• Title/Summary/Keyword: Authority Database

Search Result 84, Processing Time 0.029 seconds

A Study of Archival Authority Records for Corporate Bodies (기록물을 위한 단체 전거레코드 연구)

  • Seol, Mun-Won
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.2 no.2
    • /
    • pp.39-68
    • /
    • 2002
  • Many problems of archival description in new environments can be solved by building archival authority databases. This study examines function and structure of archival authority records comparing with library authority records, and analyses the archival authority records in NARA system and Australian CRS System which accepts dynamic description process for archival records. Based on these investigations, some development directions for national archival authority database are recommended.

Implementation of Voice Awareness Security Sytems (음성인식 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.799-800
    • /
    • 2006
  • This thesis implemented security systems of voice awareness which is higher accessible than existing security system using biological authentication system and is inexpensive in module of security device, and has an advantage in usability. Proposed the security systems of voice awareness implemented algorithm for characteristic extraction of inputted speaker's voice signal verification, and also implemented database of access control that is founded on extractible output. And a security system of voice awareness has a function of an authority of access control to system.

  • PDF

Buffer Invalidation Schemes for High Performance Transaction Processing in Shared Database Environment (공유 데이터베이스 환경에서 고성능 트랜잭션 처리를 위한 버퍼 무효화 기법)

  • 김신희;배정미;강병욱
    • The Journal of Information Systems
    • /
    • v.6 no.1
    • /
    • pp.159-180
    • /
    • 1997
  • Database sharing system(DBSS) refers to a system for high performance transaction processing. In DBSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory, a separate copy of operating system, and a DBMS. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. However, since multiple nodes may be simultaneously cached a page, cache consistency must be ensured so that every node can always access the latest version of pages. In this paper, we propose efficient buffer invalidation schemes in DBSS, where the database is logically partitioned using primary copy authority to reduce locking overhead. The proposed schemes can improve performance by reducing the disk access overhead and the message overhead due to maintaining cache consistency. Furthermore, they can show good performance when database workloads are varied dynamically.

  • PDF

A Dynamic Transaction Routing Algorithm with Primary Copy Authority (주사본 권한을 이용한 동적 트랜잭션 분배 알고리즘)

  • Kim, Ki-Hyung;Cho, Hang-Rae;Nam, Young-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1067-1076
    • /
    • 2003
  • Database sharing system (DSS) refers to a system for high performance transaction processing. In DSS, the processing nodes are locally coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches database pages in its local memory buffer. In this paper, we propose a dynamic transaction routing algorithm to balance the load of each node in the DSS. The proposed algorithm is novel in the sense that it can support node-specific locality of reference by utilizing the primary copy authority assigned to each node; hence, it can achieve better cache hit ratios and thus fewer disk I/Os. Furthermore, the proposed algorithm avoids a specific node being overloaded by considering the current workload of each node. To evaluate the performance of the proposed algorithm, we develop a simulation model of the DSS, and then analyze the simulation results. The results show that the proposed algorithm outperforms the existing algorithms in the transaction processing rate. Especially the proposed algorithm shows better performance when the number of concurrently executed transactions is high and the data page access patterns of the transactions are not equally distributed.

Requirements for Composite Material Property Sharing System to Korean Products (국산 복합재료의 물성치 공유체계 수립을 위한 요구조건)

  • Suh, Jang Won;Rhee, Seung Yun;Lee, Young Dae
    • Journal of Aerospace System Engineering
    • /
    • v.7 no.1
    • /
    • pp.32-38
    • /
    • 2013
  • This paper presents a survey results on the material properties sharing system database on composite in USA. The requirements on management and database for Korean composite product that meet KAS (Korean Airworthiness Standard) are suggested. The certification policy on composite material qualification of also introduced. The benefits to material supplier, aircraft manufacturer and certification authority, which get through the database have been considered. The database managing process, composite material manufacturing process, properties and design allowable meeting KAS have been suggested.

Extraction of Author Identification Elements of Overseas Academic Papers on Authority Data System for Science and Technology (과학기술 전거데이터 시스템에서의 해외 학술논문 저자 식별요소 추출)

  • Choi, Hyunmi;Lee, Seokhyoung;Kim, Kwangyoung;Kim, Hwanmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.711-713
    • /
    • 2013
  • Various human resource information of the world can be found according to spread of social network such as facebook and twitter. There are an amounts of researcher information on the science and technology area but it is difficult to find a suitable researcher for research or business such as research partner, because researcher information is not systematically arranged. To solver this problem, we are constructing authority data system for science and technology based on authority information of overseas academic papers. In this paper, in order to construct the authority data, we extracts author identification elements from millions of overseas academic papers, which are published from 1994 to 2012. There are more than 50 author identification elements such as author name, affiliation, paper title, publisher, year, keywords, co-author, co-author's affiliation in Korean, English, Chinese, and Japanese. We construct the element database by extracting and storing an author identification information based on the elements from overseas academic papers. Future works includes that the authority database for overseas academic papers is constructed by storing an academic activities of researchers after author clustering with these extracted elements. The authority data is used to improve the researcher information utilization and activate community to find a suitable research partner or a business examiner.

  • PDF

Automated inventory and material science scoping calculations under fission and fusion conditions

  • Gilbert, Mark R.;Fleming, Michael;Sublet, Jean-Christophe
    • Nuclear Engineering and Technology
    • /
    • v.49 no.6
    • /
    • pp.1346-1353
    • /
    • 2017
  • The FISPACT-II inventory simulation platform is a modern computational tool with advanced and unique capabilities. It is sufficiently flexible and efficient to make it an ideal basis around which to perform extensive simulation studies to scope a variety of responses of many materials (elements) to several different neutron irradiation scenarios. This paper briefly presents the typical outputs from these scoping studies, which have been used to compile a suite of nuclear physics materials handbooks, providing a useful and vital resource for material selection and design studies. Several different global responses are extracted from these reports, allowing for comparisons between materials and between different irradiation conditions. A new graphical output format has been developed for the FISPACT-II platform to display these "global summaries"; results for different elements are shown in a periodic table layout, allowing side-by-side comparisons. Several examples of such plots are presented and discussed.

Work-Related Stress Risk Assessment in Italy: A Methodological Proposal Adapted to Regulatory Guidelines

  • Persechino, Benedetta;Valenti, Antonio;Ronchetti, Matteo;Rondinone, Bruna Maria;Tecco, Cristina Di;Vitali, Sara;Iavicoli, Sergio
    • Safety and Health at Work
    • /
    • v.4 no.2
    • /
    • pp.95-99
    • /
    • 2013
  • Background: Work-related stress is one of the major causes of occupational ill health. In line with the regulatory framework on occupational health and safety (OSH), adequate models for assessing and managing risk need to be identified so as to minimize the impact of this stress not only on workers' health, but also on productivity. Methods: After close analysis of the Italian and European reference regulatory framework and workrelated stress assessment and management models used in some European countries, we adopted the UK Health and Safety Executive's (HSE) Management Standards (MS) approach, adapting it to the Italian context in order to provide a suitable methodological proposal for Italy. Results: We have developed a work-related stress risk assessment strategy, meeting regulatory requirements, now available on a specific web platform that includes software, tutorials, and other tools to assist companies in their assessments. Conclusion: This methodological proposal is new on the Italian work-related stress risk assessment scene. Besides providing an evaluation approach using scientifically validated instruments, it ensures the active participation of occupational health professionals in each company. The assessment tools provided enable companies not only to comply with the law, but also to contribute to a database for monitoring and assessment and give access to a reserved area for data analysis and comparisons.

Power System Design in the Inchon Inta'l Airport (인천국제공항 전력시스템 설계)

  • Oh, Y.D.;Min, S.J.;Lim, J.G.;Moon, J.H.;Lee, T.S.;Lee, K.S.;Son, J.Y.;Kim, J.H.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1125-1127
    • /
    • 1998
  • Inchon International Airport(IIA) is constructed for Northeast Asia Gate as is important for IIA to become a 21 century's leader in the world. as is planned for open at December 2000 as a important economic link for unified korea. Power System is designed through investigation of advanced domestic and international example. In addition to power facility operation it is designed for using an information infrastructure of whole airport. IIA Power System Design make instantaneously the Power Distribution Facilities and the SCADA System to construct the airport. and the Airport Power Information System to operate the Power System. It is designed to take efficient and safe Power System including the advanced technology. Power System make the integrated Power Information Database to operate the Main Control Center, analyze the data about the relation of the Power System and Airport operation, and will support the important files in the future.

  • PDF

Sensitive Personal Information Protection Model for RBAC System (역할기반 접근제어시스템에 적용가능한 민감한 개인정보 보호모델)

  • Mun, Hyung-Jin;Suh, Jung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the Personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject.

  • PDF