• Title/Summary/Keyword: Natural Access Control

Search Result 49, Processing Time 0.025 seconds

A Study on the Environmental Planning Guidelines for Crime Safety at Elementary School settings (초등학교 교육환경의 범죄안전 환경계획방안에 관한 연구)

  • Byun, Gi-Dong;Ha, Mi-Kyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.2
    • /
    • pp.211-219
    • /
    • 2013
  • The purpose of this study is to propose the environmental planning guidelines of elementary school settings for a crime safety. The research methodologies To achieve the goal, the literature review analysis and the survey were used as main research methodologies. The survey is organized as follows. First, elementary education facilities were divided into 20 spaces based on the major space. Second, after analyzing the domestic and foreign CPTED Guidelines, elements of environmental planning were classified to fit in the space. Based on this, the expert survey was conducted. The results of this study are as follows; First, it is necessary to consider specific places such as 'toilets', 'parking lot', 'in-between space', 'main access road', 'sub-access road' and 'harmful facilities around school' for safer school environment. Second, it is significant to plan 'equipment facilities' and 'outdoor space in the school setting' with priority for elementary education environment. Third, environmental planning elements for safer elementary schools can be classified into 9 factors(types) including 'natural surveillance planning', 'territoriality reinforcement planning', 'mechanical surveillance planning', 'access control planning' and 'neighborhood reinforcement planning'. Forth, regarding 'indoor space', crime-free elementary school environment can be build through 'natural surveillance planning' and 'territoriality reinforcement planning'. Finally, regarding 'outdoor space', the crime can be prevented through 'natural surveillance planning' and 'access control planning'.

Design and Implementation of HomeTDMA: a TDMA Protocol for Home Networks

  • Casaquite, Reizel;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1612-1621
    • /
    • 2007
  • In this paper, we introduced our designed TDMA (Time Division Multiple Access) based MAC (Medium Access Control) protocol for Home Networks called HomeTDMA. We have implemented and tested it in a test bed using crossbow motes and TinyOS. We also have compared HomeTDMA and CSMA (Carrier Sense Multiple Access) in terms of space and time complexity, channel access time, delivery success ratio, and throughput. Based on our results, HomeTDMA has an advantage over CSMA on channel access time, throughput and delivery success ratioIn the case of complexity, HomeTDMA is more complex compared to CSMA. Thus, CSMA is more appropriate in wireless sensor networks (WSNs) where memory, energy, and throughput are important parameters to be considered. However, HomeTDMA has a natural advantage of collision free medium access and is very promising for home networks where a reliable transmission or data transfer and congestion control is highly preferred.

  • PDF

A Study on the Non-Authority Control System (무전거시스템에 관한 연구)

  • Choi Suk-Doo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.233-264
    • /
    • 1993
  • The authorized form is called the heading must be unique and consistent. Without both uniqueness and cosistency, retrieval from the bibliographic database will not be optimal and in some cases may even be impossible. But the authority control is extremely expensive, because it is labour-intensive and dependent on professional investigation and judgement. In fact, it is by far the most expensive function in all of bibliographic control. The processes used to determine the form of access points. maintain. use. and evaluate very accurate authority records reduce the efficiency to generate or merge bibliographic items without modification from any national level bibliographic utilities as well as individual library. In this paper non-authority control system was suggested to solve the disadvantages of authority work. The apparent advantages of the non-authority control system are it is easy to determine the heading, input the bibliographic data. integrate the access points into an existing file, and generate and merge bibliographic data without modification. In addition, non-authority control system can be transmitted into online information retrieval system conducted with a mixture of controlled vocabularies and natural language.

  • PDF

Application Design and Execution Framework in Role-Based Access Control Systems (역할기반 접근통제 시스템에서 응용 프로그램의 설계 및 시행지원 프레임워크)

  • Lee, Hyeong-Hyo;Choe, Eun-Bok;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3020-3033
    • /
    • 1999
  • Role-Based Access Control(RBAC) security policy is being widely accepted not only as an access control policy for information security but as both a natural modeling tool for management structure of organizations and flexible permission management framework in various commercial environments. Important functions provided by the current RBAC model are to administrate the information on the components of RBAC model and determine whether user's access request to information is granted or not, and most researches on RBAC are for defining the model itself, describing it in formal method and other important properties such as separation of duty. As the current RBAC model which does not define the definition, design and operation for applications is not suitable for automated information systems that consist of various applications, it is needed that how applications should be designed and then executed based on RBAC security model. In this paper, we describe dynamic properties of session which is taken for a passive entity only activated by users, as a vehicle for building and executing applications in an automated information systems. And, a framework for session-oriented separation of duty property, application design and operation is also presented.

  • PDF

Satisfaction Realization of Apartment House Inhabitants for CPTED Design Element: To with Group by CPTED Application Level, Reciprocal Action Effect of Crime Prevention Effort (CPTED 설계요소에 대한 공동주택주민의 만족도 인식: CPTED 적용수준별 집단과 거주기간, 범죄예방노력의 교호작용효과)

  • Choi, Hyun-Sick;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.231-258
    • /
    • 2010
  • A study apartment house inhabitants of to, crime prevention effort is done satisfaction analysis and that deduce design plan of CPTED that can overcome safe life space embodiment and criminal fear from crime in Juminin viewpoint through atomize group's interaction by background fantast. Is positive because factor analysis wave and satisfaction index of deduce universe (Total group) 8 factor are presented more than all 0, and quite was expose by level that is worth accommodating. Satisfaction index of The secondary design group (Group1) 8 factor is positive because is presented more than all 0, and mechanical access control, mechanical surveillance is level that is worth accommodating quite, and level that is proper in remainder 6 dimension appear. Can know that 1 The secondary design group(Group2) is expose by level that satisfaction characteristic of 8 factor can be presented more than all 0 and appeared positively, and accommodate quite in all dimensions. Result that analyze Two-way ANOVA satisfaction difference of environment design of group by satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction by appeared satisfaction high in group less than natural access control, 2 years of natural surveillance, and reciprocal action effect that go with group is high satisfaction in 2 years low in The secondary design group more than the primary and the secondary design group of systematic access control and natural access control, and the primary and the secondary design group appeared high in subgroup of 2 remainders. Satisfaction difference by group by crime prevention effort satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction difference by crime prevention effort appeared satisfaction high in 'A prize' group to The secondary design group, and reciprocal action efficiency is high in 'A prize' group in The secondary design group more than the primary and the secondary design group in mechanical access control, systematic access control, natural access control, territoriality reinforcement, and satisfaction of 'Between' and 'Very' group appeared high in the primary and the secondary design group.

  • PDF

A Study on The Architectural Plan Access Method for The Integrated Design of The Environmentally Friendly Architecture (친환경 건축의 통합설계를 위한 건축 계획적 접근방법에 관한 연구)

  • Cho, Sung-Hyun;Kim, Chul-Kyu
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.10 no.3
    • /
    • pp.79-86
    • /
    • 2010
  • From the research which sees the building which uses a natural control method with ecological architecture, continuity tried to divide the building which uses a physical control method with sustainable architecture. Ecological architecture analyzes the microclimate of the area and applies mining and natural ventilation leads and that the interior environment controls, the condition of the site actively and there is a possibility of seeing. Also sustainable architecture which is possible to lead and recycling and reuse of the resources and energy cyclic process of the construction resources to lead and the interior environment to control. Therefore the case where the facility system and structural system become integrated design organically in natural circulating method is many. Specially the sunshade system and double skin system are combined and structural system of the building and there is a possibility of having the envelope which form is feature. Today the buildings lead and the system integration process where the integral parts are systematic is demanded the interior environment which and an external form and that, they make they are there is a possibility of seeing. the environmental building which hits joins in with natural control method and the structure and facility system are integrated and has the tendency which is developed and there is a possibility of saying that a meaning with the alternative construction will be able to reduce the resources and an energy.

A Study on a Smart Home Access Control using Lightweight Proof of Work (경량 작업증명시스템을 이용한 스마트 홈 접근제어 연구)

  • Kim, DaeYoub
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.931-941
    • /
    • 2020
  • As natural language processing technology using machine learning develops, a Smart Home Network Service (SHNS) is drawing attention again. However, it is difficult to apply a standardized authentication scheme for SHNS because of the diversity of components and the variability of users. Blockchain is proposed for data authentication in a distributed environment. But there is a limit to applying it to SHNS due to the computational overhead required when implementing a proof-of-work system. In this paper, a lightweight work proof system is proposed. The proposed lightweight proof-of-work system is proposed to manage block generation by controlling the work authority of the device. In addition, this paper proposes an access control scheme for SHNS.

The Access Control System of Network Management Information Base (망관리 정보베이스 접근 제어 시스템)

  • Kim, Jong-Duk;Lee, Hyung-Hyo;Noh, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.5
    • /
    • pp.1246-1256
    • /
    • 1998
  • MIB(Management Information Base), one of the key components of network management system, is a conceptual repository for the information of the various managed objects. MIB stores and manages all the structural and operational data of each managed resources. Therefore, MIB should be protected properly from inadvertant user access or malicious attacks. International standard ISO/IEC 10164-9 describes several managed object classes for the enforcement of MIB security. Those managed object classes described access control rules for security policy. But the exact authorization procedures using those newly added managed object classes are not presented. In this paper, we divide managed object classes into two groups, explicit and implicit ones, and describe the access authorization procedure in Z specification language. Using Z as a description method for both authorization procedure and GDMO's action part, the behaviour of each managed object class and access authorization procedure is more precisely and formally defined than those of natural language form.

  • PDF

Biodiversity Conservation and Its Social Implications: The Case of Indigenous and Community Conserved Areas in Sabah, Malaysia

  • Cooke, Fadzilah Majid;Hussin, Rosazman
    • SUVANNABHUMI
    • /
    • v.6 no.2
    • /
    • pp.3-18
    • /
    • 2014
  • With natural resources-terrestrial or coastal-fastly diminishing, governments are now resorting to biodiversity conservation, fast-tracking the introduction of new legislations, as well as the amendment of existing ones, and laying out programs that interpret existing practices and research agendas. This paper examines how biodiversity conservation-in addition to eco-tourism-has become an important symbol of the modernizing state of Sabah, Malaysia. It further examines the effects of biodiversity conservation on state and community management of natural resources, with particular reference to the management of natural resources by the indigenous peoples of Sabah. Citing case studies and focusing on a forest community at Kiau Nuluh, in the district of Kota Belud, Sabah, this paper evaluates strategies used by indigenous groups to maintain access and control over the management of natural resources-and by implication to livelihoods-via ecotourism, making creative alliances with non-government organisations as well as forging cooperation with government agencies which act as custodians of these resources. For a majority of indigenous groups however, the practice of biodiversity conservation has meant reduced and controlled access to natural resources, considering the fundamental issue of the lack of security of tenure to the land claimed under customary rights. New initiatives at recognizing Indigenous and Community Conserved Areas (ICCAs) by international conservation groups provide a means for tenure recognition, for a price, of course. The recognition of ICCAs also faces obstacles arising from developmentalist ideology which upholds that forests are valuable only when converted to other land use, and not left to stand for their intrinsic value.

  • PDF

A Transdisciplinary Approach for Water Pollution Control: Case Studies on Application of Natural Systems

  • Polprasert, Chongrak;Liamlaem, Warunsak
    • Environmental Engineering Research
    • /
    • v.19 no.3
    • /
    • pp.185-195
    • /
    • 2014
  • Despite the enormous technical and economic efforts to improve environmental conditions, currently about 40% of the global population (or 2 billion people) are still lack access to safe water supply and adequate sanitation facilities. Pollution problems and transmission of water- related diseases will continue to proliferate. The rapid population growth and industrialization will lead to a reduction of arable land, thus exacerbating the food shortage problems and threatening environmental sustainability. Natural systems in this context are a transdisciplinary approach which employs the activities of microbes, soil and/or plants in waste stabilisation and resource recovery without the aid of mechanical or energy-intensive equipments. Examples of these natural systems are: waste stabilisation ponds, aquatic weed ponds, constructed wetlands and land treatment processes. Although they require relatively large land areas, the natural systems could achieve a high degree of waste stabilisation and at the same time, yield potentials for waste recycling through the production of algal protein, fish, crops, and plant biomass. Because of the complex interactions occurring in the natural systems, the existing design procedures are based mainly on empirical or field experience approaches. An integrated kinetic model encompassing the activities of both suspended and biofilm bacteria and some important engineering parameters has been developed which could predict the organic matter degradation in the natural systems satisfactorily.