• Title/Summary/Keyword: 다중 연계

Search Result 325, Processing Time 0.02 seconds

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

A Study on Satisfaction of Service by the Models of Informal-formal Resources Linkages for Long-term Care Elder (장기요양대상노인의 비공식적·공식적 자원연계 유형에 따른 서비스 만족도 연구)

  • Kim, Geum-Yeol
    • 한국노년학
    • /
    • v.30 no.4
    • /
    • pp.1027-1044
    • /
    • 2010
  • This study is to examine the effective system for providing services for long-term care elders, despite the expansion of formal care, informal care still is needed. Thus, this study's purpose is to classify the informal-formal resources linkages types of long-term care elders and looks into service satisfaction by these types and discover effective informal-formal resources linkages models. For that, this study is to divide informal-formal resources linkages types by the degree of providing services of informal and formal caregivers and discover the informal-formal resources linkages types using cluster analysis and explores the effectiveness of service satisfaction using multiple regression. The study's results is to suggest four models, such as family care, complementary, separation, formal service and complementary type was founded to be the most effective and then based on the result, we discuss as follows. First, we must strive to combine informal resources into formal service systemto the system for providing of service is made up the complementary type. Second, the system for providing services of long-term care elders is required integrated care system to alining of medical and long-term care services. Third, we have to consider a measure to improve of formal service type, for the satisfaction of formal service appears low relatively. Based on research findings, this study propose that the informal-formal resources linkages models are subdivided into the dimension of quantity and quality of care for improving the effectiveness of long-term care services.

Performance Evaluation of Turbo Codes by Soft Detection Metrics of STBC over an IEEE 802.16e Link (IEEE 802.16e 링크에서 시공간 블록 부호의 연판정 검출에 따른 터보 부호의 성능평가)

  • Kim, Young-Min;Kim, Soo-Young;Lim, Kwang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.1-8
    • /
    • 2010
  • Multi antenna techniques using space-time codes can achieve diversity gains in a multi-path environment without additional bandwidth requirement. Most of the 4G candidate standards including the IEEE 802.16e adopt multi-input multi-output (MIMO) schemes to achieve either high throughput performance or diversity gains. In these 4G candidate standards, turbo codes using an iterative decoder with soft input soft output are used to overcome serious channel fading. For this reason, the estimated signal values from MIMO detectors should be soft decision detection values. In this paper, we propose efficient methods to estimate soft decision detection values for various space time coding schemes, and provide the simulation results of turbo coded space time coding scheme over an IEEE 802.16e link.

A Privacy Approach Model for Multi-Access to IoT Users based on Society 5.0 (소사이어티 5.0 기반 IoT 사용자에 대한 다중 접근방식의 프라이버시 접근 모델)

  • Jeong, Yoon-Su;Yon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.4
    • /
    • pp.18-24
    • /
    • 2020
  • Recently, research on Society 5.0 has been actively carried out in Japan. The Society 5.0 is used in various areas using IoT sensors. This paper proposes a privacy approach model of multiple approaches to IoT users based on Society 5.0. The proposed model used multiple methods of synchronizing important information of IoT devices with one another in the virtual environment. The proposed model improved the efficiency of IoT information by accumulating the weight of IoT information on a probability-based basis. Further, it improves the accuracy of IoT information by segmenting it so that attribute information is linked to IoT information. As a result of the performance evaluation, the efficiency of IoT devices has improved by an average of 5.6 percent, depending on the number of IoT devices and the number of IoT hub devices. Accuracy has improved by an average of 15.9% depending on information collection and processing.

An Analysis on Teaching and Learning Strategies of Inquiry Tasks in the Elementary Moral Textbooks by Multiple Intelligence (다중지능을 이용한 초등학교 도덕 교과서 탐구 과제의 교수·학습 전략 분석)

  • Noh, Jeong-Im;Song, Gi-Ho;Yu, Jong-Youl
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.51 no.2
    • /
    • pp.5-22
    • /
    • 2017
  • The purpose of this study is to analyze the teaching and learning strategies included in the inquiry tasks of elementary moral textbooks with multiple intelligences (M.I), and to propose educational information services of teacher librarians. It was found that the tasks were mainly designed by the linguistic intelligence, logical & mathematical intelligence and spatial intelligence. In terms of the information literacy process, linguistic intelligence and spatial intelligence are mainly applied to the analysis-understanding stage. Logical & mathematical intelligence is applied to the stage of comprehensive-application and linguistic intelligence is applied to expression-delivery step. In order to cultivate the insufficient M.I in inquiry activities, teacher librarians should improve room and teaching materials of their school library and provide workbooks using the graphic organizer after analyzing the linkage of the inquiry tasks between the subjects.

Design of Translator for generating Secure Java Bytecode from Thread code of Multithreaded Models (다중스레드 모델의 스레드 코드를 안전한 자바 바이트코드로 변환하기 위한 번역기 설계)

  • 김기태;유원희
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.148-155
    • /
    • 2002
  • Multithreaded models improve the efficiency of parallel systems by combining inner parallelism, asynchronous data availability and the locality of von Neumann model. This model executes thread code which is generated by compiler and of which quality is given by the method of generation. But multithreaded models have the demerit that execution model is restricted to a specific platform. On the contrary, Java has the platform independency, so if we can translate from threads code to Java bytecode, we can use the advantages of multithreaded models in many platforms. Java executes Java bytecode which is intermediate language format for Java virtual machine. Java bytecode plays a role of an intermediate language in translator and Java virtual machine work as back-end in translator. But, Java bytecode which is translated from multithreaded models have the demerit that it is not secure. This paper, multhithread code whose feature of platform independent can execute in java virtual machine. We design and implement translator which translate from thread code of multithreaded code to Java bytecode and which check secure problems from Java bytecode.

  • PDF

The Effect of Private Guards' Job Embeddedness on Dual Commitment (민간경비원의 직무착근도가 이중몰입에 미치는 영향)

  • Lim, Woon-Sik
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.123-151
    • /
    • 2014
  • The purpose of this study was focused on the relationship between private guards' job embeddedness and dual commitment. In this study, job embeddedness is selected as an independent variable and dual commitment is selected as a dependent variable one. job embeddedness was divided into three sub-factors such as "fit", "links", and "sacrifice", and dual commitment is again composed with organizational commitment, and career commitment. Moreover sex, age, academic background, service period, and income were selected as a control variable. To test the hypotheses, survey data from private guards in Kyungpook are collected and analyzed. Principal component method is used to see which items cluster together in each factor and to calculate factor scores. Multiple regression analysis identifies several factors which have significant effects on dual commitment. Key finding can be summarized as follow. Fist, the factor of "fit" have significant effects on organizational commitment, and career commitment. Second, the factor of "links" have significant effects on organizational commitment, and career commitment. Third the factor of "sacrifice" have significant effects on organizational commitment, and career commitment. Finally, when all the variables with significant effects are included in the final model, "links" disappear, while "fit" and "sacrifice" remain statistically significant. Based on these finding, this study suggests some policy issues to promote private guards' dual commitment.

  • PDF

A Study on Outage Restoration Guide Including Load Cutoff in Distribution System (부하차단을 포함한 배전계통 정전복구방안에 관한 연구)

  • 김세호
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.1
    • /
    • pp.98-104
    • /
    • 2004
  • This paper represents the fast and efficient load transfer guide for fault or outage restoration in distribution system. For restoration guide, system trace is performed to reverse direction(source side) from tie breaker in tree-structured distribution network. Search space and breaker's combinational number for restoration guide are greatly reduced. It is proposed the load transfer method including first stage restoration(single load transfer, double load transfer, triple load transfer), second stage restoration(transferring load to neighboring feeder in order to expand the capacity margin) and load cutoff guide. The proposed method can be easily applied to primary customer restoration, multi-fault recovery and distribution automation system.

An Implementation of URI Management and Service System for the Construction of National R&D Reference Information Ontology (국가 과학기술 R&D 기반정보 온톨로지 구축을 위한 URI 관리 및 서비스 시스템 구현)

  • Koo Hee-Kwan;Jung Han-Min;Kang In-Su;Sung Won-Kyung;Yi Seung-June;Shim Bin-Gu
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.217-219
    • /
    • 2006
  • 전체적인 관점으로 국가 과학기술 R&D를 조망하는 국가 과학기술 R&D 기반정보 온톨로지는 인력정보, 과제정보, 성과정보를 포함하며 여러 URI들과 연계된다. 본 논문에서는 기존의 단일 URI 체계가 아닌 시스템 적이고 다층적인 국가 과락기술 R&D 기반정보 온톨로지의 인스턴스 레벨에 필요한 다중 URI 관리 및 서비스 시스템을 구현한다. 본 시스템은 관리적인 측면에서 웹 인터페이스 기반 URI 등록과 조회를, 서비스 측면에서 URI 질의중심의 웹서비스를 제공한다. 기존 정보(KISTI의 KOI, 학술진흥재단의 부서 및 기관, 국가과학기술인력 종합정보시스템의 인력DB)와 연계를 기반으로 가용성 및 재사용성을 높이고 신규정보를 위한 URI 생성규칙을 제공함으로써 URI 관리 및 서비스 시스템 완성도를 높였다.

  • PDF

The Network Protocol Among Cars at High-Speed based on Active Network (엑티브 네트워크 기반의 고속 이동시 차량 간 통신 프로토콜)

  • Jang, Hae-Suk;Lee, Jin-Kwan;Jung, Kyu-Cheol;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2008
  • This paper propose CAR-TO-CAR protocol which can prevent the cars at high-speed from a multiple clash accident at highway with exchanging information. we construct cluster be linked with distance took from GPS(Global Positioning System) because there is no connection at cars on the road. The proposed method solved the overload problem by establishing route because construct the cluster at the IEEE 802.11 MAC class. 'Multi-hop Routing protocol' based on Active Network enable stable Network to be formed by using Active Network.

  • PDF