• Title/Summary/Keyword: data centric

Search Result 468, Processing Time 0.028 seconds

Resource Reservation Based Image Data Transmission Scheme for Surveillance Sensor Networks (감시정찰 센서 네트워크를 위한 자원예약 기반 이미지 데이터 전송 기법)

  • Song, Woon-Seop;Jung, Woo-Sung;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.11
    • /
    • pp.1104-1113
    • /
    • 2014
  • Future combat systems can be represented as the NCW (Network Centric Warefare), which is based on the concept of Sensor-to-Shooter. A wireless video sensor networking technology, one of the core components of NCW, has been actively applied for the purpose of tactical surveillance. In such a surveillance sensor network, multi-composite sensors, especially consisting of image sensors are utilized to improve reliability for intrusion detection and enemy tracing. However, these sensors may cause a problem of requiring very high network capacity and energy consumption. In order to alleviate this problem, this paper proposes an image data transmission scheme based on resource reservation. The proposed scheme can make it possible to have more reliable image data transmission by choosing proper multiple interfaces, while trying to control resolution and compression quality of image data based on network resource availability. By the performance analysis using NS-3 simulation, we have confirmed the transmission reliability as well as energy efficiency of the proposed scheme.

Co-author Network Analysis of Research Institutes in the Computer Field Based on the Journal Articles Published in Korea (한국 학술지 기반 컴퓨터분야 연구기관 공저 네트워크 분석)

  • Kim, Byungkyu;You, Beon-Jong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.117-122
    • /
    • 2021
  • In order to reveal the co-research relationship with key research institutes in the computer field in Korea, which have high competitiveness in the ICT field, this paper analyzes the co-author network of research institutes based on the papers of Korean journals. For this study, 15 computer journals published in Korea were selected and collected for the past 5 years. In addition, authors, affiliated institutions, and country information were extracted from the papers, and experimental data were produced using institutional identification data and SNA analysis techniques. Through this, statistical analysis was performed on researchers, research institutes, and countries, and the centrality of research institutes was measured through co-authored network analysis and visualized as a map. The results of the research that analyzed the co-author relationship based on the papers in computer science journals published in Korea are as follows. First, the status of co-author relations among researchers was statistically analyzed in detail. The number of authors, the number of co-authors, and statistics by co-authoring countries, as well as the ratio of co-authored research by institution and the ratio of co-authored by country were revealed. The co-authoring status of papers in English journals was analyzed separately to compare and analyze characteristics. Second, the centrality of each individual was measured through the co-authored network analysis of the identified researchers, institutions and countries affiliated with the institution, and the frequency of connection between data by level was identified. In addition, the co-authorization network between research institutes was visualized and presented as a map so that the overall view of the co-authoring network was presented, and the connection frequency between the institutes was checked. It is possible to recommend a research partner based on the co-authoring behavior of Korean computer researchers and the co-authoring relationship between major research institutes. For this, additional research is needed to analyze the subject areas of each institution.

  • PDF

A Study on the Data Value: In Public Data (데이터 가치에 대한 탐색적 연구: 공공데이터를 중심으로)

  • Lee, Sang Eun;Lee, Jung Hoon;Choi, Hyun Jin
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.145-161
    • /
    • 2022
  • The data is a key catalyst for the development of the fourth industry, and has been viewed as an essential element of the new industry, with technology convergence such as artificial intelligence, augmented/virtual reality, self-driving and 5 G. This will determine the price and value of the data as the user uses data in which the data is based on the context of the situation, rather than the data itself of the past supplier-centric data. This study began with, what factors will increase the value of data from a user perspective not a supplier perspective The study was limited to public data and users conducted research on users using data, such as analysis or development based on data. The study was designed to gauge the value of data that was not studied in the user's perspective, and was instrumental in raising the value of data in the jurisdiction of supplying and managing data.

Development of Information Technology for Smart Defense (Smart Defense 를 위한 IT 기술 개발)

  • Chung, Kyo-Il;Lee, So Yeon;Park, Sangjoon;Park, Jonghyun;Han, Sang-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.3
    • /
    • pp.323-328
    • /
    • 2014
  • Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication & Computer, Intelligence), ISR(Intelligence, Surveillance & Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

A study of the educational effects in SNS-utilized instruction (소셜 네트워크 서비스 활용 수업에서의 교육적 효과 고찰)

  • Kwon, Myung-Soon;Kan, Jin-Sook;Kim, Jin-Whan
    • The Journal of Korean Association of Computer Education
    • /
    • v.17 no.6
    • /
    • pp.135-146
    • /
    • 2014
  • The study has compared the effects in SNS-utilized instruction that each of self centric activities and social interaction added social activities affected self initiative, attitudes and self efficacy to information technology respectively. The research methods utilized the pre experimental design as nonequivalent experimental group. The data was analyzed by paired t-test and content analysis. The results showed that the SNS class utilized self-centric activities were effective in self-initiative and attitudes toward information technology, while social interaction added social activities were effective in not only self-initiative and the attitudes of information technology but also self efficacy of information technology. And content analysis of the effects of the education showed that information sharing, instancy and accessibility were advantageous but information security and privacy issues were problematic. That is, it was confirmed that when self-centric activities and social interaction activities were practised simultaneously in SNS-utilized instruction, the self initiative which learners planed and executed by themselves, the attitudes and self efficacy of information technology which were able to enhance learning ability and to show satisfaction to individual learning were improved.

  • PDF

Patent Analysis of Information Security Technology for Network-Centric Warfare (네트워크 중심전을 위한 정보보호기술의 특허동향 분석)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.355-364
    • /
    • 2007
  • The paradigm of war is basically changed by development of information and communication technologies. One of the paradigms in future war is NCW(Network-Centric Warfare) that is purposed of achievement in information-superiority. In this future war, the level of menace and fragility is rapidly increased in information-security according to the massive information and complex system. Therefore the Korean army is developing the information-security technologies for NCW. But, until now patent analysis concerning NCW has not performed. In this paper, we suggest a meaningful data for efficient R&D through patent analysis of information-security technologies on NCW.

Effect of Professional Competence of Public Institutions on Service Quality: Focused on Housing Welfare Service (공공서비스 조직의 서비스역량이 서비스품질에 미치는 영향관계 연구 : 주거복지서비스를 중심으로)

  • Park, Kun-Suk;Lee, Seok-Je;Kim, Jong-Lim;Lee, Hyun-Jeong
    • Land and Housing Review
    • /
    • v.3 no.3
    • /
    • pp.213-223
    • /
    • 2012
  • As the public sector has been facing many challenges arising from the global economy and experiencing major changes, public services are redefined and various modes to improve their quality are applied to the customer service area. This research addresses whether and to what degree the professional competence of public institutions affect the customer service, in particular the quality and delivery of housing welfare services. With the institutional competences consisting of three elements - customer centric culture of service delivery, information sharing, and service delivery channels, this study utilizes a questionnaire survey, and the collected data are analyzed by using the inferential statistics. The findings show that customer centric culture of service delivery and information sharing have positive impacts on the quality of housing welfare services while service delivery channels don't have any influence on it. The research results imply that the institutional competence in the public sector is critical in the quality and delivery of the housing welfare services.

Popularity-Based Pushing Scheme for Supporting Content Provider Mobility in Content-Centric Networking (콘텐츠 중심 네트워크에서 정보제공자의 이동성 지원을 위한 인기도 기반 푸싱 기법)

  • Woo, Taehee;Park, Heungsoon;Kwon, Taewook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.78-87
    • /
    • 2015
  • Content-Centric Networking(CCN) is a new networking paradigm to search for the routing information needed to find a data from the content name, unlike conventional IP networks. In CCN, the mobility management, one of the CCN challenges, is consists of consumer mobility and content provider mobility. Among both, in the case of the content provider mobility, it requires too much overhead and time to update routing information on the corresponding routers. In this paper, we propose Popularity-based Pushing CCN(PoPCoN) which considers the content popularity to support effective mobility of content provider in CCN. Our proposed algorithm shortens content download time for the consumer and reduces the network overhead during mobility as compared to the existing approaches.

Edge-Centric Metamorphic IoT Device Platform for Efficient On-Demand Hardware Replacement in Large-Scale IoT Applications (대규모 IoT 응용에 효과적인 주문형 하드웨어의 재구성을 위한 엣지 기반 변성적 IoT 디바이스 플랫폼)

  • Moon, Hyeongyun;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1688-1696
    • /
    • 2020
  • The paradigm of Internet-of-things(IoT) systems is changing from a cloud-based system to an edge-based system to solve delays caused by network congestion, server overload and security issues due to data transmission. However, edge-based IoT systems have fatal weaknesses such as lack of performance and flexibility due to various limitations. To improve performance, application-specific hardware can be implemented in the edge device, but performance cannot be improved except for specific applications due to a fixed function. This paper introduces a edge-centric metamorphic IoT(mIoT) platform that can use a variety of hardware through on-demand partial reconfiguration despite the limited hardware resources of the edge device, so we can increase the performance and flexibility of the edge device. According to the experimental results, the edge-centric mIoT platform that executes the reconfiguration algorithm at the edge was able to reduce the number of server accesses by up to 82.2% compared to previous studies in which the reconfiguration algorithm was executed on the server.