• Title/Summary/Keyword: 공간정보 플랫폼

Search Result 533, Processing Time 0.028 seconds

Development of Search Method using Semantic technologies about RESTful Web Services (시맨틱 기술을 활용한 RESTful 웹서비스의 검색 기법 개발)

  • Cha, Seung-Jun;Choi, Yun-Jeong;Lee, Kyu-Chul
    • Journal of Korea Spatial Information System Society
    • /
    • v.12 no.1
    • /
    • pp.100-104
    • /
    • 2010
  • Recently with advent of Web 2.0, RESTful Web Services are becoming increasing trend to emphasize Web as platform. There are already many services and the number of service increases in very fast pace. So it is difficult to find the service what we want by keyword based search. To solve this problem, we developed the search method using sem antic technologies about RESTful Web Services. For that, first we define the system structure and model the description format based on the integrated search system for OpenAPIs, and then we add Semantic Markup (tagging, semantic annotation) on the HTML description pages. Next we extract RDF document from them and store it in service repository. Based on the keywords that are extended by means of ontology, the developed system provides more purified and extended results than similarity-based keyword searching system.

Levee Maintenance Using Point Cloud Data Obtained from a Mobile Mapping System (모바일 매핑시스템을 이용한 제방 유지보수에 관한 연구)

  • Lee, Jisang;Hong, Seunghwan;Park, Il suk;Mohammad, Gholami Farkoushi;Kim, Chulhwan;Sohn, Hong-Gyoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.4
    • /
    • pp.469-475
    • /
    • 2021
  • In order to effectively maintain and manage river facilities, on going data collection of associated objects is important. However, the existing data acquisition methods of using a total station, a global navigation satellite system, or a terrestrial laser scanner have limitations in terms of cost/time/manpower when acquiring spatial information data on river facilities distributed over a wide and long area, unlike general facilities. In contrast, a mobile mapping system (MMS), which acquires data while moving its platform, acquires precise spatial information data for a large area in a short time, so it is suitable for use in the maintenance of linear facilities around rivers. As a result of applying a MMS to a research area of 4 km, 184,646,099 points were acquired during a 20-minute data acquisition period, and 378 cross-sections were extracted. By comparing this with computer-drawn river plans, it was confirmed that efficient levee management using a MMS is possible.

An Analysis of National R&D Trends in the Metaverse Field using Topic Modeling (토픽 모델링을 활용한 메타버스 분야 국가 R&D 동향 분석)

  • Lee, Jungwoo;Lee, Soyeon
    • Smart Media Journal
    • /
    • v.11 no.8
    • /
    • pp.9-20
    • /
    • 2022
  • With the rise of the metaverse industry worldwide, relevant national strategies and nurturing systems have been prepared in Korea. As the complexity of policies increases, the importance of establishing data-based policymkaing is growing, and studies diagnosing national R&D trends in the metaverse field are still lacking. Therefore, this paper collected NTIS national R&D information for 9,651 R&D projects promoted from 2002 to 2020. And this study looked at the current status and identified major topics based on the topic modeling, and considered time-series changes in the topics. Eleven major topics of R&D tasks in the metaverse field were derived, hot topics were service/content/platform development and medical/surgical fields of application fields, and cold topics were urban/environment/spatial information fields. Strategic R&D Management, metaverse-related laws, and institutional studies were proposed as policy directions.

A Study on Korea Land Use Information System Zoning Data Maintenance Plan (국토이용정보체계 용도지역지구 데이터 정비방안)

  • Lee, Se-won
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.2
    • /
    • pp.51-72
    • /
    • 2021
  • The purpose of this study is to explain the types and causes of errors in zoning data that occur in the topographic map notification procedure, and to prepare a data maintenance plan. In Korea, like the United States, law-based land use regulation is dominant. In other words, according to the land use regulation method in the Act, the government designates zoning for all lots in the country, and landowners check the land use regulations of their land through the Korea Land use Information System. The land use plan confirmation document is important land information that affects the results of administrative dispositions such as land transactions between individuals or permission for development activities. However, there are data errors that occur during the current topographic map notification procedure and data construction process. Therefore, four local governments that can verify data by type were selected in consideration of local government conditions. A number of errors are first, errors in data construction and management in the Korea Land use Information System, and second, errors in lack of expertise that occur while the local government officials maintain data. Third, it was analyzed as an error from the relationship between the serial cadastral map and the zoning DB. Based on the above results, it is hoped that the results of this study will be reflected in the establishment of the KLIP and the reform of the legal system, which is currently underway after the establishment of the 「3rd the Korea Land use Information System Construction Plan」.

Implementation of PersonalJave™ AWT using Light-weight Window Manager (경량 윈도우 관리기를 이용한 퍼스널자바 AWT 구현)

  • Kim, Tae-Hyoun;Kim, Kwang-Young;Kim, Hyung-Soo;Sung, Min-Young;Chang, Nae-Hyuck;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.240-247
    • /
    • 2001
  • Java is a promising runtime environment for embedded systems because it has many advantages such as platform independence, high security and support for multi-threading. One of the most famous Java run-time environments, Sun's ($PersonalJave^{TM}$) is based on Truffle architecture, which enables programmers to design various GUIs easily. For this reason, it has been ported to various embedded systems such as set-top boxes and personal digital assistants(PDA's). Basically, Truffle uses heavy-weight window managers such as Microsoft vVin32 API and X-Window. However, those window managers are not adequate for embedded systems because they require a large amount of memory and disk space. To come up with the requirements of embedded systems, we adopt Microwindows as the platform graphic system for Personal] ava A WT onto Embedded Linux. Although Microwindows is a light-weight window manager, it provides as powerful API as traditional window managers. Because Microwindows does not require any support from other graphics systems, it can be easily ported to various platforms. In addition, it is an open source code software. Therefore, we can easily modify and extend it as needed. In this paper, we implement Personal]ava A WT using Microwindows on embedded Linux and prove the efficiency of our approach.

  • PDF

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure (Diskless와 Stateless 보안정책 기반의 고속화 동기 네트워크 인프라 구현에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.673-681
    • /
    • 2011
  • Among the network information services combined with a number of security technologies and required security policies, Infrastructure as a Service, a hardware plat-form service of Cloud Computing, has been provided since 2011. It is more or less similar to the existing central concentration method services, in terms of the specifications and technical aspects for given hardware category, but it is entirely different from them in that it overcomes the spatial limitations of specific network and targets the public network. Information security technology has also been prospering so that it could ensure the stability of offered hardware plat-forms. As currently supported hardware, Internet Data Center has been provided by virtualizing the previously offered servers and discs (backup discs), but the hardware plat-forms offered are somewhat limited. Meanwhile, the areas of security fields for offered services are confined to the center or include the TCP/IP-based SSL (Secure Sockets Layer) for the public network connected with clients, which shows that microscopic access security policies have been used. Therefore, this study was aimed to provide a realistic security mechanism for realizing defense policy, by expanding service areas into security devices and suggesting Diskless and Stateless security policy based high-speed synchronous network infrastructure.

The Study of Sensor Network for Information Retrieval and Communication Protocol High Performance Algorithm (센서 네트워크의 정보검색 및 통신프로토콜 성능향상 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.816-823
    • /
    • 2010
  • Recently research efforts for ubiquitous technology that includes RFID(Radio Frequency Deification and sensor networks are conducted very actively The architectural framework of the USN sensor network discovery service. The survey of the USN technology is conducted on four technological visions that contain USN system technology USN networking technology and USN middleware along with the service platform, With respect to each technological division domestic and worldwide leading research projects are primarily explored with their technical features and research projects are primarily explored with their technical features and research outputs. Boasted on the result of the survey we establish a USN software model that includes data sensing, sensor data storage sensor data storage sensor data naming and sensor feed name service. This main objective of this model is to provide a reference model for the facilitation of USN application developments.

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

Design and Implementation of Blended PBL Systems for Information Communication Ethics Education (정보통신윤리 교육을 위한 블랜디드 문제중심학습 시스템 설계 및 구현)

  • Lee, Jun-Hee;Yoo, Kwan-Hee
    • Journal of The Korean Association of Information Education
    • /
    • v.15 no.2
    • /
    • pp.179-188
    • /
    • 2011
  • The purpose of this thesis was to implement effective blended PBL(Problem-Based Learning) systems for information communication ethics education. The proposed systems, Online learning and face-to-face classes were systematically combined and Moodle is used for online learning platform. We proposed the use of wikis and blogs not just for creation of knowledge, but as active learning tool to support PBL. In the proposed system, learners used the web 2.0 as a open place to create new knowledge and experience various effects of PBL, such as (1) Improvement of problem solving ability, (2) Understanding of cooperative learning. The blended PBL systems with teaching and learning model were evaluated learners' level of satisfaction and educational achievement in the study of information communication ethics. The result shows that blended PBL learning method is more effective in cultivating consciousness of information communication ethics and showed more higher level of learners' satisfaction and educational achievement than the face-to-face PBL learning method.

  • PDF