• Title/Summary/Keyword: 데이터 개방.공유

Search Result 115, Processing Time 0.024 seconds

A Study on the Considerations for Data Management Plan Services in University Libraries (대학도서관의 데이터관리계획 서비스 고려사항에 관한 연구)

  • Park, Hyeong Jeong;Kim, Jihyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.187-215
    • /
    • 2021
  • Due to the ongoing spread of digital technology, there is a movement around the world to open the process and results of research, and Open Science in order to improve access to data produced during the research process, which, as a result, supports the open development and advancement of science. In Korea, discussions on the DMP service are starting at domestic universities for the systematic management, sharing, and utilization of research data. Therefore, in this study, the status of DMP services provided by overseas university libraries were examined through case studies, opinions and requirements for DMP services. The effectiveness of DMP services were confirmed with collected research data, including interviews with research support service personnel of domestic university libraries. Through this, it was intended to suggest matters to be considered in terms of policy making, service implementation and awareness enhancement when providing DMP service in domestic university libraries.

Open GIS Component Software Ensuring an Interoperability of Spatial Information (공간정보 상호운용성 지원을 위한 컴포넌트 기반의 개방형 GIS 소프트웨어)

  • Choe, Hye-Ok;Kim, Gwang-Su;Lee, Jong-Hun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.657-664
    • /
    • 2001
  • The Information Technology has progressed to the open architecture, component, and multimedia services under Internet, ensuring interoperability, reusability, and realtime. The GIS is a system processing geo-spatial information such as natural resources, buildings, roads, and many kinds of facilities in the earth. The spatial information featured by complexity and diversity requires interoperability and reusability of pre-built databases under open architecture. This paper is for the development of component based open GIS Software. The goal of the open GIS component software is a middleware of GIS combining technology of open architecture and component ensuring interoperability of spatial information and reusability of elementary pieces of GIS software. The open GIS component conforms to the distributed open architecture for spatial information proposed by OGC (Open GIS Consortium). The system consists of data provider components, kernel (MapBase) components, clearinghouse components and five kinds of GIS application of local governments. The data provider component places a unique OLE DB interface to connect and access diverse data sources independent of their formats and locations. The MapBase component supports core and common technology of GIS feasible for various applications. The clearinghouse component provides functionality about discovery and access of spatial information under Internet. The system is implemented using ATL/COM and Visual C++ under MicroSoft's Windows environment and consisted of more than 20 components. As we made case study for KSDI (Korea Spatial Data Infrastructure) sharing spatial information between local governments, the advantage of component based open GIS software was proved. Now, we are undertaking another case study for sharing seven kinds of underground facilities using the open GIS component software.

  • PDF

Formation of Weak Ties in Social Media (소셜미디어에서 약한 유대관계의 형성)

  • Park, Chala;Lim, Seongtaek;Yun, Sang;Lee, Inseong;Kim, Jinwoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.4
    • /
    • pp.97-109
    • /
    • 2014
  • Social media is a general term for online services by which users share opinions, perspectives, and experiences. It supports interactions between users in sharing contents on it and weak ties among them play an important role in the process. This exploratory study attempts to identify crucial factors of establishing weak ties between social media users in the perspective of social network theory and uncertainty reduction theory. We collected data through diary study and in-depth interview and analyzed it following grounded theory approach. As a result, social media users more actively interacted each other or shared contents based on weak ties, compared to strong ties. In addition, similarity, self-disclosure, and relevance appeared to facilitate establishment of weak ties, by reducing psychological distance between social media users and perceived uncertainty of them.

Effect of Online Social Network to build virtual Human Capital (온라인 모임이 사회적 자원 형성에 미치는 영향)

  • Yun, Ho-Seong;Park, Jung-Hee;Lee, Ki-Dong
    • Journal of Digital Convergence
    • /
    • v.8 no.1
    • /
    • pp.71-79
    • /
    • 2010
  • Impact of online social network to cyber community has increased much attention recently. The biggest challenge in fostering a social network is to the extent whether it helps to build human capital network or social community. We propose what critical factors influence the formation of online capital network. The study uses three independent factors as motivation, self disclosure, and interactivity and two dependent factors as knowledge sharing and strengthening relationships to create virtual capital connection. Data collected from 256 university students to test the proposed model. The results of the study shows that all hypothesis are supported except one with strengthening relationship. Implications and limitations of this research are discussed.

  • PDF

Semantic Segmentation of Drone Images Based on Combined Segmentation Network Using Multiple Open Datasets (개방형 다중 데이터셋을 활용한 Combined Segmentation Network 기반 드론 영상의 의미론적 분할)

  • Ahram Song
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_3
    • /
    • pp.967-978
    • /
    • 2023
  • This study proposed and validated a combined segmentation network (CSN) designed to effectively train on multiple drone image datasets and enhance the accuracy of semantic segmentation. CSN shares the entire encoding domain to accommodate the diversity of three drone datasets, while the decoding domains are trained independently. During training, the segmentation accuracy of CSN was lower compared to U-Net and the pyramid scene parsing network (PSPNet) on single datasets because it considers loss values for all dataset simultaneously. However, when applied to domestic autonomous drone images, CSN demonstrated the ability to classify pixels into appropriate classes without requiring additional training, outperforming PSPNet. This research suggests that CSN can serve as a valuable tool for effectively training on diverse drone image datasets and improving object recognition accuracy in new regions.

A Study on Exploring Factors Influencing Military Security Level (Based on the Theory of Planned Behavior, Deterrence and Protection Motivation) (군(軍) 보안수준에 미치는 영향요인 탐색에 관한 연구 (계획 행동이론, 억제이론, 보호 동기 이론을 중심으로))

  • Jong-Hyoun Kim;Sang-Jun Ahn
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, as the environment of the 4th industrial revolution has arrived, the opening, sharing and convergence of data are actively being achieved in any organization. However, the opening and sharing of data inevitably leads to security vulnerability and there is ambivalence that is a threat that can affect the existence of an organization operated in the 4th industrial revolution environment. Especially security issues in the organization of the military can be a threat to the state, not the military itself, so it is always necessary to maintain a high level of security discipline. In this paper, 14 variables were selected through structural equation model applying theory of planned behavior, deterrence and protection motivation to find out the security level development measures by extracting factors that can affect security level. As a result, the theory of planned behavior that the security knowledge embodied through the usual security regulation education and evaluation affects the behavior was adopted, and the theory of deterrence and protection motivation showed the significance of the rejection level. In addition, it was confirmed that the variables that have the greatest impact on the military security level through the measured values of the three-year security audit were commanders and mental security. In conclusion, in order to improve the security level, it is suggested that security education, definite reward and punishment, and security system upgrading should be firmly established and mental security posture should be secured.

i-Manager: An Implementation of LOD Instance Development System (i-Manager : LOD 인스턴스 개발 시스템의 구현)

  • Moon, Hee-kyung;Han, Sung-kook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1174-1182
    • /
    • 2017
  • The research and development on Web of Data to realize the opening and sharing of diverse, heterogonous data on the Web has been actively accomplished. As a standard data model for this effort, LOD (Linked Open Data) based on ontology has been proposed. A specialized instance generation system is vital to the development of LOD-based system effectively. This paper implements i-Manager as an appropriate environment for the development of LOD instances, considering the requirements of LOD systems and the practical development environment of the diverse application domains. i-Manager separates the instance layer from the ontology layer by way of LOD Interface Sheet (LIS) and implements the specialized functions requested in LOD instance development, such as instance edit/store, visualization and SPARQL query processing. This paper proposes a new approach for LOD instance development, and i-Manager can be applied for the practical LOD development environment in the diverse application areas.

Seeking Platform Finance as an Alternative Model of Financing for Small and Medium Enterprises in Korea (중소기업 대안금융으로서 플랫폼 금융의 모색)

  • Chung, Jay M.;Park, Jaesung James
    • The Journal of Small Business Innovation
    • /
    • v.20 no.3
    • /
    • pp.49-68
    • /
    • 2017
  • Platform finance is emerging as an alternative finance for SMEs by suggesting a new funding source based on a new technology named FinTech. The essence of this business is the adapting ICT challenges to the financial industry that can adequately reflect risk assessment using Big Data and effectively meet individual risk-return preference. Thus, this is evolving as an alternative to existing finance in the form of P2P loans for Micro Enterprises and supply-chain finance for SMEs that need more working capital. Platform finance in Korea, however, is still at an infant stage and requires policy support. This can be summarized as follows: "Participation of institutional investors and the public sector," meaning that public investors provide seed money for the private investors to crowd in for platform finance. "Negative system in financial regulations," with current regulations to be deferred for new projects, such as Sandbox in the UK. In addition, "Environment for generous use of data," allowing discretionary data sharing for new products," and "Spreading alternative investments," fostering platform finance products as alternative investments in the low interest-rate era.

  • PDF

A Study on the Strategic Application of National Defense Data for the Construction of Smart Forces in the 4th IR (4차 산업혁명시대 스마트 강군 건설을 위한 국방 데이터의 전략적 활용 방안연구)

  • Kim, Seyong;Kim, Junsang;Kang, Seokwon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.113-123
    • /
    • 2020
  • The fourth industrial revolution can be called the hyper-connected-based intelligent revolution triggered by advanced information technology and intelligent technology, and the basis for implementing these technologies is 'data'. This study proposes a way to strategically use data in order to lead this intelligent revolution in the defense area. First of all, implications through analysis of domestic and international trends and prior research and current status of defense data management were analyzed, and four directions for development were presented. If the government composes conditions for building, releasing, sharing, distribution, and convergence of defense data considering the environment of national defense in the future, it is expected that it will serve as a foundation and a shortcut to be a digitalized strong military through smart defense innovation in the era of the fourth industrial revolution.

A Study on the 4th Industrial Revolution and Intelligent Government Operating Strategy -In Terms of Block Chain Introduction Plans of Electronic Government- (제4차 산업혁명과 지능형 정부 운용전략에 대한 연구 -블록체인 기술의 전자정부 도입방안 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.1-10
    • /
    • 2019
  • In terms of realizing the future e-government such as intelligent government, this paper attempts to provide an earnest and insightful reflection and suggests desirable strategies with regard to the four different crucial elements including electronic voting, electronic contract, resident registration/electronic document management, and real-estate registration as an operating strategy of intelligent government and the fourth industrial revolution regarding. The 4th industrial revolution is aimed at concentrating information or data characterized with sharing, opening, communicating and releasing in cloud computing system, analyzing big data, collecting information, and flourishing people's well-being by information and communications technology with utilizing the smart devices. Therefore, reliability of the pivotal information or data is critical and it is important for the participants being transparently shared, without the data or information being forged. In this respect, introduction or application of block chain technology is essential. This paper will review preceding studies, discuss the aspect of the 4th industrial revolution and intelligent government, then suggest operating strategies in the field of electronic voting, electronic contract, management of resident registration and electronic document and real-estate registration.