• Title/Summary/Keyword: 통신관리

Search Result 8,695, Processing Time 0.04 seconds

A Road Luminance Measurement Application based on Android (안드로이드 기반의 도로 밝기 측정 어플리케이션 구현)

  • Choi, Young-Hwan;Kim, Hongrae;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.49-55
    • /
    • 2015
  • According to the statistics of traffic accidents over recent 5 years, traffic accidents during the night times happened more than the day times. There are various causes to occur traffic accidents and the one of the major causes is inappropriate or missing street lights that make driver's sight confused and causes the traffic accidents. In this paper, with smartphones, we designed and implemented a lane luminance measurement application which stores the information of driver's location, driving, and lane luminance into database in real time to figure out the inappropriate street light facilities and the area that does not have any street lights. This application is implemented under Native C/C++ environment using android NDK and it improves the operation speed than code written in Java or other languages. To measure the luminance of road, the input image with RGB color space is converted to image with YCbCr color space and Y value returns the luminance of road. The application detects the road lane and calculates the road lane luminance into the database sever. Also this application receives the road video image using smart phone's camera and improves the computational cost by allocating the ROI(Region of interest) of input images. The ROI of image is converted to Grayscale image and then applied the canny edge detector to extract the outline of lanes. After that, we applied hough line transform method to achieve the candidated lane group. The both sides of lane is selected by lane detection algorithm that utilizes the gradient of candidated lanes. When the both lanes of road are detected, we set up a triangle area with a height 20 pixels down from intersection of lanes and the luminance of road is estimated from this triangle area. Y value is calculated from the extracted each R, G, B value of pixels in the triangle. The average Y value of pixels is ranged between from 0 to 100 value to inform a luminance of road and each pixel values are represented with color between black and green. We store car location using smartphone's GPS sensor into the database server after analyzing the road lane video image with luminance of road about 60 meters ahead by wireless communication every 10 minutes. We expect that those collected road luminance information can warn drivers about safe driving or effectively improve the renovation plans of road luminance management.

A Study on 21st Century Fashion Market in Korea (21세기 한국패션시장에 대한 연구)

  • Kim, Hye-Young
    • The Journal of Natural Sciences
    • /
    • v.10 no.1
    • /
    • pp.209-216
    • /
    • 1998
  • The results of the study of diving the 21st century's Korea fashion market into consumer market, fashion market, and a new marketing strategy are as follows. The 21st consumer market is First, a fashion democracy phenomenon. As many people try to leave unconditional fashion following, consumer show a phenomenon to choose and create their own fashion by subjective judgements. Second, a phenomenon of total fashion pursuit. Consumer in the future are likely to put their goals not in differentiating small item products, but considering various fashion elements based on their individuality and sense of value. Third, world quality-oriented. With the improvement of life level, it accomplishes to emphasize consumers' fashion mind on the world wide popular use of materials, quality, design and brand image. Fourth, with the entrance of neo-rationalism, consumers show increasing trends to emphasize wisdom, solidity in goods strategy pursuing high quality fashion and to demand resonable prices. Fifth, concept-oriented. Consumers are changing into pursuing concept appropriate to individual life scene. Prospecting the composition of the 21st century's fashion market, First, sportive casual zone will draw attention more than any other zone. This is because interest in sports will grow according to the increase of leisure time and the expasion of time and space in the 21st century, and also ecology will become the important issue of sports sense because of human beings's natural habit toward nature. Second, the down aging phenomenon will accelerate its speed as a big trend. Third, a retro phenomenon, a concept contrary to digital and high-tech, will become another big trend for its remake, antique, and classic concept in fashion market with ecology trend. New marketing strategy to cope with changing fashion market is as follows. First, with the trend of borderless concept, borders between apparels are becoming vague, for example, they offer custom-made products to consumers. Second, as more enterprises take the way of gorilla and guerrilla where guerrillas who aim at niche market show up will develop. Basically, they think highly of individual creative study, and pursue the scene adherence with high sensitiveness. However this polarization becomes mutually-supplementing relationship showing gorilla's guerilla movement, and guerilla's gorilla high-tech. Third with the development of value retailing, enterprises pursuing mass merchandising of groups called category killers are expanded and amplified to new product fields, and expand business' share. Fourth, using outsourcing, the trend to use exterior function leaving each enterprise's strength by inspecting its own work is gradually strong. Fifth, with the expansion of none store sale, the entrance of the internet and the CD-ROM sales added to communication sales such as catalogues are specified. An eminent American think tank expect that 5-5% of the total sale of clothes and home goods in 2010 will be done by none store sale. Accordingly, to overcome the problems, First international, global level marketing, Second, the improvement of technology, Third, knowledge-creating marketing are needed.

  • PDF

The Effect of Patent Citation Relationship on Business Performance : A Social Network Analysis Perspective (특허 인용 관계가 기업 성과에 미치는 영향 : 소셜네트워크분석 관점)

  • Park, Jun Hyung;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.127-139
    • /
    • 2013
  • With an advent of recent knowledge-based society, the interest in intellectual property has increased. Firms have tired to result in productive outcomes through continuous innovative activity. Especially, ICT firms which lead high-tech industry have tried to manage intellectual property more systematically. Firm's interest in the patent has increased in order to manage the innovative activity and Knowledge property. The patent involves not only simple information but also important values as information of technology, management and right. Moreover, as the patent has the detailed contents regarding technology development activity, it is regarded as valuable data. The patent which reflects technology spread and research outcomes and business performances are closely interrelated as the patent is considered as a significant the level of firm's innovation. As the patent information which represents companies' intellectual capital is accumulated continuously, it has become possible to do quantitative analysis. The advantages of patent in the related industry information and it's standardize information can be easily obtained. Through the patent, the flow of knowledge can be determined. The patent information can analyze in various levels from patent to nation. The patent information is used to analyze technical status and the effects on performance. The patent which has a high frequency of citation refers to having high technological values. Analyzing the patent information contains both citation index analysis using the number of citation and network analysis using citation relationship. Network analysis can provide the information on the flows of knowledge and technological changes, and it can show future research direction. Studies using the patent citation analysis vary academically and practically. For the citation index research, studies to analyze influential big patent has been conducted, and for the network analysis research, studies to find out the flows of technology in a certain industry has been conducted. Social network analysis is applied not only in the sociology, but also in a field of management consulting and company's knowledge management. Research of how the company's network position has an impact on business performances has been conducted from various aspects in a field of network analysis. Social network analysis can be based on the visual forms. Network indicators are available through the quantitative analysis. Social network analysis is used when analyzing outcomes in terms of the position of network. Social network analysis focuses largely on centrality and structural holes. Centrality indicates that actors having central positions among other actors have an advantage to exert stronger influence for exchange relationship. Degree centrality, betweenness centrality and closeness centrality are used for centrality analysis. Structural holes refer to an empty place in social structure and are defined as efficiency and constraints. This study stresses and analyzes firms' network in terms of the patent and how network characteristics have an influence on business performances. For the purpose of doing this, seventy-four ICT companies listed in S&P500 are chosen for the sample. UCINET6 is used to analyze the network structural characteristics such as outdegree centrality, betweenness centrality and efficiency. Then, regression analysis test is conducted to find out how these network characteristics are related to business performance. It is found that each network index has significant impacts on net income, i.e. business performance. However, it is found that efficiency is negatively associated with business performance. As the efficiency increases, net income decreases and it has a negative impact on business performances. Furthermore, it is shown that betweenness centrality solely has statistically significance for the multiple regression analysis with three network indexes. The patent citation network analysis shows the flows of knowledge between firms, and it can be expected to contribute to company's management strategies by analyzing company's network structural positions.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

A Study on E-mail Campaigns and Feedback Analysis as Marketing Tools of Internet Fashion Shopping Malls - With Focus on Specialized Fashion Shopping Malls - (인터넷 패션쇼핑몰의 이메일 마케팅 활용과 반응 - 패션 전문몰을 중심으로 -)

  • Han, Ji-Sook
    • Archives of design research
    • /
    • v.19 no.2 s.64
    • /
    • pp.53-62
    • /
    • 2006
  • E-mail has indeed developed from 'a means of instant communication' to an indispensable part of online marketing. Therefore, companies need to implement consistent customer management. Communication with customers and marketing through e-mail is a powerful way of communication and adapting one-to-one marketing strategies to customer trends, habits and taste preferences. Since setting accurate targets is especially important in the fashion industry, e-mail marketing is the most effective way to communicate with customers and one-to-one marketing constitutes a very important strategy. In this study, I will analyze this powerful one-on-one marketing tool, particularly actual e-mail messages sent by an Internet Shopping Mall from June 12 to July 30, 2005, examine the effect of these messages on sales growth and analyze actual feedback received. Regarding e-mail read rates broken down by age and gender, 1 found that females in their late twenties recorded the highest rate at 21.66% and their contribution to sales growth was recorded at 3.5% From actual sales records, found that 28.10% of total sales were attributable to people in their late twenties, showing that the age group that reads e-mails the most also buys the most. Regarding feedback by e-mail title, e-mails from the 'Casual' category seemed to be the most effective, in that most of these e-mails were read. Also, messages sent on Tuesdays were read the most, according to the feedback analysis by weekday. Section e-mails were read more often than regular e-mails. Regarding the view rate according to the time e-mails were sent, messages sent to females in their late twenties at two o'clock in the afternoon were read by 20.93% of recipients, recording the highest read rate. By offering informative content and practical tips, visitors will be attracted to the site and generate site traffic. Therefore, we can conclude that sending e-mail messages can greatly contribute to sales growth and e-mail marketing is very effective. Also, in order to make e-mail campaigns more effective and improve marketing results, we need to analyze actual results and apply our findings in future e-mail campaigns. With this, we get successful marketing results.

  • PDF

The Individual Discrimination Location Tracking Technology for Multimodal Interaction at the Exhibition (전시 공간에서 다중 인터랙션을 위한 개인식별 위치 측위 기술 연구)

  • Jung, Hyun-Chul;Kim, Nam-Jin;Choi, Lee-Kwon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.19-28
    • /
    • 2012
  • After the internet era, we are moving to the ubiquitous society. Nowadays the people are interested in the multimodal interaction technology, which enables audience to naturally interact with the computing environment at the exhibitions such as gallery, museum, and park. Also, there are other attempts to provide additional service based on the location information of the audience, or to improve and deploy interaction between subjects and audience by analyzing the using pattern of the people. In order to provide multimodal interaction service to the audience at the exhibition, it is important to distinguish the individuals and trace their location and route. For the location tracking on the outside, GPS is widely used nowadays. GPS is able to get the real time location of the subjects moving fast, so this is one of the important technologies in the field requiring location tracking service. However, as GPS uses the location tracking method using satellites, the service cannot be used on the inside, because it cannot catch the satellite signal. For this reason, the studies about inside location tracking are going on using very short range communication service such as ZigBee, UWB, RFID, as well as using mobile communication network and wireless lan service. However these technologies have shortcomings in that the audience needs to use additional sensor device and it becomes difficult and expensive as the density of the target area gets higher. In addition, the usual exhibition environment has many obstacles for the network, which makes the performance of the system to fall. Above all these things, the biggest problem is that the interaction method using the devices based on the old technologies cannot provide natural service to the users. Plus the system uses sensor recognition method, so multiple users should equip the devices. Therefore, there is the limitation in the number of the users that can use the system simultaneously. In order to make up for these shortcomings, in this study we suggest a technology that gets the exact location information of the users through the location mapping technology using Wi-Fi and 3d camera of the smartphones. We applied the signal amplitude of access point using wireless lan, to develop inside location tracking system with lower price. AP is cheaper than other devices used in other tracking techniques, and by installing the software to the user's mobile device it can be directly used as the tracking system device. We used the Microsoft Kinect sensor for the 3D Camera. Kinect is equippedwith the function discriminating the depth and human information inside the shooting area. Therefore it is appropriate to extract user's body, vector, and acceleration information with low price. We confirm the location of the audience using the cell ID obtained from the Wi-Fi signal. By using smartphones as the basic device for the location service, we solve the problems of additional tagging device and provide environment that multiple users can get the interaction service simultaneously. 3d cameras located at each cell areas get the exact location and status information of the users. The 3d cameras are connected to the Camera Client, calculate the mapping information aligned to each cells, get the exact information of the users, and get the status and pattern information of the audience. The location mapping technique of Camera Client decreases the error rate that occurs on the inside location service, increases accuracy of individual discrimination in the area through the individual discrimination based on body information, and establishes the foundation of the multimodal interaction technology at the exhibition. Calculated data and information enables the users to get the appropriate interaction service through the main server.

An Implementation of Dynamic Gesture Recognizer Based on WPS and Data Glove (WPS와 장갑 장치 기반의 동적 제스처 인식기의 구현)

  • Kim, Jung-Hyun;Roh, Yong-Wan;Hong, Kwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.561-568
    • /
    • 2006
  • WPS(Wearable Personal Station) for next generation PC can define as a core terminal of 'Ubiquitous Computing' that include information processing and network function and overcome spatial limitation in acquisition of new information. As a way to acquire significant dynamic gesture data of user from haptic devices, traditional gesture recognizer based on desktop-PC using wire communication module has several restrictions such as conditionality on space, complexity between transmission mediums(cable elements), limitation of motion and incommodiousness on use. Accordingly, in this paper, in order to overcome these problems, we implement hand gesture recognition system using fuzzy algorithm and neural network for Post PC(the embedded-ubiquitous environment using blue-tooth module and WPS). Also, we propose most efficient and reasonable hand gesture recognition interface for Post PC through evaluation and analysis of performance about each gesture recognition system. The proposed gesture recognition system consists of three modules: 1) gesture input module that processes motion of dynamic hand to input data 2) Relational Database Management System(hereafter, RDBMS) module to segment significant gestures from input data and 3) 2 each different recognition modulo: fuzzy max-min and neural network recognition module to recognize significant gesture of continuous / dynamic gestures. Experimental result shows the average recognition rate of 98.8% in fuzzy min-nin module and 96.7% in neural network recognition module about significantly dynamic gestures.

Status and Preservation of Cultural Relics in the Demilitarized Zone (비무장지대(DMZ) 문화유적 현황과 보전방안)

  • Lee, Jae
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.1
    • /
    • pp.216-241
    • /
    • 2019
  • There are 35 cultural properties of fourteen kinds in the Demilitarized Zone known so far, but this number is expected to increase in the future. Among them, Cheolwon-Doseong and Jeongol-Chong of Gimhwa should be the first step toward conservation efforts by conducting a joint investigation through the collaboration of North and South Korea. In particular, the joint investigation of Cheolwon-Doseong will not only remind the North and South that they are the same people who have had common history and cultural traditions for a long time, but will also give symbolic meaning to convert the demilitarized zone into a stage for peace. Since Jeongol-Chong is a mass grave of the fallen soldiers of Pyeongan Province who fought against the invasion of the Qing of China, it should be managed as a national designated cultural asset through joint investigation. In addition, the Demilitarized Zone should become a World Heritage Site because of its importance to the legacy of the Korean War, an international war caused by an ideological confrontation. Furthermore, it has more than 6,000 kinds of temperate forests in addition to 100 species of endangered species and natural monuments. The DMZ is very qualified to be a World Natural Heritage Site, and should be included as a World Complex Cultural Heritage Site that qualifies as a World Heritage and World Natural Heritage Site. In the Demilitarized Zone, we can also find numerous highlands, tunnels and posts used during the Korean War, as well as surveillance posts, a military demarcation line, barbed wire fences, and Panmunjom, which were created by the armistice agreement. it would be desirable to select some of its sections and war facilities and to register them as modern cultural heritage assets. Finally, it is necessary to reconstruct the Dorasan Signal Fire Site, which was the communication facility of a traditional era which connected the South (Dorasan) and North (Gaesong). This would symbolize smooth communication between the two Koreas. In order to prepare for the reckless development of the Demilitarized Zone due to the upcoming cease-fire, the government and cultural asset experts will have to work hard to identify and preserve the cultural properties of the Demilitarized Zone, and they will also have to maintain consistent control over matters such as indiscriminate investigation and mine clearance.

Multiple SL-AVS(Small size & Low power Around View System) Synchronization Maintenance Method (다중 SL-AVS 동기화 유지기법)

  • Park, Hyun-Moon;Park, Soo-Huyn;Seo, Hae-Moon;Park, Woo-Chool
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • Due to the many advantages including low price, low power consumption, and miniaturization, the CMOS camera has been utilized in many applications, including mobile phones, the automotive industry, medical sciences and sensoring, robotic controls, and research in the security field. In particular, the 360 degree omni-directional camera when utilized in multi-camera applications has displayed issues of software nature, interface communication management, delays, and a complicated image display control. Other issues include energy management problems, and miniaturization of a multi-camera in the hardware field. Traditional CMOS camera systems are comprised of an embedded system that consists of a high-performance MCU enabling a camera to send and receive images and a multi-layer system similar to an individual control system that consists of the camera's high performance Micro Controller Unit. We proposed the SL-AVS (Small Size/Low power Around-View System) to be able to control a camera while collecting image data using a high speed synchronization technique on the foundation of a single layer low performance MCU. It is an initial model of the omni-directional camera that takes images from a 360 view drawing from several CMOS camera utilizing a 110 degree view. We then connected a single MCU with four low-power CMOS cameras and implemented controls that include synchronization, controlling, and transmit/receive functions of individual camera compared with the traditional system. The synchronization of the respective cameras were controlled and then memorized by handling each interrupt through the MCU. We were able to improve the efficiency of data transmission that minimizes re-synchronization amongst a target, the CMOS camera, and the MCU. Further, depending on the choice of users, respective or groups of images divided into 4 domains were then provided with a target. We finally analyzed and compared the performance of the developed camera system including the synchronization and time of data transfer and image data loss, etc.

An Oral History Study of Overseas Korean Astronomer: John D. R. Bahng's Case (한국천문연구원 원외 원로 구술사연구 - 방득룡 전임 노스웨스턴 대학교 천문학 교수 사례 -)

  • Choi, Youngsil;Seo, Yoon Kyung;Lee, Hyung Mok
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.73.4-74
    • /
    • 2021
  • 한국천문연구원은 2017년 제1차 구술채록사업에 이어 2020년 제2차 사업을 진행하면서 최초로 원외 원로에 대한 구술채록을 시도하였다. 국가 대표 천문연구의 산실로서 연구원 존재 의의를 확립하기 위하여 원내 원로에 국한되었던 구술자 대상을 확장한 것이다. 그 첫 외부 구술 대상자로 방득룡 전임 노스웨스턴 천문학과 교수를 선정하여 2020년 7월부터 준비단계에 들어갔다. 방득룡 전(前)교수가 첫 번째 한국천문연구원 원외 인사 구술자로 선정된 이유는, 그가 우리나라 천문대1호 망원경 구매 선정에 개입한 서신(1972년)이 자료로 남아있었기 때문이다. 한국천문연구원에서 2017년에 수행한 제1차 구술채록사업에서 구술자로 참여한 오병렬 한국천문연구원 원로가 기증한 사료들은 대부분 연구원 태동기 국립천문대 구축과 망원경 구매 관련 자료였으며 이 가운데 1972년 당시 과학기술처 김선길 진흥국장에게 Boller and Chivesns(사(社))의 반사경을 추천한 방득룡 전(前)교수의 서신은 한국 천문학 발전사에서 중요한 사료였다. 연구진은 이 자료를 시작으로, 방득룡 전(前)교수의 생존 여부와 문서고의 공기록물들에서 그의 흔적을 찾아가기 시작했다. 놀랍게도 그는 실제 세계와 한국천문연구원 문서고 깊숙이 기록물들 모두에서 상존하고 있었다. 1927년생인 방득룡 전(前)교수, Dr. John D. R.은 미국 플로리다 한 실버타운에서 건강한 정신으로 생존하여 있었고 연구진의 인터뷰에 흔쾌히 응했다. 2020년 9월 16일에 한국천문연구원 본원 세종홀 2층 회의실에서 영상통신회의로 그와의 구술인터뷰가 진행되었다. 이 구술인터뷰는 원외 인사가 대상이란 점 외에도 방법적으로는 전형적인 대면 방식이 아닌 영상 인터뷰였다는 점에서 코로나 시대의 대안이 되는 실험적 시도였다. 현대 한국천문학 발전사의 재조명 측면에서도 의미가 있었다. 1960년대 초반부터 1992년 정년퇴임까지 30년을 미국 유수 대학교 천문학과 교수로 재직하며 활발한 활동을 해 온 한국계 천문학자가 우리나라 최초 반사망원경 구매 선정에 적극 개입하였던 역사는, 공문서 자료들과 서신 사료들에 이어 그의 육성으로 나머지 의구심의 간극이 채워졌다. 또 구술자 개인이 주관적으로 중요하다고 여기는 '기억'이 중요한 아카이빙 콘텐츠 확장의 단초가 될 수 있다는 것을 보여줌으로써 구술사 연구에 있어서도 중요한 관점을 주었다. 애초 연구진이 방득룡 전(前)교수의 공식 기록에서 아카이빙의 큰 줄기로 잡았던 것은 1948년 도미, 1957년 위스콘신 대학교 천문학 박사학위 취득, 1962년부터 노스웨스턴 대학(일리노이주 에반스턴)의 천문학 교수진, 1992년 은퇴로 이어진 생애였다. 그러나 그와의 구술 준비 서신 왕래와 구술을 통하여 알게 된 그가 인생에서 중요시 여겼던 지점은, 1948년 도미 무렵 한국의 전쟁 전 상황과 당시 비슷한 시기에 유학한 한국 천문학자들의 동태, 그리고 1957년부터 1962년까지 프린스턴 대학교에서 M. Schwarzschild 교수와 L. Spitzer 교수를 보조하며 Stratoscope Project를 연구하였던 경험이었다. 기록학적 의미에서도, 전자를 통해서 그와 함께 동시대 한국 천문학을 이끌었던 인재들의 맥락정보를 얻을 수 있었으며, 후자를 통해서는 세계 천문학사에 큰 영향을 미친 석학에 대한 아카이브 정보와의 연계 지점과 방득룡 전(前)교수의 연구 근원을 찾을 수 있었다. 이들은 추후 방득룡 콘텐츠 서비스 시에 AIP, NASM, Lyman Spitzer 콘텐츠, 평양천문대, 화천조경천문대, 서울대와 연세대, 그리고 한국천문연구원까지 연계되어 전 세계 폭넓은 이용자들의 유입을 유도할 수 있는 검색 도구가 될 수 있다. 이번 방득룡 구술사 연구에서 구술자 개인의 주관적인 소회가 공식 기록이 다가갈 수 없는 역사적 실체에 일정 부분 가까울 수 있다는 것, 그리고 이를 통하여 개인의 역사는 공동체의 역사로 확장될 수 있다는 사실을 발견할 수 있었다. 또 연구진은 방득룡 전(前)교수의 회상을 통하여 구술자 개인의 시각으로 한국과 미국 천문학계의 공동체 역사를 재조명할 수 있었고, 이것을 아카이브 콘텐츠 확장 서비스에 반영할 수 있다는 기대를 가지게 되었다. 무엇보다 이 연구를 통하여 다양한 주제의 아카이브로 연동될 수 있는 주제어와 검색도구를 구술자 개인의 회상으로부터 유효하게 도출할 수 있다는 것을 확인하였다. 그리고 향후 한국천문 구술아카이브의 확장을 통하여 보다 다양한 활용과 연구 재활용의 선순환이 가능하다는 것도 알 수 있었다. 이는 최근 기록학계에서 대두되고 있는 LOD(Linked Open Data)의 방향성과도 흡사하여 한국천문학 구술사연구의 차세대 통합형 기록관리의 미래모형을 기대케 하는 대목이다.

  • PDF