• Title/Summary/Keyword: Access Types

Search Result 898, Processing Time 0.022 seconds

A Study on the Cognitive Characteristics and Image Formation Structure of Hotel Access Space (호텔 진입공간의 유형별 인지특성 및 이미지형성구조에 관한 연구)

  • Lee, Jeong-Lim;Cho, Yong-Joon
    • Journal of the Korean housing association
    • /
    • v.20 no.5
    • /
    • pp.9-21
    • /
    • 2009
  • This study classified visual perception types of access space at 17 five-star hotels in Jejudo and examined their cognitive characteristics and image formation structures in an effort to provide basic information important for designing the elevation and the access spaces of a hotel. The results of this study are as follows. Access space image of experimental hotels showed more negative evaluations at both city hotels and resort hotels, viewing angle (upward angle) was also positively evaluated between $10^{\circ}{\sim}12^{\circ}$ and $18^{\circ}$ and central type in arrangement type and detour access and straight access types in access circulation type were positively evaluated. When viewed from an upward angle of $10^{\circ}$ to $12^{\circ}$, the most important factors were as plasticity, decorativeness, and creativity; from $18^{\circ}$ it was such factors as harmony and peculiarity; and at $45^{\circ}$ it was factors like decorativeness and stability. In considering the various access types, the most important factors in a straight access type were peculiarity and harmony; for one-time curved access type it was by decorativeness, creativity, Peculiarity, and stability; and for detour access types it was decorativeness, stability, and peculiarity. Influential of factors affecting image formation and plasticity and harmony factors and the form had more influences on image formation.

Universal Description of Access Control Systems

  • Karel Burda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.43-53
    • /
    • 2024
  • Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.

A 3D Memory System Allowing Multi-Access (다중접근을 허용하는 3차원 메모리 시스템)

  • 이형
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.9
    • /
    • pp.457-464
    • /
    • 2005
  • In this paper a 3D memory system that allows 17 access types at an arbitrary position is introduced. The proposed memory system is based on two main functions: memory module assignment function and address assignment function. Based on them, the memory system supports 17 access types: 13 Lines, 3 Rectangles, and 1 Hexahedron. That is, the memory system allows simultaneous access to multiple data in any access types at an arbitrary position with a constant interval. In order to allow 17 access types the memory system consists of memory module selection circuitry, data routing circuitry for READ/WRITE, and address calculation/routing circuitry In the point of view of a developer and a programmer, the memory system proposed in this paper supports easy hardware extension according to the applications and both of them to deal with it as a logical three-dimensional away In addition, multiple data in various across types can be simultaneously accessed with a constant interval. Therefore, the memory system is suitable for building systems related to ,3D applications (e.g. volume rendering and volume clipping) and a frame buffer for multi-resolution.

Access Control for Secure Access Path (안전한 접근 경로를 보장하기 위한 접근 제어)

  • Kim, Hyun-Bae
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.2
    • /
    • pp.57-66
    • /
    • 1997
  • The primary purpose of security mechanisms in a computer systems is to control the access to information. There are two types of access control mechanisms to be used typically. One is discretionary access control(DAC) and another is mandatory access control(MAC). In this study an access control mechanism is introduced for secure access path in security system. The security policy of this access control is that no disclosure of information and no unauthorized modification of information. To make this access control correspond to security policy, we introduce three properties; read, write and create.

  • PDF

A Study on the Characteristics of Single Housing Block - Focused on Daejeon Metropolitan City - (도시지역 단일동 아파트의 계획특성 분석연구 - 대전광역시 단일동 아파트를 중심으로 -)

  • Kang, In-Ho
    • Journal of the Korean housing association
    • /
    • v.24 no.3
    • /
    • pp.9-18
    • /
    • 2013
  • This paper aims to investigate the design characteristics of a single housing block which is increasing in urban areas. For the analysis, all cases of single block housing in Daejeon metropolitan city were gathered into a database. Main concerns were on the location and the physical characteristics. The results of this study were as follows; 1) single block housing has been increasing both in the new developed areas and the existing urban areas 2) their location has shifted from residential districts to semi-residential and commercial districts. For this reason, the size and density has been increasing 3) the slab block with the hall type and the exterior corridor type were general in residential districts, diverse ones, however, including the point tower type were increasing with unusual circulation types such as central corridor, central core, double corridor, and mixed type in semi-residential and commercial districts 4) there were 5 types of access systems, and especially the street access and the piloti access were increasing, which were related with the high density.

Services and technologies for emerging local access demand

  • 이용환
    • The Magazine of the IEIE
    • /
    • v.25 no.4
    • /
    • pp.14-26
    • /
    • 1998
  • Emergence of the Interned, World Wide Web (WWW), and multimedia services accelerates the demand for broadband access to mass market. As the demand for broader bandwidth for local access rapidly increases, new types of services for local access have been offered or are being developed. However, nothing has yet been shown up for a definite long-term solution. In this article, we address some issues and technological perspectives of such emerging local access demand.

  • PDF

Characterization Studies on Data Access Bias in Mobile Platforms

  • Bahn, Hyokyung
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.52-58
    • /
    • 2021
  • Data access bias can be observed in various types of computing systems. In this paper, we characterize the data access bias in modern mobile computing platforms. In particular, we focus on the access bias of data observed at three different subsystems based on our experiences. First, we show the access bias of file data in mobile platforms. Second, we show the access bias of memory data in mobile platforms. Third, we show the access bias of web data and web servers. We expect that the characterization study in this paper will be helpful in the efficient management of mobile computing systems.

A Study on the Status of Building Reference Shelf and Analysis of Types of Online Reference Sources in the University Library (대학도서관의 온라인 참고서가 구축현황과 온라인 참고정보원의 유형분석에 관한 연구)

  • Choi, Eun-Ju
    • Journal of Information Management
    • /
    • v.38 no.1
    • /
    • pp.21-36
    • /
    • 2007
  • This study aimed to investigate present status of online reference shelf and analyze access point in the home page and types of online reference sources in the university library. Data were collected by accessing home pages of 41 university libraries in the region of Seoul and Kyonggi-Do. 30 libraries had prepared reference shelf out of 41 libraries, and "User Service", "Electronic Reference Sources", or "Reference & Information Sources" were mostly used as home page menu. Types of references sources varied among libraries, and "Directories", "Dictionaries", "Statistics" or "Encyclopedias" were mostly loaded types in the reference shelf. For the enhancement of reference services through reference shelf, establishing and applying standards for evaluation, ease of access, access by subject, and continuous updates and additions of reference sources were suggested.

Requirements Analysis for Access Control Model on Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서의 접근제어 모델을 위한 요구사항 분석)

  • Oh Sejong;Park Jeho
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.563-570
    • /
    • 2004
  • Ubiquitous computing environment requires strong security and privacy. Access control is one of security areas. Access control on Ubiquitous computing is different from it on traditional information systems so that traditional access control models are not suitable for Ubiquitous comput-ing environment. This research defines Ubiquitous computing environment as an access control point of view, and shows requirements to consid-er for developing access control model for Ubiquitous computing environment. It also brings up three implementing types of access control on Ubiquitous computing environment.

LED-QR Authentication Technology for Access Control and Security

  • Chung, Youngseek;Jung, Soonho;Kim, Junwoo;Lee, Junghoon;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.69-75
    • /
    • 2015
  • There are several possible places which are accessible in many buildings and facilities, various types of systems have been utilized such as access control or surveillance depending on the purpose. Especially if security is important, it must go through the various authentication procedures when people can access. Until now many access control systems have been proposed and developed, they are applied and utilized to companies which security is needed. However, as time passes the problems with existing access control systems occur or the vulnerabilities related to access control are reported, as technology advances. The solution to this, we propose authentication technology related to access control using LED-QR tag.