• Title/Summary/Keyword: Open network

Search Result 1,733, Processing Time 0.027 seconds

Landscape Design for the National Athlete Training Camp (국가대표 선수 훈련원 마스터플랜 설계경기 조경계획)

  • Kim Ah-Yeon;Yoo Seon-Keun;Oh Hyung-Seok
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.33 no.6 s.113
    • /
    • pp.109-126
    • /
    • 2006
  • As the national interest in sports has been increased over time, sports facilities and sports complex are considered more than just physical environments for training athletes or watching games. Sports facilities now become symbolic spatial devices to represent the national and cultural pride of any countries. The existing national training camp located in Taenung, Seoul is gotting outdated and degraded. The polluted air in the city risks athletes' health condition. The government planned to construct the second training camp at Jincheon, Chungbuk at the area of $2,171,910m^2$. The Korea Sports Council called for proposals to envision the future training camp, and they held a design competition from August to November, 2005. The first phase was to present the masterplan for the entire site including training buildings, outdoor training facilities, dormitories, a visitor center, a research center, education and administration buildings. Considering the size of the site, the planning process required a strong relationship between landscape and architecture. This study tries to provide general explanations on the winning proposal focused on the landscape-related issues. It also attempts to have reference points for contemporary planning and design issues to situate the project in the stream of continuing design effort to avoid the dichotomy between nature and culture. The landscape proposal for the new national taming camp suggests four main strategies; 1) The camp has two intersecting and interweaving parks which represent the natural and urban order. 2) The entire site is organized and networked by the flow of landscape called landscape ribbon in terms of topography, vegetation, and water flow. 3) The landscape is choreographed through the time and process. 4) The ecological process and the digital contents are juxtaposed in the landscape. This winning proposal is the first step to portray the national vision for the sustainable environment coexisting with sports industry. Landscape in this proposal is an active agent to network various parts of the site which enables landscape to be infrastructure. Landscape design in this proposal should be considered open-ended strategies rather than determined concrete forms and its engaging further development will be tested in following Design-Build phase.

The Experience of the first-married stepmother's stress and adaptation to her stepfamily (초혼계모의 재혼가족생활 스트레스와 적응에 대한 경험적 연구)

  • 임춘희
    • Journal of the Korean Home Economics Association
    • /
    • v.35 no.5
    • /
    • pp.73-102
    • /
    • 1997
  • The purpose of this study was to identify the specific and empirical contents in terms of first-married stepmother about her stress and efforts to adapt to her stepfamily. This studies relied on the qualitative research method in order to approach stepmother's subjective experience. There were 6 stepmother respondents who were 6 first-marrieds living in Seoul or Kyoungki area. The data was collected by in-depth personal interview.‘Open coding process’, a part of grounded theory procedures were used to analyzed the data. The major findings can be summarized as follows: 1. When focused o stressors, the stress of stepmothers were categorized into 4 categories. Those were the following: 1 When focused on stressors, the stress of stepmothers were categorized into 4 categories. Those were the following: (1) Stepmother's own problem such as stepmother' identity problem; (2) Problems within stepfamily such as problems about relations with husbands, stepchildren, and her own children; (3) Problems of stepmother family's kin such as relational problems with former spouses, in-laws, and her parent; (4) Problems of social relationship such as isolation and alienation in social relationship and neighbors' prejudice about stepmother. 2. In overcoming stress from stepfamily life and adapting to it, 4 categories were identified as important. Contents of 4 categories were such like this: (1) Stepmother's own efforts - (a) give a positive meaning to marriage or remarriage (b) flexible personality (c) situation-accepting attitude (d) exclusive management of household income (e) job (f) perseverance for time to adaptation; (2) Positive feedback within stepfamily - (a) supportive husband (b) sense of unity as a couple (c) psychological reward from stepchildren (d) existence of stepmother's own child (e) behavior for family solidarity (f) family-centered religious life; (3) Stepfamily's relationship with former spouses such as breakdown in relationship with ex-wives or ex-husbands; (4) Support from stepmothers' kin and people in social network with stepmothers. It was concluded that to reduce stress and to help adapt to stepfamily, stepmother should make an effort, and that her stepfamily and her kin should cooperate and support. In addition, negative stereotype of stepmother and stepfamily should disappeared. It was suggested that studies on stepfamily should be vitalized and that programs for preparing remarriage and counseling for stepfamily should be spread.

  • PDF

On Problematizing IS Research: A Critical Reading of the KMIS SOLOMO Research Agenda

  • Juhn, Sung H.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.31-49
    • /
    • 2012
  • In this essay, we problematize the problematics of the KMIS SOLOMO research agenda. We propose that the SOLOMO agenda is a conditioned product of the various assumptions, biases, premises, and presuppositions that the field of IS collectively succumbs to and shares, and thus needs to be problematized to arrive at a new set of research questions for the field. The problematization begins with the ontology that underlies the agenda. We argue that the agenda is largely drawn from a dichotomic, deep ontology of Human vs. Technology. While such ontology is neither right nor wrong in its own right, we suggest it is what underlies and influences the field's whole mode of inquiry including its research agenda. We propose an alternative ontology, the Actor-Network Theory (ANT), which as a flat ontology provides a radically different set of research questions for the field. Next we take issue with the teleology of the SOLOMO agenda, and suggest that the telos of the agenda, and of the field of IS and the whole of Management discipline together, are anchored upon the capitalist episteme so that it creates a significant hole in its teleological scape. While not in any sense calling for an ideological demagogue, we propose that the field of IS should open itself to an alternative teleology including a leftist perspective. We draw upon the Critical Management Studies (CMS) to explore how further problematization can be made on the SOLOMO agenda, generating questions about its performativity, denaturalization, and reflexivity. As a result of the discussions, a list of new problematized research questions for the SOLOMO agenda is generated. In the end we state the motivation of the essay and call for a critical refurbishing of the field of IS.

  • PDF

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

A Mobile Device Description Language (모바일 단말 정보 표현 언어)

  • Kim, Tae-Hyun;Lee, Seung-Yun;Lee, Kang-Chan;Lee, Won-Suk;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.811-814
    • /
    • 2007
  • Mobile device will be able to use the various contents from the advancement of the wireless Internet and mobile device manufacture technique. Each devices HTTP headers about under using provides terminal information to contents provider which is provided the contents which is suitable in device. But there is not a standard for a terminal information proηsion and when using the contents of service network outside, interoperability problems mobile communication it will provides terminal information in different method. International Organization for Standard OMA UAProf about under using it solved interoperability problems from outside. But about under using it provides terminal information, MMS support and Smart Card support, against an external storage space supporting information it is not seen clearly UAProf not to be, it will not be able to provide terminal information which is complete. This paper hereupon it designed UAProf in base which provides the contents which has become optimize to the mobile device of domestic environment the mobile device description language which expresses device information which is necessary.

  • PDF

Knowledge- Evolutionary Intelligent Machine-Tools - Part 1 : Design of Dialogue Agent based on Standard Platform

  • Kim, Dong-Hoon;Song, Jun-Yeob
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.11
    • /
    • pp.1863-1872
    • /
    • 2006
  • In FMS (Flexible Manufacturing System) and CIM (Computer Integrated Manufacturing), machine-tools have been the target of integration in the last three decades. The conventional concept of integration is being changed into the autonomous manufacturing device based on the knowledge evolution by applying advanced information technology in which an open architecture controller, high-speed network and internet technology are included. In the advanced environment, the machine-tools is not the target of integration anymore, but has been the key subject of cooperation. In the near future, machine-tools will be more improved in the form of a knowledge-evolutionary intelligent device. The final goal of this study is to develop an intelligent machine having knowledge-evolution capability and a management system based on internet operability. The knowledge-evolutionary intelligent machine-tools is expected to gather knowledge autonomically, by producing knowledge, understanding knowledge, reasoning knowledge, making a new decision, dialoguing with other machines, etc. The concept of the knowledge-evolutionary intelligent machine is originated from the machine control being operated by human experts' sense, dialogue and decision. The structure of knowledge evolution in M2M (Machine to Machine) and the scheme for a dialogue agent among agent-based modules such as a sensory agent, a dialogue agent and an expert system (decision support agent) are presented in this paper, with intent to develop the knowledge-evolutionary machine-tools. The dialogue agent functions as an interface for inter-machine cooperation. To design the dialogue agent module in an M2M environment, FIPA (Foundation of Intelligent Physical Agent) standard platform and the ping agent based on FIPA are analyzed in this study. In addition, the dialogue agent is designed and applied to recommend cutting conditions and thermal error compensation in a tapping machine. The knowledge-evolutionary machine-tools are expected easily implemented on the basis of this study and shows a good assistance to sensory and decision support agents.

Federation Trader Model Supporting Interface Between Object Groups (객체그룹간의 상호접속을 지원하는 연합 트레이더 모델)

  • Jeong, Chang-Won;Ju, Su-Jong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.9
    • /
    • pp.1126-1134
    • /
    • 1999
  • 최근 다양한 멀티미디어 서비스를 지원하기 위한 통신망 관리와 서비스 관리가 통합된 개방형 정보 통신망의 구조가 요구되고 있다. 이러한 구조를 기반으로, TINA-C(Tele-communications Information Networking Architecture-Consortium)에서는 분산 환경에서 분산 어플리케이션 객체들에 대한 복잡한 서비스 및 관리 인터페이스들을 간결하도록 객체그룹의 개념을 정의하고 있다. 이러한 환경 속에서 트레이딩 서비스는 통신 서비스를 제공하는 객체그룹간의 상호작용을 지원하는데 매우 중요하다.따라서, 본 논문에서는 객체그룹간의 상호접속을 지원할 수 있는 트레이딩 기능과 이들 트레이더들간의 연동을 위한 트레이더 연합 모델을 제시하고자 한다. 이를 위해 우리는 트레이더의 중개자로서 Cooperator를 설계하여 기존의 트레이더와 연동시켰다. 이러한 결과로서 우리의 새로운 트레이더 연합 모델에서 Cooperator는 객체그룹간의 상호접속에서 객체들의 접속 권한의 체크 기능과 기존의 트레이더 연합모델의 문제점인 트레이더들간의 단 방향 연결문제를 보완하여 양방향 연결 기능을 갖도록 하였다. 끝으로, 이러한 해결 과정을 보이기 위해 트레이더와 Cooperator들로 이루어진 본 연합모델에서 분산 객체그룹간의 상호접속 절차과정과 사건 추적 다이어그램을 보였다.Abstract Recently, the open networking architecture is required to support various multimedia services as integrated functions of network management and service management. Based on this architecture, TINA-C defines an object group concept for simplifying complex management and service interfaces, when distributed application is executed in distributed environments. Within the support environment the trading service is an important of the interacting object groups which provide a telecommunication service.Hence, we suggest the trader federation model for supporting interconnections between object groups and among existing traders by using the cooperator we designed, as an intermediator among traders. Our cooperator has functions for checking access rights of objects in object groups, and for providing bidirectional linkage among traders. Up to now, the existing trader federation models have a single directional linkage for interactions among traders. Finally, we showed the interface procedure and the event trace diagram of distributed object groups using our model consisted of traders and the cooperators.

Implementation of Web-based Information System for Full-text Processing (전문 처리를 위한 웹 기반 정보시스템 구현)

  • Kim, Sang-Do;Mun, Byeong-Ju;Ryu, Geun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.6
    • /
    • pp.1481-1492
    • /
    • 1999
  • As Internet is popularized by the advent of Web concept having characteristics such as open network, user-friendly, and easy-usage, there are many changes in Information systems providing various information. Web is rapidly transferred traditional Information systems to Web-based Information systems, because it provides not only text information but also multimedia information including image, audio, video, and etc. Also, as information contents were changed from text-based simple abstract information to full-text information, there was appeared various document formats processing Full-text information. But, as they naturally demand large systems memory, long processing time, broader transmission bandwidth, and etc, estimating of these factors is necessary when constructing information systems. This paper focuses on how to design and construct information system processing full-text information and providing function of an integrated document. Primarily, we should review standard document format which is used or developed, and any document format is appropriate to process full-text information in review with viewpoint of information system. Also, practically we should construct information system providing full-text information based on PDF document.

  • PDF

Evaluation of Security Protocols for the Session Initiation Protocol (SIP 보안 프로토콜의 성능 분석)

  • Cha, Eun-Chul;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.55-64
    • /
    • 2007
  • Behind the popularity of VoIP in these days, it may present significant security challenges in privacy and accounting. Authentication and message encryption are considered to be essential mechanisms in VoIP to be comparable to PSTN. SIP is responsible for setting up a secure call in VoIP. SIP employs TLS, DTLS or IPSec combined with TCP, UDP or SCTP as a security protocol in VoIP. These security mechanisms may introduce additional overheads into the SIP performance. However, this overhead has not been understood in detail by the community. In this paper we present the effect of the security protocol on the performance of SIP by comparing the call setup delays among security protocols. We implement a simulation of the various combinations of three security protocols and three transport layer protocols suggested for SIP. UDP with any combination of security protocols performs a lot better than the combination of TCP. TLS over SCTP may impose higher impact on the performance in average because TLS might have to open secure channels as the same number of streams in SCTP. The reasons for differences in the SIP performances are given.

A Design of Permission Management System Based on Group Key in Hadoop Distributed File System (하둡 분산 파일 시스템에서 그룹키 기반 Permission Management 시스템 설계)

  • Kim, Hyungjoo;Kang, Jungho;You, Hanna;Jun, Moonseog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.141-146
    • /
    • 2015
  • Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.