• Title/Summary/Keyword: 연동 방안

Search Result 833, Processing Time 0.029 seconds

A Study on the Application and Management Framework of Social Science Scholarly Ontology for Semantic Information Navigation (연구자 중심 연구성과물 의미검색을 위한 인문사회 학술용어 온톨로지 적용 및 유지관리 체계 연구)

  • Yoo, Sa-Rah;Lee, Hye-Won;Song, In-Seok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.2
    • /
    • pp.277-298
    • /
    • 2009
  • In order to utilize the operational metadata retrieval system which is based on the semantic association between the research outcomes of the Korean Research Memory (KRM), the systematic integration of the metadata of the research outcomes with the term data registry (DR) was required. This study presents the ontology which can be used effectively to support the KRM. It includes the concept modeling of the knowledge structure of research outcomes, information retrieval service modeling that applies an analytical approach to researchers' needs in conjunction with the term DR, and also some technical and administrative suggestions for future system management.

Development of Hydrologic Data Aquisition and Management System(HDAMS) in Anyangcheon watershed (안양천 유역의 실시간 수문모니터링 자료관리시스템 개발)

  • Lee, Kyoung-Do;Kim, You-Jin;Kim, Nam-Il;Lee, Kil-Seoung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.2029-2033
    • /
    • 2007
  • 오늘날 특정 유역에서의 수문현상 및 수문순환에 대한 분석을 위한 연구가 활발히 진행되고 있다. 이를 위해서는 수문자료의 관측은 반드시 수반되어야 하며, 관측자료의 품질관리 및 원시자료의 관리 등이 요구되고 있는 실정이다. 관측된 수문자료의 품질관리라 함은 자료의 신뢰도 분석과 자료의 보완의 두 과정을 포함한다. 여기서, 신뢰도 분석이라 함은 자료 속에 포함된 불확실성을 판별하는 작업을 의미하며, 자료의 불확실성은 위에서 언급된 자료의 불충분 및 불안정을 제외한 부정확, 불일관성에서 비롯된다. 자료의 보완이라 함은 자료의 신뢰도 분석을 통하여 자료 속에 포함된 불확실한 성분들을 찾아내고, 이를 제거한 후 완전한 자료로 대체하고, 자료가 결측된 경우 공백을 연결함으로써 자료의 완전성을 유지하거나 또는 불충분한 자료를 확장하는 일련의 보완작업이라고 정의한다. 자료의 품질을 결정하는 주요 인자는 크게 관측소 관리의 하드웨어적인 측면과 자료 분석의 소프트웨어적인 측면이 있다. 하드웨어적인 측면에서의 수문자료 품질관리를 위해서 본 과제에서는 현장에 설치된 수위계, 강우량계의 센서 등에 대한 장비를 점검하고, 현장실측을 통해 지속적으로 측정값을 보정해주는 역할을 수행하고 있으며, 소프트웨어적인 측면에서 수문자료의 품질관리를 위해서는 수문자료의 수집 단계부터 시작하여 데이터베이스 저장, 필터링, 통계분석, 웹 및 C/S(Client Server)를 통한 배포 등의 일련의 자료 처리 과정을 수행할 수 있는 수문자료관리 프로그램을 웹 시스템과 C/S로 분류하여 정의내릴 수 있다. 본 연구에서는 수문자료의 관리자 입장에서의 보다 효율적이고 체계적으로 자료를 관리하고 분석하기 위한 방안으로 수문자료관리시스템(Hydrologic Data Aquisition and Management System, HDAMS)을 개발하였다. 이 시스템은 안양천 유역에서 시범 적용하고 있으며, 범용성을 전제로 개발되었다. 또한 수문자료 관리 프로그램의 DB 구조 및 DB 자료를 활용한 다양한 분석기능은 갖도록 설계하였으며 계획된 데이터베이스 구조를 바탕으로 계측기 인터페이스와 사용자 인터페이스, 데이터베이스 간의 연동이 원활히 이루어지도록 개발하고자 한다.

  • PDF

Determination of the Impact Fee Zone by the Parcel Based Information of Development Permit (개발행위허가 지적정보에 의한 기반시설부담구역 선별방안)

  • Choei, Nae-Young
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.3
    • /
    • pp.89-95
    • /
    • 2009
  • One of the criteria provided by the law to designate the Impact Fee Zone requires that the increase rate of the development permit should exceed that of the entire locality by more than twenty percent. Since the permits are issued to scattered parcels on the individual basis, however, it renders significant difficulties in accurately figuring out the finite local areas that exceed such legal criteria. This study, in this context, tries to join the development permit time-series data with the Korea Land Information System (KLIS) so that, with the aid of the landform layer and existing infrastructure layer, it could pinpoint the local area where the development activities are concentrating. Taking a sector in Yangpyong County as the case, the study practically demonstrates as to how the designation process is geospatially processed.

  • PDF

Multipoint multimedia communcation service in broadband ISDN part I: a conversational communcation on DAVID STB environment (광대역ISDN상의 다지점 멀티미디어 통신서비스 I부:DAVIC 표준 STB에서의 대화형 멀티미디어통신)

  • 황대환;이종형;박영덕;조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.4
    • /
    • pp.821-835
    • /
    • 1998
  • The Digital Audio-Visual Council(DAVIC) that was established to develop useful multimedia communication services has completed the specifications for providing on-demand services such as Movie on Demand(MoD), Teleshopping and accepting Internet service. And then they are proceeding the works to suport converstional communcation services like Plain Old Telecphone Service(POTS), Video telephone, Video teleconferencing. In this paper, we prpose an efficient terminal architecture which can provide conversational multimedia communication services on DAVIC Set-Top Box (STB) environments. To apply the implemented conversational terminal to the multipoint communication environment, we considered the factors of Qurlity of Services(QoS) that determine grade of conversational communication service. We also present the inter-working scheme and that system structure to satisfy QoS by using new MPEG video bridge which gurantees end to end delay requirements as major element of QoS for achieving the real time communication and does not accompany visual quality degradation.

  • PDF

CORBA-based Distributed Multimedia Communication Systems for Controlling and Managing Multimedia Streams (멀티미디어 스트림 제어 및 관리를 위한 CORBA 기반 분산 멀티미디어 통신 시스템)

  • 박상윤;정길호;박상현;엄영익
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.51-63
    • /
    • 2001
  • According to the popular use of the multimedia services in distributed environments, the need for the variable multimedia communication technologies have been presented today. In order to support the efficient transmission multimedia streams, the multicasting, and the interoperability between multimedia applications in distributed environments, the development of the open exclusive multimedia communication systems and the provision of the control and management methodologies for media streams have been required. In order support the realtime transmission of multimedia stream in distributed environments. the protocols such as RTP, RSVP, and RTSP have been standardized. For supporting the interoperability between multimedia applications and the control and management of streams, the distributed processing platforms such as CORBA by OMG and DSM-CC by DAVIC were published. In this paper, we introduce the CORBA-based distributed multimedia communication system which support the realtime transmission, control, and management of multimedia streams and provide the interoperability between multimedia applications. Finally, we present the QoS measurement results by the interoperability between our systems and VoD systems.

  • PDF

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

Lightweight Energy IoT Standard Protocol and Test Certification Procedure (에너지 IoT 표준 프로토콜 경량화 및 시험인증절차에 관한 연구)

  • Park, Myunghye;Kim, Younghyun;Myoung, Nogil;Kang, Sukyung;Eun, Changsoo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.2
    • /
    • pp.129-135
    • /
    • 2020
  • The standardization of e-IoT (energy Internet of Things) communication and service, which is the energy field of energy, is to define the standard model and to demonstrate the practical model in order to take the lead and occupy the market where new market is created with the latest technology. In particular, detailed technical specifications are defined for developing a framework for IoT technology, the foundation technology of the 4th Industrial Revolution, securing interoperability through standardization, and operating a standard platform. In this paper, we propose a method for e-IoT standard protocol lightening and test certification procedure. The proposed method provides a product implementation method that can solve the problem of low power issue of e-IoT product in the future.

A Proposal of Building an LVC for the ROK Military based on the HLA (Focused on the System View and Technical Standard View) (HLA 기반 한국군 LVC 구축방안 제안 (시스템 관점 및 기술표준 관점을 중심으로))

  • Lee, Chong-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.1-11
    • /
    • 2017
  • During the past several years the ROK military has made an effort to build LVC synthetic battlefield that reflects the real world environment. In spite of its efforts, little has been accomplished. The disappointing achievement is mainly due to the lack of operational requirements and concepts, and policies or systematic approaches on the architecture and technology. Furthermore, there is insufficient understanding on the basic concepts and principles, and conflicting interests between organizations. In this study, I propose to construct an LVC based on the HLA that focuses on the system view and technical standard view, rather than the operational view. The proposed approach employs the information centric integration, focuses on an architecture convergence efforts based on the HLA/RTI, emphasizes the HLA compliance test and federation test, adapts to DSEEP, DMAO, and FEAT, and finally invents and implements an LVC Compliance Test System.

GIS-based Fire Evacuation Simulation using CA Model (CA 모델을 이용한 GIS 기반 화재 대피 시뮬레이션)

  • Park, In-Hye;Jun, Chul-Min;Lee, Ji-Yeong
    • Spatial Information Research
    • /
    • v.16 no.2
    • /
    • pp.157-171
    • /
    • 2008
  • With emerging technologies on wireless networks and mobile computing environment, a number of researches have been carried out for ubiquitous computing. An important functional requirement of ubiquitous computing is to handle location data with ease. With the increase of accidents in large complex buildings. move attention is being paid to indoor spaces and evacuation. However, most currently used evacuation-related applications are simulation based on hypothetical data. Also, since they use non-georeferenced CAD data, it is not easy to integrate them with indoor positioning devices. With the recent progress of indoor positioning systems, the simulators can be enhanced to real-time evacuation systems. As a preliminary stage to make such systems possible, this study proposes using a georeferenced data and evacuation simulation. This study used GIS data and Cellular Automata theory an the algorithm for the movement of the evacuee.

  • PDF

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm (DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.