ebook img

Big Data, Cloud Computing, and Data Science Engineering PDF

190 Pages·2023·6.103 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Big Data, Cloud Computing, and Data Science Engineering

Studies in Computational Intelligence 1075 Roger Lee   Editor Big Data, Cloud Computing, and Data Science Engineering Studies in Computational Intelligence Volume 1075 Series Editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland The series “Studies in Computational Intelligence” (SCI) publishes new developments and advances in the various areas of computational intelligence—quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. Indexed by SCOPUS, DBLP, WTI Frankfurt eG, zbMATH, SCImago. All books published in the series are submitted for consideration in Web of Science. Roger Lee Editor Big Data, Cloud Computing, and Data Science Engineering Editor Roger Lee Software Engineering and Information Technology Institute Central Michigan University Mount Pleasant, MI, USA ISSN 1860-949X ISSN 1860-9503 (electronic) Studies in Computational Intelligence ISBN 978-3-031-19607-2 ISBN 978-3-031-19608-9 (eBook) https://doi.org/10.1007/978-3-031-19608-9 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland Foreword The purpose of the 7th IEEE/ACIS International Conference on Big Data, Cloud Computing, Data Science and Engineering (BCD 2022) held on August 4–6, 2022, in Da Nang, Vietnam, was to bring together researchers, scientists, engineers, industry practitioners, and students to discuss, encourage, and exchange new ideas, research results, and experiences on all aspects of big data, cloud computing, data science, and engineering and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers have selected the best 15 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. In chapter “Research on Development of Sponsorship Effect Analysis Module Using Text Mining Technique,” Weonsun Choi, Kyunghyun Lee, Yoonje Sung, and Gwangyong Gim collected more than 200,000 online sports media data to analyze the sponsorship effect by minimizing the omission of sponsor brands exposed through online media and detecting sophisticated data. A commercial dictionary in the sports field was established, and a sponsorship effect analysis module was developed by quantifying text data using morpheme analysis and TF-IDF. In chapter “A Study on the Relationship Between ESG News Keywords and ESG Ratings,” Jaeyoung So, Myungho Lee, Jihun Park, and Gwangyong Gim, attempts to reveal the correlation between daily ESG-related news and each E/S/G grade, focusing on the keywords of the main disclosure metrics according to the ESG disclosure guidance by KRX. In chapter “Development of Associated Company Network Visualization Tech- niques Using Company Product and Service Information—Using Cosine Similarity Function,” Kyunghyun Lee, Weonsun Choi, Beonghwa Jeon, and Gwangyong Gim present a network of related companies providing artificial intelligence-related solu- tions and application services which were closely examined. It is divided into compa- nies that develop artificial intelligence technology and companies that apply it to various fields. v vi Foreword In chapter “Hybrid CNN-LSTM Based Time Series Data Prediction Model Study,” Chungku Han, Hyeonju Park, Youngsoo Kim, and Gwangyong Gim present a hybrid CNN-LSTM to solve the long-term dependency problem that can reduce the learning time of long-term time series data. In chapter “A Study on Predicting Employee Attrition Using Machine Learning,” Simon Gim and Eun Tack Im use three machine learning methods, random forest, XGBoost, and artificial neural network to predict employee attrition to prevent unwanted loss of employees due to resignations. In chapter “A Study on the Intention to Continue Using a Highway Driving Assistance (HDA) System Based on Advanced Driver Assistance System (ADAS),” Myungho Lee, Jaeyoung So, and Jaewook Kim present a study to identify factors affecting the intention to continue using the ADAS-based HDA system, which will lead to the development of autonomous vehicles. In chapter “Security Policy Deploying System for Zero Trust Environment,” Sung- Hwa Han proposes a security policy deploy system for zero trust-based environment. The proposed system consists of three components operating in two systems and uses an object-based security policy deployment method. In chapter “TTY Session Audit Techniques for Linux Platform,” Sung-Hwa Han proposes a TTY session audit technique that can check the command input by the user accessing the Linux environment and the resulting message. In chapter “A Study on the Role of Higher Education and Human Resources Devel- opment for Data-Driven AI Society,” Ji Hun Lim, Jeong Eun Seo, Jun Hyuk Choi, and Hun Yeong Kwon attempt to investigate and analyze the educational status of higher education in situations that train AI experts. They point out the problem of arti- ficial intelligence ethics education in higher education and suggested the educational methods to be taken in the future. In chapter “The Way Forward for Security Vulnerability Disclosure Policy: Comparative Analysis of US, EU, and Netherlands,” Yoon Sang Pil analyzes the cases of the US, EU, and the Netherlands to derive key elements of the VDP and propose tasks to be considered when operating and improving the VDP in the future. In chapter “Study on Government Data Governance Framework: Based on the National Data Strategy in the US, the UK, Australia, and Japan,” JeongEun Seo and HunYeong Kwon analyze the NDS of the USA, the UK, Australia, and Japan based on the DGF of the DGI to derive the essential considerations in formu- lating national data strategies and suggest the components of the Government Data Governance Framework. In chapter “A Study on the Attack Index Packet Filtering Algorithm Based on Web Vulnerability,” Min Su Kim propose an application layer-based web packet filtering algorithm to improve web service continuity and operational efficiency based on the attack index for web vulnerabilities. In chapter “Analysis of IoT Research Topics Using LDA Modeling,” Daesoo Choi analyzes the research trend of “Internet of Things,” a core technology, and attempts to gain insight by identifying the fields of engineering and social sciences separately. In chapter “Log4j Vulnerability Analysis and Detection Pattern Production Tech- nology Based on Snort Rules,” WonHyung Park and IlHyun Lee analyze the Log4j Foreword vii vulnerability in detail and propose the Snort detection policy technology so that the security control system can quickly and accurately detect it. In chapter “A Study on Technology Innovation at Incheon International Airport: Focusing on RAISA,” Seo Young Kim and Min Seo Park present a study which categorizes the core technologies utilized in airports and explores the advantages, for instance attaining process efficiency and providing customer convenience from robot, AI, and service automation (RAISA). It is our sincere hope that this volume provides stimulation and inspiration and that it will be used as a foundation for works to come. August 2022 Dr. Vo Thi Thanh Thao Korea University of Information and Communication Technology The University of Danang Da Nang, Vietnam Dr. Jong-Bae Kim Soongsil University Seoul, South Korea Contents Research on Development of Sponsorship Effect Analysis Module Using Text Mining Technique ....................................... 1 Weonsun Choi, Kyunghyun Lee, Yoonje Sung, and Gwangyong Gim A Study on the Relationship Between ESG News Keywords and ESG Ratings .................................................. 15 Jaeyoung So, Myungho Lee, Jihun Park, and Gwangyong Gim Development of Associated Company Network Visualization Techniques Using Company Product and Service Information—Using Cosine Similarity Function ...................... 29 Kyunghyun Lee, Weonsun Choi, Beonghwa Jeon, and Gwangyong Gim Hybrid CNN-LSTM Based Time Series Data Prediction Model Study ............................................................. 43 Chungku Han, Hyeonju Park, Youngsoo Kim, and Gwangyong Gim A Study on Predicting Employee Attrition Using Machine Learning .... 55 Simon Gim and Eun Tack Im A Study on the Intention to Continue Using a Highway Driving Assistance (HDA) System Based on Advanced Driver Assistance System (ADAS) .................................................... 71 Myungho Lee, Jaeyoung So, and Jaewook Kim Security Policy Deploying System for Zero Trust Environment ......... 83 Sung-Hwa Han TTY Session Audit Techniques for Linux Platform ................... 95 Sung-Hwa Han A Study on the Role of Higher Education and Human Resources Development for Data Driven AI Society ............................. 107 Ji Hun Lim, Jeong Eun Seo, Jun Hyuk Choi, and Hun Yeong Kwon ix x Contents The Way Forward for Security Vulnerability Disclosure Policy: Comparative Analysis of US, EU, and Netherlands ................... 119 Yoon Sang Pil Study on Government Data Governance Framework: Based on the National Data Strategy in the US, the UK, Australia, and Japan ........................................................ 133 Jeong Eun Seo and Hun Yeong Kwon A Study on the Attack Index Packet Filtering Algorithm Based on Web Vulnerability .............................................. 145 MinSuKim Analysis of IoT Research Topics Using LDA Modeling ................ 153 Daesoo Choi Log4j Vulnerability Analysis and Detection Pattern Production Technology Based on Snort Rules ................................... 165 WonHyung Park and IlHyun Lee A Study on Technology Innovation at Incheon International Airport: Focusing on RAISA ....................................... 175 Seo Young Kim and Min Seo Park Author Index ...................................................... 185

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.