• Title/Summary/Keyword: Resource Discovery

Search Result 151, Processing Time 0.024 seconds

Deployment of BIBFRAME as a New Bibliographic Framework in Linked Data (링크드 데이터 환경에서의 서지기술형식 BIBFRAME과 그 활용에 대한 고찰)

  • Park, Ok Nam;Oh, Jung Sun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.235-263
    • /
    • 2014
  • Library of Congress introduced BIBFRAME as a new bibliographic framework to enhance web accessibility of bibliographic records and their integration to Web of data. This study introduces BIBFRAME model and its current status, reviews BIBFRAME classes and properties, and presents a mapping between MARC21 and BIBFRAME. The study aims to help the understanding the deployment of BIBFRAME in bibliographic description. BIBFRAME categorizes bibliographic entities into Work-Instance, and employs RDF/XML and URIs to identify resources and specify semantics of the resources on the Web. It also suggests an Annotation entity to provide additional information produced by users and external organizations. BIBFRAME is significant in that it presents a new paradigm of bibliographic description and expands users' information discovery in the context of Linked Data. Continuous researches are required to support its content model agnostic application to diverse resource type, which may entail a modification of BIBFRAME model and vocabulary. It also calls for guidelines for using the complicated vocabulary in a coherent way.

Processing of ρ-intersect Operation on RDF Data Using Suffix Array (RDF 데이터에서 접미사 배열을 이용한 ρ-intersect 연산의 처리)

  • Kim, Sung-Wan;Kim, Youn-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.7
    • /
    • pp.95-103
    • /
    • 2011
  • The actual utilization of Semantic Web technology which aims to provide more intelligent and automated service for information retrieval over the Web becomes gradually reality. RDF is widely used as the one of standard formats to present and manage the voluminous data on the Web. Efficient query processing on RDF data, therefore, is one of the ongoing research topics. Retrieving resources having a specific association from a given resource is the typical query processing type and several researches for this have done. However the most of previous researches have not fully considered discovering the complex relationship among resources such as returning the association between resources as the query processing result. This paper introduces the indexing and query processing for ${\rho}$-intersect operation which is one of the semantic association retrieval types. It includes an indexing scheme using suffix array and optimal processing approaches for handling ${\rho}$-intersect operation. The experimental evaluations shows that the average execution times for the proposed approach is 3~7 times faster than the previous approach.

KARE Genomewide Association Study of Blood Pressure Using Imputed SNPs

  • Hong, Kyung-Won;Lim, Ji-Eun;Kim, Young-Jin;Cho, Nam-H.;Shin, Chol;Oh, Berm-Seok
    • Genomics & Informatics
    • /
    • v.8 no.3
    • /
    • pp.103-107
    • /
    • 2010
  • The imputation of untyped SNPs enables researchers to validate association findings across SNP arrays and also enables them to test a large number of SNPs to reveal the fine structure of the association peak, facilitating interpretation of the results and the location of causal polymorphisms. In this study, we applied the imputation method to a genomewide association study and recapitulated the previously associated gene loci of blood pressure traits in Korean cohorts. A total of 1,827,004 SNPs were imputed by the IMPUTE program, and we conducted a genomewide association study for systolic and diastolic blood pressure. While no SNPs passed the Bonferroni correction p-value (p=$2.74{\times}10^{-8}$ for 1,827,004 SNPs), 12 novel loci for systolic blood pressure and 16 novel loci for diastolic blood pressure were detected by imputed SNPs, with $10^{-5}$ < p-value < $10^{-4}$. Moreover, 7 regions (ATP2B1, 10p15.1, ARHGEF12, ALX4, LIPC, 7q31.1, and TCF7L2) out of 14 genetic loci that were previously reported revealed that the imputed SNPs had lower p-values than those of genotyped SNPs. Moreover, a nonsynonymous SNP in the CSMD1 gene, one of the 14 genes, was found to be associated with systolic blood pressure (p<0.05). These results suggest that the imputation method can facilitate the discovery of novel SNPs as well as enhance the fine structure of the association peak in the loci.

Defining and Discovering Cardinalities of the Temporal Workcases from XES-based Workflow Logs

  • Yun, Jaeyoung;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.77-84
    • /
    • 2019
  • Workflow management system is a system that manages the workflow model which defines the process of work in reality. We can define the workflow process by sequencing jobs which is performed by the performers. Using the workflow management system, we can also analyze the flow of the process and revise it more efficiently. Many researches are focused on how to make the workflow process model more efficiently and manage it more easily. Recently, many researches use the workflow log files which are the execution history of the workflow process model performed by the workflow management system. Ourresearch group has many interests in making useful knowledge from the workflow event logs. In this paper we use XES log files because there are many data using this format. This papersuggests what are the cardinalities of the temporal workcases and how to get them from the workflow event logs. Cardinalities of the temporal workcases are the occurrence pattern of critical elements in the workflow process. We discover instance cardinalities, activity cardinalities and organizational resource cardinalities from several XES-based workflow event logs and visualize them. The instance cardinality defines the occurrence of the workflow process instances, the activity cardinality defines the occurrence of the activities and the organizational cardinality defines the occurrence of the organizational resources. From them, we expect to get many useful knowledge such as a patterns of the control flow of the process, frequently executed events, frequently working performer and etc. In further, we even expect to predict the original process model by only using the workflow event logs.

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

Evaluation of Genetic Characteristics and Essential oil Composition of Coriander (Coriandrum sativum L.)

  • Tae Hee Kim;Song Mun Kim;Ki Yeon Lee;Kyung Dae Kim;Jae Hee Lee;Eun Ha Jang;Jin Gwan Ham
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.320-320
    • /
    • 2022
  • Coriander(Coriandrum sativum L.) belongs to the family Umbelliferae/Apiaceae. It is cultivated as a spice and medicinal herb around the world, including its leaves and seeds. Coriander leaves have soft and fragrant, so they can be used in cuisines such as China, Mexico, and, Southeast Asia. Coriander leaves contain a high amount of vitamin C, carotene, and multiple polyphenols. Coriander essential oils and extracts have various chemical components and are known to have antioxidant, antibacterial, and antifungal activities. This study was carried out for resource discovery, propagation, and DB construction of aromatic plants. In order to evaluate the genetic characteristics, 30 kinds of Coriander seeds were supplied from the Center for Genetic Resources. The evaluation of characteristics of the basal part leaf number, leaf shape, and plant height was investigated. Also, Essential oils extract from various parts of plants including the leaves, flowers, and steam isolated by simultaneous distillation extraction(SDE) apparatus. In the results, heights showed growing to 70 cm over and basal part leaf number 0 to7. The leaves are variable, they are measured according to leaves incisions, and most of the included incision. The qualitative analysis of EOs was performed using gas chromatography-mass spectrometry. EOs had various chemical compositions. Major compounds were trans-2-Decenal, linalool, decanal, 2-Dodecenal, 13-Tetradecanal, 2-Undecenal.

  • PDF

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A study on the Human Resources Development Strategy for Korean Companies in China (중국진출 한국기업의 현지인력 개발 전략에 관한 연구 - 중국 하얼빈지역 진출기업을 중심으로 -)

  • Kim, Jong-Deuk;Kim, Jang-Ho
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.29-52
    • /
    • 2012
  • Since diplomatic relations with China in 1992, many Korean companies have entered into China and that expansion is currently continuing. But now, many of Korean enterprises tend to withdraw and return to the domestic, this is because that major factors are too much fast increasing in labor costs and the difficulty of local workforce management. In this study, it is researched that the type of human resource management of Korean firms entering into Heilongjiang Province, Harbin and the similarities and differences were investigated by comparing the form of personnel management of existing areas and Harbin area, and then this study was conducted the survey and interview of domestic companies operating in Harbin, to pursuit the efficient way to manage the workforce development and management strategies. The result of researches and workforce development strategies of entering firms are as follows; First, it is required to establish a human resource discovery system for entering companies in focusing on managerial work ability and on blue-collar which is separated by professional and technical experts and a simple blue-collar people. Second, it is required to entering companies that they have to grow up the promotion and exchange of the Department of Korean Studies in Harbin and have to build the industry and universities training programs to promote needed experts, and have to establish the expert pool systems to support the flexible labor supply.

  • PDF

Changes in the work arrangements and new lifestyles after the COVID-19 pandemic: Evidence based on survey data from the Japanese Cabinet Office (코로나19 팬데믹 이후 일하는 방식의 변화와 새로운 라이프 스타일의 탐색 -코로나19 팬데믹 이후에 실시된 일본 내각부 조사자료를 중심으로-)

  • Lee, Sujin
    • Journal of Family Resource Management and Policy Review
    • /
    • v.26 no.3
    • /
    • pp.87-106
    • /
    • 2022
  • This study compared working arrangements, interest in rural migration, and life satisfaction in Japan in two periods: immediately after the COVID-19 (2019 coronavirus disease) pandemic and two years after the global outbreak. The comparison was based on data from the "Survey on Changes in Attitudes and Behaviors in Daily Life under the Influence of Novel Coronavirus Infection, 2020, 2021", which was conducted four times by the Japanese Cabinet Office directly after the COVID crisis (May 2020 and September 2021). The respondents who participated in both the first and fourth surveys were employed individuals aged 20 years or older. The results are as follows. First, the proportion of Tokyo residents engaging in telework immediately after the COVID-19 pandemic was 36.1%, which is higher than the levels observed nationwide. Second, individuals involved in telework and those working under flexible arrangements were more highly interested in moving to rural areas than those who commute to work. Third, among people engaged in telework, life satisfaction diminished immediately after the COVID-19 pandemic compared with the period before this crisis. After two years of the pandemic, however, life satisfaction among this group improved. Changes in working arrangements due to the pandemic can be expected to promote migration, as well as help revitalize regions and encourage the discovery of new lifestyles.

A whole genome sequence association study of muscle fiber traits in a White Duroc×Erhualian F2 resource population

  • Guo, Tianfu;Gao, Jun;Yang, Bin;Yan, Guorong;Xiao, Shijun;Zhang, Zhiyan;Huang, Lusheng
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.33 no.5
    • /
    • pp.704-711
    • /
    • 2020
  • Objective: Muscle fiber types, numbers and area are crucial aspects associated with meat production and quality. However, there are few studies of pig muscle fibre traits in terms of the detection power, false discovery rate and confidence interval precision of whole-genome quantitative trait loci (QTL). We had previously performed genome scanning for muscle fibre traits using 183 microsatellites and detected 8 significant QTLs in a White Duroc×Erhualian F2 population. The confidence intervals of these QTLs ranged between 11 and 127 centimorgan (cM), which contained hundreds of genes and hampered the identification of QTLs. A whole-genome sequence imputation of the population was used for fine mapping in this study. Methods: A whole-genome sequences association study was performed in the F2 population. Genotyping was performed for 1,020 individuals (19 F0, 68 F1, and 933 F2). The whole-genome variants were imputed and 21,624,800 single nucleotide polymorphisms (SNPs) were identified and examined for associations to 11 longissimus dorsi muscle fiber traits. Results: A total of 3,201 significant SNPs comprising 7 novel QTLs showing associations with the relative area of fiber type I (I_RA), the fiber number per square centimeter (FN) and the total fiber number (TFN). Moreover, one QTL on pig chromosome 14 was found to affect both FN and TFN. Furthermore, four plausible candidate genes associated with FN (kinase non-catalytic C-lobe domain containing [KNDC1]), TFN (KNDC1), and I_RA (solute carrier family 36 member 4, contactin associated protein like 5, and glutamate metabotropic receptor 8) were identified. Conclusion: An efficient and powerful imputation-based association approach was utilized to identify genes potentially associated with muscle fiber traits. These identified genes and SNPs could be explored to improve meat production and quality via marker-assisted selection in pigs.