• Title/Summary/Keyword: Web technologies

Search Result 975, Processing Time 0.024 seconds

An Investigation on Core Competencies of Data Curator (데이터 큐레이터의 핵심 직무 요건 고찰에 관한 연구)

  • Lee, You-Kyoung;Chung, EunKyung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.3
    • /
    • pp.129-150
    • /
    • 2015
  • As the digital technologies and internet have advanced, data have centered in the process of meaningful scientific ramifications and policy making in a wide variety of fields. Data curator in charge of managing data plays a significant role in terms of improving the effectiveness and efficiency of data management and re-uses. The purpose of this study is to identify the core competencies for data curator. For achieving the purpose of this study, two sets of data were collected. First, a total of 255 job descriptions were collected from the web sites including ARL, Digital Curation Exchange, Code4lib, ASIS&T JobLine for the period of 2011-2014. Second, in-depth interviews with five data curators from four diverse organizations were collected. The two sets of data were analyzed into seven categories identified from the related studies. Findings of this study showed that core competencies for data curator were identified into four categories, communication skills, data management techniques, knowledge and strategies for data management, and instructions and service provisions for users. The implications of this study can be considered as integrated and professional curriculum developments for data curator with core competencies.

A MDA-based Approach to Developing UI Architecture for Mobile Telephony Software (MDA기반 이동 단말 시스템 소프트웨어 개발 기법)

  • Lee Joon-Sang;Chae Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.383-390
    • /
    • 2006
  • Product-line engineering is a dreaming goal in software engineering research. Unfortunately, the current underlying technologies do not seem to be still not much matured enough to make it viable in the industry. Based on our experiences in working on mobile telephony systems over 3 years, now we are in the course of developing an approach to product-line engineering for mobile telephony system software. In this paper, the experiences are shared together with our research motivation and idea. Consequently, we propose an approach to building and maintaining telephony application logics from the perspective of scenes. As a Domain-Specific Language(DSL), Menu Navigation Viewpoint(MNV) DSL is designed to deal with the problem domain of telephony applications. The functional requirements on how a set of telephony application logics are configured can be so various depending on manufacturer, product concept, service carrier, and so on. However, there is a commonality that all of the currently used telephony application logics can be generally described from the point of user's view, with a set of functional features that can be combinatorially synthesized from typical telephony services(i.e. voice/video telephony, CBS/SMS/MMS, address book, data connection, camera/multimedia, web browsing, etc.), and their possible connectivity. MNV DSL description acts as a backbone software architecture based on which the other types of telephony application logics are placed and aligned to work together globally.

Real-time and Parallel Semantic Translation Technique for Large-Scale Streaming Sensor Data in an IoT Environment (사물인터넷 환경에서 대용량 스트리밍 센서데이터의 실시간·병렬 시맨틱 변환 기법)

  • Kwon, SoonHyun;Park, Dongwan;Bang, Hyochan;Park, Youngtack
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.54-67
    • /
    • 2015
  • Nowadays, studies on the fusion of Semantic Web technologies are being carried out to promote the interoperability and value of sensor data in an IoT environment. To accomplish this, the semantic translation of sensor data is essential for convergence with service domain knowledge. The existing semantic translation technique, however, involves translating from static metadata into semantic data(RDF), and cannot properly process real-time and large-scale features in an IoT environment. Therefore, in this paper, we propose a technique for translating large-scale streaming sensor data generated in an IoT environment into semantic data, using real-time and parallel processing. In this technique, we define rules for semantic translation and store them in the semantic repository. The sensor data is translated in real-time with parallel processing using these pre-defined rules and an ontology-based semantic model. To improve the performance, we use the Apache Storm, a real-time big data analysis framework for parallel processing. The proposed technique was subjected to performance testing with the AWS observation data of the Meteorological Administration, which are large-scale streaming sensor data for demonstration purposes.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Design and Implementation of Database Broker system for Integrated Data Environment of Virtual Enterprises (가상 기업의 통합 데이터 환경을 위한 데이터베이스 브로커 시스템의 설계 및 구현)

  • Yun, Seon-Hui;Jeong, Jin-Uk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.2
    • /
    • pp.425-438
    • /
    • 1999
  • In recent days network computing technologies have bee developed rapidly and the extended use of Internet applications for enterprises such as internet/extarnet in and between enterprises has been increased enormously. Therefore the business in the future will be executed by virtual enterprise. Virtual enterprises which is based on information sharing between enterprises are composed of work processes related to information exchange between virtual enterprises, the team members who are representatives of the organizations that are participated in the actual business of virtual enterprises, and members who are representatives of the organizations that are participated in the actual business of virtual enterprises, and environment that are provided by supporting CALS(continuous Acquisition and Life cycle Support or commerce At light Speed). Supporting system of IDE(Integrated Data Environment)for CALS implementation that is provided as an environment of virtual enterprises has to ensure the autonomies of local data and to provide the accessibility of heterogeneous database of enterprises on network transparently for giving user a single global view of data. This paper introduce the design and implementation of the database broker system that can be accessed data transparently by the suers of participated enterprises in the integrated data environment supporting virtual enterprises. The system uses java/CORBA technology in Web environment and Object Query language (OQL) to process the queries of relational database system, object-oriented database system, and file information.

  • PDF

An Integrated QoS Management System for Large-Scale Heterogeneous IP Networks : Design and Prototype Implementation (대규모 이기종 IP 망의 통합품질관리 시스템의 설계 및 구현)

  • Choi, Tae-Sang;Chung, Hyung-Seok;Choi, Hee-Sook;Kim, Chang-Hoon;Jeong, Tae-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3633-3650
    • /
    • 2000
  • Internet is no longer a network for special communities but became a global means of communication infrastructure for everyday life. People are exchanging their personal messages using e-mails, students are getting their educational aids through the web, people are buying a variety of goods from cyber shopping malls, and companies are conducting their businesses over the Internet. Recently, such an explosive growth of the traffic in the Internet raised a big concern on how to accommodate ever-changing user's needs in terms of an amount of the traffic, characteristics of the traffic, and various service quality requirements, Over provisioning can be a simple solution but it is too expensive and inefficient. Thus many new technologies to solve this very difficult puzzle have bcen introduced recently, Any single solution, however, can be insufficient and a carefully designed architecture, which integrates a group of solutions, is required. In this paper, we propose a policy-based Internet QoS provisioning, traffic engineering and perfonnance management system as our solution to this problem. Our integrated management QoS solution can provide highly responsive flow-through service provisioning, more realistic service and resource policy control based on the real network performance information, and centralized control of traffic engineering for heterogeneous networks.

  • PDF

Implementation of User-friendly Intelligent Space for Ubiquitous Computing (유비쿼터스 컴퓨팅을 위한 사용자 친화적 지능형 공간 구현)

  • Choi, Jong-Moo;Baek, Chang-Woo;Koo, Ja-Kyoung;Choi, Yong-Suk;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.443-452
    • /
    • 2004
  • The paper presents an intelligent space management system for ubiquitous computing. The system is basically a home/office automation system that could control light, electronic key, and home appliances such as TV and audio. On top of these basic capabilities, there are four elegant features in the system. First, we can access the system using either a cellular Phone or using a browser on the PC connected to the Internet, so that we control the system at any time and any place. Second, to provide more human-oriented interface, we integrate voice recognition functionalities into the system. Third, the system supports not only reactive services but also proactive services, based on the regularities of user behavior. Finally, by exploiting embedded technologies, the system could be run on the hardware that has less-processing power and storage. We have implemented the system on the embedded board consisting of StrongARM CPU with 205MHz, 32MB SDRAM, 16MB NOR-type flash memory, and Relay box. Under these hardware platforms, software components such as embedded Linux, HTK voice recognition tools, GoAhead Web Server, and GPIO driver are cooperated to support user-friendly intelligent space.

Development of Pre-Service and In-Service Information Management System (iSIMS) (원전 가동전/중 검사정보관리 시스템 개발)

  • Yoo, H.J.;Choi, S.N.;Kim, H.N.;Kim, Y.H.;Yang, S.H.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.4
    • /
    • pp.390-395
    • /
    • 2004
  • The iSTMS is a web-based integrated information system supporting Pre-Service and In-Service Inspection(PSI/ISI) processes for the nuclear power plants of KHNP(Korea Hydro & Nuclear Power Co. Ltd.). The system provides a full spectrum coverage of the inspection processes from the planning stage to the final report of examination in accordance with applicable codes, standards, and regulatory requirements. The major functions of the system includes the inspection planning, examination, reporting, project control and status reporting, resource management as well as objects search and navigation. The system also provides two dimensional or three dimensional visualization interface to identify the location and geometry of components and weld areas subject to examination in collaboration with database applications. The iSIMS is implemented with commercial software packages such as database management system, 2-D and 3-D visualization tool, etc., which provide open, updated and verified foundations. This paper describes the key functions and the technologies for the implementation of the iSIMS.

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

A Study on Automated Fake News Detection Using Verification Articles (검증 자료를 활용한 가짜뉴스 탐지 자동화 연구)

  • Han, Yoon-Jin;Kim, Geun-Hyung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.569-578
    • /
    • 2021
  • Thanks to web development today, we can easily access online news via various media. As much as it is easy to access online news, we often face fake news pretending to be true. As fake news items have become a global problem, fact-checking services are provided domestically, too. However, these are based on expert-based manual detection, and research to provide technologies that automate the detection of fake news is being actively conducted. As for the existing research, detection is made available based on contextual characteristics of an article and the comparison of a title and the main article. However, there is a limit to such an attempt making detection difficult when manipulation precision has become high. Therefore, this study suggests using a verifying article to decide whether a news item is genuine or not to be affected by article manipulation. Also, to improve the precision of fake news detection, the study added a process to summarize a subject article and a verifying article through the summarization model. In order to verify the suggested algorithm, this study conducted verification for summarization method of documents, verification for search method of verification articles, and verification for the precision of fake news detection in the finally suggested algorithm. The algorithm suggested in this study can be helpful to identify the truth of an article before it is applied to media sources and made available online via various media sources.