• Title/Summary/Keyword: Data Archive

Search Result 300, Processing Time 0.024 seconds

Study on how to vitalize the historical record management of the provinces (지방의 역사기록관리 활성화 방안 연구)

  • Sohn, Dong-you
    • The Korean Journal of Archival Studies
    • /
    • no.28
    • /
    • pp.155-180
    • /
    • 2011
  • This study presents how to vitalize the record management of the provinces by investigating the current issues and by identifying the universality and the distinctiveness of the record management in local agencies. However, it only deals with the system of the record management, focusing on the history of the provinces. Although the related projects conducted by the provinces of Korea consist of various types, including publishing the local history, creating the activities of local cultural institutes, and collecting and organizing the historical records, these have not been active in many regions with insignificant achievements. In this regard, local self-governing bodies need to actively fulfill the duty of the management not only for the administrative archives but also for the historical archives by aggressively interpreting the associated parts suggested by the Act on the Management of Public Archives. Ultimately, it is proper to integrate theses two functions. Moreover, an effective collection is the core part of the record management of history. Therefore, a 'committee' with experts should provide in-depth views from planning to post-processing stages. Meanwhile, a consensus on the importance and the necessity of the historical archive management between owners and concerned parties should be formed during the collection process. In conclusion, each local autonomous entity should make sure of the active record management of history through establishing their own mid to long-term development plans, securing experts in archive management, as well as providing the service for record contents.

Investigation on the Conservation Status of the 50-year-old "Yu Kil-Chun Archives" and an Effective and Practical Method of Preserving and Sharing Contents (출간 50년된 '유길준 전서(兪吉濬全書)'의 보존상태조사와 효과적인 자료보존과 공유방법)

  • Yoo, Woo Sik;Yoo, Seung Sun;Yoo, Byeong Ho;Yoo, Sung Jun
    • Journal of Conservation Science
    • /
    • v.37 no.2
    • /
    • pp.167-178
    • /
    • 2021
  • For the preservation and efficient content sharing of 5 volumes (2,866 pages) of Yu Kil-Chun's book published in 1971, which provides an important collection of data for the study of modern Korean history during the late 19th century (enlightenment period of Joseon dynasty). The books were purchased and its preservation status investigated and documented electronically by scanning for permanent preservation of content and to determine the condition of preservation at the time of documentation. The degree of deterioration and damage, such as discoloration, hardening, breakage, and damage in these 50 years old modern printed books was quantified through image analysis and made attempts to visualize the damaged areas. It was observed that the degree of deterioration and damage depended on the material and the surface condition of the paper used, the degree of exposure to light, and the storage environment. The comparison of the preservation status at the time of the photographing (or scanning) and judgment as to whether or not the image under investigation was artificially modified was accomplished by comparing the electronically documented images of Seoyugyeonmun (西遊見聞) in Volume 1 of Yu Kil-Chun's works with images provided on other websites. Practical problems encountered while considering the effective preservation of electronically documented data and publicly sharing it, in the course of this study, with other academic researchers around the world were also summarized.

A Traffic Simulation Model Verification Method Using GPS Equipment (GPS를 활용한 교통 시뮬레이션 모형 검증)

  • Hu, Hyejung;Baek, Jongdae;Han, Sangjin
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.5
    • /
    • pp.62-69
    • /
    • 2012
  • Traffic simulation models have been used for assessing various transportation strategies. Through comparing results from a simulation model and real field data, researchers try to show how close the model can reproduce the real world traffic. This model verification step is one of the most essential tasks in modeling procedure. Traffic counts and speeds have been frequently used for the verification or validation. Authors modeled severe PM peak bottleneck situation on the I-40 corridor in Raleigh, North Carolina using DYNASMART-P, a mesoscopic traffic simulation tool and verified the model. NCDOT has Traffic Information Management System which has archive capability for the traffic speeds on the I-40 corridor. However, the authors selected travel time as the field measure for model verification and collected the data using a GPS equipment because the speed data from NCDOT speed detectors are spot speeds which are not appropriate for comparison with link average speed from the simulation model. This paper describes the GPS field data collection procedure, the model verification method, and the results.

Bulk Insertion Method for R-tree using Seeded Clustering (R-tree에서 Seeded 클러스터링을 이용한 다량 삽입)

  • 이태원;문봉기;이석호
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.30-38
    • /
    • 2004
  • In many scientific and commercial applications such as Earth Observation System (EOSDIS) and mobile Phone services tracking a large number of clients, it is a daunting task to archive and index ever increasing volume of complex data that are continuously added to databases. To efficiently manage multidimensional data in scientific and data warehousing environments, R-tree based index structures have been widely used. In this paper, we propose a scalable technique called seeded clustering that allows us to maintain R-tree indexes by bulk insertion while keeping pace with high data arrival rates. Our approach uses a seed tree, which is copied from the top k levels of a target R-tree, to classify input data objects into clusters. We then build an R-tree for each of the clusters and insert the input R-trees into the target R-tree in bulk one at a time. We present detailed algorithms for the seeded clustering and bulk insertion as well as the results from our extensive experimental study. The experimental results show that the bulk insertion by seeded clustering outperforms the previously known methods in terms of insertion cost and the quality of target R-trees measured by their query performance.

A Digital Secret File Leakage Prevention System via Hadoop-based User Behavior Analysis (하둡 기반의 사용자 행위 분석을 통한 기밀파일 유출 방지 시스템)

  • Yoo, Hye-Rim;Shin, Gyu-Jin;Yang, Dong-Min;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1544-1553
    • /
    • 2018
  • Recently internal information leakage in industries is severely increasing in spite of industry security policy. Thus, it is essential to prepare an information leakage prevention measure by industries. Most of the leaks result from the insiders, not from external attacks. In this paper, a real-time internal information leakage prevention system via both storage and network is implemented in order to protect confidential file leakage. In addition, a Hadoop-based user behavior analysis and statistics system is designed and implemented for storing and analyzing information log data in industries. The proposed system stores a large volume of data in HDFS and improves data processing capability using RHive, consequently helps the administrator recognize and prepare the confidential file leak trials. The implemented audit system would be contributed to reducing the damage caused by leakage of confidential files inside of the industries via both portable data media and networks.

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.

The Effects of School Adolescents' Personal Relationship on Delinquency: Focusing on Mediator Effect of Game Addiction (학교청소년의 대인관계가 비행에 미치는 영향: 게임중독의 매개효과를 중심으로)

  • Choi, Gui-Suk;Lim, Sung-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.180-193
    • /
    • 2017
  • This study aimed to examine the mediate effects of game addiction on the delinquency among school adolescents. In order to achieve the research purpose, secondary data was used which is the data by 8,516 people researched for 'A study on mental health improvement policy for children and adolescents II' among NYPI cross-sectional analysis provided by Korean Children Adolescents Data Archive and the collected data was analyzed using SPSS 21.0 and AMOS 21.0. The major findings were as follows. First, the better relationship with family and teachers led to lower level of game addiction and delinquency. However, in terms of relationship with friends, better relationship led to lower level of game addiction but higher level of delinquency. Second, as a result of verifying mediator effect of game addiction by decomposing the effects of relationship with family, teachers and friends on delinquency, they all demonstrated negative mediator effect. Based on the results I discussed social welfare intervention methods for game addiction in order to understand and prevent school adolescents' delinquency.

Parallel Design and Implementation of Shot Boundary Detection Algorithm (샷 경계 탐지 알고리즘의 병렬 설계와 구현)

  • Lee, Joon-Goo;Kim, SeungHyun;You, Byoung-Moon;Hwang, DooSung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.76-84
    • /
    • 2014
  • As the number of high-density videos increase, parallel processing approaches are necessary to process a large-scale of video data. When a processing method of video data requires thousands of simple operations, GPU-based parallel processing is preferred to CPU-based parallel processing by way of reducing the time and space complexities of a given computation problem. This paper studies the parallel design and implementation of a shot-boundary detection algorithm. The proposed shot-boundary detection algorithm uses pixel brightness comparisons and global histogram data among the blocks of frames, and the computation of these data is characterized with the high parallelism for the related operations. In order to maximize these operations in parallel, the computations of the pixel brightness and histogram are designed in parallel and implemented in NVIDIA GPU. The GPU-based shot detection method is tested with 10 videos from the set of videos in National Archive of Korea. In experiments, the detection rate is similar but the computation time is about 10 time faster to that of the CPU-based algorithm.

A Study on Contents Model for Business Records by the Application of the PREMIS Data Model (PREMIS 데이터모델 적용을 위한 사무문서 컨텐츠모형 설계 연구)

  • Moon, Ju-Young;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.1
    • /
    • pp.43-68
    • /
    • 2011
  • This study presents a contents model designed for business records that require long-term preservation. The contents model is based on the PREMIS(Preservation Metadata: Implementation Strategies) data model and the ISAD(G)(General International Standard Archival Description). The study selected the record collection of "the records of the overseas petroleum business and oil field development of A company located in B country." This collection requires permanent preservations by the nation and even beyond. It was attempted to establish the concepts of intellectual objects in the PREMIS data model to apply the PREMIS data model to the business records specifically. In other words, the study established the principles for differentiation of the classes in the record contents and the hierarchy structure, and the hierarchy model was developed for business records contents to derive the business records model based on those principles.

A Case Study on Implementation of Mobile Information Security (모바일 정보보안을 위한 실시간 모바일 기기 제어 및 관리 시스템 설계.구현 사례연구)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Lee, Kang-Hyun
    • Information Systems Review
    • /
    • v.15 no.2
    • /
    • pp.1-19
    • /
    • 2013
  • Smart working sparked by iPhone3 opens a revolution in smart ways of working at any time, regardless of location and environment. Also, It provide real-time information processing and analysis, rapid decision-making and the productivity of businesses, including through the timely response and the opportunity to increase the efficiency. As a result, every company are developing mobile information systems. But company data is accessed from the outside, it has problems to solve like security, hacking and information leakage. Also, Mobile devices such as smart phones belonging to the privately-owned asset can't be always controlled to archive company security policy. In the meantime, public smart phones owned by company was always applied security policy. But it can't not apply to privately-owned smart phones. Thus, this paper is focused to archive company security policy, but also enable the individual's free to use of smart phones when we use mobile information systems. So, when we use smart phone as individual purpose, the normal operation of all smart phone functions. But, when we use smart phone as company purpose like mobile information systems, the smart phone functions are blocked like screen capture, Wi-Fi, camera to protect company data. In this study, we suggest the design and implementation of real time control and management of mobile device using MDM(Mobile Device Management) solution. As a result, we can archive company security policy and individual using of smart phone and it is the optimal solution in the BYOD(Bring Your Own Device) era.

  • PDF