• Title/Summary/Keyword: 공유서비스센터

Search Result 112, Processing Time 0.025 seconds

Development of the Bibliographic Information Network Prototype for Biology and Life Science (생명과학 문헌정보 네트워크 프로토타입 개발)

  • Ahn, Bu-Young;Song, Chi-Pyoung
    • Journal of Information Management
    • /
    • v.36 no.2
    • /
    • pp.125-151
    • /
    • 2005
  • The eight types of Korean bibliographic information of biology and life science are included in PubMed that serves universal medical bibliographic information. Other domestic bibliographic information are served on its own format at different organizations. To fulfill the CCBB homepage user's request that it is necessary that integration of bibliographic service for quick acquisition of research information, we intends to construct metadata registry and service about bibliographic information of biology and life science. This paper describes the design and implementation of bibliographic information network prototype for biology and life science that can be used to share latest research result, seminar presentation data, research note, and research paper etc as well as to exchange information between researchers through Open Archiving Community.

Expanding Information Services of Grey Literatures through the Central Management System (회색문헌 통합관리 체계에 관한 연구)

  • Kim, Mee-Jin;Nam, Young-Joon
    • Journal of Information Management
    • /
    • v.34 no.1
    • /
    • pp.1-18
    • /
    • 2003
  • The purposes of the study were to identify the characteristics and types of grey literatures, to investigate the factors restricting the sharing of grey literatures in Korea, and to make recommendations for the efficient collection and utilization system of grey literatures being produced and managed by either government agencies or government-supported research institutes in Korea. A survey instrument was designed to measure the current status of grey literature management systems and to elicit expert opinions from information professionals in information centers for an efficient system of grey literatures. It was found that information professionals considered the technical reports as the most important type of grey literatures, but maps and dissertations as the least important type of information value. Related to the participation for the central system of grey literatures, many respondents preferred to utilize the grey literatures owned by other information centers, but they showed a neutral interest level in sharing their information centers' grey literatures with other centers.

Performance Analysis of Campus Inter-library Loan on Library Automation (캠퍼스 상호대차서비스 전산화에 따른 성과 분석)

  • Lee, Hye-Young
    • Journal of Information Management
    • /
    • v.40 no.4
    • /
    • pp.73-92
    • /
    • 2009
  • Generally, we used to provide ILL to users for overcoming the limited resource and satisfying user's desires for information. ILL makes library service's paradigm change from ownership to sharing. K-university Library has been providing Campus inter-library loan as ILL to users for long time and continually trying to improve the service's quality. This case study is to analysis the performance of campus inter-library loan in the past 9 years. As the related automation system was developed and upgraded, the service requests have been increasing annually. Campus inter-library loan requests were 12% of total book requests in 2001, and then were 75% of total book requests in 2008. The transaction time was reduced until 17% of 2004.

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

A Markov Approximation-Based Approach for Network Service Chain Embedding (Markov Approximation 프레임워크 기반 네트워크 서비스 체인 임베딩 기법 연구)

  • Chuan, Pham;Nguyen, Minh N.H.;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.719-725
    • /
    • 2017
  • To reduce management costs and improve performance, the European Telecommunication Standards Institute (ETSI) introduced the concept of network function virtualization (NFV), which can implement network functions (NFs) on cloud/datacenters. Within the NFV architecture, NFs can share physical resources by hosting NFs on physical nodes (commodity servers). For network service providers who support NFV architectures, an efficient resource allocation method finds utility in being able to reduce operating expenses (OPEX) and capital expenses (CAPEX). Thus, in this paper, we analyzed the network service chain embedding problem via an optimization formulation and found a close-optimal solution based on the Markov approximation framework. Our simulation results show that our approach could increases on average CPU utilization by up to 73% and link utilization up to 53%.

발명하는 사람들-제46호

  • Han, Mi-Yeong
    • The Inventors News
    • /
    • no.46
    • /
    • pp.1-16
    • /
    • 2006
  • '2006 대한민국 여성 발명품 박람회' 개최/'발명의 달 5월' 행사 풍성히 열려/'제12회 여성발명 우수사례 발표회' 열려/;꽃꽃이 용기' 출원동향 급격히 늘어나/특허청 '소멸특허정보 서비스' 제공한다/김열 특허청 차장 승진 임명/BM 특허 출원, 개인은 줄고 기업은 늘고/5월부터 특허료, 우선심사신청료 인하/현장 스케치/특허청과 한국전력 기술.특허정보 공유 양해각서 체결/독일과 '장미전쟁', 한국 승리/'제34회 제네바 국제발명전'에서 전원 수상 기록/국제 특허 전문가 한 자리에 모였다/특허청, 해외지재권 침해 소송비용 지원/국가연구 개발사업 지원하는 'R&D 특허센터' 출범/'특허 고객 고층 해결 안방 서비스' 개시/한국특허정보원, 다양한 캠페인 통해 사회공헌 활동/특허청, 과학기술 전문인력 50명 특별채용/'특허기술이전 박람회' 개최/취업 위해 일본 기업에 IT특허 기술 유출/부조리 신고자에 포상금 지급/역사 속의 발명품/하루 10분 발명교실/특허Q&A/'주부에서 발명가로, 필요에 의해 발병이 시작됐습니다'/여주초등학교 발명교실/아이디어 착상 및 발명 기법/여성 발명 활동 더욱 장려해야/무리에의 마가린/세계 상표제도 더욱 가까워져/특허청,'아시아 특허정보 허브'로 급부상/'2006 발명 특허 페스티벌' 개최/지리적 명칭, 신문제호 상표등록 안된다/리빙 아이디어/특허기술사업화에 3천89척원 지원/'찾아가는 심사 서비스' 대리인 사무소까지 확대/문화콘텐츠 식별체계 첫 선 보여/한국여성발명협회 회원사 발명품 가이드/

  • PDF

A Study on the Development of an AR-Based Diary Application Using Unity (Unity를 활용한 AR 기반 다이어리 애플리케이션 개발에 관한 연구)

  • Sun-Young Bae;Hee-Jung KIM;Yu-Bin Park;Woo-Rim Jang;Ja-Won Kang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.894-895
    • /
    • 2023
  • 증강현실(AR)이란, 현실의 이미지나 배경에 3차원 가상 이미지를 입혀 실시간으로 출력되는 컴퓨터 그래픽 기법이다. 본 논문에서는 AR 서비스를 이용한 여행 기록 애플리케이션을 제안한다. 현재 제공되는 서비스에서는 장소에 대해 제공하는 정보가 매우 한정적이다. 따라서 공유 커뮤니티를 형성할 수 있도록 하여 다양한 정보를 전달하고 직접적인 시각 자료를 제공받을 수 있는 애플리케이션이 필요하다고 생각하여 기획하게 되었다. ReactNative와 SpringBoot를 사용하며, MySQL을 이용하여 데이터를 저장한다. Google Map API를 활용하여 사용자가 기록하고자 하는 장소에 대한 위도와 경도 정보를 받을 수 있도록 하며, AR 기능은 Unity로 구현하였다. AR을 포함한 혼합 현실 서비스를 제공하여 사용자들이 본인의 경험에만 의존하는 것이 아닌 풍부한 몰입력과 현장감을 통해 보다 가시적이고 생생한 다이어리 기록을 만들 수 있다.

Social Network Analysis of Shared Bicycle Usage Pattern Based on Urban Characteristics: A Case Study of Seoul Data (도시특성에 기반한 공유 자전거 이용 패턴의 소셜 네트워크 분석 연구: 서울시 데이터 사례 분석)

  • Byung Hyun Lee;Il Young Choi;Jae Kyeong Kim
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.147-165
    • /
    • 2020
  • The sharing economy service is now spreading in various fields such as accommodation, cars and bicycles. In particular, bicycle-sharing service have become very popular around the world, and since September 2015, Seoul has been providing a bicycle-sharing service called 'Ttareungi'. However, the number of bicycles is unbalanced among rental stations continuously according to the user's bicycle use. In order to solve these problems, we employed social network analysis using Ttareungi data in Seoul, Korea. We analyzed degree centrality, closeness centrality, betweenness centrality and k-core. As a result, the degree centrality was found to be closely linked with bus or subway transfer center. Closeness centrality was found to be in an unbalanced departure and arrival frequency or poor public transport proximity. Betweenness centrality means where the frequency of departure and arrival occurs frequently. Finally, the k-core analysis showed that Mapo-gu was the most important group by time zone. Therefore, the results of this study may contribute to the planning of relocation and additional installation of bike rental station in Seoul.

A Study on the Appling National ITS Standardization for Advanced Traffic Information System (통합교통정보체계 추진을 위한 표준안 활용방안 연구)

  • Cho Young-Sung;Lee Sang-Keon;Moon Young-Jun;Jung Hee-Woon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.1 s.2
    • /
    • pp.15-24
    • /
    • 2003
  • While public institutions and privite coperations have constructed the data collecting infrastructure and commercialized it to service traffic information, inaccuracy with information, insufficiency with the public sector, overapping investment and the rest are arising from the differences of data treatment, offering method, communication protocal and the like. For these reasons, we need standardization it as a national enterprise. In this paper, we would like to present the unity management and joint method of traffic information based on the present position of system construction and national ITS standardization. At first, we presented the relation between data elements and message sets and then analyzed how message sets have been used to message sets to share traffic information so far in public institutions and private coperations like Korea freeway cooperation-ITS model city-Cheonan-Nonsan expressway, In-cheon international airport expressway-Korea freeway cooperation and Seoul metropolitan police agency-Seoul metropolitan government. As the results of analyzing message sets, it had disclosed that data transmission is impossible or a system is unchangeable because data form and each items to transmission were different from each other and its own address and link IDS were not determined yet. Also it showed these message sets did not abidy by The Draft of National ITS Standards. First of all, we proposed data basic form and elements which were form by items used in each center in common and the elements to manage traffic information suggested by Standards based on the results of analyses.

  • PDF

A Lightweight Authentication and Key Agreement Protocol in Wireless Sensor Networks (무선센서 네트워크에서 경량화된 인증과 키 동의 프로토콜)

  • Yoon, Sin-Sook;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.41-51
    • /
    • 2009
  • Recently, there are many researches on security to remove vulnerability which is caused by wireless communication in wireless sensor networks. To guarantee secure communication, we should basically provide key management for each node, mutual authentication and key agreement protocol between two nodes. Although many protocols are presented to supply these security services, some of them require plentiful storage memory, powerful computation and communication capacity. In this paper, we propose a lightweight and efficient authentication and key agreement protocol between two sensor nodes, which is an enhanced version of Juang's scheme. In Juang's protocol, sensor node's information used to share a secret key should be transmitted to registration center via a base station. On the contrary, since node's information in our protocol is transmitted up to only base station, the proposed scheme can decrease computation and communication cost for establishing the shared key between two nodes.

  • PDF