• Title/Summary/Keyword: data paper

Search Result 56,011, Processing Time 0.068 seconds

Analysis and Modeling of Essential Concepts and Process for Peer-Reviewing Data Paper (데이터논문 동료심사를 위한 핵심 개념 분석과 프로세스 모델링)

  • Sungsoo Ahn;Sung-Nam Cho;Youngim Jung
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.3
    • /
    • pp.321-346
    • /
    • 2023
  • A data paper describing research data helps credit researchers producing the data while helping other researchers verify previous research and start new research by reusing the data. Publishing a data paper and depositing data to a public data repository are increasing with these benefits. A domestic academic society that plans to publish data papers faces challenges, including timely acquiring tremendous knowledge concerning data paper structures and templates, peer review policy and process, and trustworthy data repositories, as a data paper has different characteristics, unlike a research paper. However, the need for more research and information concerning the critical elements of data paper and the peer-review process makes it difficult to operate for data paper review and publication. To address these issues, we propose essential concepts of the data paper and the data paper peer-review, including the process model of the peer-review with in-depth analysis of five data journals' data paper templates, articles, and other guides worldwide. Academic societies intending to publish or add data papers as a new type of paper may establish policies and define a peer-review process by adopting the proposed conceptual models, effectively streamlining the preparation of data paper publication.

EPD File Generation System Based on Template for Choosing E-paper Contents Layout

  • Son, Bong-Ki
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.107-114
    • /
    • 2018
  • We propose EPD(Electrophoretic Display) file generation system based on template that enable users to choose contents layout for E-paper display. And also we show implementation results that apply the proposed system in digital doorsign management field adopting E-paper display. Template includes information for contents layout which is composed of standard form image to be used as background image, coordinates of area for dynamic data to be inserted, data source about dynamic data, and characteristic data of EPD panel for displaying contents. System administrator registers templates in Forms Server. When user chooses a contents layout, Forms Server automatically generates EPD file for displaying contents in E-paper by using information of the template and sends EPD file into doorsign. Strength of the proposed system lies in reflecting user preference about contents design and adding personal data into E-paper contents by smartphone application.

Research on Geodetic Data Standard System

  • Zhiping, Lu;Xiguang, Zhang
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.53-56
    • /
    • 2003
  • Aiming at importance of geodetic data standards in process of digitized geodetic production, application and service, this paper discusses the content framework of geodetic technical base standard, information system standard and data service standard. Hierarchy relation and category relation of geodetic data standard system are established in this paper.

  • PDF

Platform Business and Value Creation: Using Public Open Data (플랫폼 비즈니스와 가치 창출: 개방형 공공데이터 활용)

  • Han, Junghee
    • Knowledge Management Research
    • /
    • v.20 no.1
    • /
    • pp.155-174
    • /
    • 2019
  • Variety of data have been opened or connected by several levels of government. In smart city initiatives, open data become the source of a new business model. This paper is to foster ways of public open data (POD) by analyzing the start-up company that utilizes POD. In order to fulfill it, this paper adapts the case study research. Findings say that POD has potential to validate and further enrich the platform business. But to find which types of public open data are most prevalent is insufficient. To do this, it is more needed that sophisticated and many cases should be examined. However, this paper shows that platform business by using POD could lead to reduce the cost and increase the benefits for both providers and customers. From the findings, this paper shows that public open data has an important role not only to boost new venture creations which are prevalent ways of smart city but also to foster different platforms enabling new value capture and creation according to development of internet of things based on ICT technology.

Technology Clustering Using Textual Information of Reference Titles in Scientific Paper (과학기술 논문의 참고문헌 텍스트 정보를 활용한 기술의 군집화)

  • Park, Inchae;Kim, Songhee;Yoon, Byungun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.2
    • /
    • pp.25-32
    • /
    • 2020
  • Data on patent and scientific paper is considered as a useful information source for analyzing technological information and has been widely utilized. Technology big data is analyzed in various ways to identify the latest technological trends and predict future promising technologies. Clustering is one of the ways to discover new features by creating groups from technology big data. Patent includes refined bibliographic information such as patent classification code whereas scientific paper does not have appropriate bibliographic information for clustering. This research proposes a new approach for clustering data of scientific paper by utilizing reference titles in each scientific paper. In this approach, the reference titles are considered as textual information because each reference consists of the title of the paper that represents the core content of the paper. We collected the scientific paper data, extracted the title of the reference, and conducted clustering by measuring the text-based similarity. The results from the proposed approach are compared with the results using existing methodologies that one is the approach utilizing textual information from titles and abstracts and the other one is a citation-based approach. The suggested approach in this paper shows statistically significant difference compared to the existing approaches and it shows better clustering performance. The proposed approach will be considered as a useful method for clustering scientific papers.

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

A Survey of Homomorphic Encryption for Outsourced Big Data Computation

  • Fun, Tan Soo;Samsudin, Azman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3826-3851
    • /
    • 2016
  • With traditional data storage solutions becoming too expensive and cumbersome to support Big Data processing, enterprises are now starting to outsource their data requirements to third parties, such as cloud service providers. However, this outsourced initiative introduces a number of security and privacy concerns. In this paper, homomorphic encryption is suggested as a mechanism to protect the confidentiality and privacy of outsourced data, while at the same time allowing third parties to perform computation on encrypted data. This paper also discusses the challenges of Big Data processing protection and highlights its differences from traditional data protection. Existing works on homomorphic encryption are technically reviewed and compared in terms of their encryption scheme, homomorphism classification, algorithm design, noise management, and security assumption. Finally, this paper discusses the current implementation, challenges, and future direction towards a practical homomorphic encryption scheme for securing outsourced Big Data computation.

A Level Evaluation Model for Data Governance (데이터 거버넌스 수준평가 모델 개발의 제안)

  • Jang, Kyoung-Ae;Kim, Woo-Je
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.42 no.1
    • /
    • pp.65-77
    • /
    • 2017
  • The purpose of this paper is to develop a model of level evaluation for data governance that can diagnose and verify level of insufficient part of operating data governance. We expanded the previous study related on attribute indices of data governance and developed a level model of evaluation and items. The model of level evaluation for data governance is the level of evaluation and has items of 400 components. We used previous studies and expert opinion analysis such as the Delphi technique, KJ method in this paper. This study contributes to literature by developing a level evaluation model for data governance at the early phase. This paper will be used for the base line data in objective evidence of performance in the companies and agencies of operating data governance.

A Implementation of Optimal Multiple Classification System using Data Mining for Genome Analysis

  • Jeong, Yu-Jeong;Choi, Gwang-Mi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.43-48
    • /
    • 2018
  • In this paper, more efficient classification result could be obtained by applying the combination of the Hidden Markov Model and SVM Model to HMSV algorithm gene expression data which simulated the stochastic flow of gene data and clustering it. In this paper, we verified the HMSV algorithm that combines independently learned algorithms. To prove that this paper is superior to other papers, we tested the sensitivity and specificity of the most commonly used classification criteria. As a result, the K-means is 71% and the SOM is 68%. The proposed HMSV algorithm is 85%. These results are stable and high. It can be seen that this is better classified than using a general classification algorithm. The algorithm proposed in this paper is a stochastic modeling of the generation process of the characteristics included in the signal, and a good recognition rate can be obtained with a small amount of calculation, so it will be useful to study the relationship with diseases by showing fast and effective performance improvement with an algorithm that clusters nodes by simulating the stochastic flow of Gene Data through data mining of BigData.

Design of AES/SEED Encription Module and Implemention of Multi-Level Security System (AES/SEED암호화 모듈 설계와 멀티레벨 보안 시스템 구현)

  • 박덕용;최경문;김현성;차재원;김영철
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.1133-1136
    • /
    • 2003
  • This paper has been studied about the implemention of the data-encription processor and imformation security system. Also in the paper, the brief contents of the verification of the data-encryption algorithm and the method of using HDL-level sources implemented is described. And then this paper has been designed for multi-level data secure system to verify and analyze the data-encryption processor implemented as VHDL.

  • PDF