• 제목/요약/키워드: Permission System

Search Result 277, Processing Time 0.024 seconds

Multimedia Traffic Analysis using Markov Chain Model in CDMA Mobile Communication Systems (CDMA 이동통신 시스템에서 멀티미디어 트래픽에 대한 마르코프 체인 해석)

  • 김백현;김철순;곽경섭
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.7
    • /
    • pp.1219-1230
    • /
    • 2003
  • We analyze an integrated voice/data CDMA system, where the whole channels are divided into voice prioritized channels and voice non-prioritized channels. For real-time voice service, a preemptivc priority is granted in the voice prioritized channels. And, for delay-tolerant data service, the employment of buffer is considered. On the other hand, the transmission permission probability in best-effort packet-data service is controlled by estimating the residual capacity available for users. We build a 2-dimensional markov chain about prioritized-voice and stream-data services and accomplish numerical analysis in combination with packet-data traffic based on residual capacity equation.

  • PDF

Protective Mechanism for Sensitive Data using Lightweight Process Tracking (경량화 프로세스 추적을 통한 중요 데이터 유출 방지)

  • Kang, Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.33-39
    • /
    • 2009
  • As the usage of computers and mobile handsets is popularized, the processing and storing of private and business data are increased. Hence we note that these sensitive data should never be transferred out of these personal devices without user's permission. In this paper, we propose a simple method to prevent transferring the sensitive data out of personal computing devices through their networking interfaces. The proposed method determines which processes invoke open system call related to the sensitive data, and then traces them within a specific duration. The proposed scheme has advantage over the existing ones using authentication or encryption because it could be still working well independent upon the new attack technologies or the latest vulnerabilities of hardware and software. In order to verify the proposed algorithm, we test it by implementing the necessary codes at the user and kernel spaces of Linux.

Understanding and Improvement of Best Available Techniques for Electricity and Steam Production Facility (전기 및 증기 생산시설 최적가용기법 (BAT) 기준서의 이해와 개선방향)

  • Shin, Sujeong;Park, Jae-Hong;Lee, DaeGyun;Kim, Dai-Gon
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.34 no.2
    • /
    • pp.281-293
    • /
    • 2018
  • As the public interest in environmental issues increased, the "Act On The Integrated Control Of Pollutant-Discharging Facility" was enacted. Through the integrated environmental pollution prevention act in which 19 industries with large environmental impacts are sequentially applied, pollutants can be managed in a medium-integrated manner and integrated permission of the business unit is possible and BAT can be applied to enable a scientific and proactive environmental management system. This study analyzed the overview of BAT reference documents(BREF), BAT setting procedure and method, and then suggested the development direction BAT and BAT-AEL monitoring method of a Electricity and Steam production facility.

Downlink Power Allocation of the OFDMA Femtocell for Inter-cell Interference Mitigation (OFDMA 초소형 기지국의 인접셀 간섭을 최소화하기 위한 하향링크 전력 할당 기법)

  • Jung, Hyun-Duk;Lee, Jai-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8A
    • /
    • pp.743-751
    • /
    • 2010
  • OFDMA femtocell becomes an effective solution to support indoor high data rate services instead of the macrocell systems. Although the advantage of the femtocell, the co-channel interference between the femocell and the macrocell is the most significant problem that reduces the system performance. Macrocell users who have no permission to access the femtocell suffer from interference of the downlink transmission of femtocell. Therefore, the femtocell should use transmission power as small as possible to reduce interference to macrocell users. In this paper, we define the margin adaptive power allocation problem for the femtocell and propose a heuristic power allocation algorithm to solve the problem. Simulation results show the performance of the proposed algorithm.

Design and Fabrication of FSK Transmitter for Miniaturized Wireless Endoscope (초소형 무선 내시경용 FSK송신기 설계 및 제작)

  • 장경만;문연관;류원열;윤영섭;조진호;최현철
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.9
    • /
    • pp.936-943
    • /
    • 2003
  • The miniaturized wireless endoscope consists of CMOS Image sensor, FPGA, LED, Battery, DC to DC Converter, Antenna and Transmitter. FSK transmitter is designed and fabricated with 10 mm(diameter)${\times}$23 mm(thickness) dimension considering the maximum permission exposure(MPE), system size, power consumption, linearity and modulation method. Experimental results is - 3.67 dBm output power level, 20 MHz frequency deviation, and - 99 dBc/Hz(@100 kHz offset) phase noise at 1.2 GHz. From the in-vivo experiment, the designed FSK transmitter has a acceptable capability for wireless endoscope.

Analysis of Nurses' Soothing Behaviors in Neonatal Intensive Care Unit: Focused on Babies with Bronchopulmonary Dysplasia (신생아 중환자실 환아 달래기시 나타나는 간호사 행위 분석: 기관지폐이형성증 환아 중심으로)

  • Lee, Yu-Nah;Shin, Hyunsook
    • Child Health Nursing Research
    • /
    • v.23 no.4
    • /
    • pp.494-504
    • /
    • 2017
  • Purpose: The aim of this study was to analyze Neonatal Intensive Care Unit nurses' behaviors while soothing newborns with bronchopulmonary dysplasia. Methods: An observational study was used to assess nurses' soothing behaviors. Data were collected from September, 2012 to March, 2013 using an audio-video recording system. Participants were eight babies and 12 nurses caring for those babies. After obtaining parental permission, the overall process of each episode from nurses' engagement in soothing to the end of soothing was recorded. Then a researcher interviewed each participating nurse. Data from 18 episodes were transcribed as verbal and nonverbal nursing behaviors and then categorized by two researchers. Results: There were 177 observed soothing behaviors which were classified with the five sensory-based categories (tactile, oral, visual, auditory, vestibular). Most frequently observed soothing behavior was 'Gently talking' followed by 'Removing irritant', and 'Providing non-nutritive sucking'. Nurses' perceived soothing behaviors were similar to the observed soothing behaviors except for 'Gently talking'. Conclusion: Nurses used diverse and mixed soothing behaviors as well as recognizing those behaviors as essential nursing skills. Nurses' soothing behaviors identified in this study can be used to comfort babies and to enhance their developmental potential in accordance with individual characterstics or cues.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

BAT-AEL Calculation in Waste Incineration Facility (폐기물 소각시설 최적가용기법 연계배출수준 (BAT-AEL) 설정)

  • Shin, Sujeong;Park, Jae-Hong;Lee, DaeGyun;Kim, Dai-Gon;Bae, YeonJoung
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.34 no.1
    • /
    • pp.144-155
    • /
    • 2018
  • As the public interest in environmental issues increased, the "Act On The Integrated Control Of Pollutant-Discharging Facility" was enacted. Through the integrated environmental pollution prevention act in which 19 industries with large environmental impacts are sequentially applied, pollutants can be managed in a medium-integrated manner and integrated permission of the business unit is possible and BAT can be applied to enable a scientific and proactive environmental management system. In addition, if the facility with BAT works normally, the pollutant emission is offered with the range of lower limit to upper limit. This study analyzed the overview of Best Available Techniques-Associated Emission Levels (BAT-AEL), and its setting procedure and method, and then suggested the BAT-AEL of a waste incineration facility. In comparative analysis on Emission Limit Values (ELVs) of EU, this study tries to propose improvement matters and development directions if the relevant standard is revised.

A Review on Consent to the Medical Treatment in the case of Foreign Determination (의료행위와 대리승낙)

  • Lee, Seok-Bae
    • The Korean Society of Law and Medicine
    • /
    • v.15 no.1
    • /
    • pp.303-333
    • /
    • 2014
  • The right to self-determination in regard to one's body is a key element of human dignity, privacy and freedom. It is constitutionally enshrined in the guarantee of human dignity, in the general right of personality and, most concretely of all, in the right to physical integrity. In principle No-one may trespass another person's body against his will, whether this act improves his physical condition or not. This right of self-determination applies equally to healthy and to sick people. Hence everyone has the right either to permit or to refuse a medical treatment, unless he can not make a rational decision. If the person does not consent himself, for whatever reason, another one must do for him as guardian. Representation in consent to medical treatment is therefore the exception of self-determination rule. This article explored, 1. who can consent to the medical treatment in the case of the mentally incapacitated adult and the infant, 2. what kind of consent to the medical treatment can the deputy determinate for the mentally incapacitated adult and the infant, 3. when the deputy can not determinate without permission of the court, and 4. what can the doctor do in the case of conflict between minors and guardians.

  • PDF

A Study on Ways of Improvement to Effectively Control the Flight Information Region focusing on air space of IEODO (비행정보구역(Flight Information Region)의 효율적 관리를 위한 개선방안 연구 : 이어도(IEODO) 상공을 중심으로)

  • Kim, Choon-San;Bang, Jang-Kyu
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.19 no.3
    • /
    • pp.43-53
    • /
    • 2011
  • It is well known some Foreign aircraft used to fly INCHEON FIR(Flight Information Region), especially the island of IEODO without a flight plan, even though foreign aircraft is subject to submitting a flight plan to Flight Information Center(FIC) before its flight. IEODO is a sunken rock 4.6m beneath the sea level, 149km away from Marado. Facing the Yangtze river's sea entrance horizontally and military zones of Korea and China vertically, IEODO is a very important place for national security of North East Asia because it is located at the boundary between China East Sea and Yellow Sea of South Korea. Moreover, JDZ(the 7th mine lot) is just 77NM from IEODO, which possesses natural gas eight times bigger than the gulf region and oil 4.5 times bigger than that of the U.S. In addition, INCHEON FIR, managed by MLTM(Air Traffic Control Center) and Japanese Self-Defense Force's JADIZ(Japanese Air Defense Identification Zone) are overlapping on IEODO whose air space is very complex. This paper focuses on air space, FIR, ADIZ(Air Defense Identification Zone) and related airspace system and suggests strategic implications of how to prevent foreign aircraft from invading INCHEON FIR without permission and of how to utilize the airspace efficiently.