• Title/Summary/Keyword: Access Modes

Search Result 109, Processing Time 0.026 seconds

A Study on Access Authorization Inference Modes for Information Security of Specialized Private Networks (특성화 사설 네트워크 정보보호를 위한 접근권한 추론모드에 관한 연구)

  • Seo, Woo Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.99-106
    • /
    • 2014
  • The most significant change and trend in the information security market in the year of 2014 is in relation to the issue and incidents of personal information security, which leads the area of information security to a new phase. With the year of 2011 as the turning point, the security technology advanced based on the policies and conditions that combine personal information and information security in the same category. Such technical changes in information security involve various types of information, rapidly changing security policies in response to emerging illegal techniques, and embracing consistent changes in the network configuration accordingly. This study presents the result of standardization and quantification of external access inference by utilizing the measurements to fathom the access authorization performance in advance for information security in specialized networks designed to carry out certain tasks for a group of clients in the easiest and most simple manner. The findings will provide the realistic data available with the access authorization inference modes to control illegal access to the edge of a client network.

Optimal Resource Allocation Scheme according to Access Mode in LTE Femtocell Systems (LTE 기반의 펨토셀 시스템에서 접근 모드에 따른 최적의 자원 할당 방식)

  • Lee, In-Sun;Park, Min-Ho;Kim, Dong-Ki;Hwang, Jae-Ho;Kim, Jae-Moung
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.26-34
    • /
    • 2011
  • In Femtocell that provides high quality of indoor communications with low transmitted power, there are two typical Access modes; Closed Access mode and Open Access mode. In this paper, we propose resource allocation scheme, which mitigates difference of performance between Access modes and improves overall cell performance, according to Access mode. We give more wireless resources to Open Access mode Femtocell, which improves performance of other users, than Closed Access mode Femtocell. If Open Access mode Femtocell uses more resource, there is trade-off between improvement of user using Open Access mode Femtocell and increase of interference that other users receive. So, we solve the optimal value for resource allocation and analyze performance of conventional scheme and proposed scheme applying the optimal value. Eventually, proposed scheme can improve overall cell performance relative to conventional scheme.

An Image Retrieval System with Multiple Access Modes (키워드탐색과 비주얼 브라우징 기법을 이용한 이미지 개발 시스템)

  • 이지연
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.183-200
    • /
    • 2001
  • The traditional way of access to image information is through descriptive keyword searching. However, many studies in image indexing and retrieval have reached a consensus on the difficulties and limitations of text-base image description. This research investigates the feasibility of using visual browsing that is being used comparatively much less than keyword searching. The effectiveness of Keyword access versus visual access were examined through experiments in which participants searched for pictures of specified emotions using different access modes: keywords only, visual browsing only, and the combination of both. It was found that keyword searching was appropriate for clean searches while visual browsing was the effective way to browse many pictures quickly, thus finding more relevant pictures. Findings and results can guide of images retrieval systems, especially the retrieval system of subjective and interpretive information.

  • PDF

A Performance Modeling of Wireless Sensor Networks as a Queueing Network with On and Off Servers

  • Ali, Mustafa K. Mehmet;Gu, Hao
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.406-415
    • /
    • 2009
  • In this work, we consider performance modeling of a wireless sensor network with a time division multiple access (TDMA) media access protocol with slot reuse. It is assumed that all the nodes are peers of each other and they have two modes of operation, active and sleep modes. We model the sensor network as a Jackson network with unreliable nodes with on and off states. Active and sleep modes of sensor nodes are modeled with on and off states of unreliable nodes. We determine the joint distribution of the sensor node queue lengths in the network. From this result, we derive the probability distribution of the number of active nodes and blocking probability of node activation. Then, we present the mean packet delay, average sleep period of a node and the network throughput. We present numerical results as well as simulation results to verify the analysis. Finally, we discuss how the derived results may be used in the design of sensor networks.

An Analysis of Access and Egress Mode Choice to Regional Railway Station using Transit Smart Card Data (a case of Seoul station) (지역 간 철도 이용객의 접근통행 패턴 연구)

  • Choi, Myoung-Hun;Eom, Jin-Ki;Lee, Jun;Moon, Dae-Seop;Song, Ji-Young
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.595-600
    • /
    • 2011
  • This study analyzed passenger's access modes that connect to regional railway station and developed a model of access mode choice based on transit smart card data of Seoul station as a case study. The study boundary includes sixteen bus stops around the station. The results show that most passengers access to station have less than two transfers. Of total 15000, eighty percent of passengers use metro and the rest of people take a bus. Interestingly, it is found that almost same proportions of passengers use metro and bus for egress the station. Consequently, metro is found to be most likely used mode compared to bus for both access and egress trips.

  • PDF

Storage Assignment for Variables Considering Efficient Memory Access in Embedded System Design (임베디드 시스템 설계에서 효율적인 메모리 접근을 고려한 변수 저장 방법)

  • Choi Yoonseo;Kim Taewhan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.2
    • /
    • pp.85-94
    • /
    • 2005
  • It has been reported and verified in many design experiences that a judicious utilization of the page and burst access modes supported by DRAMs contributes a great reduction in not only the DRAM access latency but also DRAM's energy consumption. Recently, researchers showed that a careful arrangement of data variables in memory directly leads to a maximum utilization of the page and burst access modes for the variable accesses, but unfortunately, found that the problems are not tractable, consequently, resorting to simple (e.g., greedy) heuristic solutions to the problems. In this parer, to improve the quality of existing solutions, we propose 0-1 ILP-based techniques which produce optimal or near-optimal solution depending on the formulation parameters. It is shown that the proposed techniques use on average 32.2%, l5.1% and 3.5% more page accesses, and 84.0%, 113.5% and 10.1% more burst accesses compared to OFU (the order of first use) and the technique in [l, 2] and the technique in [3], respectively.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

Design and Implementation of an Automatic Switching Technology Between Ad-Hoc and Infrastructure Modes in Wireless LANs (무선 LAN에서 Ad-Hoc과 Infrastructure 모드의 자동전환 기술 설계 및 구현)

  • Shin Taek-Su;Jo Sung-Min;Min Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9A
    • /
    • pp.892-899
    • /
    • 2006
  • In this paper, we propose an automatic switching technology between the ad-hoc and the infrastructure modes without user intervention in the IEEE 802.11b wireless LAN. Also, we design our proposed technology and implemented on the Linux machine. For this operation, the area within an Access Point (AP) coverage is defined as a switching area, and a node without any transmission in this area is assumed to be able to relay frames between the AP and nodes in the shaded area that is outside the coverage and cannot reach the AP. By using the proposed technology, it is possible to provide the seamless Internet access service to nodes at the ad-hoc mode in the shaded area. In this paper, we explains the operation of the detection method of the switching area, presents the flowchart and implementation environment. To prove the operation of our technology, we obtain the results of captured packets transmitted between nodes and throughput results through ftp transmission experiment. Hence, we can see that our proposed scheme can be improve the wireless access service in wireless and mobile networks.

The Study of Stiffness Evaluation Technique for L, T Shaped Joint Structures Using Normal Modes Analysis with Lumped Mass (모드해석을 이용한 L, T 자형 구조물의 결합 강성 평가 방법에 대한 연구)

  • Hur, Deog-Jae;Jung, Jae-Yup;Cho, Yeon;Park, Tae-Won
    • Journal of KSNVE
    • /
    • v.9 no.5
    • /
    • pp.975-983
    • /
    • 1999
  • This paper describes the dynamic characteristics of the joint structures in case of using the simplified beam model in the F. E. analysis. The modeling errors, when replace the shell with the beam, are investigated through F. E. normal modes analysis. Normal mode analysis were performed to obtain the natural frequencies of the L and T shaped joints with various type of channels. The results were analyzed to access the effects of the models on the accuracy of F.E. analysis by identifying the geometric factors which cause the error. The geometric factors considered are joint angle, channel length, thickness and area ratio of the hollow section to the filled one. The joint stiffness evaluation technique is developed in this study using normal modes analysis with Lumped Mass. With this method, the progressively improved results of F. E. analysis are obtained using the simplified beam model. The static and normal modes analysis are performed with the joint stiffness values obtained by the Kazunori Shimonkakis' virtual stiffness method and the proposed method and these simplified modeling errors are compared.

  • PDF

The Association between Modes of Access to Betting Games and Problem Gambling among Adolescents : Focusing on Comparisons between On-line and Land-based Modes (청소년의 돈내기 게임 접촉방식과 문제도박의 관계 : 온라인과 오프라인 방식의 비교를 중심으로)

  • Lee, Jaekyoung;Lee, RaeHyuck;Chang, Hae-Lim
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.139-148
    • /
    • 2020
  • This study examined the modes of access to betting games among adolescents and analyzed the influence of on-line betting games (e.g., legalized gambling, illegal gambling, speculative games) on problem gambling. The raw data from the 2018 Survey on Youth Gambling Problems were used. Using a sample of 5,101 school adolescents who were from first-grade middle school students to second-grade high school students and who experienced betting games during the last three months, this study conducted cross tabulation and logistic regression analyses. Of the adolescents who experienced betting games, 17.8% experienced on-line games that were composed of 4.9% in illegal gambling, 2.4% in speculative games, and 0.4% in legalized gambling. Compared to land-based modes of gambling, on-line illegal gambling, legalized gambling, and speculative games were associated with higher odds of problem gambling. While on-line illegal gambling was associated with higher odds of problem gambling for female adolescents, on-line illegal gambling, legalized gambling, and speculative games were associated with higher odds of problem gambling for male adolescents. This study discussed intervention strategies to address problem gambling and modes of betting games among adolescents.