• Title/Summary/Keyword: 상호배제

Search Result 236, Processing Time 0.028 seconds

Methods of User-Role Assignment for Static Separation of Duty (정적 임무분리를 만족하는 사용자-역할 할당 방안)

  • 윤희정;전준철;김용석;전진우;유기영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.451-453
    • /
    • 2004
  • 오래 전부터 많은 컴퓨팅 시스템에서 기분적으로 제공되어지는 원리인 임무분리는 중대한 업무를 둘 이상의 사용자에게 나누어줌으로써 단독 사용자가 시스템을 손상시키는 것을 막도록 하는 것이 목적이다. 역할기반 접근통제에서 임무분리 원리를 제공하는 종류로는 정적 임무분리, 동적 임무분리, 기능적 임무분리, 객체기반 임무분리 등이 있다. 여기서 우리는 정적 임무분리를 만족시키는 모델로서 상호 배제 역할 쌍을 이용한 모델과 역할유형을 이용한 모델 그리고 상호 무관 역할 쌍을 이용한 모델을 제안한다

  • PDF

An Intersection Validation and Interference Elimination Algorithm between Weapon Trajectories in Multi-target and Multi-weapon Environments (다표적-다무장 환경에서 무장 궤적 간 교차 검증 및 간섭 배제 알고리즘)

  • Yoon, Moonhyung;Park, Junho;Yi, JeongHoon;Kim, Kapsoo;Koo, BongJoo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.614-622
    • /
    • 2018
  • As multiple weapons are fired simultaneously in multi-target and multi-weapon environments, a possibility always exists in the collision occurred by the intersection between weapon trajectories. The collision between weapons not only hinders the rapid reaction but also causes the loss of the asset of weapons of friendly force to weaken the responsive power against the threat by an enemy. In this paper, we propose an intersection validation and interference elimination algorithm between weapon trajectories in multi-target and multi-weapon environments. The core points of our algorithm are to confirm the possible interference through the analysis on the intersections between weapon trajectories and to eliminate the mutual interference. To show the superiority of our algorithm, we implement the evaluation and verification of performances through the simulation and visualization of our algorithm. Our experimental results show that the proposed algorithm performs effectively the interference elimination regardless of the number of targets and weapon groups by showing that no cross point exists.

Between a Historical Subject and a Novel Subject -Reading The Song of sword based on the Logic of Choice, Transformation, and Exclusion (역사적 인간과 소설적 인간의 사이 -선택, 변형, 배제의 논리로 읽는 『칼의 노래』)

  • Kim, Won-Kyu
    • Journal of Popular Narrative
    • /
    • v.25 no.3
    • /
    • pp.103-141
    • /
    • 2019
  • The purpose of this paper is to examine the logic of choice, transformation, and exclusion in The Song of sword, comparing it with the historical records. This paper explains how a novel is 'produced'. Through this, it searches for the aspects in which The Song of sword changed into 'a narrative revealing the disillusionment of the novel's subject with the world'. In the logic of choice, it explores which time and space were chosen in the novel, and which character was chosen to prepare the content and formal framework of the novel. In the logic of transformation, it is confirmed that the meaning of 'individual' is highlighted in the novel, unlike the historical records, by transforming both the character of the enemy and the meaning of war. In the logic of exclusion, it studies the characteristics of the modern (novel's) subject in the novel by excluding the characteristics of the historical subject that existed in a particular time and space. This paper differs from previous studies in that it examines the way in which a novel is produced by comparing and analyzing The Song of sword based on the historical records. Through these analyses, we can see the unity of various heterogeneous elements, such as the historical reality, the writer's ideology and imagination, and the desire of the contemporary in the form of a novel. Also, by examining the elements of text that can not be sutured into a complete form, we can see the meaning of the novel's text as an unstable system.

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.605-608
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network conisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

  • PDF

A study on Management Mechanism of Malicious Node in Ad-hoc Networks (Ad-hoc 네트워크에서 악의적 노드 관리기법에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2716-2723
    • /
    • 2010
  • An Ad-hoc network will operate properly and provide smooth communication when nodes cooperate mutually with each of them having equal authority. Although it is possible to form a network consisting only of authenticated nodes in order to ensure reliability, authentication by itself is not sufficient to remove malicious nodes and their activities jeopardizing the whole network. Detection and prevention of such activities are vital for maintaining a safe and reliable network, but research on this matter is relatively lacking. Hence a suggestion is made on how to detect and prevent malicious or uncooperative ones among the nodes forming a network by a relationship of mutual trust, thereby maintaining safety and stability of the network and improving its processing abilities

비트겐슈타인은 왜 "논고"를 포기했는가?

  • Park, Jeong-Il
    • Korean Journal of Logic
    • /
    • v.7 no.2
    • /
    • pp.71-104
    • /
    • 2004
  • 비트겐슈타인이 왜 "논고"를 포기했느냐 하는 주제는 비트겐슈타인의 철학을 조명하는 데 매우 중요한 문제이다. 그러나 이 글의 일차적인 관심은 비트겐슈타인이라는 한 개인의 실제 철학적 사유 과정보다는, 오히려 "논고"가 포기될 수 있는 모든 가능성들과 경로를 생각하고 추적하는 데 있다. 이를 위하여 우리는 "논고"의 여러 근본 전제들을 크게 두 가지로 나눌 수 있다. 한 부류는 직접적 논박 가능성이 희박한 것으로서, 여기에는 "논고"에서 정의에 해당되는 것, 모호한 개념인 "완전한 분석"과 관련된 것, 그리고 유아론과 관련된 것 등이 있다. 다른한 부류는 전자에 비해 어떤 직접적인 논박 가능성의 여지가 있는 근본 전제로서, 가장 중요한 것으로 요소 명제들의 상호 독립성을 들 수 있다. "논고"는 소위 "색깔배제 문제"부터 후자에 속하는 근본전제가 직접적인 타격을 입으면서 와해되기 시작했으며, "논고"와는 완전히 다른 패러다임에 서게 됨으로써 비로소 포기되었다.

  • PDF

Improvement Programs for Traffic Safety Devices on Urban Freeway (도시고속도로 교통안전시설물 개선방안)

  • 이대원
    • Proceedings of the KOR-KST Conference
    • /
    • 1998.10a
    • /
    • pp.332-341
    • /
    • 1998
  • 본 연구는 지역간 고속도로에 비해 통행수요가 높고, 진·출입램프 간격이 짧으며, 구간의 용량변화가 심하고, 기하설계 기준이 낮은 도시고속도로 교통안전시설물의 설치·운영상의 문제점을 검토하고, 이를 통한 개선 방안을 제시하였다. 도시고속도로 교통안전시설물 문헌조사는 국내외 관련 기준서를 비교 분석하였으며, 현황 조사는 서울지역의 도시고속도로중 올림필대로를 중심으로 시설물의 종류, 설치방법, 시인성등을 조사하였다. 문헌과 현황조사 결과에 의하면 현행 시설물 중에는 설치 기준의 누락 또는 새로이 개발된 시설물 기준 등이 미흡하며, 시설물의 설치 및 운영이 현행 기준에 크게 못 미치는 것을 나타났다. 또한 경제성을 고려한 시설상호간 중복 및 모순을 배제할 필요가 있으며, 시설물의 유지관리체계 마련이 시급한 것으로 나타났다. 따라서 본 연구에서는 기초연구를 통한 신개발 시설물의 설치 기준 설정, 현행 기준의 명확한 적용으로 시인성 및 통일성 확보, 시설물의 중복성 배제와 기능성 확립, 유지관리체계 마련, 그리고 도시고속도로 특성에 맞는 시설물 설치 기준서 및 실무지침서의 개발을 제안하였다.

  • PDF

A Study on the Solutions of the Elderly Problems in Terms of Social Issuest (사회문제 측면에서 본 노인문제의 해결방안에 관한 연구)

  • Jeong, Su-Il;Kim, Bo-Ki
    • Industry Promotion Research
    • /
    • v.1 no.2
    • /
    • pp.109-119
    • /
    • 2016
  • This study analyzed how the situation of the elderly problems around the issue appeared on theory and field. First was to identify elderly issues with a theoretical argument about the elderly problem, from the perspective of structural functionalism, conflict theory, symbolic interaction theory. The issues of older issues was selected to increase, divorce increases and remarried decline in the elderly, exclusion from the labor market, and dilemmas, such as political participation and volunteering in the elderly households study the current situation and their problems for them. the results in terms of social issues the first solution to the problem, the elderly, it is necessary to switch recognition for the elderly. Second, we need to remove negative perceptions about older people. Third, we must establish a complementary relationship between the state and the private sector.In conclusion, it should be full in order to solve the elderly problem in terms of social issues, not limited to the elderly problem in the elderly subject matter of an individual or family corresponds to publicize it as a social problem social preemptively.

Globalization and the Politics of "Forgetting" : A Study on a Foreign Immigrant Community in Wongok-dong, Ansan (세계화와 "잊어버림"의 정치 : 안산시 원곡동의 외국인 노동자 거주지역에 대한 연구)

  • Park, Bae-Gyoon;Jung, Keun-Hwa
    • Journal of the Korean association of regional geographers
    • /
    • v.10 no.4
    • /
    • pp.800-823
    • /
    • 2004
  • This paper aims at examining the ways in which foreign immigrant workers in South Korea have been "forgotten" and "marginalized" in the regulatory politics of globalization and how the politics of "forgetting" has influenced the formation of immigrant local communities in South Korea. More specifically, by focusing on the immigrant community in Wongok dong, Ansan, it explores the forming questions. First, under what conditions has Wongok' dong become one of the biggest communities for foreign workers in South Korea? Second, how has the growth of the Wongok-dong immigrant community been influenced by the politics of "exclusion", and "inclusion" taking place at various geographical scales? Based on this case study, this paper suggests that the practices of "exclusion" and "forgetting" should not be seen as an inevitable outcome of globalization; instead, they need to be seen as an outcome of political processes, in which the practices of "exclusion" and "inclusion" are intertwined with one another through interactions and negotiations among different interests and ideas that take place in the multi-scalar regulatory processes, which contribute to the (material and discursive) construction of globalization.

  • PDF

Design and Implementation of a Concuuuency Control Manager for Main Memory Databases (주기억장치 데이터베이스를 위한 동시성 제어 관리자의 설계 및 구현)

  • Kim, Sang-Wook;Jang, Yeon-Jeong;Kim, Yun-Ho;Kim, Jin-Ho;Lee, Seung-Sun;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.646-680
    • /
    • 2000
  • In this paper, we discuss the design and implementation of a concurrency control manager for a main memory DBMS(MMDBMS). Since an MMDBMS, unlike a disk-based DBMS, performs all of data update or retrieval operations by accessing main memory only, the portion of the cost for concurrency control in the total cost for a data update or retrieval is fairly high. Thus, the development of an efficient concurrency control manager highly accelerates the performance of the entire system. Our concurrency control manager employs the 2-phase locking protocol, and has the following characteristics. First, it adapts the partition, an allocation unit of main memory, as a locking granule, and thus, effectively adjusts the trade-off between the system concurrency and locking cost through the analysis of applications. Second, it enjoys low locking costs by maintaining the lock information directly in the partition itself. Third, it provides the latch as a mechanism for physical consistency of system data. Our latch supports both of the shared and exclusive modes, and maximizes the CPU utilization by combining the Bakery algorithm and Unix semaphore facility. Fourth, for solving the deadlock problem, it periodically examines whether a system is in a deadlock state using lock waiting information. In addition, we discuss various issues arising in development such as mutual exclusion of a transaction table, mutual exclusion of indexes and system catalogs, and realtime application supports.

  • PDF