• Title/Summary/Keyword: Access to Information (A2I)

Search Result 194, Processing Time 0.027 seconds

Deploying Linked Open Vocabulary (LOV) to Enhance Library Linked Data

  • Oh, Sam Gyun;Yi, Myongho;Jang, Wonghong
    • Journal of Information Science Theory and Practice
    • /
    • v.3 no.2
    • /
    • pp.6-15
    • /
    • 2015
  • Since the advent of Linked Data (LD) as a method for building webs of data, there have been many attempts to apply and implement LD in various settings. Efforts have been made to convert bibliographic data in libraries into Linked Data, thereby generating Library Linked Data (LLD). However, when memory institutions have tried to link their data with external sources based on principles suggested by Tim Berners-Lee, identifying appropriate vocabularies for use in describing their bibliographic data has proved challenging. The objective of this paper is to discuss the potential role of Linked Open Vocabularies (LOV) in providing better access to various open datasets and facilitating effective linking. The paper will also examine the ways in which memory institutions can utilize LOV to enhance the quality of LLD and LLD-based ontology design.

Technology of MRAM (Magneto-resistive Random Access Memory) Using MTJ(Magnetic Tunnel Junction) Cell

  • Park, Wanjun;Song, I-Hun;Park, Sangjin;Kim, Teawan
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.3
    • /
    • pp.197-204
    • /
    • 2002
  • DRAM, SRAM, and FLASH memory are three major memory devices currently used in most electronic applications. But, they have very distinct attributes, therefore, each memory could be used only for limited applications. MRAM (Magneto-resistive Random Access Memory) is a promising candidate for a universal memory that meets all application needs with non-volatile, fast operational speed, and low power consumption. The simplest architecture of MRAM cell is a series of MTJ (Magnetic Tunnel Junction) as a data storage part and MOS transistor as a data selection part. To be a commercially competitive memory device, scalability is an important factor as well. This paper is testing the actual electrical parameters and the scaling factors to limit MRAM technology in the semiconductor based memory device by an actual integration of MRAM core cell. Electrical tuning of MOS/MTJ, and control of resistance are important factors for data sensing, and control of magnetic switching for data writing.

Shared-medium Access Control Protocol for the ATM Access Network - Part I : DMR-II Protocol Architecture - (ATM 액세스망을 위한 공유매체 접속 제어 프로토콜 - I부 : DMR-II 프로토콜 구조 -)

  • 황민태;김장경;이정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.379-388
    • /
    • 1998
  • In this paper we propose a DMR-II shared-medium access control protocol which was developed for the ATM access network users to support isochronous and non-isochronous traffics simultaneously under the bandwidth sharing environment, and describe its architecture and operation principles. The DMR-II protocol uses the slotted-ring topology, and gives the higher transmission priority to the isochronous traffic than the non-isochronous traffic. To support the isochronous traffic it uses the slot reservation mechanism, and maintains the delay variation of the isochronous traffic beyond the threshold value by using the blocking mechanism whenever the total user traffic overflows the network's bandwidth limitation. for the non-isochronous traffic the DMR-II protocol lets all the nodes to have fair transmission chances by using the reset mechanism based on the window counter scheme.

  • PDF

A Study on Measures in the Tourism Service Sector of WTO Service Negotiations (관광서비스 부문 WTO 서비스 협상 동향과 우리나라의 대응방안)

  • Shin, Jai-Gi
    • The Journal of Information Technology
    • /
    • v.8 no.2
    • /
    • pp.121-133
    • /
    • 2005
  • The WTO(World Trade Organization) meetings for service negotiations started in February in 2000. Since then, the member countries have discussed the tourism sector and their expectations and methods of liberalization, based on the proposals they have submitted. The Republic of Korea had already opened hotels and restaurants, travel agencies and tour operator services, and tourist guide services, preceding of WTO service negotiations. However, to comply with the terms of the negotiations, the domestic laws and systems related to tourism should be analyzed according to their adherence to the principles of GATS(General Agreement on Trade in Services), which include market access and national treatment. Thus, the purposes of this study were two-fold: first, regarding the two basic principles of GATS(market access and national treatment), the articles of the administrative laws relating to tourism were examined. Second, proposals from the tourism sectors in the US, Canada, Dominique, EC, Switzerland, and Japan were also summarized and reviewed. Proper responses to service negotiations were proposed based on the results of this analysis. As a result, I can support the GATS classification(w/120) of tourism and the liberalization of tourism in other WTO member countries. I can also support the elimination of obstacles such as economic need tests and nationality requirement. 'Others' category should be considered more carefully according to the competitiveness of the given industry.

  • PDF

APC: An Adaptive Page Prefetching Control Scheme in Virtual Memory System (APC: 가상 메모리 시스템에서 적응적 페이지 선반입 제어 기법)

  • Ahn, Woo-Hyun;Yang, Jong-Cheol;Oh, Jae-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.37 no.3
    • /
    • pp.172-183
    • /
    • 2010
  • Virtual memory systems (VM) reduce disk I/Os caused by page faults using page prefetching, which reads pages together with a desired page at a page fault in a single disk I/O. Operating systems including 4.4BSD attempt to prefetch as many pages as possible at a page fault regardless of page access patterns of applications. However, such an approach increases a disk access time taken to service a page fault when a high portion of the prefetched pages is not referenced. More seriously, the approach can cause the memory pollution, a problem that prefetched pages not to be accessed evict another pages that will be referenced soon. To solve these problems, we propose an adaptive page prefetching control scheme (APC), which periodically monitors access patterns of prefetched pages in a process unit. Such a pattern is represented as the ratio of referenced pages among prefetched ones before they are evicted from memory. Then APC uses the ratio to adjust the number of pages that 4.4BSD VM intends to prefetch at a page fault. Thus APC allows 4.4BSD VM to prefetch a proper number of pages to have a better effect on reducing disk I/Os, though page access patterns of an application vary in runtime. The experiment of our technique implemented in FreeBSD 6.2 shows that APC improves the execution times of SOR, SMM, and FFT benchmarks over 4.4BSD VM by up to 57%.

A Study on the International Communication System in International Bidding (국제통신시스템 국제입찰에서의 입찰행태 분석)

  • Hong, Seung-Gee;Hwan, Ho-Yon
    • International Commerce and Information Review
    • /
    • v.7 no.2
    • /
    • pp.25-47
    • /
    • 2005
  • This study wishes to analyze that affect in purchasing decision in Telecommunication operation company's international competitive bidding. When submit a tender laying stress on international competitive bidding of the Telecommunication operation companies among specially various international competitive bidding, I wish to investigate game theory enemy by bid method through access method about bid form affecting in buyer's purchasing decision.

  • PDF

An Efficient Association Control Method for Vehicular Networks with Mobile Hotspots

  • Hwang, Jae-Ryong;Choi, Jae-Hyuk;Yoo, Joon;Lee, Hwa-Ryong;Kim, Chong-Kwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.5
    • /
    • pp.888-908
    • /
    • 2011
  • The increasing demand from passengers in vehicles to improve safety, traffic efficiency, and comfort has lead to the growing interest of Wi-Fi based vehicle-to-infrastructure (V2I) communications. Although the V2I system provides fast and cost-effective Internet connectivity to vehicles via roadside Wi-Fi access points (APs), it suffers from frequent handoffs due to the high mobility of vehicles and the limited coverage of Wi-Fi APs. Recently, the Mobile AP (MAP) platform has emerged as a promising solution that overcomes the problem in the V2I systems. The main advantage is that MAPs may yield longer service duration to the nearby vehicles that have similar mobility patterns, yet they provide smaller link capacities than the roadside APs. In this paper, we present a new association control technique that harnesses available connection duration as well as achievable link bandwidth in high-speed vehicular network environments. We also analyze the tradeoff between two association metrics, namely, available connection duration and achievable link bandwidth. Extensive simulation studies based on real traces demonstrate that our scheme significantly outperforms the previous methods.

A study and analysis of WiBro for infrastructure-vehicle communication technology (인프라-차량단말간 통신기술을 위한 WiBro 기술 분석 및 연구)

  • Lim, Il-kwon;Choi, Sang-wook;Kim, Young-hyuk;Choi, Jeong-Dan;Lee, Jea-kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.120-123
    • /
    • 2009
  • The WiBro to start June 2006 is mobile internet service with 60km/h, 3Mbps. And current WiBro service is used in Seoul, the metropolitan area and the local major cities. This study suggests WiBro technology and analyzes wireless communication technology to vehicle-to-infrastructure communications for the unmanned vehicle control. We were driving vehicle with two laptop computer's WiBro unit for V2I communication environment. So each RAS(Radio Access Station) on center is tested coverage area, transmission rate, latency rate, lost rate and transmission rate to parking area environment.

  • PDF

A Study on the User Task in Resource Description & Access (RDA에 나타난 이용자 과업에 대한 연구)

  • Lee, Kyung-Ho
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.99-122
    • /
    • 2012
  • This study deals with the user task that is the goal of development of RDA (Resource Description & Access), an international standard for future bibliographic description. RDA seeks to implement the user task based on FRBR-FRAD model. User task could be composed of two areas: (1) find, identify, select, and obtain of bibliographic resources in information seeking and (2) find, identify, clarify, and understand of entities related to resources (i.e., person, family, corporate, concept, etc.). This research analyzes how the resource is defined with entity, attributes, and relationship in RDA based on the conceptual model of FRBR-FRAD. And this finally shows the ways of supporting user task in RDA.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF