• Title/Summary/Keyword: 상세 단계

Search Result 548, Processing Time 0.037 seconds

Feature Analysis of Metadata Schemas for Records Management and Archives from the Viewpoint of Records Lifecycle (기록 생애주기 관점에서 본 기록관리 메타데이터 표준의 특징 분석)

  • Baek, Jae-Eun;Sugimoto, Shigeo
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.10 no.2
    • /
    • pp.75-99
    • /
    • 2010
  • Digital resources are widely used in our modern society. However, we are facing fundamental problems to maintain and preserve digital resources over time. Several standard methods for preserving digital resources have been developed and are in use. It is widely recognized that metadata is one of the most important components for digital archiving and preservation. There are many metadata standards for archiving and preservation of digital resources, where each standard has its own feature in accordance with its primary application. This means that each schema has to be appropriately selected and tailored in accordance with a particular application. And, in some cases, those schemas are combined in a larger frame work and container metadata such as the DCMI application framework and METS. There are many metadata standards for archives of digital resources. We used the following metadata standards in this study for the feature analysis me metadata standards - AGLS Metadata which is defined to improve search of both digital resources and non-digital resources, ISAD(G) which is a commonly used standard for archives, EAD which is well used for digital archives, OAIS which defines a metadata framework for preserving digital objects, and PREMIS which is designed primarily for preservation of digital resources. In addition, we extracted attributes from the decision tree defined for digital preservation process by Digital Preservation Coalition (DPC) and compared the set of attributes with these metadata standards. This paper shows the features of these metadata standards obtained through the feature analysis based on the records lifecycle model. The features are shown in a single frame work which makes it easy to relate the tasks in the lifecycle to metadata elements of these standards. As a result of the detailed analysis of the metadata elements, we clarified the features of the standards from the viewpoint of relationships between the elements and the lifecycle stages. Mapping between metadata schemas is often required in the long-term preservation process because different schemes are used in the records lifecycle. Therefore, it is crucial to build a unified framework to enhance interoperability of these schemes. This study presents a basis for the interoperability of different metadata schemas used in digital archiving and preservation.

Analysis on the Cooling Efficiency of High-Performance Multicore Processors according to Cooling Methods (기계식 쿨링 기법에 따른 고성능 멀티코어 프로세서의 냉각 효율성 분석)

  • Kang, Seung-Gu;Choi, Hong-Jun;Ahn, Jin-Woo;Park, Jae-Hyung;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.7
    • /
    • pp.1-11
    • /
    • 2011
  • Many researchers have studied on the methods to improve the processor performance. However, high integrated semiconductor technology for improving the processor performance causes many problems such as battery life, high power density, hotspot, etc. Especially, as hotspot has critical impact on the reliability of chip, thermal problems should be considered together with performance and power consumption when designing high-performance processors. To alleviate the thermal problems of processors, there have been various researches. In the past, mechanical cooling methods have been used to control the temperature of processors. However, up-to-date microprocessors causes severe thermal problems, resulting in increased cooling cost. Therefore, recent studies have focused on architecture-level thermal-aware design techniques than mechanical cooling methods. Even though architecture-level thermal-aware design techniques are efficient for reducing the temperature of processors, they cause performance degradation inevitably. Therefore, if the mechanical cooling methods can manage the thermal problems of processors efficiently, the performance can be improved by reducing the performance degradation due to architecture-level thermal-aware design techniques such as dynamic thermal management. In this paper, we analyze the cooling efficiency of high-performance multicore processors according to mechanical cooling methods. According to our experiments using air cooler and liquid cooler, the liquid cooler consumes more power than the air cooler whereas it reduces the temperature more efficiently. Especially, the cost for reducing $1^{\circ}C$ is varied by the environments. Therefore, if the mechanical cooling methods can be used appropriately, the temperature of high-performance processors can be managed more efficiently.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

영양-울진지역 선캠브리아기 변성암류의 변형작용사

  • 강지훈;김남훈;박계헌;송용선;옥수석
    • Proceedings of the Mineralogical Society of Korea Conference
    • /
    • 2003.05a
    • /
    • pp.84-85
    • /
    • 2003
  • 소백산육괴의 동부에 분포하는 영양-울진지역의 선캠브리아기 변성암류는 평해층, 기성층, 원남층, 평해화강편마암, 하다우백질화강편마암 등으로 구성되어 있다(김옥준 외, 1963). 그러나, 최근 김남훈 외(2001, 2002)은 야외조사연구와 암석학적 및 지구화학적 연구를 통하여 주로 변성화산암류로 기재되었던 기성층은 변성화산암류가 아니라 평해층과 원남층에서 산출되는 화강암질편마암과 각섬암 기원의 변성암류가 연성전단변형을 받아 형성된 압쇄암 내지 초압쇄암으로 되어 있고, 기존의 기성층은 변성화산암류와 같이 성분상으로 구분되는 별개의 층이 아닌 구조적으로 만들어진 연성전단대의 중심부일 가능성을 시사한 바가 있다. 본 연구는 연성전단대의 연장성 및 연성전단대 형성과 관련된 지구조운동의 특성을 파악하고, 중첩된 변형구조들의 선후관계로부터 영양-울진지역 선캠브리아기 변성암류에 대한 변형작용사를 규명하기 위해 기성층의 분포지를 중심으로 이 지역 선캠브리아기 변성암류에 대한 상세한 야외지질조사를 실시하였다. 그 결과, 예천(북후면-평은면)지역을 통과하여 봉화 부근에서 동북동-서남서 방향이 동-서 방향으로 전환하여 장군봉지역까지 연장되는 것으로 알려져 있는 우수 주향 이동성 예천전단대(KIGAM, 1995; 강지훈 외 1997; 강지훈, 2000; 강지훈과 김형식, 2000)는 영양-울진지역까지 연장됨이 확인된다. 또한, 영양-울진지역의 선캠브리아기 변성암류에는 연성전단변형 이전에 적어도 한 번의 습곡작용과 이후에 적어도 두 번의 습곡작용이 인지된다. 각 변형단계별 특징적인 구조요소를 요약하면 다음과 같다. D1 변형: 편마면 내지 편리(S0)가 습곡되어 형성된 F1 습곡은 동-서 방향의 준 수평적인 습곡축을 갖는 뿌리 없는 등사습곡 형태로 인지된다. 양 날개부의 S0 엽리는 F1 습곡축면(S1)으로 완전히 전위된 하나의 엽리(S0-1)로 나타나고, S0-1 엽리는 이 지역의 광역엽리로 인지된다. S0-1 광역엽리는 구성암류의 대상 분포 방향과 유사한 서북서 주향에 북쪽으로 중각 경사하는 집중된 방향성을 보이며 분산되어 나타난다. D2 변형: 변형구조로는 신장선구조, 압쇄구조면, 비대칭습곡 등으로 인지된다. 신장선구조는 S0-1 엽리면상에서 주로 신장된 석영(집합체)과 장석(집합체)들의 정향배열에 의해 정의되고, S0-1 엽리의 주향 방향으로 저각으로 침강하는 집중된 방향성을 보이며 분산되어 나타난다. 신장선구조에 평행하고 S0-1 엽리에 수직한 단면에서는 상부-동쪽-이동의 우수주향 이동성 연성 전단운동감각을 지시하는 구조요소들이 다량 관찰된다. 연성전단변형에 의해 형성된 압쇄구조면은 전단엽리와 압쇄엽리에 각각 해당하는 C면과 S면 등이 인지된다. 전단엽리 C면은 S0-1 광역엽리와 거의 일치하고, 압쇄엽리 S면은 F2 비대칭습곡의 축면엽리와 거의 일치한다. S0-1 엽리를 습곡시키는 F2 비대칭습곡은 S0-1 엽리를 전단면으로 하여 상부-동쪽-이동 전단운동에 의해 형성된 밀착습곡 형태로 인지된다. F2 습곡축은 북동 방향으로 중각 내지 저각 침강하고 F1 습곡축과는 65$^{\circ}$-75$^{\circ}$ 범위의 사이각을 이룬다. F2 습곡축면은 동북동 주향에 북쪽으로 중각으로 경사하고 F1 습곡축면과는 20$^{\circ}$-40$^{\circ}$ 범위의 사이각을 이룬다. D3 변형. S0-1 엽리와 압쇄구조면 등을 습곡시키는 F3 습곡은 준 수평적인 습곡축과 습곡축면을 갖는 개방 횡와습곡의 형태로 인지된다. D4 변형: F4 습곡은 비대칭 공역성 킹크습곡, 공역성 충상단층에 수반되어 나타나는 드래그습곡, 대칭 개방 직림습곡 등의 다양한 습곡 형태로 인지된다. 이들 F4 습곡의 축면엽리는 일반적으로 동-서 주향에 남쪽과 북쪽으로 경사한다. 그 경사각은 비대칭 공역성 킹크습곡(저각), 드래그습곡(중각), 대칭 개방 직립습곡(고각) 순으로 고각을 이룬다. F4 습곡축은 동쪽과 서쪽으로 저각 침강하는 집중된 방향성을 보인다. 공역성 충상단층은 동-서 주향에 남쪽과 북쪽으로 경사하는 단층면과 상부가 북쪽과 남쪽으로 충상하는 운동상을 보인다. 드래그습곡의 축면엽리는 이러한 공역성 충상단층운동의 전단압축방향에 수직으로 발달한다. 이러한 D4 변형구조는 남-북 방향의 압축 지구조 환경하에서 형성된 것으로 고찰된다.

  • PDF

Adaptive Lock Escalation in Database Management Systems (데이타베이스 관리 시스템에서의 적응형 로크 상승)

  • Chang, Ji-Woong;Lee, Young-Koo;Whang, Kyu-Young;Yang, Jae-Heon
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.742-757
    • /
    • 2001
  • Since database management systems(DBMSS) have limited lock resources, transactions requesting locks beyond the limit mutt be aborted. In the worst carte, if such transactions are aborted repeatedly, the DBMS can become paralyzed, i.e., transaction execute but cannot commit. Lock escalation is considered a solution to this problem. However, existing lock escalation methods do not provide a complete solution. In this paper, we prognose a new lock escalation method, adaptive lock escalation, that selves most of the problems. First, we propose a general model for lock escalation and present the concept of the unescalatable look, which is the major cause making the transactions to abort. Second, we propose the notions of semi lock escalation, lock blocking, and selective relief as the mechanisms to control the number of unescalatable locks. We then propose the adaptive lock escalation method using these notions. Adaptive lock escalation reduces needless aborts and guarantees that the DBMS is not paralyzed under excessive lock requests. It also allows graceful degradation of performance under those circumstances. Third, through extensive simulation, we show that adaptive lock escalation outperforms existing lock escalation methods. The results show that, compared to the existing methods, adaptive lock escalation reduces the number of aborts and the average response time, and increases the throughput to a great extent. Especially, it is shown that the number of concurrent transactions can be increased more than 16 ~256 fold. The contribution of this paper is significant in that it has formally analysed the role of lock escalation in lock resource management and identified the detailed underlying mechanisms. Existing lock escalation methods rely on users or system administrator to handle the problems of excessive lock requests. In contrast, adaptive lock escalation releases the users of this responsibility by providing graceful degradation and preventing system paralysis through automatic control of unescalatable locks Thus adaptive lock escalation can contribute to developing self-tuning: DBMSS that draw a lot of attention these days.

  • PDF

Latitude within Judgement and Virtue (판단력과 덕 그리고 활동여지)

  • Kim, Duk-soo
    • Journal of Korean Philosophical Society
    • /
    • v.142
    • /
    • pp.1-25
    • /
    • 2017
  • Kant's doctrine of virtue shows how an actor should behave morally in an individual situation with moral law defines the limits of human action. There is latitude for action in the course of formulating the maxims of action by an actor. And moral judgement, as Aristotle's Pronesis, is very important in the latitude for action. In the doctrine of virtue, Kant suggests two kinds of duty of virtue: one's own perfeciton as an obligatory end, and the happiness to others as an obligatory end-and raises the question of casuistics for each. However, this was the practice and training for the human moral life by application of the moral law. In particular, Kant saw that ethics does not give laws for action, but only give laws for the maxims of action, and further intended to realize the practice in a proper way of seeking truth through casuistical questions. Thus, Kant points out that the casuistic is related only to ethics in a fragmentary way and is added to ethics only as a comment on the system. According to Kant, virtue and judgment are inevitable to apply categorical imperative in the empirical and realistic world. In other words, virtue and judgment are necessary to enable people who are likely to act in accordance to inclination to live a moral life in accordance with the command of reason. Thus Kant saw that in order to take wide duty into narrow ones, human beings must not only have to cultivate virtues as a strong power of will, but also to exercise judgment. In addition, the distinction between duty of law(narrow obligation) and duty of virtue(wide obligation) is dependent on whether there is a latitude for action in the application of both duties. So the role of virtue and training of judgement is very important in the latitude for action that occurs in the process of formalizing actor's maxims. In detail, as the duty is wider, so man's obligation to action is more imperfect, but the closer to narrow duty(Law) he brings the maxim of observing this duty(in his attitude of will), so much the more perfect is his virtuous action. Thus, it was an effort to show how Kant's best moral principles, that is categorical imperative could be applied to the real world at the time of criticism. Of course, even if it is difficult to assess Kant's efforts as successful, criticizing Kant's ethics as 'formal', 'abstract', or 'monologous' is not persuasive because of critics did not understand his ethics as a whole.

Development Strategy for New Climate Change Scenarios based on RCP (온실가스 시나리오 RCP에 대한 새로운 기후변화 시나리오 개발 전략)

  • Baek, Hee-Jeong;Cho, ChunHo;Kwon, Won-Tae;Kim, Seong-Kyoun;Cho, Joo-Young;Kim, Yeongsin
    • Journal of Climate Change Research
    • /
    • v.2 no.1
    • /
    • pp.55-68
    • /
    • 2011
  • The Intergovernmental Panel on Climate Change(IPCC) has identified the causes of climate change and come up with measures to address it at the global level. Its key component of the work involves developing and assessing future climate change scenarios. The IPCC Expert Meeting in September 2007 identified a new greenhouse gas concentration scenario "Representative Concentration Pathway(RCP)" and established the framework and development schedules for Climate Modeling (CM), Integrated Assessment Modeling(IAM), Impact Adaptation Vulnerability(IAV) community for the fifth IPCC Assessment Reports while 130 researchers and users took part in. The CM community at the IPCC Expert Meeting in September 2008, agreed on a new set of coordinated climate model experiments, the phase five of the Coupled Model Intercomparison Project(CMIP5), which consists of more than 30 standardized experiment protocols for the shortterm and long-term time scales, in order to enhance understanding on climate change for the IPCC AR5 and to develop climate change scenarios and to address major issues raised at the IPCC AR4. Since early 2009, fourteen countries including the Korea have been carrying out CMIP5-related projects. Withe increasing interest on climate change, in 2009 the COdinated Regional Downscaling EXperiment(CORDEX) has been launched to generate regional and local level information on climate change. The National Institute of Meteorological Research(NIMR) under the Korea Meteorological Administration (KMA) has contributed to the IPCC AR4 by developing climate change scenarios based on IPCC SRES using ECHO-G and embarked on crafting national scenarios for climate change as well as RCP-based global ones by engaging in international projects such as CMIP5 and CORDEX. NIMR/KMA will make a contribution to drawing the IPCC AR5 and will develop national climate change scenarios reflecting geographical factors, local climate characteristics and user needs and provide them to national IAV and IAM communites to assess future regional climate impacts and take action.

A Plan to Strengthen the Role of Citizens as Co-Creators of Smart City Services - Focused on the Development of Function Issue Card Technology - (스마트도시서비스 공동창의자로서의 시민 역할 강화 방안 - 기능카드 기법 개발을 중심으로 -)

  • JI, Sang-Tae;PARK, Jun-Ho;PARK, Joung-Woo;NAM, Kwang-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.24 no.2
    • /
    • pp.1-11
    • /
    • 2021
  • Lately, the Korean Government has gradually expanded participation by local residents who are users of the area in the smart city project for the construction of region specialization smart city service (hereinafter called "Smart Service") and the enhancement in the citizen's awareness. However, due to the lack of information on smart service-related technology, there has been a limitation in getting the specific opinion of citizens in the process of designing the Smart Service. In this study, reports made by 4 four local governments which were selected for implementation of 2019 "Smart Town Challenge Projects" were reviewed to diagnose the actualization level of the smart service suggested by citizens through the living lab. The analysis results show that though the smart service plan was established by using diverse design thinking methodology through the living lab, there was a limitation in having citizens design the specific functions of the smart service. So, this study suggests the function issue card technique which can be used by modulating and freely combining four elements such as information collection, processing, supplying method and technique of the smart service and the service contents. This function issue card technique was directly applied to the living lab of the smart city project to verify its effectiveness. It was found that through this technique, citizens can combine the functions and contents of the smart service to materialize smart services at the level of detailed functions. The function issue card technique suggested in this study is expected to contribute to the actualization of opinions for the role of citizens as co-creators in solving local problems in the citizen participation type smart city plan in the future, thus helping the design of the regional specialization smart service.

Yeoheon Jang Hyun Gwang's Design of Self-organization for Completion of Confucian Truth (여헌(旅軒) 장현광(張顯光)의 실학적(實學的) 설계(設計) - 『역학도설(易學圖說)』과 위기지학(爲己之學) -)

  • Yoo, Kwon Jong
    • (The)Study of the Eastern Classic
    • /
    • no.49
    • /
    • pp.7-38
    • /
    • 2012
  • This study is an argument that Yeoheon Jang Hyun Gwang's Yeok-Hak-Do-Seol has been on the context of the typical Confucian methodology of self-organization for a sage's or superman's character (爲己之學) and completed the methodology. Therefore the context from Confucius to Southern Song China Era is argued as a context of development and systematization of the methodology. In addition the fact that Zhuxi(朱熹) and his students had systimatization of the methodology with the publications of some important textbooks is also explained. The most stressed thing of this study is Yeoheon's Yeok-Hak-Do-Seol is just the text that succeeded them as the methodology of self-organization and had a special purpose of completion of the methodology not only with comprehensive items of practice but also intuition into the human's life and the world by his mastery of Yeokhak(易學). The viewpoint this study keeps is the Confucian methodology of self-organization is considered for the purpose of development and upholding the Confucian truth, and thus the methodology itself has been regarded as the necessary one that is the closest approximation to a pursuit of Confucian truth. According to this viewpoint we can observe the features of methodology of the pursuit of Confucian truth from the Yeok-Hak-Do-Seol. However the Yeok-Hak-Do-Seol has its purpose merely on a human being's self-organization but also on an enormous enterprise to make the universe peace or sustainability of the world. His stress on the enterprise shows that his methodology is not a merely repetition of the tradition of the Zhuzixue but a creative deveopment of the tradition. The other feature is that his methodology is systematization on the basis of Yeokhak, or the study of Yi-jing(易經). The main method he intensified is easiness and simplification that is the main point which he extracted from Yi-jing as the most important and necessary way of life.

Structural Geometry, Kinematics and Microstructures of the Imjingang Belt in the Munsan Area, Korea (임진강대 문산지역의 구조기하, 키네마틱스 및 미세구조 연구)

  • Lee, Hyunseo;Jang, Yirang;Kwon, Sanghoon
    • Economic and Environmental Geology
    • /
    • v.54 no.2
    • /
    • pp.271-283
    • /
    • 2021
  • The Imjingang Belt in the middle-western Korean Peninsula has tectonically been correlated with the Permo-Triassic Qinling-Dabie-Sulu collisional belt between the North and South China cratons in terms of collisional tectonics. Within the belt, crustal-scale extensional ductile shear zones that were interpreted to be formed during collapsing stage with thrusts and folds were reported as evidence of collisional events by previous studies. In this study, we tried to understand the nature of deformation along the southern boundary of the belt in the Munsan area based on the interpretations of recently conducted structural analyses. To figure out the realistic geometry of the study area, the down-plunge projection was carried out based on the geometric relationships between structural elements from the detailed field investigation. We also conducted kinematic interpretations based on the observed shear sense indicators from the outcrops and the oriented thin-sections made from the mylonite samples. The prominent structures of the Munsan area are the regional-scale ENE-WSW striking thrust and the N-S trending map-scale folds, both in its hanging wall and footwall areas. Shear sense indicators suggest both eastward and westward vergence, showing opposite directions on each limb of the map-scale folds in the Munsan area. In addition, observed deformed microstructures from the biotite gneiss and the metasyenite of the Munsan area suggest that their deformation conditions are corresponding to the typical mid-crustal plastic deformation of the quartzofeldspathic metamorphic rocks. These microstructural results combined with the macro-scale structural interpretations suggest that the shear zones preserved in the Munsan area is mostly related to the development of the N-S trending map-scale folds that might be formed by flexural folding rather than the previously reported E-W trending crustal-scale extensional ductile shear zone by Permo-Triassic collision. These detailed examinations of the structures preserved in the Imjingang Belt can further contribute to solving the tectonic enigma of the Korean collisional orogen.