• Title/Summary/Keyword: copyright paper

Search Result 571, Processing Time 0.025 seconds

A Study on Methods of Implementation for the NRF Open Access Policy (한국연구재단 오픈액세스 정책 실행방안 연구)

  • Joung, KyoungHee;Lee, Jae Yun;Chung, EunKyung;Choi, Sanghee
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.255-286
    • /
    • 2020
  • This study aims to identify the methods of implementation for the 'National Research Foundation of Korea Open Access 2021(Plan)'. This study covers the methods of implementation in the three following core items: 1) developing the details on the amount, method, and procedures of APC support; 2) proposing methods for facilitating the transition of domestic Korean academic journals to open access journals; and 3) developing methods of entrusting papers to open access repositories. APC support should be guaranteed at a reasonable level. The average or median of APC values for the previous three years will be applied to set the upper limit for support each year. APC support will be provided when the paper is published to open access journals or transitioning journals to open access. Hybrid journals or dual access journals are not included. Support for open access publishing of academic journals in Korea during the transition period will be available for open access journals that have registered for CCL in KJCI or journals that have submitted their application for transitioning to open access. Publishing in hybrid, dual access or subscription-based journals must be accompanied by items related to copyright such as embargo. Research results will be used for the detailed implementation plan of 'NRF OA2021 (Plan)'. They will serve as the base data for the rapid, stable, and sustainable implementation of open access policy in NRF, addressing the Korean domestic academic journal publishing environment and the field of international academic communication.

A Study on the Characteristics of Non-Fungible Token(NFT) and Application Plans from the Digital Records Perspective : Focused on Transferable Records (전자기록 관점에서 본 대체 불가능한 토큰(NFT) 특성 및 활용 방안 이전 및 거래 가능한 기록을 중심으로)

  • Won, Joo-hye;So, Hyeon-Gi;Oh, Hyo-Jung
    • The Korean Journal of Archival Studies
    • /
    • no.73
    • /
    • pp.47-79
    • /
    • 2022
  • NFT is literally a 'non-fungible token', a digital file that records specific virtual assets on a blockchain. Events such as ownership of the asset and transaction history are recorded on the blockchain through the token transaction, so counterfeiting and falsification are impossible. Therefore, NFT is used as a tool that can uniquely represent a specific virtual asset. The main purpose of this paper is to examine the characteristics of NFT from a records management point of view and to find ways to use them, and focuses on digital records that have the characteristics of assets as digital works. For this purpose, we first examine the basic concept of NFT and the principle of ownership and proof of value as an asset for digital works. In addition, it was confirmed how the advantages of NFT were applied through NFT use cases in various fields, and in particular, areas related to audio-visual records such as art, music, sports, and fashion were focused on. Furthermore, by comparing the characteristics of digital records with those of NFT, factors applicable to electronic records were identified. Finally, the types of digital records that are expected to be effective in the application of NFT were identified, and the possibility of their use and discussion points for introduction in records management are presented.

A Study on the Need for Separation of Software Completeness Appraisal and Software Ready-made Appraisal (소프트웨어 완성도 감정과 기성고 감정 분리 필요성에 대한 고찰)

  • Kim, DoWan
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.11-17
    • /
    • 2021
  • In this study, problems of software completeness appraisal are pointed out and their solutions are presented by analyzing appraisal cases and judicial precedents. Completeness appraisal, ready-made appraisal, defect appraisal, and cost appraisal have been classified as and have been evaluated with extant software completeness appraisals. From a legal point of view, and in judicial precedents, however, there is a big difference between the definition of completeness and the completion rate. This is because the degree of completeness is evaluated under the premise that the software's development is complete, whereas the ready-made appraisal inspects the development progress of unfinished software. Often, in cases involving software completion rate, the total completion level is calculated by weighting each step of the software development process. However, completeness evaluations use the software's realization-operation as its sole criterion. In addition, another issue not addressed in existing software completeness appraisal cases is that there is no mention of who is responsible for software defects, whereas in case law, the responsible party is determined by finding who caused the dispute. In this paper, we systematically classify these problems, and present a novel evaluation method that separates software completeness evaluations from software completion evaluations.

Comparative Analysis of Self-supervised Deephashing Models for Efficient Image Retrieval System (효율적인 이미지 검색 시스템을 위한 자기 감독 딥해싱 모델의 비교 분석)

  • Kim Soo In;Jeon Young Jin;Lee Sang Bum;Kim Won Gyum
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.519-524
    • /
    • 2023
  • In hashing-based image retrieval, the hash code of a manipulated image is different from the original image, making it difficult to search for the same image. This paper proposes and evaluates a self-supervised deephashing model that generates perceptual hash codes from feature information such as texture, shape, and color of images. The comparison models are autoencoder-based variational inference models, but the encoder is designed with a fully connected layer, convolutional neural network, and transformer modules. The proposed model is a variational inference model that includes a SimAM module of extracting geometric patterns and positional relationships within images. The SimAM module can learn latent vectors highlighting objects or local regions through an energy function using the activation values of neurons and surrounding neurons. The proposed method is a representation learning model that can generate low-dimensional latent vectors from high-dimensional input images, and the latent vectors are binarized into distinguishable hash code. From the experimental results on public datasets such as CIFAR-10, ImageNet, and NUS-WIDE, the proposed model is superior to the comparative model and analyzed to have equivalent performance to the supervised learning-based deephashing model. The proposed model can be used in application systems that require low-dimensional representation of images, such as image search or copyright image determination.

An improved technique for hiding confidential data in the LSB of image pixels using quadruple encryption techniques (4중 암호화 기법을 사용하여 기밀 데이터를 이미지 픽셀의 LSB에 은닉하는 개선된 기법)

  • Soo-Mok Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.17-24
    • /
    • 2024
  • In this paper, we propose a highly secure technique to hide confidential data in image pixels using a quadruple encryption techniques. In the proposed technique, the boundary surface where the image outline exists and the flat surface with little change in pixel values are investigated. At the boundary of the image, in order to preserve the characteristics of the boundary, one bit of confidential data that has been multiply encrypted is spatially encrypted again in the LSB of the pixel located at the boundary to hide the confidential data. At the boundary of an image, in order to preserve the characteristics of the boundary, one bit of confidential data that is multiplely encrypted is hidden in the LSB of the pixel located at the boundary by spatially encrypting it. In pixels that are not on the border of the image but on a flat surface with little change in pixel value, 2-bit confidential data that is multiply encrypted is hidden in the lower 2 bits of the pixel using location-based encryption and spatial encryption techniques. When applying the proposed technique to hide confidential data, the image quality of the stego-image is up to 49.64dB, and the amount of confidential data hidden increases by up to 92.2% compared to the existing LSB method. Without an encryption key, the encrypted confidential data hidden in the stego-image cannot be extracted, and even if extracted, it cannot be decrypted, so the security of the confidential data hidden in the stego-image is maintained very strongly. The proposed technique can be effectively used to hide copyright information in general commercial images such as webtoons that do not require the use of reversible data hiding techniques.

Enhancing Global Research Visibility of Faculty Staffs by the Academic libraries in Public Universities in South East, Nigeria

  • Francisca C. MBAGWU;Judith S. NSE;Jacintha EZE;Ijeoma Irene BERNARD
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.2
    • /
    • pp.29-46
    • /
    • 2024
  • Academic libraries are at the forefront of supporting their parent institutions in teaching and learning, research activities, and community services for the students and faculty members, but, the researchers observed that some of the research emanating from faculty members in academic institutions particularly universities remains largely unknown, unrecognized and invisible on the global scene. This present paper is therefore a modest attempt towards addressing the issue of enhancing the faculty research visibility in the institutions of higher learning by the academic libraries. It also examines the extent academic libraries in public universities in Nigeria use research visibility channels to increase the global visibility of their faculty members. Difficulties encountered by librarians and ways of tackling the visibility of the faculty were also examined. A descriptive survey research design was adopted and the population consisted of all the 162 librarians in public universities in South-East (S.E), Nigeria. Telephone calls and Online Questionnaire were used for data collection. The number of librarians was obtained through phone calls from the Heads of each of the Libraries. The Online Questionnaire was submitted to the WhatsApp platforms of librarians in Nigeria- Academic and Research Libraries (ARL) and Chartered Librarians in Nigeria Connect (CLN-Connect). The questionnaire was structured in such a way that only the Librarians in Public universities in the S.E. Nigeria will respond to it. At the end of the day only 120 librarians responded, at a response rate of 74%. The study was analysed using tables, percentages and charts. The study recommended that librarians who are unaware of RVCs and its utilization should go for training to acquire the knowledge that will enable them enhance the global visibility of faculty staff, Management of Public universities in S.E, Nigeria should in addition to addressing copyright issues by the use of disclaimer notices and creative common licensing and provision of infrastructural facilities e.g. steady power supply, High power brand Internet connectivity, establishment of an Institutional Repository, etc, also should mandate the faculty staff to release their productive work to the library for onward submission to the RVCs platforms for enhancement of their global visibility.

A Study on Open Source Version and License Detection Tool (오픈소스 버전 및 라이선스 탐지 도구에 관한 연구)

  • Ki-Hwan Kim;Seong-Cheol Yoon;Su-Hyun Kim;Im-Yeong Lee
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.7
    • /
    • pp.299-310
    • /
    • 2024
  • Software is expensive, labor-intensive, and time-consuming to develop. To solve this problem, many organizations turn to publicly available open source, but they often do so without knowing exactly what they're getting into. Older versions of open source have various security vulnerabilities, and even when newer versions are released, many users are still using them, exposing themselves to security threats. Additionally, compliance with licenses is essential when using open source, but many users overlook this, leading to copyright issues. To solve this problem, you need a tool that analyzes open source versions, vulnerabilities, and license information. Traditional Blackduck provide a wealth of open source information when you request the source code, but it's a heavy lift to build the environment. In addition, Fossology extracts the licenses of open source, but does not provide detailed information such as versions because it does not have its own database. To solve these problems, this paper proposes a version and license detection tool that identifies the open source of a user's source code by measuring the source code similarity, and then detects the version and license. The proposed method improves the accuracy of similarity over existing source code similarity measurement programs such as MOSS, and provides users with information about licenses, versions, and vulnerabilities by analyzing each file in the corresponding open source in a web-based lightweight platform environment. This solves capacity issues such as BlackDuck and the lack of open source details such as Fossology.

Digital Archives of Cultural Archetype Contents: Its Problems and Direction (디지털 아카이브즈의 문제점과 방향 - 문화원형 콘텐츠를 중심으로 -)

  • Hahm, Han-Hee;Park, Soon-Cheol
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.17 no.2
    • /
    • pp.23-42
    • /
    • 2006
  • This is a study of the digital archives of Culturecontent.com where 'Cultural Archetype Contents' are currently in service. One of the major purposes of our study is to point out problems in the current system and eventually propose improvements to the digital archives. The government launched a four-year project for developing the cultural archetype content sources and establishing its related business with the hope of enhancing the nation's competitiveness. More specifically, the project focuses on the production of source materials of cultural archetype contents in the subjects of Korea's history. tradition, everyday life. arts and general geographical books. In addition, through this project, the government also intends to establish a proper distribution system of digitalized culture contents and to control copyright issues. This paper analyzes the digital archives system that stores the culture content data that have been produced from 2002 to 2005 and evaluates the current system's weaknesses and strengths. The summary of our findings is as follows. First. the digital archives system does not contain a semantic search engine and therefore its full function is 1agged. Second, similar data is not classified into the same categories but into the different ones, thereby confusing and inconveniencing users. Users who want to find source materials could be disappointed by the current distributive system. Our paper suggests a better system of digital archives with text mining technology which consists of five significant intelligent process-keyword searches, summarization, clustering, classification and topic tracking. Our paper endeavors to develop the best technical environment for preserving and using culture contents data. With the new digitalized upgraded settings, users of culture contents data will discover a world of new knowledge. The technology we introduce in this paper will lead to the highest achievable digital intelligence through a new framework.

Personalized Recommendation System for IPTV using Ontology and K-medoids (IPTV환경에서 온톨로지와 k-medoids기법을 이용한 개인화 시스템)

  • Yun, Byeong-Dae;Kim, Jong-Woo;Cho, Yong-Seok;Kang, Sang-Gil
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.147-161
    • /
    • 2010
  • As broadcasting and communication are converged recently, communication is jointed to TV. TV viewing has brought about many changes. The IPTV (Internet Protocol Television) provides information service, movie contents, broadcast, etc. through internet with live programs + VOD (Video on demand) jointed. Using communication network, it becomes an issue of new business. In addition, new technical issues have been created by imaging technology for the service, networking technology without video cuts, security technologies to protect copyright, etc. Through this IPTV network, users can watch their desired programs when they want. However, IPTV has difficulties in search approach, menu approach, or finding programs. Menu approach spends a lot of time in approaching programs desired. Search approach can't be found when title, genre, name of actors, etc. are not known. In addition, inserting letters through remote control have problems. However, the bigger problem is that many times users are not usually ware of the services they use. Thus, to resolve difficulties when selecting VOD service in IPTV, a personalized service is recommended, which enhance users' satisfaction and use your time, efficiently. This paper provides appropriate programs which are fit to individuals not to save time in order to solve IPTV's shortcomings through filtering and recommendation-related system. The proposed recommendation system collects TV program information, the user's preferred program genres and detailed genre, channel, watching program, and information on viewing time based on individual records of watching IPTV. To look for these kinds of similarities, similarities can be compared by using ontology for TV programs. The reason to use these is because the distance of program can be measured by the similarity comparison. TV program ontology we are using is one extracted from TV-Anytime metadata which represents semantic nature. Also, ontology expresses the contents and features in figures. Through world net, vocabulary similarity is determined. All the words described on the programs are expanded into upper and lower classes for word similarity decision. The average of described key words was measured. The criterion of distance calculated ties similar programs through K-medoids dividing method. K-medoids dividing method is a dividing way to divide classified groups into ones with similar characteristics. This K-medoids method sets K-unit representative objects. Here, distance from representative object sets temporary distance and colonize it. Through algorithm, when the initial n-unit objects are tried to be divided into K-units. The optimal object must be found through repeated trials after selecting representative object temporarily. Through this course, similar programs must be colonized. Selecting programs through group analysis, weight should be given to the recommendation. The way to provide weight with recommendation is as the follows. When each group recommends programs, similar programs near representative objects will be recommended to users. The formula to calculate the distance is same as measure similar distance. It will be a basic figure which determines the rankings of recommended programs. Weight is used to calculate the number of watching lists. As the more programs are, the higher weight will be loaded. This is defined as cluster weight. Through this, sub-TV programs which are representative of the groups must be selected. The final TV programs ranks must be determined. However, the group-representative TV programs include errors. Therefore, weights must be added to TV program viewing preference. They must determine the finalranks.Based on this, our customers prefer proposed to recommend contents. So, based on the proposed method this paper suggested, experiment was carried out in controlled environment. Through experiment, the superiority of the proposed method is shown, compared to existing ways.

The Present Situation and Challenges of the Russian Music Industry: Centered on the Digital Sound Sources (러시아 음악 산업 현황과 과제 - 디지털 음원을 중심으로 -)

  • Kwon, ki-bae;Kim, Se-il
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.395-424
    • /
    • 2018
  • The purpose of this paper is to examine the current situation and background of the Russian consumer music market, where digital music sources are making great strides in the noted recent years. In addition, music storage technology, media and change are considered together in this report. Moreover, Russia is the 12th largest music market in the world. The Russian music industry is following the recent trend of the global music industry, where the digital music market is growing rapidly on many different levels. The explosive growth of the digital sound sources in Russia's music industry is attributed to the explosive increase in available consumer downloads, streaming sound source service, and the increase in the number of digital sound sources using mobile technologies due to the development of the Internet. In particular, the sales of the available and accessible streaming sound sources are expected to grow explosively by the year 2020, which is expected to account for more than 85% of total digital music sales. In other words, the spread of smartphones and the resulting changes in the lifestyle of the Russians have created these changes for the global consumer of music. In other words, the time has come for anyone to easily access music and listen to music without a separate audio or digital player. And the fact that the Russian government's strong policy on the eradication of illegal copying of music is becoming an effective deterrent, as is also the factor that led to the increase of the share of the digital sound source to increase sales in Russia. Today, the Russian music industry is leading this change through the age and process of simply adapting to the digital age. Music is the most important element of cultural assets, and it is the beneficial content, which drives the overall growth of the digital economy. In addition, if the following five improvements(First, strengthen the consciousness of the Russian people about copyright protection; Second, utilizing the Big Data Internet resources in the digital music industry; Third, to improve the monopoly situation of digital music distributors; Fourth, distribution of fair music revenues; and Fifth, revitalization of a re-investment in the current Russian music industry) are effective and productive, Russia's role and position in the world music market is likely to expand.