promising technique to improve the performance of spectrum sensing in cognitive radio networks (CRNs). However, collaborative spectrum sensing is vulnerable to spectrum data falsification (SSDF) attack, where malicious users (MUs) may send false sensing data to mislead other secondary users (SUs) to make an incorrect decision about primary user (PUs) activity, which is one of the key adversaries to the performance of CRNs. In this paper, we propose a coalition based malicious users detection (CMD) algorithm to detect the malicious user in CRNs. The proposed CMD algorithm can efficiently detect MUs base on the Geary'C theory and be modeled as a coalition formation game. Specifically, SSDF attack is one of the key issues to affect the resource allocation process. Focusing on the security issues, in this paper, we analyze the power allocation problem with MUs, and propose MUs detection based power allocation (MPA) algorithm. The MPA algorithm is divided into two steps: the MUs detection step and the optimal power allocation step. Firstly, in the MUs detection step, by the CMD algorithm we can obtain the MUs detection probability and the energy consumption of MUs detection. Secondly, in the optimal power allocation step, we use the Lagrange dual decomposition method to obtain the optimal transmission power of each SU and achieve the maximum utility of the whole CRN. Numerical simulation results show that the proposed CMD and MPA scheme can achieve a considerable performance improvement in MUs detection and power allocation.

Distributed Test Method using Logical Clock (Logical Clock을 이용한 분산 시험)

  • Choi, Young-Joon;Kim, Myeong-Chul;Seol, Soon-Uk
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.469-478
    • /
    • 2001
  • It is difficult to test a distributed system because of the task of controlling concurrent events,. Existing works do not propose the test sequence generation algorithm in a formal way and the amount of message is large due to synchronization. In this paper, we propose a formal test sequence generation algorithm using logical clock to control concurrent events. It can solve the control-observation problem and makes the test results reproducible. It also provides a generic solution such that the algorithm can be used for any possible communication paradigm. In distributed test, the number of channels among the testers increases non-linearly with the number of distributed objects. We propose a new remote test architecture for solving this problem. SDL Tool is used to verify the correctness of the proposed algorithm and it is applied to the message exchange for the establishment of Q.2971 point-to-multipoint call/connection as a case study.

  • PDF

An Implementation of Fault Tolerant Software Distributed Shared Memory with Remote Logging (원격 로깅 기법을 이용하는 고장 허용 소프트웨어 분산공유메모리 시스템의 구현)

  • 박소연;김영재;맹승렬
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.328-334
    • /
    • 2004
  • Recently, Software DSMs continue to improve its performance and scalability As Software DSMs become attractive on larger clusters, the focus of attention is likely to move toward improving the reliability of a system. A popular approach to tolerate failures is message logging with checkpointing, and so many log-based rollback recovery schemes have been proposed. In this work, we propose a remote logging scheme which uses the volatile memory of a remote node assigned to each node. As our remote logging does not incur frequent disk accesses during failure-free execution, its logging overhead is not significant especially over high-speed communication network. The remote logging tolerates multiple failures if the backup nodes of failed nodes are alive. It makes the reliability of DSMs grow much higher. We have designed and implemented the FT-KDSM(Fault Tolerant KAIST DSM) with the remote logging and showed the logging overhead and the recovery time.

Politics of Candlelight Protest and Democratic Theories in Korea (촛불의 정치와 민주주의 이론: 현실과 이론, 사실과 가치의 긴장과 균형)

  • Jaung, Hoon
    • Korean Journal of Legislative Studies
    • /
    • v.23 no.2
    • /
    • pp.37-66
    • /
    • 2017
  • Massive civic protests and consequent presidential impeachment requires a serious revisiting to democratic theories of Korean democracy. This paper explores the strengths and limitations of macro and micro approaches. Changes in democratic realities was manifested on three fronts. First, the rise of new political subject, that is, participants to massive protest. Second, changing nexus between representative institutions and civic protests. Third, parliamentarization of presidential democracy. Specifically macro approach has changed its negative assessment of democracy into positive evaluation. Macro theory has to revisit it's notion of 'minjung' to cope with the rise of new subject. Also macro approach has to struggle with the declining role of civic organizations and political activists. Micro approach has to deal with new mode of networking among citizens and to unravel the evolving relation between democratic institutions and civic protests. In sum, theories need to expand the analytic scope, to revitalize analytic tools and to rebalance value judgment and analytical efforts.

H.263-Based Scalable Video Codec (H.263을 기반으로 한 확장 가능한 비디오 코덱)

  • 노경택
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.3
    • /
    • pp.29-32
    • /
    • 2000
  • Layered video coding schemes allow the video information to be transmitted in multiple video bitstreams to achieve scalability. they are attractive in theory for two reasons. First, they naturally allow for heterogeneity in networks and receivers in terms of client processing capability and network bandwidth. Second, they correspond to optimal utilization of available bandwidth when several video qualify levels are desired. In this paper we propose a scalable video codec architectures with motion estimation, which is suitable for real-time audio and video communication over packet networks. The coding algorithm is compatible with ITU-T recommendation H.263+ and includes various techniques to reduce complexity. Fast motion estimation is Performed at the H.263-compatible base layer and used at higher layers, and perceptual macroblock skipping is performed at all layers before motion estimation. Error propagation from packet loss is avoided by Periodically rebuilding a valid Predictor in Intra mode at each layer.

  • PDF

Identification of Profane Words in Cyberbullying Incidents within Social Networks

  • Ali, Wan Noor Hamiza Wan;Mohd, Masnizah;Fauzi, Fariza
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.1
    • /
    • pp.24-34
    • /
    • 2021
  • The popularity of social networking sites (SNS) has facilitated communication between users. The usage of SNS helps users in their daily life in various ways such as sharing of opinions, keeping in touch with old friends, making new friends, and getting information. However, some users misuse SNS to belittle or hurt others using profanities, which is typical in cyberbullying incidents. Thus, in this study, we aim to identify profane words from the ASKfm corpus to analyze the profane word distribution across four different roles involved in cyberbullying based on lexicon dictionary. These four roles are: harasser, victim, bystander that assists the bully, and bystander that defends the victim. Evaluation in this study focused on occurrences of the profane word for each role from the corpus. The top 10 common words used in the corpus are also identified and represented in a graph. Results from the analysis show that these four roles used profane words in their conversation with different weightage and distribution, even though the profane words used are mostly similar. The harasser is the first ranked that used profane words in the conversation compared to other roles. The results can be further explored and considered as a potential feature in a cyberbullying detection model using a machine learning approach. Results in this work will contribute to formulate the suitable representation. It is also useful in modeling a cyberbullying detection model based on the identification of profane word distribution across different cyberbullying roles in social networks for future works.

A Exploratory Study on the Transition-Oriented Firm: A Conceptual Framework and a Case Study (사회·기술시스템 전환을 지향하는 기업의 혁신활동에 대한 탐색적 연구: 개념적 틀과 사례분석)

  • Song, Wichin;Seong, Jieun
    • Journal of Technology Innovation
    • /
    • v.29 no.4
    • /
    • pp.59-93
    • /
    • 2021
  • This article discusses the innovation activities of firms that aim for system transformation from the perspective of 'Transformative Innovation Policies'. Here, for the sustainable transformation of our society, a firm that finds the 'purpose' of business activities in solving social problems and implements a new business model is defined as a 'transition-oriented firm'. The main characteristics of a transition-oriented firm are examined in terms of 1) transition vision and mission setting, 2) business model innovation for transition, 3) network formation for system transition, and 4) securing legitimacy of transition. And through case studies, the approach, significance, and limitations of the transition-oriented corporate innovation theory are discussed. The case study is from a Eisai Korea, which aims for an integrated prevention, treatment, and care system centered on residents and citizens.

A Study of the Influence of Online Digital Character Experience on Offline Related Products Purchasing Intention -Focused on Kakao Friends O4O(Online for Offline) Product Portfolio (온라인 디지털 캐릭터 경험이 오프라인 연관상품 구매의도에 미치는 영향에 관한 연구 -카카오프렌즈의 O4O(Online for Offline) 제품 포트폴리오를 중심으로)

  • Son, Jae-young
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.296-304
    • /
    • 2019
  • The Amazon Go was the catalyst of O4O era. O4O is an advanced business model from O2O, which is the integration of offline service to online, especially through smart phone network. We also find the O2O strategy of digital contents companies such as Kakao and Line. This study examined the relation between online character experience and offline purchasing intention on related character products. The SEM was designed on the former study that based on the theory of user experience and brand attitude. The result of this study shows that the users' online experience have influence on the purchasing intention of offline related products and there exist the mediating routes of satisfaction of user experience, brand preference and brand reliability. There are no statistical support to the relation between satisfaction of user experience and purchasing intention. These points illustrate what marketers better to focus on transmedia strategies.

A study of factors on intention of intervention and posting malicious comments (악성댓글 작성과 중재 의도에 대한 요인 연구)

  • Kim, Han-Min;Park, Kyungbo
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.197-206
    • /
    • 2018
  • The harmful effects of online malicious comments are continuously increasing. Many previous studies have confirmed that neutralization of malicious comments is a key predictor. Neutralization is theoretically composed of seven multidimensional concepts, and the significance of neutralization factors varies depending on the type of deviant behavior. This study focuses on the fact that the malicious comment researches have considered the neutralization techniques in a single dimension as opposed to demonstrating the multidimensional neutralization techniques in the deviant behavior research. On the other hand, the role of arbitrator in deviant behavior can contribute to restraining deviant behavior, but the research of intervention intention is relatively lacking in malicious comments research. This study, composed of two complementary studies, tried to find out the related factors of malicious comments and intervention intention. As a result of study, This study revealed that malicious commentator uses the neutralization techniques of condemn the condemners and denial of responsibility. In addition, we found that affective empathy has a significant effect on the intervention intention in malicious comments.