• 제목/요약/키워드: 데이터과학자

Search Result 597, Processing Time 0.035 seconds

The Reference Identifier Matching System for Developing Reference Linking Service (참조연계 서비스 구현을 위한 참고문헌 식별자 매칭 시스템)

  • Lee, Yong-Sik;Lee, Sang-Gi
    • Journal of Information Management
    • /
    • v.41 no.3
    • /
    • pp.191-209
    • /
    • 2010
  • A reference linking service that is connection of each other different information resource need to setup the reference database and to match identifier. CrossRef, PubMed and Web Of Science etc. the many overseas agencies developed reference linking service, that they used the automatic tools of Inera eXstyles, Parity Computings Reference Extractor etc. and setup in base DOI and PMID etc. Domestic the various agencies of KISTI(Korea Institute Science and Technology of Information), KRF(Korea Research Foundation) etc are construction reference database. But each research communities adopts a various reference bibliography writing format. As, the data base construction which is collect is confronting is many to being difficult. In this paper, We developed the Citation Matcher System. This system is automatic parsing the reference string to metadata and matching DOI, PMID and KOI as Identifier. It is improved the effectiveness of reference database setup.

Development for Worker Safety Management System on the EOS Blockchain (EOS 블록체인 기반의 작업자 안전관리 시스템 개발)

  • Jo, Yeon-Jeong;Eom, Hyun-Min;Sim, Chae-Lin;Koo, Hyeong-Seo;Lee, Myung-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.10
    • /
    • pp.797-808
    • /
    • 2019
  • In a closed workplace, the management of the workplace is important because the environmental data at the workplace has a great influence on the safety of workers. Today's industrial sites are transformed into data-based factories that collect and analyze data through sensors in those sites, requiring a management system to ensure safety. In general, a safety management system stores and manages data on a central server associated with a database. Since such management system introduces high possibility of forgery and loss of data, workers often suspect the reliability of the information on the management system. In this paper, we present a worker safety management system based on the EOS blockchain which is considered as third-generation blockchain technology. The developed system consists of a set of smart contracts on the EOS blockchain and 3 decentralized applications associated with the blockchain. According to the roles of users, the worker and manager applications respectively perform the process of initiating or terminating tasks as blockchain transactions. The entire transaction history is distributed and stored in all nodes participating in the blockchain network, so forgery and loss of data is practically impossible. The system administrator application assigns the account rights of workers and managers appropriate for performing the functions, and specifies the safety standards of IoT data for ensuring workplace safety. The IoT data received from sensor platforms in workplaces and the information on initiation, termination or approval of tasks assigned to workers, are explicitly stored and managed in the EOS smart contracts.

A Scheduling Algorithm for Dataflow Graphs with Conditional Branches (조건부 분기를 가진 데이터-흐름 그래프 스케쥴링 알고리즘)

  • Kim, Tae-Hwan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.1_2
    • /
    • pp.103-109
    • /
    • 2001
  • 이 논문에서는 중첩된 조건부 분기를 가진 데이터-흐름 그래프에 대한 효과적인 스케쥴링 알고리즘을 제안한다. 이러한 그래프의 스케쥴링은 조건부 자원 공유 문제를 추가적으로 고려해야 하기 때문에 상당히 복잡하게 된다. 이 논문은 이를 적절히 해결하기 위한 방법을 제시하고 있는데 그 핵심은 조건부 분기가 있는 데이터-흐름 그래프를 조건부 분기가 없는 동일한 기능의 그래프로 변형시키는데 있다. 이렇게 함으로서, 변형된 그래프에 설계자의 관심에 맞는 기존의 스케쥴링 알고리즘을 선택 적용하여 스케쥴을 얻을 수 있고, 이것에서부터 원래 그래프의 스케쥴을 생성 할 수 있다. 실험 결과로부터 우리는 이러한 접근 방식이 매우 효과적임을 입증한다.

  • PDF

A Method of Constructing Robust Descriptors Using Scale Space Derivatives (스케일 공간 도함수를 이용한 강인한 기술자 생성 기법)

  • Park, Jongseung;Park, Unsang
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.764-768
    • /
    • 2015
  • Requirement of effective image handling methods such as image retrieval has been increasing with the rising production and consumption of multimedia data. In this paper, a method of constructing more effective descriptor is proposed for robust keypoint based image retrieval. The proposed method uses information embedded in the first order and second order derivative images, in addition to the scale space image, for the descriptor construction. The performance of multi-image descriptor is evaluated in terms of the similarities in keypoints with a public domain image database that contains various image transformations. The proposed descriptor shows significant improvement in keypoint matching with minor increase of the length.

Secure Multi-Party Computation of Correlation Coefficients (상관계수의 안전한 다자간 계산)

  • Hong, Sun-Kyong;Kim, Sang-Pil;Lim, Hyo-Sang;Moon, Yang-Sae
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.799-809
    • /
    • 2014
  • In this paper, we address the problem of computing Pearson correlation coefficients and Spearman's rank correlation coefficients in a secure manner while data providers preserve privacy of their own data in distributed environment. For a data mining or data analysis in the distributed environment, data providers(data owners) need to share their original data with each other. However, the original data may often contain very sensitive information, and thus, data providers do not prefer to disclose their original data for preserving privacy. In this paper, we formally define the secure correlation computation, SCC in short, as the problem of computing correlation coefficients in the distributed computing environment while preserving the data privacy (i.e., not disclosing the sensitive data) of multiple data providers. We then present SCC solutions for Pearson and Spearman's correlation coefficients using secure scalar product. We show the correctness and secure property of the proposed solutions by presenting theorems and proving them formally. We also empirically show that the proposed solutions can be used for practical applications in the performance aspect.

Application of access control policy in ScienceDMZ-based network configuration (ScienceDMZ 기반의 네트워크 구성에서 접근제어정책 적용)

  • Kwon, Woo Chang;Lee, Jae Kwang;Kim, Ki Hyeon
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.3-10
    • /
    • 2021
  • Nowadays, data-based scientific research is a trend, and the transmission of large amounts of data has a great influence on research productivity. To solve this problem, a separate network structure for transmitting large-scale scientific big data is required. ScienceDMZ is a network structure designed to transmit such scientific big data. In such a network configuration, it is essential to establish an access control list(ACL) for users and resources. In this paper, we describe the R&E Together project and the network structure implemented in the actual ScienceDMZ network structure, and define users and services to which access control policies are applied for safe data transmission and service provision. In addition, it presents a method for the network administrator to apply the access control policy to all network resources and users collectively, and through this, it was possible to achieve automation of the application of the access control policy.

Load Balancing for Distributed Processing of Real-time Spatial Big Data Stream (실시간 공간 빅데이터 스트림 분산 처리를 위한 부하 균형화 방법)

  • Yoon, Susik;Lee, Jae-Gil
    • Journal of KIISE
    • /
    • v.44 no.11
    • /
    • pp.1209-1218
    • /
    • 2017
  • A variety of sensors is widely used these days, and it has become much easier to acquire spatial big data streams from various sources. Since spatial data streams have inherently skewed and dynamically changing distributions, the system must effectively distribute the load among workers. Previous studies to solve this load imbalance problem are not directly applicable to processing spatial data. In this research, we propose Adaptive Spatial Key Grouping (ASKG). The main idea of ASKG is, by utilizing the previous distribution of the data streams, to adaptively suggest a new grouping scheme that evenly distributes the future load among workers. We evaluate the validity of the proposed algorithm in various environments, by conducting an experiment with real datasets while varying the number of workers, input rate, and processing overhead. Compared to two other alternative algorithms, ASKG improves the system performance in terms of load imbalance, throughput, and latency.

A Study on Publication and Citation of Research Data (연구 데이터의 출판과 인용에 관한 연구)

  • Lee, sang-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2017.05a
    • /
    • pp.65-66
    • /
    • 2017
  • 최근 오픈 사이언스 운동과 함께 정부 부처, 연구비 지원기관 등에서는 공적 기금으로 연구를 수행하는 경우 생성된 각종 연구 데이터를 관리하고 공개하도록 의무화하려는 움직임이 있다. 데이터에 DOI와 같은 식별자를 부여하여 데이터 리파지토리를 통해 출판하면 이해당사자들에게 많은 이익을 가져다 줄 수 있으며, 데이터의 인용을 활성화하기 위해 주제별 또는 기관별 리파지토리나 데이터센터에서 표준적인 인용 방법과 인용 요소들을 발표하고 있다. 앞으로 과학연구의 공개, 개방화가 더욱 추진되면 더욱 많은 연구데이터의 공유 활동이 일어날 것으로 예상되며 분야별 또는 유형별로 국제적인 데이터 리파지토리들이 출현하여 학술 논문의 근거가 되는 데이터 저장소로서의 역할을 수행할 것으로 생각된다.

  • PDF

A Suggestion of image capturing position analysis system using Beacon positioning data and camera sensor data (Beacon 측위 데이터와 카메라 센서데이터를 이용한 실내 영상의 촬영 위치 분석 시스템 제안)

  • Jung, SeoKyung;Yoo, Sung-geun;Song, Minjeong;Park, Sang-il
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.11a
    • /
    • pp.145-147
    • /
    • 2018
  • 다수의 일반 카메라로 촬영한 영상들로 360도 영상을 제작하는 경우 다수의 영상 간 동일한 영역을 찾고 기하학 보정을 위한 영상 스티칭 기술이 필요하다. 영상 스티칭 기술은 여러 영상에서 추출한 특징점들의 유사도를 비교하여 영상들을 이어 붙여 큰 하나의 영상으로 만드는 것이다. 본 논문에서는 비콘이 부착된 공연장을 가정하여, 비콘을 통해서 촬영자의 위치를 대략적으로 파악하고, 사용자가 어플리케이션을 통하여 전송한 영상과 영상의 방위각, FOV(Field Of View)들을 이용하여 실내에서 촬영된 영상들을 스티칭 대상 영상들로 필터링하는 방법을 제안한다.

  • PDF

Korean Lip Reading System Using MobileNet (MobileNet을 이용한 한국어 입모양 인식 시스템)

  • Won-Jong Lee;Joo-Ah Kim;Seo-Won Son;Dong Ho Kim
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.11a
    • /
    • pp.211-213
    • /
    • 2022
  • Lip Reading(독순술(讀脣術)) 이란 입술의 움직임을 보고 상대방이 무슨 말을 하는지 알아내는 기술이다. 본 논문에서는 MBC, SBS 뉴스 클로징 영상에서 쓰이는 문장 10개를 데이터로 사용하고 CNN(Convolutional Neural Network) 아키텍처 중 모바일 기기에서 동작을 목표로 한 MobileNet을 모델로 이용하여 발화자의 입모양을 통해 문장 인식 연구를 진행한 결과를 제시한다. 본 연구는 MobileNet과 LSTM을 활용하여 한국어 입모양을 인식하는데 목적이 있다. 본 연구에서는 뉴스 클로징 영상을 프레임 단위로 잘라 실험 문장 10개를 수집하여 데이터셋(Dataset)을 만들고 발화한 입력 영상으로부터 입술 인식과 검출을 한 후, 전처리 과정을 수행한다. 이후 MobileNet과 LSTM을 이용하여 뉴스 클로징 문장을 발화하는 입모양을 학습 시킨 후 정확도를 알아보는 실험을 진행하였다.

  • PDF