• Title/Summary/Keyword: Information Provision

Search Result 1,403, Processing Time 0.026 seconds

A Study on Social Sharing of Scholarly Information Resources: Focusing on Laypeople's Information Needs and Behaviors (학술정보자원의 사회적 공유에 관한 연구 - 일반인의 정보요구와 행위를 중심으로 -)

  • Kim, Chohae;Park, Ji-Hong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.2
    • /
    • pp.57-82
    • /
    • 2022
  • Today, despite the increase in professional knowledge-related information needs of citizens, the expansion of citizen participatory research in academia, and the provision of information services for the professional knowledge, there are still difficulties in access to scholarly information resources by laypeople. Focusing on this problem, this study investigates laypeople's scholarly information needs and behaviors through a questionnaire survey. By examining the search and use behaviors of scholarly information resources, and the perception of the need to support the utilization of them, this study analyzes the degree and pattern of social sharing of scholarly information resources beyond the scholarly community. This study is significant in that it expands the range of users in traditional scholarly communication and emphasizes the need to support them to access and use scholarly information resources.

A Study on the Facility Design for People with Disabilities that Considers the Preservation Environment of Castle Heritage - Focused on the Castle Heritage in England - (성곽문화재 보존환경을 고려한 장애인 편의시설 디자인에 관한 연구 - 영국 성곽문화재를 중심으로 -)

  • Lee, Keon ha;Lee, Woong gu;Kim, Young eun
    • KIEAE Journal
    • /
    • v.12 no.5
    • /
    • pp.63-70
    • /
    • 2012
  • In order to set the direction of providing facility for the utilization of castle heritage, as well as to establish the method for securing access and determine installation criteria in consideration of preservation environment, an analysis was carried out on the cases of having secured access for people with disabilities in England for the advanced utilization of castle heritage. As the result of the analysis, the planning factors of the facility for people with disabilities in England for the utilization of castle heritage were deduced as follows: 1) The plan for facility was focused on the disabled using wheelchairs and visually impaired persons, rather than on services for hearing-impaired persons and people with learning disability. 2) As for audience movement line plan, regular route was used for audience movement line to lead them in a single direction. 3) As for the provision of prior access information, 3 stepwise access grades were established for the facility information plan of heritage. 4) As for information service by disability type, models were provided; and complementary explanation was provided by using text, drawing, picture, video and voice. 5) Rest spaces were secured where audience could look out upon castle heritage. For the utilization of castle heritage, it is necessary to develop planning factors of the facility design for people with disabilities according to its characteristics.

IPv6 Networking with Subnet ID Deprecated

  • Kim, Young Hee;Kim, Dae Young;Park, Jong Won
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.2
    • /
    • pp.49-57
    • /
    • 2017
  • This paper proposes a new IPv6 networking paradigm as a counter answer to the rationale for locator/identifier separation. Instead of involving separate number spaces each for node identifiers and locators, the context of the IP address as a node identifier alone is utilized and no additional locators are incorporated. That is, there are only node addresses and no locators, and location information is indirectly derived from neighbor relations between nodes. In order to accomplish this, no subnet IDs are utilized; the ID value is set to zero for all subnets. The paper details how to construct this paradigm through novel choice of operational policies in various IPv6 protocols and some trivial modifications. Especially, inherent provision of intra-domain node- as well as subnet-mobility by use of standard link-state intra-domain routing protocols is discussed. A number of important advantages of this paradigm over the canonical IPv6 networking and various known solutions of locator/identifier separation are discussed. Tailoring for multi-area domains and IPv4 is left for further study.

An Exploratory Study for Utilization of Copyrighted Public Records and Provision of Customer-Centered Services (공공저작물 활용 및 수요자 중심의 서비스 제공을 위한 탐색적 연구 : 공공저작물 제공사이트를 중심으로)

  • Ryu, Me Ae;Ahn, Tae Ho
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.223-245
    • /
    • 2016
  • This study defines copyrighted public records in broad sense including open government data and public domain except for some private records. Additionally, this study aims to investigate improvement plan for maximizing utilization of copyrighted public records in web-sites using customer side, without consideration of supplier side. For this purpose, qualitative study method was used with grounded theory on analyzed problems from literature review and case study. Literature review was concentrated on definition of open data and abroad utilization indicators whereas case study analyzed current situation of four web-sites providing copyrighted public records. Converged opinions from in-depth interview and various statistical data was analyzed as a basis for grounded theory, then a paradigm model was constructed and future improvement plans were presented. The findings imply that opening of copyrighted public records is not just important for quantitative results, rather it requires qualitative improvement providing latest credible information that is consistent with the demand of the customer. Thus, development of service platform and business models for copyrighted public records are urgent task.

Extending Sensor Registry System Using Network Coverage Information (네트워크 커버리지를 이용한 센서 레지스트리 시스템 확장)

  • Jung, Hyunjun;Jeong, Dongwon;Lee, Sukhoon;Baik, Doo-Kwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.425-430
    • /
    • 2015
  • The Sensor Registry System(SRS) provides sensor metadata to a user for instant use and seamless interpretation of sensor data in a heterogeneous sensor network environment. The existing sensor registry system cannot provide sensor metadata in case that the network connection is not available or is unstable. To resolve the problem, this paper proposes an extension of sensor registry system using network coverage information. The extended system sends a set of sensor metadata to the user by using network coverage open data (mobile vendors, signal strength, communication type). The extended SRS proposed in this paper supports a safer sensor metadata provision than the existing SRS, and it thus improves the quality of application services.

Human Activity Recognition Using Spatiotemporal 3-D Body Joint Features with Hidden Markov Models

  • Uddin, Md. Zia;Kim, Jaehyoun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2767-2780
    • /
    • 2016
  • Video-based human-activity recognition has become increasingly popular due to the prominent corresponding applications in a variety of fields such as computer vision, image processing, smart-home healthcare, and human-computer interactions. The essential goals of a video-based activity-recognition system include the provision of behavior-based information to enable functionality that proactively assists a person with his/her tasks. The target of this work is the development of a novel approach for human-activity recognition, whereby human-body-joint features that are extracted from depth videos are used. From silhouette images taken at every depth, the direction and magnitude features are first obtained from each connected body-joint pair so that they can be augmented later with motion direction, as well as with the magnitude features of each joint in the next frame. A generalized discriminant analysis (GDA) is applied to make the spatiotemporal features more robust, followed by the feeding of the time-sequence features into a Hidden Markov Model (HMM) for the training of each activity. Lastly, all of the trained-activity HMMs are used for depth-video activity recognition.

Customized Web Search Rank Provision (개인화된 웹 검색 순위 생성)

  • Kang, Youngki;Bae, Joonsoo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.2
    • /
    • pp.119-128
    • /
    • 2013
  • Most internet users utilize internet portal search engines, such as Naver, Daum and Google nowadays. But since the results of internet portal search engines are based on universal criteria (e.g. search frequency by region or country), they do not consider personal interests. Namely, current search engines do not provide exact search results for homonym or polysemy because they try to serve universal users. In order to solve this problem, this research determines keyword importance and weight value for each individual search characteristics by collecting and analyzing customized keyword at external database. The customized keyword weight values are integrated with search engine results (e.g. PageRank), and the search ranks are rearranged. Using 50 web pages of Goolge search results for experiment and 6 web pages for customized keyword collection, the new customized search results are proved to be 90% match. Our personalization approach is not the way that users enter preference directly, but the way that system automatically collects and analyzes personal information and then reflects them for customized search results.

Secure OTP Smart Card Authentication Protocol for Denial of Service (서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.201-206
    • /
    • 2007
  • Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.

  • PDF

A Study of Integration Modelling for Context-aware Service Based on Ontology (온톨로지 기반의 상황인지 서비스를 위한 통합 모델에 관한 연구)

  • Hwang, Chi-Gon;Yoon, Chang-Pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.253-255
    • /
    • 2015
  • In a variety of network environments, the provision of context-aware services, it is difficult to integrate and share because of the heterogeneity problem between distributed data. This paper proposes the integration model using the ontology as a method for solving the above. This uses an ontology to integrate the context-aware informations that are collected. The ontology is generated by the acquisition, semantic analysis and inference of the metadata of the context-aware information. This is the basis of the analysis and analysis of the additional system. Accordingly, this paper studies ways to create an ontology and apply them. The advantage of the proposed scheme can be used without modifying the existing tools, it is possible to easily perform the expansion and consolidation of the system.

  • PDF

Fast Handover Provision Mechanism through Reduction of CoA Configuration Time (CoA 설정 시간 단축을 통한 빠른 핸드오버 제공 메카니즘)

  • Choi, Ji-Hyoung;Lee, Dong-Chul;Kim, Dong-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.79-82
    • /
    • 2007
  • Recently the diffusion of the advancement of mobile communication technique and mobile terminal increased, The users were demanded seamless services when carrying and moving. It proposed the FMIPv6 (Fast Handoff for Mobile IPv6) from the IETF like this meeting this requirement. The handover procedure of the FMIPv6 causes to defecate with movement detection, new CoA configuration and binding update. But, the delay occurs from each process, when the DAD(Duplicate Address Detection) of the CoA executing, the big delay occurs. This paper proposes a scheme of delay reduction, it omits DAD process and stores in the AR(Access Router) relates in the CoA of the mobile terminal information.

  • PDF