• Title/Summary/Keyword: 메타정보

Search Result 2,838, Processing Time 0.03 seconds

Ant Colony System Considering the Iteration Search Frequency that the Global Optimal Path does not Improved (전역 최적 경로가 향상되지 않는 반복 탐색 횟수를 고려한 개미 집단 시스템)

  • Lee, Seung-Gwan;Lee, Dae-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.9-15
    • /
    • 2009
  • Ant Colony System is new meta heuristic for hard combinatorial optimization problem. The original ant colony system accomplishes a pheromone updating about only the global optimal path using global updating rule. But, If the global optimal path is not searched until the end condition is satisfied, only pheromone evaporation happens to no matter how a lot of iteration accomplishment. In this paper, the length of the global optimal path does not improved within the limited iterations, we evaluates this state that fall into the local optimum and selects the next node using changed parameters in the state transition rule. This method has effectiveness of the search for a path through diversifications is enhanced by decreasing the value of parameter of the state transition rules for the select of next node, and escape from the local optima is possible. Finally, the performance of Best and Average_Best of proposed algorithm outperforms original ACS.

SPDX Document Generation Visual Studio Plug-in development for Invigorating Blockchain based Software Distribution Platform (블록체인 기반의 소프트웨어 유통 플랫폼의 활성화를 위한 SPDX 문서 생성 Visual Studio용 플러그인 개발)

  • Yun, Ho-Yeong;Joe, Yong-Joon;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.13 no.2
    • /
    • pp.9-17
    • /
    • 2017
  • Software compliance is an essential process when Open Source Software is included in software development to avoid such as license violation issue. However, analyzing quite big software which involves many developers requires enormous time and hard difficulty. To resolve these kinds of problem, SPDX formalizes and standardize the metadata about the software package. When the use of SPDX is activated, software package analysis would be simple and could contribute fair Open Source Software distribution. In this paper, we develop blockchain based SPDX distribution platform which fulfills the requirement of SPDX lifecycle to provide SPDX database which does not depend on particular centralized service but serve as distributed ledger and control by user's certification and their purpose. Moreover, to contribute invigoration of blockchain based SPDX distribution platform, we develop SPDX document generation plug-in for integrated development environment such as Visual Studio.

Toward Developing a Provenance Conceptual Model for Data-driven Electronic Records (데이터형 전자기록을 위한 출처 개념 모델 개발 방향)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.305-341
    • /
    • 2024
  • This study explored the possibilities of a new approach to developing the provenance concept to electronic records in the data-driven digital environments by reviewing and adopting data provenance concepts and models. It then conducted basic literature review to develop a ground for a model representing the provenance of data-driven electronic records. In particular, it proposed to embrace to the concepts of retrospective and prospective provenance, and to develop a different model for representing provenance from records management metadata. If the model can be developed that can represent provenance independently while maintaining a dynamic relationship with records, it can be ensure the fluidity of records and even support to secure the record's attributes and play the roles of provenance. Eventually, it proposed the direction to develop the provenance model which can support the fixity of records, the reproducibility of activities, and the trustworthiness of representations. It is expected to be a fit provenance model in the data-driven digital environment.

Design for Proximity Voice Chat System in Multimedia Environments

  • Jae-Woo Chang;Jin-Woong Kim;Soo Kyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.83-90
    • /
    • 2024
  • In this paper, we propose a solution to apply a proximity voice dialog system to voice dialog technology, one of the interaction systems in multimedia environments. A voice dialog between multiple users in a multimedia space is designed by adjusting the volume of the voice according to the distance between the user avatars and muting the user who is beyond the audible distance. The main feature of this research is a reliable UDP-based active server system that delivers low-quality voice data to users who are far away based on distance and does not transmit voice data to users who enter the inaudible area for economic development. The performance of the proposed system was measured in a previously completed project based on the Unity game engine, and it is expected that the system proposed in this research will be actively used in environments that provide interaction between multiple users such as met averse content and real-time battle action games.

Privacy Paradox: A Literature Review and Future Direction (프라이버시 역설에 관한 문헌적 고찰 및 향후 연구방향: 국내 연구를 대상으로)

  • Sanghee Kim;Jongki Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.115-135
    • /
    • 2018
  • The growing interest in the privacy paradox involving discussions about discrepancy between attitude and behavior led to an increase in the number of studies on the topic. An in-depth theoretical review of the privacy paradox is essential to promote qualitative growth of domestic research in the privacy paradox. In this study, we conducted literature review of existing domestic studies in the privacy paradox. The results of this study showed that the quantity and the quality of research showed marked improvement. Earlier studies primarily focused on the existence of the privacy paradox phenomenon, but existing studies on the causes of the phenomenon gradually increased. Despite the use of various methodologies and analytical tools to investigate the causes of the privacy paradox, research in privacy paradox remains in its infancy. Further efforts are needed to achieve qualitative growth, and further studies should be conducted to introduce the behavioral economic approach. This approach posits that bounded rationality could contribute to a clear understanding of the privacy paradox and the academic development of the privacy field.

A Study of Subjectivity about Virtual Fashion

  • Su-Joung Cha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.189-202
    • /
    • 2024
  • The purpose of this study was to apply the Q methodology to type subjective perceptions of virtual clothing and to examine the characteristics of each type. Perceptions of virtual clothing were analyzed into four types. The first type was the "virtual clothing trusting fit grasping type," who preferred to use virtual clothing and believed that virtual clothing would help them grasp the fit. The second type was the shopping mall adoption-positive design understanding type, which believes that virtual clothing is useful for design understanding and that all shopping malls should have a virtual clothing system. The third type was the environmental pollution reduction virtual clothing purchase type, where the virtual clothing reduces environmental pollution and the user wants to purchase virtual clothing that cannot actually be worn. The fourth type was the actual clothing-like fun-seeking type, in which the virtual clothing resembles actual clothing and the shopper believes that the virtual clothing will make shopping more enjoyable. Depending on the type, the avatar was required to adjust the dimensions of the avatar, enhance the design expression of the garment, equip the avatar with decorative items, and produce virtual clothing for sale.

A Study on Library Engagement and Models for Support of MOOC (온라인 대중공개강좌(MOOC)를 위한 도서관 지원 서비스 모델 연구)

  • Son, Taeik
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.50 no.3
    • /
    • pp.293-308
    • /
    • 2016
  • Many universities are offering some of their offline courses for anyone to learn free online as an MOOC format. University libraries In response to changing university conditions, foreign university libraries are struggling to redefine their roles and provide new services. This study aimed to find the trends and models to support MOOCs in foreign libraries and Library and information science domain by conducting a systematic review of studies on foreign library and information journals which have been published from 2012 to 2015. A total of 34 out of 348 studies were included in the final analysis. This study also aimed to present the limits and the future models of MOOC support direction. The relevant articles could be identified, two criteria: 24 MOOCs studies relating to Libraries and 10 MOOCs studies related to LIS. The selected articles were summarized and analyzed yearly. The study identifies elements of library MOOC support models in 5 areas including MOOC design (copyright clearance and consulting, content licensing, open content), production support (course production, video editing, librarian MOOC production), management support (instructional design and content creation, students support), evaluation (MOOC data collection, analysis), reuse (MOOC metadata management, archive structure). Based on these findings, this study suggested the models of library MOOC support and set the theoretical fundamentals.

Design and implementation of protection and management system of digital contents based on MPEG-21 IPMP (MPEG-21 IPMP 기반 디지털 콘텐츠 보호 관리 시스템 설계 및 구현)

  • Ryu Kwang-Hee;Kim Yun-Ki;Kim Kwang-Yong;Kim Jae-Gon;Hong Jin-Woo;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.149-152
    • /
    • 2006
  • The usage increase of digital contents required solution for protection technology and interoperability of system. MPEG proposed MPEG-21 Multimedia Frameworks. MPEG-21 IPMP is standard that provides the means to enable digital item and rights information to be persistently managed and protected across networks and devices. In this paper, MPEG-21 IPMP based system to protect digital contents designed by four structures of license server, production server, consumption server, tool sewer. License sewer create rights information document using the XML-based REL about multimedia contents of users. Production server makes a digital item by packaging multimedia resource and metadata, which is combined by REL information and IPMP information of multimedia resource. Consumption server takes care of the functions of players that use digital item, and tool server was implement to transmit for missing tool that night occur in all procedures.

  • PDF

An Investigation on Data Needs and Data Reuse Behavior in the Field of Social Sciences (사회과학 분야 연구자의 데이터요구와 데이터 재이용 행위에 관한 연구)

  • Kim, NaYon;Chung, EunKyung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.1-26
    • /
    • 2020
  • In today's increasingly data-intensive academic environment, data is becoming the foundation of academic communication as a research outcome rather than a research by-product. However, there is a limit to guaranteeing actual data reuse only by expanding the data supply or securing accessibility. In order to overcome this, it is necessary to understand the data reuse behavior and data needs in-depth. Therefore, this study attempted to identify the major data reuse behavior and data needs among researchers. To this end, the authors of KCI papers among the data reuse documents of the Korea Social Science Data Archive (KOSSDA) for the past 3 years were targeted. An in-depth interview was conducted with 12 researchers who accepted the interview. As a result, factors considered when reusing data were personal, economic, technical, and social aspects, and it was found that the data itself was used or contextual information of the data was used depending on the purpose of data reuse. The path to acquiring data is a web-based source of information, and a path through informal communication can also be found. In terms of the data needs, it was found that they prefer English, the United States, and institutional producers. Also they have a clear preference for quantitative data from an interviewer-filled interpersonal interview survey method, rich metadata along with raw data, and data that contains identification information. However, due to the lack of confidence in the value, it is negative for the use of data with controlled access and use, and it is difficult to confirm a clear preference because there is no similar data available for selection in terms of size and freshness.

Improved Tree-Based ${\mu}TESLA$ Broadcast Authentication Protocol Based on XOR Chain for Data-Loss Tolerant and Gigh-Efficiency (데이터 손실에 강하고 효율적 연산을 지원하는 XOR 체인을 이용한 트리기반 ${\mu}TESLA$ 프로토콜 개선)

  • Yeo, Don-Gu;Jang, Jae-Hoon;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.43-55
    • /
    • 2010
  • ${\mu}TESLA$ broadcast authentication protocol have been developed by many researchers for providing authenticated broadcasting message between receiver and sender in sensor networks. Those cause authentication delay Tree-based ${\mu}TESLA$[3] solves the problem of authentication delay. But, it has new problems from Merkel hash tree certificate structure. Such as an increase in quantity of data transmission and computation according to the number of sender or parameter of ${\mu}TESLA$ chain. ${\mu}TPCT$-based ${\mu}TESLA$[4] has an advantages, such as a fixed computation cost by altered Low-level Merkel has tree to hash chain. However, it only use the sequential values of Hash chain to authenticate ${\mu}TESLA$ parameters. So, It can't ensure the success of authentication in lossy sensor network. This paper is to propose the improved method for Tree-based ${\mu}TESLA$ by using XOR-based chain. The proposed scheme provide advantages such as a fixed computation cost with ${\mu}$TPCT-based ${\mu}TESLA$ and a message loss-tolerant with Tree-based ${\mu}TESLA$.