In this research, a proposed Dynamic Virtual Ontology using Tags (DyVOT) supports dynamic search of resources depending on user's requirements using tags from social web driven resources. It is general that the tags are defined by annotations of a series of described words by social users who usually tags social information resources such as web-page, images, u-tube, videos, etc. Therefore, tags are characterized and mirrored by information resources. Therefore, it is possible for tags as meta-data to match into some resources. Consequently, we can extract semantic relationships between tags owing to the dependency of relationships between tags as representatives of resources. However, to do this, there is limitation because there are allophonic synonym and homonym among tags that are usually marked by a series of words. Thus, research related to folksonomies using tags have been applied to classification of words by semantic-based allophonic synonym. In addition, some research are focusing on clustering and/or classification of resources by semantic-based relationships among tags. In spite of, there also is limitation of these research because these are focusing on semantic-based hyper/hypo relationships or clustering among tags without consideration of conceptual associative relationships between classified or clustered groups. It makes difficulty to effective searching resources depending on user requirements. In this research, the proposed DyVOT uses tags and constructs ontologyfor effective search. We assumed that tags are extracted from user requirements, which are used to construct multi sub-ontology as combinations of tags that are composed of a part of the tags or all. In addition, the proposed DyVOT constructs ontology which is based on hierarchical and associative relationships among tags for effective search of a solution. The ontology is composed of static- and dynamic-ontology. The static-ontology defines semantic-based hierarchical hyper/hypo relationships among tags as in (http://semanticcloud.sandra-siegel.de/) with a tree structure. From the static-ontology, the DyVOT extracts multi sub-ontology using multi sub-tag which are constructed by parts of tags. Finally, sub-ontology are constructed by hierarchy paths which contain the sub-tag. To create dynamic-ontology by the proposed DyVOT, it is necessary to define associative relationships among multi sub-ontology that are extracted from hierarchical relationships of static-ontology. The associative relationship is defined by shared resources between tags which are linked by multi sub-ontology. The association is measured by the degree of shared resources that are allocated into the tags of sub-ontology. If the value of association is larger than threshold value, then associative relationship among tags is newly created. The associative relationships are used to merge and construct new hierarchy the multi sub-ontology. To construct dynamic-ontology, it is essential to defined new class which is linked by two more sub-ontology, which is generated by merged tags which are highly associative by proving using shared resources. Thereby, the class is applied to generate new hierarchy with extracted multi sub-ontology to create a dynamic-ontology. The new class is settle down on the ontology. So, the newly created class needs to be belong to the dynamic-ontology. So, the class used to new hyper/hypo hierarchy relationship between the class and tags which are linked to multi sub-ontology. At last, DyVOT is developed by newly defined associative relationships which are extracted from hierarchical relationships among tags. Resources are matched into the DyVOT which narrows down search boundary and shrinks the search paths. Finally, we can create the DyVOT using the newly defined associative relationships. While static data catalog (Dean and Ghemawat, 2004; 2008) statically searches resources depending on user requirements, the proposed DyVOT dynamically searches resources using multi sub-ontology by parallel processing. In this light, the DyVOT supports improvement of correctness and agility of search and decreasing of search effort by reduction of search path.
Purpose - Because of the emphasis on the necessity of academic-industrial cooperation between companies and universities, there are various ongoing academic-industrial cooperation programs led by the government. As government actively supports such cooperation as policy,and universities vitalize new technology development, academic-industrial cooperation between companies and universities is being recognized as an important growth engine for companies the competitiveness of academic-industrial cooperation is also attracting more interest. The government has vitalized human resource fostering, practical R&D, and technology transfer to companies since 2012 by executing a "leading university fostering project for academic-industrial cooperation." Based on an organic interlink among universities, industry, and research institutes, the government also created and is promoting several models of such cooperation between companies and universities to support shared growth of industry and local universities. The purpose of academic-industrial cooperation is growth and benefit fromtechnology development, technical cooperation, and technology transfer between companies and universities. Research design, data, and methodology - As more academic-industrial cooperation efforts are ledby companies due to the limitation in technology-focused commercialization cooperation, the academic-industrial cooperation system became fragmented and it is losing the potential for future advancement. Specifically, as differences between universities grow, academic-industrial cooperation between companies and universities based on new technology from universities is finding difficulty advancing,while systematic support from companies to enhance the performance of businesses created by academic-industrial cooperation is also insufficient. Accordingly, this study established a growth model for the advancement of academic-industrial cooperation between companies and universities and suggested a plan to strengthen the competitiveness and promote the future advancementof academic-industrial cooperation between companies and universities by analyzing the current situation of such cooperation and diagnosing its issues. Results - This study explored the concept and current status of academic-industrial cooperation relationships and analyzed related issues. For such cooperative organizations to be competitive, the employment environment of professional human resources for academic-industrial cooperation should be improved and measures to secure professional resources should be taken as early as possible. Though the academic-industrial cooperation now is being led by government, there is a limitation based on business models, which require creation of profit; however, an academic-industrial cooperation model still cannot stand alone without the support of government. This study also pointed out that a having only a plan to build competitiveness of companies and universities for academic-industrial cooperation is not sufficient. Conclusions - In order to increase the competitiveness of academic-industrial cooperation, a detailed growth-sharing model for academic-industrial cooperation should be developed, and there should be more joint development processes for the advancement of such cooperation in which the need for technology development can be verified in advance. In addition, beyond focusing on technology-focused academic-industrial cooperation, a network between companies and universities searching for ideas for academic-industrial cooperation in the fields of human and social aspects should be created. A new academic-industrial model linking current cooperation between companies and universities to the local area should be built based on such academic-industrial cooperation in human and social fields.
This paper analyzes the under-researched field of the characteristics of th Chosun private railway, such as laws, systems, human resources, and subsidies associated with this railway, in an effort to increase our understanding of these characteristics. It was found that the private railway shared strong identity resemblance with a national project, as it served to assist the roles of the main national railway. General patterns of change of the company indicate that the private railway received increased subsidies consequent to the amendment of a related law and that it was strongly influenced by Japan's railway policies. The private railway system during the Chosun period more subsidies than those administered by Japan, and they tended to depend on fund raising for external capital. A tendency of many board members to be from the Chosun bureau was also noted. Profits in the private railway system were relatively low compared to those of the national railway such that the deficits were supplemented by the subsidies redeived. Based on corroborating examples, the private railway system can be said to have been an organization that had strong connections with national projects. It was especially related to regional industries according to an examination of the distribution of lines, which shows that most assisted the main railway or coincided with regions undergoing industrial development. Typically, northern areas were for resource development while southern areas were for agricultural production and/or passenger transportation. The company carried dual traits as it operated as a subsidiary enterprise for peripheral profit while also playing a role in transportation.
Recently software agent has been studied as a new abstraction unit of software engineering. The agent with autonomous, adaptability and cooperation attribute is accepted as a new abstraction unit especially in distributed systems, open systems, and complex systems. However, the progress of agent research has been slow and the realization of agent programming language seems to be far distant. Because the properties of agent are diverse, the opinions of researchers can not converge to one. In this situation, software agent framework is accepted more realistic alternative solution. However the knowledge for its development doesn't have been shared among developers. So they often have to make same errors. We will help sharing of knowledge and experience by using pattern language which has been used in object technology for long times. This paper proposes a reactive agent framework pattern language and validates it based on ATAM[l] The increase of such indirect experience can reduce the waste of resource by preventing the same try and error. So agent framework developers are able to concentrate on more essential issues. Finally quality of software agent framework will be increased.
Journal of the Korean Institute of Intelligent Systems
/
v.18
no.5
/
pp.724-729
/
2008
This paper presents the calculation of the required bandwidth of common frequency bandwidth applying queueing theory for maximizing the efficiency of frequency resource of WPAN(Wireless Personal Area Network) based Digital acoustic and communication devices. It assumed that LBT device(ZigBee) and FH devices (DCP, RFID and Bluetooth) coexist in the common frequency band for WPAN based Digital acoustic and communication devices. Frequency hopping (FH) and listen before talk (LBT) have been used for interference avoidance in the short range device (SRD). The LBT system transmits data after searching for usable frequency bandwidth in the radio wave environment. However, the FH system transmits data without searching for usable frequency bandwidth. The queuing theory is employed to model the FH and LBT system, respectively. As a result, the throughput for each channel was analyzed by processing the usage frequency and the interval of service time for each channel statistically. When common frequency bandwidth is shared with SRD using 250mW, it was known that about 35 channels were required at the condition of throughput 84%, which was determined with the input condition of Gaussian distribution implying safety communication. Therefore, the common frequency bandwidth is estimated with multiplying the number of channel by the bandwidth per channel. These methodology will be useful for the efficient usage of frequency bandwidth.
공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.
Kim, Joo Ho;Park, Moonseo;Lee, Hyun-Soo;Hyun, Hosang
Korean Journal of Construction Engineering and Management
/
v.19
no.2
/
pp.50-60
/
2018
Recently, modular construction method has been widely applied to projects with repetitive processes including dormitory, the residential facility, and the hotel construction due to reduced labor input and shortened construction schedule. Generally, about 40% of total on-site construction cost excluding unit installation cost, is put on exterior finishing work, and thus management of finishing work is deemed important in maintaining the targeted schedule and cost. Since limited equipment is shared so that subsequent activities are not affected while carrying out on-site installation and finishing work, lifting plan becomes more important for modular projects with greater portion of finishing work load. In this regard, tower crane operation plan may take the form of a single cycle or multiple cycles in which equipment efficiency can be affected. However, difficulties exist in evaluating alternatives to tower crane operation plans supporting unit installation and finishing work. Therefore, this study aims to evaluate the alternative of tower crane operation method according to the cyclic period setting in modular building site to determine the effect on T/C uptime and process by parameterizing lifting time for unit and exterior finishing material, lift cycle for unit and exterior finishing material and time required for finishing work. Accordingly, this study develops a simulation model that can increase the tower crane efficiency by controlling the work speed. An academic contribution of this study is to suggest a resource leveling method applying the concept of lifting cycle, and further is expected to be managerially used as a basis for an alternative evaluation of equipment plan.
The third industrial revolution, characterized by factory automation and informatization, are moving toward the fourth industrial revolution which is the era of superintelligence and supernetworking through rapid technology innovation. The most important resources in the fourth industrial revolution are information or data since the most of industrial and economic activities will be affected by information in the fourth industrial revolution. Therefore we can expect that more information will be utilized, shared and transfered through the networks or systems in real time than before so the significance of information management and security will also increase. As the importance of information resource management and security which is the core of the fourth industrial revolution increases, the threats on information security are also growing so security incidents such as data breeches and accidents take place more often. Various and thorough solutions are highly needed to protect information resources from security risks because information accidents or breaches seriously damage brand image and cause huge financial damage to organization. The purpose of this study is to research general trends on data breaches and accident that can be serious threat of information security. Also, we will provide resonable solutions to protect data from nine attack patterns or other risk factors after figuring out each characteristic of nin attack patterns in data breaches and accidents.
The biological resources research data around the world are not only very critical themselves but should be shared and utilized. Up to now, the biological resources have been compiled and managed individually depending on the purpose and characteristics of the study without any clear standard. So, in this study, the data reference model would be suggested which is applicable in the phase ranging from the start of the construction of the information system and which can be commonly used. For this purpose, the data model of the related information system would be expanded based on the domestic and foreign standards and data control policy so that the data reference model which can be commonly applicable to individual information system would be developed and its application procedure would be suggested. In addition, for the purpose of proving the excellence of the suggested data reference model, the quality level would be verified by applying the Korgstie's data model evaluation model and its level of data sharing with the domestic and foreign standards would be compared. The test results of this model showed that this model is better than the conventional data model in classifying the data into 4 levels of resources, target, activities and performances and that it has higher quality and sharing level of data in the data reference model which defines the derivation and relation of entity.
In order to elucidate the precise phylogenetic relationships of Korean wild boar (Sus scrofa coreanus), a partial mtDNA D-loop region (1,274 bp, NC_000845 nucleotide positions 16576-1236) was sequenced among 56 Korean wild boars. In total, 25 haplotypes were identified and classified into four distinct subgroups (K1 to K4) based on Bayesian phylogenetic analysis using Markov chain Monte Carlo methods. An extended analysis, adding 139 wild boars sampled worldwide, confirmed that Korean wild boars clearly belong to the Asian wild boar cluster. Unexpectedly, the Myanmarese/Thai wild boar population was detected on the same branch as Korean wild boar subgroups K3 and K4. A parsimonious median-joining network analysis including all Asian wild boar haplotypes again revealed four maternal lineages of Korean wild boars, which corresponded to the four Korean wild boar subgroups identified previously. In an additional analysis, we supplemented the Asian wild boar network with 34 Korean and Chinese domestic pig haplotypes. We found only one haplotype, C31, that was shared by Chinese wild, Chinese domestic and Korean domestic pigs. In contrast to our expectation that Korean wild boars contributed to the gene pool of Korean native pigs, these data clearly suggest that Korean native pigs would be introduced from China after domestication from Chinese wild boars.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.