• Title/Summary/Keyword: Non-Public Network

Search Result 151, Processing Time 0.028 seconds

A Non-parametric Trend Analysis of Water Quality Using Water Environment Network Data in Nakdong River (낙동강수계 물환경측정망 자료를 이용한 비모수적 수질 경향 비교 및 분석)

  • Kim, Jungmin;Jeong, Hyungi;Kim, Hyeran;Kim, Yongseok;Yang, Deukseok
    • Journal of Environmental Impact Assessment
    • /
    • v.29 no.1
    • /
    • pp.61-77
    • /
    • 2020
  • In South Korea, major public waters have been systematic management under national level. Water environment network has been continuous monitoring for change of aquatic ecosystem, river and reservoir. In Water Quality Monitoring Networks, the data have been generally monitored Per eight days or month, while in Automatic Water Quality Monitoring Network the data have been monitored at daily intervals. Therefore, we were compared and analyzed water quality data between the networks using statistic method for same water quality item. Mann-kendall test results confirm that all points in Water Temperature (WT) and DO were not statistically significant. In particular, the result revealed that there is significant variation of TOC in the four different sites, TN in two different sites, TP in three different sites, WT in seven different sites, pH in two different sites between Water Quality Monitoring Network and Automatic Water Quality Monitoring Network. As a result firm LOWESS, TOC and pH clearly shows different trend. Among different sites, the water quality show the significantly positive correlations between at Sinam-Sangju2 and Namgang-Namgang4. Negative correlation significantly appeared in TP (ADD_Lower-AD1 site), TOC (DG-SG site), pH (GR-GR site), TP (JP-CN) and TN, TP, pH, EC, DO (GC-GC2-1 site).

A Study on the Charge of Using the Internet Network - Focusing on U.S. Internet History and Charter Merger Approval Conditions Litigation - (인터넷 망 이용의 유상성에 대한 고찰 - 미국 인터넷 역사 및 Charter 합병승인조건 소송 중심으로 -)

  • Cho, Dae-Keun
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.123-134
    • /
    • 2021
  • This paper suggests that the Internet is not free through analysis of U.S. Internet history and lawsuits related to the Charter merger in 2016. Generally speaking, the players in internet connectivity market agree to Non-Disclosure Agreement, when connecting their facilities and networks each other. So, I adopted the case study & analysis as research methodologies due to limitation of collecting the transaction data between them. The former finds that Internet access has never been free in U.S Internet history. As we know, some including Content Providers(CPs) argue that the Internet is a free network and there are many cases to use the internet for free, so they came to conclusion that ISPs have no right to charge the users like CPs. This study refutes these arguments in two ways. One is that using the internet has never been free. From ARPANET, known as the beginning of the U.S. Internet, to the commercialization of backbone, no Internet has been considered or implemented for free since the early Internet network was devised. Also, the U.S government was paying subsidies or institutions were paying fees to secure network operations for the NSFNET backbone. the other is that "free peering" refers to barter transactions between ISPs, not to free access to counterpart internet networks. Second, this study analyze the FCC' executive order of conditioned merger approval and the court's related ruling and verify that using the internet is not free. According to the analysis, this study finds that it's real situation to make paid settlements between ISP-CPs (including OTTs) in the US Internet market at the moment. This study concludes that the Internet has never been free in terms of its technical characteristics, network structure, network operation, and system. Also it proposes how to improve the domestic settlement system between ISPs-CPs in terms of policy and regulation.

Effect of Social Network Service (SNS) Users' Object Relations Factors on User Satisfaction through Pleasure and Self-efficacy (소셜네트워크서비스(SNS) 이용자의 대상관계 요인이 즐거움과 자기효능감을 통해 이용자 만족에 미치는 영향)

  • Chae, Su-in;Choi, Hyo-geun;Kwon, Do-Soon;Park, Dong-cheol
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.1-16
    • /
    • 2022
  • Social network service (SNS) using mobile or web is growing rapidly, and the emergence of various platform services is causing innovative changes in social network service (SNS). This study is to identify the target relation factors of social network users and to empirically study the causal relationship of how much these factors affect user satisfaction through pleasure and self-efficacy. To present an effective and efficient development plan in. In order to empirically verify the research model of this study, a survey was conducted with the general public who had experience using social network services (SNS). Path analysis was performed. As a result, it was possible to verify the correlation of the object relational factors on user satisfaction through pleasure and self-efficacy.First, non-excluded had a significant effect on pleasure, but did not significantly affect self-efficacy. Second, stability attachment did not significantly affect both enjoyment and self-efficacy. Third, social ability did not significantly affect both enjoyment and self-efficacy. Fourth, self-centeredness did not have a significant effect on both enjoyment and self-efficacy. Fifth, pleasure had a significant effect on both self-efficacy and user satisfaction. Sixth, self-efficacy had a significant effect on user satisfaction.

Design and Implementation of Initial OpenSHMEM Based on PCI Express (PCI Express 기반 OpenSHMEM 초기 설계 및 구현)

  • Joo, Young-Woong;Choi, Min
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.105-112
    • /
    • 2017
  • PCI Express is a bus technology that connects the processor and the peripheral I/O devices that widely used as an industry standard because it has the characteristics of high-speed, low power. In addition, PCI Express is system interconnect technology such as Ethernet and Infiniband used in high-performance computing and computer cluster. PGAS(partitioned global address space) programming model is often used to implement the one-sided RDMA(remote direct memory access) from multi-host systems, such as computer clusters. In this paper, we design and implement a OpenSHMEM API based on PCI Express maintaining the existing features of OpenSHMEM to implement RDMA based on PCI Express. We perform experiment with implemented OpenSHMEM API through a matrix multiplication example from system which PCs connected with NTB(non-transparent bridge) technology of PCI Express. The PCI Express interconnection network is currently very expensive and is not yet widely available to the general public. Nevertheless, we actually implemented and evaluated a PCI Express based interconnection network on the RDK evaluation board. In addition, we have implemented the OpenSHMEM software stack, which is of great interest recently.

Survey study on planning direction of integrated model for the disabled and the elder - Focusing on the case of foreign country - (장애인 및 노약자의 생활시설 통합모델 설정을 위한 조사연구 - 해외 시범사업 사례를 중심으로 -)

  • Kang, Byoung-Keun;Seong, Ki-Chang;Park, Kwang-Jae;Yun, Young-Sam;Kim, Sang-Woon;Lee, Joo-Hyung
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.15 no.2
    • /
    • pp.23-30
    • /
    • 2009
  • The purpose of this study is to suggest planning directions of architectural integrates model by analysing the foreign case of integrated services for the aged and the disabled. For this study, we have researched on three different aspects. Three aspects are the element of barrier-free, architectural planning, information technology and operation. Based on the analysis of overseas examples, the good circumstance for both the disabled and the elder as one of member in the local societies could be defined like the following conditions: that is, (1) IT technology facilitates both barrier-free architecture and life to be easier and safer, and (2) both the disabled and the elder in local societies live together with the non-disabled in the same community. To realize this purpose, for a short-term plan, the system of feedback, examining the results of the research through the examples of housing plan, should be improved. In addition to, the system of public service, such as introducing the institutes for social educations, should be developed to result in the change of social insight. For a long-term plan, the whole society should have the research and plan of the unified model in a dimension of cities, where the network of public welfare is deeply associated with the system of the architecture, traffic, streets, and living-supporting information.

  • PDF

Comparison of Molecular Characterization and Antimicrobial Resistance in Carbapenem-Resistant Klebsiella pneumoniae ST307 and Non-ST307 (Carbapenem 내성 Klebsiella pneumoniae ST307과 Non-ST307의 분자 특성 및 항균제 내성 비교)

  • Hye Hyun Cho
    • Microbiology and Biotechnology Letters
    • /
    • v.51 no.4
    • /
    • pp.500-506
    • /
    • 2023
  • Carbapenem-resistant Klebsiella pneumoniae (CRKP) is emerging as a worldwide public health threat. Recently, Klebsiella pneumoniae carbapenemase-2 (KPC-2)-producing sequence type (ST) 307 was identified main clone of CRKP, and dissemination of ST307 was reported in South Korea. This study examined the molecular characteristic and antimicrobial resistance pattern of 50 CRKP isolated from a tertiary hospital in Daejeon, from March 2020 to December 2021. Epidemiological relationship was analyzed by Multilocus sequence typing (MLST) and antimicrobial susceptibility test was determined using disk-diffusion method. PCR and DNA sequence analysis were performed to identify carbapenemase genes. CRKP infections were significantly more frequent in males and the patients aged ≥ 60 years. Among the 50 CRKP isolates, 46 isolates (92.0%) were multidrug-resistant (MDR), and 44 isolates (88.0%) were carbapenemase-producing K. pneumoniae (CPKP). The major carbapenemase type was KPC-2 (36 isolates, 72.0%) and New Delhi metalloenzyme-1 (NDM-1) and NDM-5 were identified in 7 isolates (14.0%) and 1 isolate (2.0%), respectively. In particular, 88.9% (32/36) of KPC-2-producing K. pneumoniae belonged to ST307, whereas 87.5% (7/8) of NDM-1,-5-producing K. pneumoniae belonged to non-ST307. These results suggest that proper infection control and effective surveillance network need to prevent not olny the spread of ST307, but also the development of non-ST307.

Anonymity Personal Information Secure Method in Big Data environment (빅데이터 환경에서 개인정보 익명화를 통한 보호 방안)

  • Hong, Sunghyuck;Park, Sang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.179-185
    • /
    • 2018
  • Big Data is strictly positioning one of method to deal with problems faced with mankind, not an icon of revolution in future anymore. Application of Big Data and protection of personal information have contradictoriness. When we weight more to usage of Big Data, someone's privacy is necessarily invaded. otherwise, we care more about keeping safe of individual information, only low-level of research using Big Data can be used to accomplish public purpose. In this study, we propose a method to anonymize Big Data collected in order to investigate the problems of personal information infringement and utilize Big Data and protect personal. This will solve the problem of personal information infringement as well as utilizing Big Data.

EpiLoc: Deep Camera Localization Under Epipolar Constraint

  • Xu, Luoyuan;Guan, Tao;Luo, Yawei;Wang, Yuesong;Chen, Zhuo;Liu, WenKai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2044-2059
    • /
    • 2022
  • Recent works have shown that the geometric constraint can be harnessed to boost the performance of CNN-based camera localization. However, the existing strategies are limited to imposing image-level constraint between pose pairs, which is weak and coarse-gained. In this paper, we introduce a pixel-level epipolar geometry constraint to vanilla localization framework without the ground-truth 3D information. Dubbed EpiLoc, our method establishes the geometric relationship between pixels in different images by utilizing the epipolar geometry thus forcing the network to regress more accurate poses. We also propose a variant called EpiSingle to cope with non-sequential training images, which can construct the epipolar geometry constraint based on a single image in a self-supervised manner. Extensive experiments on the public indoor 7Scenes and outdoor RobotCar datasets show that the proposed pixel-level constraint is valuable, and helps our EpiLoc achieve state-of-the-art results in the end-to-end camera localization task.

Individual Networks of Practice of EFL Learners at a Chinese University: Their Impact on English Language Socialization

  • Qi, Lixia;Kim, Jungyin
    • International Journal of Contents
    • /
    • v.17 no.4
    • /
    • pp.62-78
    • /
    • 2021
  • This ethnographic multiple case study, based on Zappa-Hollman and Duff's construct of individual networks of practice (INoPs), explored English as a second language (L2) competence development and socialization process of a group of English-major undergraduates through their social connections and interactions at a public university located in an underdeveloped city in Northwest China. The study lasted for one academic semester and three students were selected as primary participants. Semi-structured interviews, student observations in English-related micro-settings, and associated texts were used to collect data. These data were coded to identify the thematic categories, and then data triangulation and member checking were conducted to select the most representative evidence to provide an in-depth description of students' perspective about mediating their English L2 socialization by their INoPs. Findings showed that factors in the formation of students' INoPs, including intensity, density, and nature, played significant roles in their academic or affective returns from their English learning, both of which had a substantial influence on the students' English L2 socialization. Considering that the macro-setting was a non-English, underdeveloped monolingual society, both educational institutions and individual students need to seek and create more English-mediated interactional opportunities to develop their English proficiency and adapt to local English learning communities.

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.