• 제목/요약/키워드: Access Scope

검색결과 167건 처리시간 0.026초

Shadow Libraries: A Bibliometric Analysis of Black Open Access Phenomenon (2011: 2023)

  • Safinaz Mahmoud Elroukh
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.21-32
    • /
    • 2024
  • This study analyzes the global literature on the black open-access phenomenon from 2011 to 2023. A bibliometric analysis was conducted using the Scopus database. The search strategy employed advanced queries with multiple synonymous terms to ensure exhaustive retrieval of relevant documents. The VOSviewer software was employed to visualize the co-occurrence networks. The findings reported 90 papers published during the study period. An evolving scholarly landscape was revealed, with heightened attention from 2016 onwards, peaking in 2017, 2021, and 2023. Articles constitute 83.3% of the total published documents. Singh and Srichandan are prolific authors, with 11.2% of the total publications. The United States contributes 18.9% of the papers, followed by India and Spain. Information Development and Scientometrics are pivotal journals in scholarly discussions about this scope, contributing 4.4% of publications. Co-occurrence network visualization revealed "Sci-Hub" and "open access" as the most used keywords in the global literature. The findings underscore the need for additional research to discover innovative business models to safeguard intellectual property rights while meeting researchers' evolving needs. The importance of this paper comes from being the first bibliometric study analyzing international literature related to this phenomenon, which provides a basis for future research efforts and policymaking.

건축 디자인품질향상을 위한 평가지표 개발에 관한 연구 -공공건축물을 대상으로- (A Study on the Development of Evaluation Indicator for Architectural Design Quality Inhancement -Based on the Public Building-)

  • 이지은;류수훈;고인룡
    • 한국디지털건축인테리어학회논문집
    • /
    • 제11권1호
    • /
    • pp.15-22
    • /
    • 2011
  • The purpose of this study is to develop design quality indicator for improvement of public architecture in Korea. The spatial scope of the study which sees limited at 'domestic public buildings'. The study contents scope is to develop design quality indicator to use design phase and evaluation of 'public buildings'. For this design quality indicator, we have analysed various domestic and international institutions associated with architecture design. And, design indicator for the possibility of application in public buildings were extracted. Through this work design quality indicator specific and objective was drawn. The results of this study 8 category were drawn 'Public', 'Harmony', 'Impact', 'Access', 'Landscape', 'Use', 'Sustainable', 'Technology'. Also, 29 Design quality Indicator were suggested. Finally, this study was developed by utilizing Design Quality Indicator can be utilized in the design phase, the evaluation process should be developed.

Fashion Blogging and Personal Style Bloggers: The Evolving Enterprise

  • Reddy, Shweta Linga
    • International Journal of Costume and Fashion
    • /
    • 제13권1호
    • /
    • pp.1-10
    • /
    • 2013
  • This study examines existing literature and uses case studies to identify the scope of fashion blogging and the evolving role of the personal style bloggers in the fashion business. Information on six popular personal style bloggers has been gathered to demonstrate the evolving business of these bloggers and their scope of operations that are relevant to fashion. The case of these six bloggers were drawn from popular media publications such as CNN, Wall Street Journal (WSJ), Time, Women's Wear Daily (WWD) and The New York Times. The case study of these six bloggers reveals that these personal style bloggers have used their reach and influence on the blog audience to procure and access business opportunities to grow their enterprise. The findings indicate that affiliation, partnership or collaboration with brands or established designers adds more value to a personal style bloggers resume. However, the findings also indicate that the popular fashion bloggers provide a new opportunity for marketing and promoting fashion brands and products to the younger generation.

프로세스 대수를 이용한 XML 문서의 접근권한 표현법 (A Method for Specifying the Access Control of XML Document using Process Algebra)

  • 이지연;김일곤
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.251-258
    • /
    • 2007
  • 웹서비스 기술의 활성화와 더불어, XML 문서에 대한 접근통제기술이 새롭게 개발되었다. 그 결과, 기존의 접근통제시스템에서와 마찬가지로, 중요정보 자원에 대한 접근통제문제에 대한 연구가 큰 각광을 받고 있다. 본 논문에서는 XML 문서에 대한 접근통제정책을 정형명세언어인 CSP로 변환하는 방법을 제시한다. 이를 위해, 첫째, XPath 경로지정 언어로 표현된 XML 문서의 계층적 접근을 CSP 프로세스 알제브라로 변환하는 방법을 소개한다. 둘째, XML 스키마 문서를 오토마타 형태의 정형모델로 표현하는 방법을 설명한다. 셋째, XML 접근통제정책에 사용되는 적용 규칙 및 충돌규칙의 의미론을 프로세스 알제브라 언어로 표현하는 방법을 제시한다. 마지막으로, 본 논문에서 제시한 방법론의 타당성을 보이기 위해, XML 스키마 문서 및 경로지정 표현에 대한 CSP 명세 예제를 보여준다.

  • PDF

V5.2 링크 식별 절차의 신뢰성 향상 방안 (Improvement of Reliability in V5.2 Link Identification Procedure)

  • 이충돈;김영화방효찬최승욱
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 추계종합학술대회 논문집
    • /
    • pp.249-252
    • /
    • 1998
  • ETSI(European Telecommunications Standards Institute) 300 34701, ITU-T(International Telecommunication Union) G.965 recommended PSTN, CONTROL, LINK CONTROL, BCC, PROTECTION protocols on V-Interfaces. But it is possible to occur misalignment between LE(Local Exchange) and AN(Access Network), especially in link identification procedure because there isn't any comment about V5.2 system management. In this paper we propose S/W guard timer to improve reliability in V5.2 link identification procedure in scope of Recommendation.

  • PDF

Institutional Constraints to Innovation: Artisan Clusters in Rural India

  • Das, Keshab
    • Asian Journal of Innovation and Policy
    • /
    • 제4권2호
    • /
    • pp.132-153
    • /
    • 2015
  • Rural enterprise clusters in India have often been characterized by low-end products, poor income earning options and a near-absence of innovativeness. This has implied limited market access, inadequate organization of production and distancing from sources of formal knowledge. Policy neglect of rural industrialization notwithstanding this paper explores the nature of institutional constraints to innovation through intensive case studies of five rural artisan clusters (handlooms and handicrafts) in as many Indian states. Whether it relates to access to loan finance or technology support or linking to markets, the formal institutions (public or private) have been distanced by informality that typifies most rural enterprise clusters. An obsession with a sectoral approach to cluster development has negated addressing infirmities of the space of enterprise, even as scope for learning from some Asian economies in rural enterprise promotion exists. The paper also enquires if the innovation systems have been inclusive and pro-poor.

Perspective Framework on the Fourth-Generation Mobile Communication Systems

  • Kim, Jin-Young;Kim, Duk-Kyung;Park, Seong-Soo;Lee, Goon-Seop;Ryu, Si-Hoon;Chang, Myung-Rae;Koo, Jun-Mo
    • Journal of Communications and Networks
    • /
    • 제4권4호
    • /
    • pp.321-335
    • /
    • 2002
  • Emergence of the fourth generation mobile communication system (4G system) is now in its dawn. This article proposes a perspective framework on the 4G system, and discusses various kinds of system aspects and technological requirements in terms of novel service features, spectrum management, radio access technologies, wired access integration, core network, and mobile terminal. The focus of the article is to define the scope and features of the 4G system in an overall system/network viewpoint. From the foreseeable development trends, it is highly expected that whatever emerges in the 4G system will be some kind of constantly evolving and grand recursive concatenation of all the existing system/network developments.

증강현실 기술을 통한 건설 현장에서의 공정 정보 활용도 제고 방안 (Augmented Reality Framework for Efficient Access to Schedule Information on Construction Sites)

  • 이용주;김진영;;박만우
    • 한국BIM학회 논문집
    • /
    • 제10권4호
    • /
    • pp.60-69
    • /
    • 2020
  • Allowing on-site workers to access information of the construction process can enable task control, data integration, material and resource control. However, in the current practice of the construction industry, the existing methods and scope is quite limited, leading to inefficient management during the construction process. In this research, by adopting cutting edge technologies such as Augmented Reality(AR), digital twins, deep learning and computer vision with wearable AR devices, the authors proposed an AR visualization framework made of virtual components to help on-site workers to obtain information of the construction process with ease of use. Also, this paper investigates wearable AR devices and object detection algorithms, which are critical factors in the proposed framework, to test their suitability.

공개활성화를 위한 전자기록물 관리정책 연구 (A Study on the Electronic Records Management for Enhancing Public Access)

  • 설문원
    • 한국비블리아학회지
    • /
    • 제12권1호
    • /
    • pp.65-86
    • /
    • 2001
  • 본 논문의 목적은 전자정부법 시행에 대비하여 전자형태 공공기록물의 공개 및 서비스 활성화 방안을 모색하기 위한 것이다. 이를 위해 우선, 기록물관리법 정보공개법, 전자정부법안 등 관련법제에 나타난 정책현황과 문제점을 분석하였는데, 특히 공개대상 전자기록물의 범위, 공개시점과 현행기록물의 공개, 편집 및 부분공개, 인터넷을 통한 정보제공, 물리적 열람공간으로서 자료관의 역할, 전자문서관리 시스템의 정비 등을 중심으로 하였다. 이를 바탕으로 공개 활성화를 위한 전자기록물 관리 및 정책 방향을 제시하였다.

  • PDF

안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템 (A Secure Identity Management System for Secure Mobile Cloud Computing)

  • ;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.