• Title/Summary/Keyword: Information Exchange Standard

Search Result 482, Processing Time 0.027 seconds

eMRA: Extension of MRA Considering the Relationships Between MDR Concepts (eMRA: MDR의 개념간 관계성을 고려한 MRA 확장)

  • Joo, Young-Min;Kim, Jangwon;Jeong, Dongwon;Baik, Doo-Kwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.3
    • /
    • pp.161-172
    • /
    • 2013
  • Metadata registry (MDR) is the international standard, developed by ISO/IEC for exchange and sharing data between databases. Many MDR systems are used in diverse domains such as medical service, bibliography, environment for sharing and integrating data. However, those systems have different physical structures individually because the MDR standard defines only the metamodel for registering and storing metadata. It causes heterogeneity between the system structures and requires additional cost to maintain interoperability. ISO/IEC 13249-8 Metadata Registry Access (MRA) is developing as an international standard to provide a consistent access facility to data stored in different metadata registries. However, MRA does not consider the relationships between the concepts (classes) defined in the MDR specification. It causes that incorrect query results returned from MDR systems. It also requires additional cost of modeling and rewriting queries to reflect each physical model. Therefore, this paper suggests eMRA which considers the relationships between the concepts in MDR. The comparative evaluations are described to show the advantages of eMRA. eMRA has superior performance in query modeling and referential integrity than MRA defined by the relationship between the concept of MDR.

A Study on the Coordinate-based Intersection ID Composition System Using Space Filling Curves (공간 채움 곡선을 활용한 좌표 기반의 교차로 ID 구성 체계에 관한 연구)

  • Lee, Eun il;Park, Soo hong;Kim, Duck ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.6
    • /
    • pp.124-136
    • /
    • 2019
  • Autonomous driving at intersections requires assistance by exchanging traffic information between traffic objects due to the intersection of various vehicles and complicated driving environment. For this reason, traffic information exchange between adjacent intersections is required, but the node ID representing the intersection in the Korean standard node link system have limitations in updating intersections and identifying location information of intersections through IDs due to the configuration system including serial numbers. In this paper, we designed a coordinate-based intersection ID configuration system created by processing and merging two-dimensional coordinates of intersections to include location information in the intersection ID. In order to verify the applicability of the proposed intersection ID, we applied a new intersection ID to domestic intersections and confirmed that there are no duplicate values. Coordinate-based intersection ID reduces data size by 60% compared to existing node ID, and enables spatial queries such as searching for nearby intersections and extracting intersections in specific areas in the form of boxes without GIS tools. Therefore, coordinate-based intersection ID is expected to be more scalable and utilized than existing node ID.

Naming Scheme and Its Implementation for the Network Management of Content Centric Networking Integrated with SNMP (SNMP를 연동한 콘텐츠 중심 네트워킹 망관리를 위한 이름 구조 및 이의 구현)

  • Kim, Kwangsoo;Roh, Byeong-hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.5
    • /
    • pp.119-126
    • /
    • 2018
  • Content-centric networking (CCN) is a future Internet technology to reorganize the paradigm of end-to-end communication of the current IP-based Internet architecture into a content-based paradigm. In managing such new networks, the network management is one of the most important functions. The standard for typical network management in existing IP networks is Simple Network Management Protocol (SNMP). Though there have been several works to implement network management functions on CCN, they have their own limitations to apply them to pure CCN operational environments. The basic reason of the limitation is that existing methods operate in an IP-overlay structure, or do not support push-type information exchange. In this paper, we propose a new naming structure that can accommodate both pull and push-type SNMP methods for CCN network management with SNMP. Then, methods to support GET and TRAP methods as well as a SET method of SNMP in the pure CCN environment using the proposed naming structure are proposed. We implement the proposed method using CCNx, and construct a CCN network testbed to validate the effectiveness of the proposed method by monitoring appropriate exchange of SNMP messages over the testbed.

Research on Security System for Safe Communication in Maritime Environment (해상환경에서 안전한 통신을 위한 보안체계 연구)

  • Seoung-Pyo Hong;Hoon-Jae Lee;Young-Sil Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.21-27
    • /
    • 2023
  • As a means of helping ships navigate safely, navigational aids in operation in the maritime envirionment require periodic management, and due to the nature of the environment, it is difficult to visually check the exact state. As a result, the smart navigation aid system, which improves route safety and operational efficiency, utillizes expertise including sensors, communications, and information technology, unlike general route markings. The communication environment of the smart navigation aid system, which aims to ensure the safety of the navigators operating the ship and the safety of the ship, uses a wireless communication network in accordance with the marine environment. The ship collects the information necessary for the maritime environment on the land and operates. In this process, there is a need to consider the wireless communication security guideline. Basically, based on IHO S-100 a standard for facilitating data exchange and SECOM, which provides an interface for safe communication. This paper research a security system for safe communication in a maritime environment. The security system for the basic interface based on the document was presented, and there were some vulnerabillties to data exchange due to the wireless communication characteristics of the maritime environment, and the user authetication part was added considering the vulnerability that unauthorized users can access the service.

A Flexible Query Processing System for XML Regular Path Expressions (XML 정규 경로식을 위한 유연한 질의 처리 시스템)

  • 김대일;김기창;김유성
    • Journal of KIISE:Databases
    • /
    • v.30 no.6
    • /
    • pp.641-650
    • /
    • 2003
  • The eXtensible Markup Language(XML) is emerging as a standard format of data representation and exchange on the Internet. There have been researches about storing and retrieving XML documents using the relational database which has techniques in full growth about large data processing, recovery, concurrency control and so on. Since in previous systems same structure information and fundamental operation are used for processing of various kinds of XML queries, only some specific query can be efficiently processed not all types of query. In this paper, we propose a flexible query processing system. To process query efficiently, the proposed system analyzes regular path expression queries, and uses $\theta$-join operation using region numbering values to check ancestor-descendent relationship and equi-join operation using parent's region start value to check parent-child relationship. Thus, the proposed system processes efficiently XML regular path expressions. From the experimental results, we show that proposed XML query processing system is more efficient than previous systems.

A Secure Monitoring Mechanism for Short Distance Wireless Communication (근거리 무선 통신의 안전한 보안 모니터링 기법)

  • Seo, Dae-Hee;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.335-344
    • /
    • 2003
  • In accordance with the changes in the wireless communication environment, there has been a great need to satisfy the demand for diverse modes of information exchange. Various types of short-distance wireless communication technology have been developed and studied to meet this demand. Among them, Bluetooth and WLAN which has recently been acclaimed as the standard for short-distance wireless communication, has been the focus of many such studies. However, Bluetooth and WLAN has weaknesses in its security features when its in real services are applied to m-commerce. The purpose of this study is to propose techniques that affinity considers to item that is non-security enemy who is although there is no public secure division direct connection in peculiar environment of radio environment as well as limitation security enemy of short distance radio communication. Propose secure monitoring techniques for straggling device to user center also applying proposed way to Bluetooth and WLAN that are short distance communication representative technology based on item that is security enemy and item that is rain suity enemy.

Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements

  • Ali, Bakhtiar;Zamir, Nida;Ng, Soon Xin;Butt, Muhammad Fasih Uddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1594-1617
    • /
    • 2018
  • In this paper, we consider a spectrum access scenario which consists of two groups of users, namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio Networks (CCRNs). SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. A comparative study of CDA, PDA, CDA-SU, PDA-SU and PDA-ALL is conducted, and the strength of each scheme is highlighted. Different schemes may be suitable for different applications. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme.

A Crowdsourcing-Based Paraphrased Opinion Spam Dataset and Its Implication on Detection Performance (크라우드소싱 기반 문장재구성 방법을 통한 의견 스팸 데이터셋 구축 및 평가)

  • Lee, Seongwoon;Kim, Seongsoon;Park, Donghyeon;Kang, Jaewoo
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.7
    • /
    • pp.338-343
    • /
    • 2016
  • Today, opinion reviews on the Web are often used as a means of information exchange. As the importance of opinion reviews continues to grow, the number of issues for opinion spam also increases. Even though many research studies on detecting spam reviews have been conducted, some limitations of gold-standard datasets hinder research. Therefore, we introduce a new dataset called "Paraphrased Opinion Spam (POS)" that contains a new type of review spam that imitates truthful reviews. We have noticed that spammers refer to existing truthful reviews to fabricate spam reviews. To create such a seemingly truthful review spam dataset, we asked task participants to paraphrase truthful reviews to create a new deceptive review. The experiment results show that classifying our POS dataset is more difficult than classifying the existing spam datasets since the reviews in our dataset more linguistically look like truthful reviews. Also, training volume has been found to be an important factor for classification model performance.

A Study on the Aquisition and Use of Videorecordings in Digital Age - concerning for the public libraries in Pusan - (디지털 시대의 비디오자료 수집과 이용에 관한 연구 -부산지역 공공도서관을 중심으로-)

  • Kim Young-Kyu
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.2
    • /
    • pp.199-233
    • /
    • 1999
  • The purpose of this study is to activate the videorecordings in public libraries. The method of activation is to analysis of data which collected through questionnaire from respondent libraries. The results of the study are as follows : 1. The budget of videorecordings is absolutely short. 2 The acquisition policy of videorecordings is not planned because of short budget and little standard selection tool. 3. Most of public libraries wanted to exchange and use of videorecordings through interlibrary loan. 4. The subject of collected videorecordings was almost oriented to the education and motion pictures. 5. Specialized collection policy of public libraries in Pusan is not considered in videorecordings selection. 6. 87 percent of public libraries are not circulate videorecordings to the end-user. 7. Group watching planning of videorecordings in public libraries was done by monthly. 8. 70 percent of public libraries was not perform user reaction survey after watching. 9. 13 percent of public libraries has done the video tape recording of TV programming. 10. Most of public libraries had not a video to introduce themselves and user also had not a plan to create a video. 11. Most of public libraries recognized the copyright law but they wanted to reproduct the videorecordings for user with permission of authors.

  • PDF

A Study on the Examination Criteria and Case Study of Certificate of Origin in ISBP 745 (ISBP 745에서 원산지증명서의 심사기준과 사례분석)

  • Jeon, Soon-Hwan
    • International Commerce and Information Review
    • /
    • v.16 no.3
    • /
    • pp.203-221
    • /
    • 2014
  • ICC Banking Commission have approved the new version of ISBP for UCP 600(Publication 745) on April 17, 2013. This is called the ISBP 745. This revised version of ISBP includes a lot of shipping documents including bill of exchange. These shipping documents stated in the ISBP 745, especially the certificate of origin is the document necessary for carrying out the customs formalities in FTA era. Particularly, practitioners such as bankers, buyers and sellers, lawyers, freight forwarders and carriers in import and export transactions have to know the UCP 600 and ISBP 745 (2013) thoroughly in order to avoid the disputes due to discrepancies of the documents with the terms and conditions of the credit. The purpose of this article is to reduce the disputes occurred in the credit transaction by providing the examination criteria and case study of the certificate of origin in ISBP 745.

  • PDF