• Title/Summary/Keyword: Distributed Security

Search Result 919, Processing Time 0.027 seconds

Translation of 3D CAD Data to X3D Dataset Maintaining the Product Structure (3차원 CAD 데이터의 제품구조를 포함하는 X3D 기반 데이터로의 변환 기법)

  • Cho, Gui-Mok;Hwang, Jin-Sang;Kim, Young-Kuk
    • The KIPS Transactions:PartA
    • /
    • v.18A no.3
    • /
    • pp.81-92
    • /
    • 2011
  • There has been a number of attempts to apply 3D CAD data created in the design stage of product life cycle to various applications of the other stages in related industries. But, 3D CAD data requires a large amount of computing resources for data processing, and it is not suitable for post applications such as distributed collaboration, marketing tool, or Interactive Electronic Technical Manual because of the design information security problem and the license cost. Therefore, various lightweight visualization formats and application systems have been suggested to overcome these problems. However, most of these lightweight formats are dependent on the companies or organizations which suggested them and cannot be shared with each other. In addition, product structure information is not represented along with the product geometric information. In this paper, we define a dataset called prod-X3D(Enhanced X3D Dataset for Web-based Visualization of 3D CAD Product Model) based on the international standard graphic format, X3D, which can represent the structure information as well as the geometry information of a product, and propose a translation method from 3D CAD data to an prod-X3D.

A Distributed Altruistic Locking Scheme For Multilevel Secure Database in Wireless Mobile Network Environments (무선 이동 네트워크 환경에서 다단계 보안 데이터베이스를 위한 분산 이타적 잠금 기법)

  • Kim, Hee-Wan;Park, Dong-Soon;Rhee, Hae-Kyung;Kim, Ung-Mo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.235-242
    • /
    • 2002
  • We propose an advanced transaction scheduling protocol for concurrency control of multilevel secure databases in wireless mobile network environment. Wireless communication is characterized by frequent spurious disconnections. So short-lived transaction must quickly access database without any delay by long-lived one. We adapted two-phase locking protocol, namely traditional syntax-oriented serializability notions, to multilevel secure databases in wireless mobile network environment. Altruistic locking, as an advanced protocol, has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of a1truism has also been deployed for extended a1truistic locking. This is in a way that scope of data to he early released is enlarged to include even data initially not intended to be donated. Our protocol is based on extended altruistic locking, but a new method, namely bi-directional donation locking for multilevel secure databases (MLBiDL), is additionally used in order to satisfy security requirements and concurrency. We showed the Simulation experiments that MLBiDL outperforms the other locking protocols in terms of the degree of throughput and average waiting time.

Design of the Network Computer Architecture based on a Web Browser (웹 브라우저 기반의 네트워크 컴퓨터 아키텍쳐 설계)

  • Song, Min-Gyu
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.607-616
    • /
    • 2008
  • By the advancement of computer & network technology, the paridigm of 'Network Computer' has been realizing`. In what is called network computer, computer system and computing resource is incomparably seem to be expanded compared with conventional network technology[1]. Network connected computer system consitute a massive virtual computer, it is possible for people to use an enourmous amout of computing resource distributed widely through the network. It is also possible that we make client lightweight by the use of computer system & all shared computing resources on the network in our computer processing and we call this type of client system as thin-client. Thin-client and network computer are on and the same network paradigm in that both paradigm featuring the active use of computer system and resource on the network[2]. In network computer paragem, network itself is regarded as a basic platform for the transfer of application, so it is possible that client access remote serve system to run remote applications through the network[3]. In this paper, we propose the system architecture for the implementation of network computer by the use of Web browser, X window system and Pyjamas. By the use of network computer proposed in this paper, it is possible for people to run application on the server system as if he run local application, and it is expected to improve the security and maintenance efficiency.

  • PDF

A Study on the Therapists' Protective Actions of Medical Information Privacy - With a focus on physical and occupational therapists - (환자 프라이버시 보호행동 실천에 관한 연구 - 물리치료사와 작업치료사를 중심으로 -)

  • Kim, Jeong-Ja;Kweon, Eun-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.447-455
    • /
    • 2012
  • The present study was carried out with a view to examine the protective actions of physical and occupational therapists for patients's privacy. For this purpose, a survey was conducted with the questionnaires that were distributed to 297 physical and occupational therapists engaged in general hospitals as well as in rehabilitation clinics across the country from January 2 to 13, 2012. From the survey, it was made known that the overall extent of protective actions practiced by them was $3.54{\pm}.733$ in average. Divided by area, the average protective action in communication was $3.62{\pm}.776$, followed by $3.57{\pm}1.013$ in direct contact and $3.53{\pm}.780$ in maintenance and management, respectively. The analysis of general characteristics by each area showed that the older their age gets and the longer their career is, the more the protective action is practiced by them. Although they are well aware of the fact that the medical information of patients should be kept 100% secret and they practice it to almost excellent grade (5), the physical and occupational therapists, as key experts in charge of improving functions of patients, were found to have little concern for and little knowledge about contents of protecting medical information. It is thus required to perform public relation and instruction continuously to intensify their awareness of needs to protect patients' privacy and to implant ethical sense in this regard deep in their mind.

Effect of Highly Pressurized Hydrogen Gas on Tensile Properties of a Low-Alloy Steel Used for Manufacturing CNG Storage Vessels (CNG 저장용기용 저합금강의 인장 특성에 미치는 고압 수소가스의 영향)

  • Lee, H.M.;Jeong, I.H.;Park, J.S.;Nahm, S.H.;Han, J.O.;Lee, Y.C.
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.8
    • /
    • pp.829-833
    • /
    • 2012
  • SNG (synthetic natural gas or substitute natural gas) could contribute greatly toward energy security. In addition, HCNG (or $H_2CNG$) is expected to be used as a fuel gas for internal combustion engines and home appliances because it has extremely low emissions and high thermal efficiency. However, the hydrogen contained in SNG or HCNG can deteriorate the mechanical properties of the materials used in existing natural gas infrastructure. Therefore, it is necessary to investigate the effect of hydrogen on the mechanical properties of such materials so that SNG or HCNG can be transported and distributed safely and reliably. In this study, the effect of highly pressurized hydrogen gas on the tensile properties of a low-alloy steel used for manufacturing CNG storage vessels was investigated using the so-called hollow tensile specimen technique.

Video Retrieval System supporting Adaptive Streaming Service (적응형 스트리밍 서비스를 지원하는 비디오 검색 시스템)

  • 이윤채;전형수;장옥배
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.1-12
    • /
    • 2003
  • Recently, many researches into distributed processing on Internet, and multimedia data processing have been performed. Rapid and convenient multimedia services supplied with high quality and high speed are to be needed. In this paper, we design and implement clip-based video retrieval system on the Web enviroment in real-time. Our system consists of the content-based indexing system supporting convenient services for video content providers, and the Web-based retrieval system in order to make it easy and various information retrieval for users in the Web. Three important methods are used in the content-based indexing system, key frame extracting method by dividing video data, clip file creation method by clustering related information, and video database construction method by using clip unit. In Web-based retrieval system, retrieval method ny using a key word, two dimension browsing method of key frame, and real-time display method of the clip are used. In this paper, we design and implement the system that supports real-time display method of the clip are used. In this paper, we design and implement the system that supports real-time retrieval for video clips on Web environment and provides the multimedia service in stability. The proposed methods show a usefulness of video content providing, and provide an easy method for serching intented video content.

K-Ar Ages of Illite from Clay Veins Distributed in Granitic Rocks in the Korean Peninsula (국내 화강암 중의 점토세맥에 포함되는 일라이트의 K-Ar 연대)

  • KITAGAWA Ryuji;NISHIDO Hirotsugu;HWANG Jin-Yeon;JIGE Mayumi
    • Journal of the Mineralogical Society of Korea
    • /
    • v.18 no.3 s.45
    • /
    • pp.215-225
    • /
    • 2005
  • Numerous clay veins along fractures such as fault, joints, cracks and small fissures are found in granitic rocks in the Korean Peninsula. Granitic rocks of three geological stages (Jurassic, Cretaceous and Paleogene) occur in the Korean Peninsula, and are known as the Daebo, Bulguksa and Hoam granites, respectively. Specimens from clay veins composed or mainly mica clay mineral (illite) were dated using the K-Ar method with the hosted granitoids. The respective ages were as follows. Jurassic: granites 143.7 Ma and 160 Ma, clay mineral veins 104 Ma and 107 Ma: Cretaceous: granite 133.2 Ma, clay mineral veins 93.6 Ma, 84.2 Ma and 84.3 Ma: Paleogene: granite 39.7 Ma and 35.4Ma, clay mineral veins 27.1 Ma and 23.9 Ma. The ages of the clay veins in the Korean Peninsula are clearly much younger than those of their hosted granitoids. This contrasts with data for similar clay veins in Cretaceous and Paleogene granitoids in southwest Japan, where the K-Ar ages of mica clay minerals are slightly younger than their host rocks, or are almost the same.

Integration Process of Federation Object Model for Interoperation of Federations (페더레이션 연동을 위한 객체 모델 통합 프로세스)

  • Kwon, Se Jung;Yu, Minwook;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • High Level Architecture(HLA) is a specification for interoperation among heterogeneous simulators which are executed in a distributed environment. HLA originally allows many federates to join in a federation using a single RTI(Run-Time Infrastructure). As the target systems become more complex, the need for the interoperation of federations, performed in a RTI-RTI interoperation environment, has been growing. It can be performed by the confederation interface with the agents, which subrogate the API calls and callbacks of each federation. The existing studies have assumed that the object models of each federation are based on same HLA standard and their object descriptions are equal. Because the existing federations are usually not under this assumption, this paper proposes the integration process of object models for the federation interoperation environment. To integrate the object models for the interoperation of federations, this process resolves the differences of HLA standards, provides conversion process between objects with different descriptions and excludes the security objects. We expect that this process enhances the reusability and effectiveness of interoperation of federations in various domains.

A Study on the Employment Status and Treatment of Temporary Librarians in the School Libraries (학교도서관 비정규직 사서의 고용실태와 처우개선 방안에 관한 연구)

  • Ryu, Jae hee;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.3
    • /
    • pp.101-128
    • /
    • 2015
  • The purpose of this study was to investigate the temporary librarians' employment status that have been placed in over 80% of the school libraries and deduce the issues of their job status for proposing some solutions to improve their job performance. To achieve the above research purposed in this study, the related literature was reviewed and analyzed and an interview was conducted with the librarians in the Chungbuk province and a survey was distributed in the same province. As a result, first, a high correlation was found between the total satisfaction and the factors as follows; 'working satisfaction', 'employment conditions', 'working environment', 'interpersonal relations' etc. In the difference verification based on the satisfaction in accordance with the employment status, a difference of satisfaction was found between the pre and post analyses of the unlimited contractions. Second, the most overall review of the temporary librarians' job performances in relation to the 'reading and lending performances was conducted, regardless of the librarian certification. Third, the temporary librarians working at the school libraries responded that 'the manpower developer' was the most difficult consideration in relation to their employment statuses. And, asked about the solutions for the improvement of their job conditions, most of the librarians wanted their job security.

Analysis on the Damage Status by Diagnostical Methodology for the Improvement Landscape on the Supyo-bridge at Chunggae-stream (청계천 수표교(水標橋)의 경관 향상을 위한 진단학적(診斷學的) 훼손상태 분석)

  • An, Jin-Sung;Choi, Ah-Hyun;Kim, Yu-Il
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.3
    • /
    • pp.105-113
    • /
    • 2010
  • This study is for the preservation plan of the tradition space which is performed by the damage status analysis through performing the value assessment. Especially, it is an experimental study for finding the process and methods by analyzing the major element for the value assessment of the selected object's damage status through the expert group who are systematized in their interest to conserve the traditional structure in traditional space. For that purpose, this study should be performed by the fundamental understanding of the physical property of the Supyo-bridge and the condition of the selected site's environment. Meanwhile, this study has been done that 'map of the damage status distribution' for making records of damage status of the Supyo-bridge on the property utilized field measurement adapted by photogrammetry and assessment guidelines, which are for investigation on damage status of objects that are standardized 'Raccomandazioni Normal' which could be said construction culture assets management guidelines of Italian government. As the result of investigation, damage status of each part in the Supyo-bridge was mostly composed of damage by sediment and corrosion and in case of 9 damage types including corrosion, in consideration of physical and chemical properties and distribution status of those elements, it is made an judgement that is not working as a threatened factor regarding security of the Supyo-bridge. On the contrary, for the improvement landscape, in case of 'Thermoclastism' phenomenon observed in 'upper floor', 'Myungae stone' and 'bridge pier' is that when taking it into consideration that is widely distributed concentrated on the bridge pier, surface reinforcement job along with elimination of damage part will be judged to be requested for earliest treatment.