• Title/Summary/Keyword: 데이터 호환성

Search Result 483, Processing Time 0.025 seconds

What factors drive AI project success? (무엇이 AI 프로젝트를 성공적으로 이끄는가?)

  • KyeSook Kim;Hyunchul Ahn
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.327-351
    • /
    • 2023
  • This paper aims to derive success factors that successfully lead an artificial intelligence (AI) project and prioritize importance. To this end, we first reviewed prior related studies to select success factors and finally derived 17 factors through expert interviews. Then, we developed a hierarchical model based on the TOE framework. With a hierarchical model, a survey was conducted on experts from AI-using companies and experts from supplier companies that support AI advice and technologies, platforms, and applications and analyzed using AHP methods. As a result of the analysis, organizational and technical factors are more important than environmental factors, but organizational factors are a little more critical. Among the organizational factors, strategic/clear business needs, AI implementation/utilization capabilities, and collaboration/communication between departments were the most important. Among the technical factors, sufficient amount and quality of data for AI learning were derived as the most important factors, followed by IT infrastructure/compatibility. Regarding environmental factors, customer preparation and support for the direct use of AI were essential. Looking at the importance of each 17 individual factors, data availability and quality (0.2245) were the most important, followed by strategy/clear business needs (0.1076) and customer readiness/support (0.0763). These results can guide successful implementation and development for companies considering or implementing AI adoption, service providers supporting AI adoption, and government policymakers seeking to foster the AI industry. In addition, they are expected to contribute to researchers who aim to study AI success models.

Systematization Design Technique for Linear Actutor by using similarity theory (유사이론을 적용한 리니어 액츄에이터의 계열화 설계기법)

  • 조경재;차인수;이권현
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.4 no.5
    • /
    • pp.442-448
    • /
    • 1999
  • We introduce the systematization design method using similarity theory which is profitable in the c compatability and standardization of the developed products and the reduction of construction time and price to d develop and design a machine equipment. Systematization design method is to select the standard model for d designing and developing from the large machinery to the super precision one and then to induce the c characteristic of machines step by step in advance in case of miniaturizing and making largelongleftarrowscale. With this m method, we extract the peculiar characteristics through the close analysis on the physical and ttx:hnical part a and predict the characteristic experiment for the magnitude we desire by an머ogical mathematical analysis. At l last, we will get the design sample the users demand with the verification of the data on optimum design p previously. In this paper, we could predict the characteristic of the product the users rC'Quire in advance with the d design method applying similarity theor${\gamma}$ and suggested the design method which could meet the various r requirements the users want. Also, it is shown that the standardization design by the similarity theory is a available as comparing the characteristic values expc'Cted through the experiment of the actual actuator with t the theoretical character data of similarity theoη after selecting the linear actuator as a model.

  • PDF

A Study on SIARD Verification as a Preservation Format for Data Set Records (행정정보 데이터세트 보존포맷으로서 SIARD 검증에 관한 연구)

  • Yoon, Sung-Ho;Lee, Jung-eun;Yang, Dongmin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.3
    • /
    • pp.99-118
    • /
    • 2021
  • As the importance of data grows because of the advent of the next industrial revolution, foreign countries are pushing for long-term data preservation technology research. On the other hand, in Korea, administrative information data sets have been legislated as records management areas without specific long-term preservation measures. As a response, this study conducted basic, cross-validation tests on the Software Independent Archiving of Relational Database (SIARD), which was proposed as an administrative information data set preservation format in several prior works. First, the underlying verification test focuses on deriving the data, structure, and functionality of the data set that SIARD can preserve. The second cross-validation test aimed at verifying the interoperability of SIARD independent of the DBMS class. In addition, two verification tests have confirmed the SIARD feature delivery range. Consequently, the differences between the feature types specified in the SIARD 2.0 standard and those provided by the actual SIARD Suite have been derived. Based on verification test results, we are proposing a development plan to broaden SIARD functionality and set a direction to efficiently enhance SIARD for local situations.

The SemanticWeb Technology and its Applications (시맨틱웹 기술과 활용방안)

  • 오삼균
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.4
    • /
    • pp.298-319
    • /
    • 2002
  • The Semantic Web is a new technology that attempts to achieve effective retrieval, automation, integration, and reuse of web resources by constructing knowledge bases that are composed of machine-readable definitions and associations of resources that express the relationships among them. To have this kind of Semantic Web in place, it is necessary to have the following infrastructures: capability to assign unchangeable and unique identifier (URI) to each resource, adoption of XML namespace concept to prevent collision of element and attribute names defined by various institutions, widespread use of RDF to describe resources so that diverse metadata can be interoperable, use of RDF schema to define the meaning of metadata elements and the relationships among them, adoption of DAML+OIL that is built upon RDF(S) to increase reasoning capability and expressive power, and finally adoption of OWL that is built upon DAML+OIL by removing unnecessary constructors and adding new ones based on experience of using DAML+OIL. The purpose of this study is to describe the central concepts and technologies related to the Semantic Web and to discuss the benefits of metadata interoperability based on XML/RDF schemas and the potential applications of diverse ontologies.

IEC 61850 Based IoT Gateway Platform for Interworking to Microgrid Operational System (마이크로그리드 운영 시스템 연계를 위한 IEC 61850 기반 IoT 게이트웨이 플랫폼)

  • Park, Jeewon;Song, ByungKwen;Shin, InJae
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.67-73
    • /
    • 2018
  • There are many types of power facilities such as transformers, switches, and energy storage devices in the micro grid environment. However, with the development of IoT technology, opportunities to acquire sensor information such as temperature, pressure, and humidity are provided. In the existing micro grid environment, the communication protocols such as MMS transport protocol in IEC 61850 standard is applied in accordance with the integrated operation between the power facilities and the platform. Therefore, to accommodate IoT data, a gateway technology that can link IoT data to a data collection device (FEP) based on IEC 61850 is required. In this paper, we propose IEC 61850 based IoT gateway platform prototype for microgrid operating system linkage. The gateway platform consists of an IoT protocol interface module (MQTT, CoAP, AMQP) and database, IEC 61850 server. For databases, We used open source based NoSQL databases, Hbase and MongoDB, to store JSON data. We verified the interoperability between the IoT protocol and the IEC 61850 protocol using Sisco's MMS EASY Lite.

A Study on dynamic gateway system for MOST GATEWAY Scheduling Algorithm in MOST25 and MOST150 Networks (MOST25와 MOST150 네트워크에서 효율적인 데이터 전송을 위한 MOST GATEWAY 스케줄링 알고리즘에 관한 연구)

  • Jang, Seong-jin;Jang, Jong-yug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.784-788
    • /
    • 2009
  • In recent years, the driver needs the convenience of their vehicles and that there is an increasing requirement. Many researches have been mainly focused on MOST Networks to provide quality of multimedia service. The MOST network to support different bandwidth(MOST 25, MOST 50, MOST 150) should consist of a heterogeneous network. So the networks to used different protocols required gateway for receive and transmit information. The method to used gateway has problems occured loss of a packet by a lot of delay. Therefore in this paper, we propose a MOST GATEWAY system for organically connected to the network MOST150 and MOST 25. After analyzing the performance of the existing scheduling algorithm, we will present an improvement scheme of the efficiency and scalability.

  • PDF

A Middleware Architecture for HTML5-Based PDF Viewer (HTML5기반의 PDF Viewer 제공을 위한 Middleware 구조 제안)

  • Jeong, Kyu-Byeong;Lee, Gi-Beum;Park, Peom;Hwang, Seong-Jin;Oh, Sangyoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.256-259
    • /
    • 2012
  • Paperless 회의 및 행정에 대한 요구가 제기되면서 ISO 14001과 같은 표준들의 제안과 함께 이 요구에 대한 많은 연구와 구현이 제안되고 있다. 최근에는 다양한 플랫폼의 스마트 기기들의 보급이 확산됨에 따라 이 기기들의 플랫폼에 맞는 전자문서서식시스템의 요구도 높아지고 있다. 본 논문에서는 제시된 여러 연구들의 효율성 검토 결과를 기반으로 사용자 중심의 전자문서 공유 및 관리 기능을 제공하는 미들웨어의 구조를 제안한다. 제안하는 미들웨어는 Content Adaptation, 즉 File Format 및 Size Converting, 스마트기기내에서의 전자서식문서 보안 처리기능, 데이터 관리기능을 포함하는 PDF Viewer를 제공하며 최근 표준화 적용이 진행 중인 HTML5를 기반으로 하여 호환성과 적용성을 높였다. 제안된 구조와 구현방식에 대한 검증을 위해 구현 사례를 본 논문에서 제시하였다.

Development of an X3D Python Language Binding Viewer Providing a 3D Data Interface (3D 데이터 인터페이스를 제공하는 X3D Python 언어 바인딩 뷰어 개발)

  • Kim, Ha Seong;Lee, Myeong Won
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.243-250
    • /
    • 2021
  • With the increased development of 3D VR applications augmented by recent VR/AR/MR technologies and by the advance of 3D devices, interchangeability and portability of 3D data have become essential. 3D files should be processed in a standard data format for common usage between applications. Providing standardized libraries and data structures along with the standard file format means that a more efficient system organization is possible and unnecessary processing due to the usage of different file formats and data structures depending on the applications can be omitted. In order to provide the function of using a common data file and data structure, this research is intended to provide a programming binding tool for generating and storing standardized data so that various services can be developed by accessing the common 3D files. To achieve this, this paper defines a common data structure including classes and functions to access X3D files with a standardized scheme using the Python programming language. It describes the implementation of a Python language binding viewer, which is an X3D VR viewer for rendering standard X3D data files based on the language binding interface. The VR viewer includes Python based 3D scene libraries and a data structure for creation, modification, exchange, and transfer of X3D objects. In addition, the viewer displays X3D objects and processes events using the libraries and data structure.

User authentication using touch positions in a touch-screen interface (터치스크린을 이용한 터치 위치기반 사용자 인증)

  • Kim, Jin-Bok;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.135-141
    • /
    • 2011
  • Recent advances in mobile devices and development of various mobile applications dealing with private information of users made user authentication in mobile devices a very important issue. This paper presents a new user authentication method based on touch screen interfaces. This method uses for authentication the PIN digits as well as the exact locations the user touches to input these digits. Our method is fully compatible with the regular PIN entry method which uses numeric keypads, and it provides better usability than the behavioral biometric schemes because its PIN registration process is much simpler. According to our experiments, our method guarantees EERs of 12.8%, 8.3%, and 9.3% for 4-digit PINs, 6-digit PINs, and 11-digit cell phone numbers, respectively, under the extremely conservative assumption that all users have the same PIN digits and cell phone numbers. Thus we can guarantee much higher performance in identification functionality by applying this result to a more practical situation where every user uses distinct PIN and sell phone number. Finally, our method is far more secure than the regular PIN entry method, which is verified by our experiments where attackers are required to recover a PIN after observing the PIN entry processes of the regular PIN and our method under the same level of security parameters.

Legal Issues in Protecting and Utilitizing Medical Data in United States - Focused on HIPAA/HITECH, 21st Century Cures Act, Common Law, Guidance - (미국의 보건의료데이터 보호 및 활용을 위한 주요 법적 쟁점 -미국 HIPAA/HITECH, 21세기 치료법, 공통규칙, 민간 가이드라인을 중심으로-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.117-157
    • /
    • 2021
  • This research reviewed the HIPAA/HITECH, 21st Century Cures Act, Common Law, and private Guidances from the perspectives in protecting and utilitizing the medical data, while implications were followed. First, the standards for protection and utilization are relatively clearly regulated through single law on personal medical information in the United States. The HIPAA has been introduced in 1996 as fundamental act on protection of medical data. Medical data was divided into personally identifiable information, non-identifying information, and limited dataset under HIPAA. Regulations on de-identification measures for medical information, objects for deletion of limited data sets, and agreement on prohibition of data re-identification were stipulated. Moreover, in the 21st Century Cures Act regulated mutual compatibility for data sharing, prohibition of data blocking, and strengthening of accessibility of data subjects. Common Law introduced comprehensive consent system and clearly stipulates procedures. Second, the regulatory system is relatively simplified and clearly stipulated in the United States. To be specific, the expert consensus and the safe harbor system were introduced as an anonymity measure for identifiable medical information, which clearly defines the process while increasing trust. Third, the protection of the rights of the data subject is specified, the duty of explanation is specified in detail, while the information right of the consumer (opt-out procedure) for identification information is specified. For instance, the HHS rule and FDA regulations recognize the comprehensive consent system for human research, but the consent procedure, method, and requirements are stipulated through the common rule. Fourth, in the case of the United States, a trust-based system is being used throughout the health and medical data legislation. To be specific, Limited Data Sets are allowed to use in condition to the researcher's agreement to prohibit re-identification, and de-identification or consent process is simplified under the system.