• Title/Summary/Keyword: Identifier System

Search Result 264, Processing Time 0.023 seconds

A Study on the Analysis of Identification System and the Linkage Method of Academic-information (학술정보의 식별체계 현황 분석 및 연계 방안 연구)

  • Gang, Ju-Yeon;Seol, Jae-Wook;Hwang, Hyekyong
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.1
    • /
    • pp.115-143
    • /
    • 2020
  • With the era of the 4th Industrial Revolution, the number of data-centric integrated researches increases. The integrated researches make information identification and linkage more important, so it is necessary to seek a method to efficiently manage and share academic-information for supporting the researches. Therefore, this study aims to analyze identification system and linkable information types of 12 major academic search engines and bibliographic databases(ASEBDs) in Korea and abroad and to propose a method to identify and link academic-information. The analysis was conducted 2 times, and academic-information types, searchable fields, linkable information types, used identification system were investigated. As a result, the ASEBDs link directly or/and indirectly 3~4 information types based on their own identifiers with persistent identifiers. In addition, they identify academic-information semi-automatically based on machine learning methodology and collect and manage the related data. Finally, the method for academic-information linkage was proposed in terms of practice and society: linkage based on persistent identifiers and linkage based on collaborative network of institutions.

Container Image Recognition using Fuzzy-based Noise Removal Method and ART2-based Self-Organizing Supervised Learning Algorithm (퍼지 기반 잡음 제거 방법과 ART2 기반 자가 생성 지도 학습 알고리즘을 이용한 컨테이너 인식 시스템)

  • Kim, Kwang-Baek;Heo, Gyeong-Yong;Woo, Young-Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1380-1386
    • /
    • 2007
  • This paper proposed an automatic recognition system of shipping container identifiers using fuzzy-based noise removal method and ART2-based self-organizing supervised learning algorithm. Generally, identifiers of a shipping container have a feature that the color of characters is blacker white. Considering such a feature, in a container image, all areas excepting areas with black or white colors are regarded as noises, and areas of identifiers and noises are discriminated by using a fuzzy-based noise detection method. Areas of identifiers are extracted by applying the edge detection by Sobel masking operation and the vertical and horizontal block extraction in turn to the noise-removed image. Extracted areas are binarized by using the iteration binarization algorithm, and individual identifiers are extracted by applying 8-directional contour tacking method. This paper proposed an ART2-based self-organizing supervised learning algorithm for the identifier recognition, which improves the performance of learning by applying generalized delta learning and Delta-bar-Delta algorithm. Experiments using real images of shipping containers showed that the proposed identifier extraction method and the ART2-based self-organizing supervised learning algorithm are more improved compared with the methods previously proposed.

A Study on Method of Framework Data Update and Computing Land Change Ratio using UFID (UFID를 이용한 기본지리정보 갱신 및 지형변화율 산출 방안 연구)

  • Kim, Ju Han;Kim, Byung Guk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1D
    • /
    • pp.157-167
    • /
    • 2006
  • During the first and second NGIS projects by the Korean government, The first one (1995~2000) was limited on constructing geographic information and the second (2001~2005) was focused on circulation and practical use of geoinformation from the result of the first project. In the latter half of 2nd NGIS project, However, the geographic information from the NGIS projects have not been renewed even though there were significant geographical changes. The accurate renewal of geoinformation is a matter of great importance to the next generation industry (e.g. LBS, Ubiquitous, Telematics). In this respect, it is time to update the geographic information in the latter half of the second NGIS project. Therefore, It is not only important to build an accurate geoinformation but also rapid and correct renewal of the geoinformation. NGII (National Geographic Information Institute) has been studying for improvement of digital map that was constructed by the result of the 1st NGIS project. Through the construction of clean digital map, NGII constructed Framework Data to three kinds of formats (NGI, NDA, NRL). Framework Data was contained to other database, and provided the reference system of location or contents for combining geoinformation. Framework Data is consist of Data Set, Data Model and UFID (Unique Feature Identifier). It will be achieved as national infrastructure data. This paper attempts to explore a method of the update to practical framework data with realtime geoinformation on feature's creation, modification and destruction managed by 'Feature management agency' using UFID's process. Furthermore, it suggests a method which can provide important data in order to plan the Framework update with the land change ratio.

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

Analysis of the taxi telematics history data based on a state diagram (상태도에 기반한 택시 텔레매틱스 히스토리 데이터 분석)

  • Lee, Jung-Hoon;Kwon, Sang-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.1
    • /
    • pp.41-49
    • /
    • 2008
  • This paper presents a data analysis method for the taxi telematics system which generates a greate deal of location history data. By the record consist of the basic GPS receiver-generated fields, device-added fields such as taxi operation status, and framework-attached fields such as matched link Identifier and position ratio in a link, each taxi can be represented by a state diagram. The transition and the state definition enable us to efficiently extract such information as pick-up time, pick-up distance, dispatch time, and dispatch distance. The analysis result can help to verify the efficiency of a specific taxi dispatch algorithm, while the analysis framework can invite a new challenging service including future traffic estimation, trajectory clustering, and so on.

  • PDF

A Study on the Design of a Topic Map-based Retrieval System for the Academic Administration Records of Universities (대학 학사행정 기록물의 토픽맵 기반 검색시스템 설계에 관한 연구)

  • Shin, Jiyu;Jung, Youngmi
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.16 no.1
    • /
    • pp.175-193
    • /
    • 2016
  • A topic map was designed as an efficient information retrieval method that is optimized for classification, organization, and navigation through the use of a semantic link network above information resources. With this, this study aims to design a topic map-based university archives retrieval system to provide the relevant information retrieval. For this study, electronic records that relate to the academic administration within two years of D university were collected, and topic map editing was carried out with Ontopia Omnigator. Topics were classified according to their functional analysis of academic administration. In the end, the number of topics was finalized as 626, with 6 types in general: academic work, staff, college register, student, university, etc. Association was separated into six types as well, which were formed with consideration to the relationships among topics. In addition, there are seven occurrence types: register class, register number, register date, receiver, title, creator, and identifier. It is expected that the associative nature of the designed topic map-based retrieval system in this study will make navigation of large records easy and allow incidental discovery of knowledge.

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

A Study on the Strategy Plan for the Utilization on Free Use License of Digital Works (디지털저작물 자유이용라이선스 활성화를 위한 전략방안 연구)

  • Oh, Sang-Hoon;Choi, Young-Sun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.2
    • /
    • pp.263-283
    • /
    • 2010
  • Free Use License is an effective means of allowing many people to freely use works in the public domain. It can also prevent copyright infringement problems. This article analyzes the current service and domestic and foreign technology as it applies to free use license. It then proposes a plan which incorporates diverse requirements including technical aspects. Strategies are formulated from the technical, service and the resources connection perspectives for applying license in addition to searching and using licensed works. This article suggests a three-stage utilization plan to encourage the use of free use license. First, a connection plan between digital archiving and free use license, is developed. Then, a connection plan between UCI identifier and free use license is developed, and finally, the plan for the use of public resources is presented.

DDoS Attack Path Retracing Using Router IP Address (라우터 IP주소를 이용한 DDoS 공격경로 역추적)

  • 원승영;구경옥;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.223-226
    • /
    • 2003
  • The best way in order to protect the system resource front Distributed Denial of Service(DDoS) attack is cut off the source of DDoS attack with path retracing the packet which transferred by attacker. Packet marking method can not use ICMP cause by using IP identifier field as marking field. And in case of increasing the number of router, retracing method using router ID has the size of marking field's increasing problem. In this paper, we propose that retracing method can be available the ICMP using marking field for option field in IP header and the size of making Held do not change even though the number of router is increased using the mark information which value obtained through XOR operation on IP address.

  • PDF

Business Performance Impact Caused by Display Restriction of Customer Information Identifier: Focusing on Domestic Securities Business (고객정보 식별자 표시제한으로 인한 업무영향에 관한 연구 - 국내 증권 업무를 중심으로 -)

  • Shin, Sangchul;Lee, Youngjai
    • The Journal of Information Systems
    • /
    • v.22 no.4
    • /
    • pp.49-69
    • /
    • 2013
  • Recently, enterprises have reinforced security control in order to prevent infringement of personal information and abuse of customer information by insiders. However, the reinforcement of security control by enterprises makes it difficult for internal users to perform business by using a business information system. There is, therefore, a need for research on various fields, which makes it possible to establish an appropriate security control policy while minimizing an impact on business. The present research verifies and analyzes an impact on difficulty in business of internal users using customer information, which is caused by security control performed by display restriction on customer information identifiers. The present research is intended to academically develop a technique for statistically analyzing an impact degree and a causal relationship between security control and an impact on business, which is a dichotomous variable, and to practically contribute to the establishment of an efficient security policy in consideration of an impact on business when an enterprise applies security control. A research target was internal business information systems of domestic securities enterprises, data was collected by questionnaire, and verification/analysis was performed by logistic regression analysis.