• Title/Summary/Keyword: Key task

Search Result 522, Processing Time 0.031 seconds

A Study on Analyzing out the Key Tasks and Developing the Professional Type of National Librarians through Job Analysis (직무분석을 통한 국립중앙도서관사서의 핵심업무 및 전문사서 유형 개발에 관한 연구)

  • Ahn, In-Ja;Hoang, Gum-Sook;Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.1
    • /
    • pp.129-148
    • /
    • 2008
  • Analyzing out the Key Tasks and Developing the Professional Type of National Librarians through Job Analysis was made, because improving the professionalism of librarians is the strategy of survival in the competency based society. It is composed of 22 duties, 216 tasks of national librarian job and 96 key tasks is extracted among them. As the results, 12 types of professional librarian which is composed 10 function oriented types, and 2 user oriented types, is suggested: collection development librarian, cataloger taxonomist, information service librarian, reading coach, research librarian of international standards, database & system manager, international work librarian, national support librarian, marketing librarian, library literacy librarian, children' librarian, handicapped service librarian.

A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.504-515
    • /
    • 2008
  • Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.

  • PDF

A unique genetic lineage at the southern coast of China in the agar-producing Gracilaria vermiculophylla (Gracilariales, Florideophyceae)

  • Hu, Zi-Min;Liu, Ruo-Yu;Zhang, Jie;Duan, De-Lin;Wang, Gao-Ge;Li, Wen-Hong
    • ALGAE
    • /
    • v.33 no.3
    • /
    • pp.269-278
    • /
    • 2018
  • Ocean warming can have significant negative impacts on population genetic diversity, local endemism and geographical distribution of a wide range of marine organisms. Thus, the identification of conservation units with high risk of extinction becomes an imperative task to assess, monitor, and manage marine biodiversity for policy-makers. Here, we surveyed population structure and genetic variation of the red seaweed Gracilaria vermiculophylla along the coast of China using genome-based amplified fragment length polymorphism (AFLP) scanning. Regardless of analysis methods used, AFLP consistently revealed a south to north genetic isolation. Populations at the southern coast of China showed unique genetic variation and much greater allelic richness, heterozygosity, and average genetic diversity than the northern. In particular, we identified a geographical barrier that may hinder genetic exchange between the two lineages. Consequently, the characterized genetic lineage at the southern coast of China likely resulted from the interplay of post-glacial persistence of ancestral diversity, geographical isolation and local adaptation. In particular, the southern populations are indispensable components to explore evolutionary genetics and historical biogeography of G. vermiculophylla in the northwestern Pacific, and the unique diversity also has important conservation value in terms of projected climate warming.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

Grain-Based Distinct Element Modeling of Thermoshearing of Rock Fracture: DECOVALEX-2023 Task G (입자기반 개별요소모델을 이용한 암석 균열의 Thermoshearing 거동 해석: 국제공동연구 DECOVALEX-2023 Task G)

  • Jung-Wook, Park;Li, Zhuang;Jeong Seok, Yoon;Chan-Hee, Park;Changlun, Sun;Changsoo, Lee
    • Tunnel and Underground Space
    • /
    • v.32 no.6
    • /
    • pp.568-585
    • /
    • 2022
  • In the present study, we proposed a numerical method for simulating thermally induced fracture slip using a grain-based distinct element model (GBDEM). As a part of DECOVALEX-2023, the thermo-mechanical loading test on a saw-cut rock fracture conducted at the Korea Institute of Civil Engineering and Building Technology was simulated. In the numerical model, the rock sample including a saw-cut fracture was represented as a group of random Voronoi polyhedra. Then, the coupled thermo-mechanical behavior of grains and their interfaces was calculated using 3DEC. The key concerns focused on the temperature evolution, thermally induced principal stress increment, and fracture normal and shear displacements under thermo-mechanical loading. The comparisons between laboratory experimental results and the numerical results revealed that the numerical model reasonably captured the heat transfer and heat loss characteristics of the rock specimen, the horizontal stress increment due to constrained displacement, and the progressive shear failure of the fracture. However, the onset of the fracture slip and the magnitudes of stress increment and fracture displacement showed discrepancies between the numerical and experimental results. We expect the numerical model to be enhanced by continuing collaboration and interaction with other research teams of DECOVALEX-2023 Task G and validated in further study.

Depth Map Coding Using Histogram-Based Segmentation and Depth Range Updating

  • Lin, Chunyu;Zhao, Yao;Xiao, Jimin;Tillo, Tammam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1121-1139
    • /
    • 2015
  • In texture-plus-depth format, depth map compression is an important task. Different from normal texture images, depth maps have less texture information, while contain many homogeneous regions separated by sharp edges. This feature will be employed to form an efficient depth map coding scheme in this paper. Firstly, the histogram of the depth map will be analyzed to find an appropriate threshold that segments the depth map into the foreground and background regions, allowing the edge between these two kinds of regions to be obtained. Secondly, the two regions will be encoded through rate distortion optimization with a shape adaptive wavelet transform, while the edges are lossless encoded with JBIG2. Finally, a depth-updating algorithm based on the threshold and the depth range is applied to enhance the quality of the decoded depth maps. Experimental results demonstrate the effective performance on both the depth map quality and the synthesized view quality.

Determination of Incident Angle and Position of Optimal Mode Ultrasonic Beam for Flaw Detection in Anisotropic and Inhomogeneous Weldments by Ray Tracing

  • Zhao, Xinyu;Song, Sung-Jin;Kim, Hak-Joon;Gang, Tie;Kang, Suk-Chull;Choi, Yong-Hwan;Kim, Kyung-Cho;Kang, Sung-Sik
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.27 no.3
    • /
    • pp.231-238
    • /
    • 2007
  • Ultrasonic inspection of austenitic steel weldments is a truly difficult task due to complicated wave propagation phenomena such as beam skewing, splitting and distortion. In order to understand these phenomena and design proper inspection procedures, simulation is increasingly paid more attention to. This article addresses a ray tracing based approach to determine incident angle and position of optimal wave mode ultrasonic beam for flaw detection in anisotropic and inhomogeneous austenitic steel weldments. Specially, the optimal mode of ultrasonic wave wave is selected by ray tracing simulation, and an optimization approach based on ray tracing and bi-section search is proposed in order to find the ray path connecting two given points in weldments. With help of this approach, the optimal incident angle and position of ultrasonic beam can be determined for a given flaw position.

A study on the librarian's key tasks of the era of the 4th Industrial Revolution (4차 산업혁명 시대 도서관 사서의 핵심업무에 관한 연구)

  • Park, Tae-Yeon;Han, Hui-Jeong;Oh, Hyo-Jung;Yang, Dongmin
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.2
    • /
    • pp.327-356
    • /
    • 2018
  • People's interest in the emergence of the era of the fourth industrial revolution based on technological innovation and consequently changes in employment structure increased. Especially, the society-wide intelligent informatization will have a great influence on the library environment, and librarian as a job in the library also needs to actively cope with these environmental changes. Therefore, in this paper, we analyze the technology substitutability according to librarian's duties, and derive the core tasks of the future librarian. Finally, the new roles of future librarian are discussed in depth.

Key Concepts in Vygotsky's Theoretical Framework: L2 Classroom Interaction and Research

  • Nam, Jung-Mi
    • English Language & Literature Teaching
    • /
    • v.11 no.3
    • /
    • pp.71-87
    • /
    • 2005
  • The role of interaction in second language (L2) classrooms has been examined from different angles, ranging from early studies of foreigner talk to the studies of the teacher- and task-based talk. However, most of the research on L2 classroom interaction has been based on a traditional psycholinguistic view of language and learning, failing to reconceptualize a broad and holistic understanding of L2 learning. Currently, many researchers have attempted to explore and describe classroom interaction in L2 classrooms from a sociocultural perspective. The purpose of this paper is to discuss Vygotsky's theoretical framework in terms of L2 classroom interaction and research from a sociocultural perspective, by describing three key concepts (zone of proximal development, private speech, and activity theory) in Vygotsky's theoretical framework and relating them to L2 classroom interaction. The results demonstrated the importance of social interaction for second language acquisition with the review of the related research study. It was also suggested that the dynamic and interactive processes of second language learning in the classroom should be valued by L2 researchers as well as L2 teachers. Finally, implications for the concepts for L2 classroom research and pedagogy are presented in the conclusion.

  • PDF

Characteristics of Construction Managers' Roles from the Perspective of Leader's Roles - Focused on Design Stages - (리더 역할 관점에서의 CM단장 역할 특성 분석에 관한 연구 - 설계단계를 중심으로 -)

  • Kim, Dong-Hee;Kim, Han-Soo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.1
    • /
    • pp.125-132
    • /
    • 2011
  • Since early 2000s, the importance of CM services has been increasingly recognized and the CM market is continuously growing. As a consequence, the number of CM companies has increased, which means keener market competition. In order to increase their competitiveness, it has been a major task for CM companies to employ and foster competent construction managers who can play a role of efficient project leaders. The objective of the paper is to analyze key characteristics of construction managers' roles during design stages from the perspective of leader's roles including strategic planner, team builder, gatekeeper, expert, champion.