• Title/Summary/Keyword: file format

Search Result 526, Processing Time 0.029 seconds

Suggestions on how to convert official documents to Machine Readable (공문서의 기계가독형(Machine Readable) 전환 방법 제언)

  • Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.67
    • /
    • pp.99-138
    • /
    • 2021
  • In the era of big data, analyzing not only structured data but also unstructured data is emerging as an important task. Official documents produced by government agencies are also subject to big data analysis as large text-based unstructured data. From the perspective of internal work efficiency, knowledge management, records management, etc, it is necessary to analyze big data of public documents to derive useful implications. However, since many of the public documents currently held by public institutions are not in open format, a pre-processing process of extracting text from a bitstream is required for big data analysis. In addition, since contextual metadata is not sufficiently stored in the document file, separate efforts to secure metadata are required for high-quality analysis. In conclusion, the current official documents have a low level of machine readability, so big data analysis becomes expensive.

Case Study: Record Management & Maintenance System Implementation with Architectural Drawings on GIS Platform (GIS 플렛폼을 활용한 건축도면 및 자료 유지관리시스템 적용 사례연구 - 미국 버지니아주 리치몬드시청 건축도면 및 자료 유지관리시스템 사례연구 -)

  • Chong, K. Chul;Sho, Kwang-Ho
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.36 no.1
    • /
    • pp.163-172
    • /
    • 2020
  • This study is a case study for in-house developed Record Maintenance and Management (RMMS) which is a digital data storage/retrieval system in a GIS-enabled solution. RMMS is designed for reorganizing submitted architectural drawings associated with scanned drawings files & geodatabase, managing metadata/table and geometric features in ArcSDE/Enterprise geodatabase format. The birth of the RMMS was borne out of a necessity for a modernized approach in digital file basis to provide improved customer services for various architectural drawings and associated with geo-spatial and its attribute information. Through a case study for building permit & review practice implemented on an internet-based Electronic Architectural administration Information System (EAIS) at the local governments in Korea, this study is able to derive differences between GIS-enabled RMMS system implemented in the Richmond City and internet-based EAIS system implemented in the local government in Korea. In an effort to be the most effective, it presents meaningful ways of maximizing efficiency in record maintenance & management system derived from the case studies that looked into in ways of a method in RMMS' operation, implementation on GIS platform, mutual interface among various programs with various digital files and finally technical supports and system development /upgrade.

An Efficient Method for Aneurysm Volume Quantification Applicable in Any Shape and Modalities

  • Chung, Jaewoo;Ko, Jung Ho
    • Journal of Korean Neurosurgical Society
    • /
    • v.64 no.4
    • /
    • pp.514-523
    • /
    • 2021
  • Objective : Aneurysm volume quantification (AVQ) using the equation of ellipsoid volume is widely used although it is inaccurate. Furthermore, AVQ with 3-dimensional (3D) rendered data has limitations in general use. A novel universal method for AVQ is introduced for any diagnostic modality and application to any shape of aneurysms. Methods : Relevant AVQ studies published from January 1997 to June 2019 were identified to determine common methods of AVQ. The basic idea is to eliminate the normal artery volume from 3D model with the aneurysm. After Digital Imaging and Communications in Medicine (DICOM) data is converted and exported to stereolithography (STL) file format, the 3D STL model is modified to remove the aneurysm and the volume difference between the 3D model with/without the aneurysm is defined as the aneurysm volume. Fifty randomly selected aneurysms from DICOM database were used to validate the different AVQ methods. Results : We reviewed and categorized AVQ methods in 121 studies. Approximately 60% used the ellipsoid method, while 24% used the 3D model. For 50 randomly selected aneurysms, volumes were measured using 3D Slicer, RadiAnt, and ellipsoid method. Using 3D Slicer as the reference, the ratios of mean difference to mean volume obtained by RadiAnt and ellipsoid method were -1.21±7.46% and 4.04±30.54%, respectively. The deviations between RadiAnt and 3D Slicer were small despite of aneurysm shapes, but those of ellipsoid method and 3D Slicer were large. Conclusion : In spite of inaccuracy, ellipsoid method is still mostly used. We propose a novel universal method for AVQ that is valid, low cost, and easy to use.

A Watermarking Algorithm of 3D Mesh Model Using Spherical Parameterization (구면 파라미터기법을 이용한 3차원 메쉬 모델의 워더마킹 알고리즘)

  • Cui, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.149-159
    • /
    • 2008
  • In this paper, we propose a blind watermarking algorithm of 3d mesh model using spherical parameterization. Spherical parameterization is a useful method which is applicable to 3D data processing. Especially, orthogonal coordinate can not analyse the feature of the vertex coordination of the 3D mesh model, but this is possible to analyse and process. In this paper, the centroid center of the 3D model was set to the origin of the spherical coordinate, the orthogonal coordinate system was transformed to the spherical coordinate system, and then the spherical parameterization was applied. The watermark was embedded via addition/modification of the vertex after the feature analysis of the geometrical information and topological information. This algorithm is robust against to the typical geometrical attacks such as translation, scaling and rotation. It is also robust to the mesh reordering, file format change, mesh simplification, and smoothing. In this case, the this algorithm can extract the watermark information about $90{\sim}98%$ from the attacked model. This means it can be applicable to the game, virtual reality and rapid prototyping fields.

Reliability Verification of Evidence Analysis Tools for Digital Forensics (디지털 포렌식을 위한 증거 분석 도구의 신뢰성 검증)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.165-176
    • /
    • 2011
  • In this paper, we examine the reliability verification procedure of evidence analysis tools for computer forensics and test the famous tools for their functional requirements using the verification items proposed by standard document, TIAK.KO-12.0112. Also, we carry out performance evaluation based on test results and suggest the way of performance improvement for evidence analysis tools. To achieve this, we first investigate functions that test subjects can perform, and then we set up a specific test plan and create evidence image files which contain the contents of a verification items. We finally verify and analyze the test results. In this process, we can discover some weaknesses of most of analysis tools, such as the restoration for deleted & fragmented files, the identification of the file format which is widely used in the country and the processing of the strings composed of Korean alphabet.

Carving deleted voice data in mobile (삭제된 휴대폰 음성 데이터 복원 방법론)

  • Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.57-65
    • /
    • 2012
  • People leave voicemails or record phone conversations in their daily cell phone use. Sometimes important voice data is deleted by the user accidently, or purposely to cover up criminal activity. In these cases, deleted voice data must be able to be recovered for forensics, since the voice data can be used as evidence in a criminal case. Because cell phones store data that is easily fragmented in flash memory, voice data recovery is very difficult. However, if there are identifiable patterns for the deleted voice data, we can recover a significant amount of it by researching images of it. There are several types of voice data, such as QCP, AMR, MP4, etc.. This study researches the data recovery solutions for EVRC codec and AMR codec in QCP file, Qualcumm's voice data format in cell phone.

Modeling of Precast Concrete Shear Walls BIM Program (BIM 프로그램을 이용한 프리캐스트 콘크리트 전단벽의 모델링)

  • Mun, Ju-Hyun;Yoon, Hyun-Sub;Kim, Jong-Won;Eom, Byung-Ho
    • Journal of the Korea Institute of Building Construction
    • /
    • v.22 no.5
    • /
    • pp.451-462
    • /
    • 2022
  • The objective of the study is to establish a BIM modeling of precast concrete(PC) shear wall with various wall-to-base connections. The family library of PC shear wall was established in BIM program using component function in a IFC(Industry foundation classes) file format and SketchUp program. From the BIM program, the amounts of concrete, reinforcing bars and steel materials as well as the interference of arranged reinforcing bars can be accurately evaluated in the PC shear walls with spliced sleeves, bolt, or welding plate connection methods. Although the additional metallic materials such as steel plates, bolts, and nuts were used in the PC shear walls with welding plate connection method, their amounts of materials, economic efficiency, and environmental impact were similar to those with spliced sleeve connection. Consequently, the bolt or welding connection is a highly applicable method as wall-to-base connection of PC shear walls, and it was a more useful method than spliced sleeve method, particularly considering the constructability.

Necessity of AI Literacy Education to Enhance for the Effectiveness of AI Education (AI교육 효과성 제고를 위한 AI리터러시 교육의 필요성)

  • Yang, Seokjae;Shin, Seungki
    • 한국정보교육학회:학술대회논문집
    • /
    • 2021.08a
    • /
    • pp.295-301
    • /
    • 2021
  • This study tried to examine the necessity of AI literacy education to increase the effectiveness of artificial intelligence education ahead of the revision of the next revised curriculum. To this end, AI modeling classes were conducted for high school students and the necessity, content, and training period of AI literacy perceived by students in AI education were investigated through a questionnaire. The results showed that they generally agreed on the need for data utilization and data preprocessing in the AI class, and in the course of the AI class, there were many cases of difficulties due to lack of basic competencies for database use. In particular, it was observed that the understanding of the file structure for data analysis was insufficient and the understanding of the data storage format for data analysis was low. In order to overcome this part, the necessity of prior education for data processing was recognized, and there were many opinions that it is generally appropriate to go to high school at that time. As for the content elements of AI literacy, it was found that there were high demands on the content of data visualization along with data transformation, including data creation and deletion.

  • PDF

A Study on Object Recognition Technique based on Artificial Intelligence (인공지능 기반 객체인식 기법에 관한 연구)

  • Yang Hwan Seok
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.3-9
    • /
    • 2022
  • Recently, in order to build a cyber physical system(CPS) that is a technology related to the 4th industry, the construction of the virtual control system for physical model and control circuit simulation is increasingly required in various industries. It takes a lot of time and money to convert documents that are not electronically documented through direct input. For this, it is very important to digitize a large number of drawings that have already been printed through object recognition using artificial intelligence. In this paper, in order to accurately recognize objects in drawings and to utilize them in various applications, a recognition technique using artificial intelligence by analyzing the characteristics of objects in drawing was proposed. In order to improve the performance of object recognition, each object was recognized and then an intermediate file storing the information was created. And the recognition rate of the next recognition target was improved by deleting the recognition result from the drawing. In addition, the recognition result was stored as a standardized format document so that it could be utilized in various fields of the control system. The excellent performance of the technique proposed in this paper was confirmed through the experiments.

Management of Reliability and Delivery for Software Object Material (소프트웨어 목적물의 전달체계 분석과 신뢰성 검증)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.51-57
    • /
    • 2019
  • On increasing illegal software copyright, the need for similarity analysis is now rising. The reliability of object material are becoming important when it's moving from developer to evaluation experts. Object material as a comparison data, is the important data to the evaluation expert which is delivered from agencies such as courts and police stations. The object material is submitted at first to the Copyright Commission and then delivered to the evaluation expert with safe. However, if the similarity result is not satisfied to the both side, they will claim to the reliability of the object material such as source code modification or revision etc. Software objects is produced in a file format and are recognized as being able to be modified. Therefore, the reliability to the object material is studied in various ways, and a forensic is proposed as one method. This study showed the suggestion to keep reliability of the object material through the actual evaluation cases.