• Title/Summary/Keyword: Preserving, Preservation

Search Result 306, Processing Time 0.019 seconds

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

Risk Management of Digital Information Resources Preservation in University Libraries (디지털 정보자원 보존의 위험관리 분석: 대학도서관 전자정보실 중심으로)

  • 서은경
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.5-29
    • /
    • 2003
  • University libraries have developed digital information resources for digital services and have tried to preserve valuable digital information. Because digital preservation raises challenges of a fundamentally different nature which we added to the problems to preserving traditional format materials, it is necessary that preserving digital resources must be discussed and researched actively. This study conducts risk management for exploring preserving technologies and assessing tools. It is found that most university libraries have used format conversion frequently and do not use the emulation technology. It is also found that medium refreshing has the lowest risk probability and isk impact, but information migration and emulation technology have the highest in the risk probability and in the risk impact individually and the absence of full-time professional staff causes high risk.

A Study to Propose Future Preservation Strategies for the Court Library Collection (법원도서관 장서의 미래 보존 전략 제안을 위한 연구)

  • Seungjin Kwak;Younghee Noh;Inho Chang;Jeong Taek Kim;Jae Min Ko;Bongsuk Kang
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.58 no.2
    • /
    • pp.33-56
    • /
    • 2024
  • In this study, we analyzed the current situation of court libraries and aimed to propose a future-oriented strategy for preserving and managing their collections. Based on literature and status analysis, the study presents the future preservation strategy of court library collections in three main categories: First, securing space for the long-term preservation of court library collections; second, establishing a system for collecting and preserving court library collections; and third, performing digital archiving for the permanent preservation and utilization of court records, valuable legal volumes, administrative materials, and other judiciary-specific resources. Through this, court libraries, including those in various courts, should resolve the issue of insufficient collection storage space, preserve holdings systematically and efficiently, and activate library use.

Effects of Reticuloendothelial Hyperfunction on Preservation of Lung (망내계기능 항진이 폐장보존에 미치는 영향)

  • 박동식
    • Journal of Chest Surgery
    • /
    • v.7 no.2
    • /
    • pp.145-152
    • /
    • 1974
  • The effect of reticuloendothelial hyperfunction on hypothermic preservation of lung was studied in dogs. In order to evaluate the viability after hemodynamic_ load in preserved isolated lung, observations were made on the rate of increase in weight, degree of edema,compliance and surface activity of lung. The results obtained as follows: l. In the group of activating of the reticuloendothelial system by injection of sodium thiosulfate intravenously before pneumonectomy and infusion of naphthionine through the pulmonary artery before hypothermic preservation of isolated lung the limit of preservation was eight hours whereas four hours in non-treated control group. 2.Therefore the method of activating of the reticuloendothelial system before and after pulmonary resection seems effective in preserving for prolonging the period of preservation of lung by means of inhibition of pulmonary edema. 3. Pulmonary surface activity is expected to be valuable as a method in evaluation of the viability of preserved lung along with compliance and rate of increase in weight of lung.

  • PDF

Numerical Simulation of Cold Storage and Preservation of Hanfu Apple

  • Gong, Yuan Juan;Zhang, Yan;Ning, Xiao Feng
    • Journal of Biosystems Engineering
    • /
    • v.41 no.3
    • /
    • pp.184-192
    • /
    • 2016
  • Purpose: To solve the decay phenomenon of Hanfu apples that occurs during storage and obtain the best environmental parameters for preserving Hanfu apples using Fluent. Methods: Preservation storage was designed by analyzing the characteristics of Hanfu-apple storage and the natural environment in northeast China. The boundary conditions and simulation of a preservation model were established. Results: Compared with the initial values, the hardness decreased by $1.95kg/cm^2$, the sugar-acid ratio decreased by 20.43, and weight-loss rate was 3.98%. Conclusion: The results for the temperature field and velocity field of the empty storage were analyzed using Fluent. Hanfu apples can maintain good quality during the period of storage, according to our analysis of the Hanfu-apple hardness, weight loss, and change in the sugar-acid ratio during the 90-day preservation period.

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering

  • Hong, Do-Won;Mohaisen, Abedelaziz
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.351-361
    • /
    • 2010
  • Multiple rotation-based transformation (MRBT) was introduced recently for mitigating the apriori-knowledge independent component analysis (AK-ICA) attack on rotation-based transformation (RBT), which is used for privacy-preserving data clustering. MRBT is shown to mitigate the AK-ICA attack but at the expense of data utility by not enabling conventional clustering. In this paper, we extend the MRBT scheme and introduce an augmented rotation-based transformation (ARBT) scheme that utilizes linearity of transformation and that both mitigates the AK-ICA attack and enables conventional clustering on data subsets transformed using the MRBT. In order to demonstrate the computational feasibility aspect of ARBT along with RBT and MRBT, we develop a toolkit and use it to empirically compare the different schemes of privacy-preserving data clustering based on data transformation in terms of their overhead and privacy.

Limiting Attribute Disclosure in Randomization Based Microdata Release

  • Guo, Ling;Ying, Xiaowei;Wu, Xintao
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.3
    • /
    • pp.169-182
    • /
    • 2011
  • Privacy preserving microdata publication has received wide attention. In this paper, we investigate the randomization approach and focus on attribute disclosure under linking attacks. We give efficient solutions to determine optimal distortion parameters, such that we can maximize utility preservation while still satisfying privacy requirements. We compare our randomization approach with l-diversity and anatomy in terms of utility preservation (under the same privacy requirements) from three aspects (reconstructed distributions, accuracy of answering queries, and preservation of correlations). Our empirical results show that randomization incurs significantly smaller utility loss.

The Preservation of Modern and Contemporary Archives (근현대기록물의 보존 현황과 방안)

  • Soahn, Jung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.4
    • /
    • pp.197-203
    • /
    • 2022
  • This article was written to examine the types of records gathered for institutions collecting modern and contemporary records, examine the role and scope of the archives, and determine the next steps. By specifying the scope of modern and contemporary records for collection and examining their role as a record repository, I would like to consider approaches to balancing the collection and preserving records and suggest methods for developing professional capabilities.

A Study on Preservation Metadata Elements for Digital Information Resources (디지털 정보자원을 위한 보존 메타데이터 요소 설정 연구)

  • Hong Jae-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.3
    • /
    • pp.175-204
    • /
    • 2004
  • Digital information resource requires detailed metadata to ensure its long-term preservation and accessibility for future generations. This paper illuminated the characteristics of digital information resources, the concept of digital preservation and the necessity of metadata for long-term preservation of digital information resources. And this paper examined the 16 elements of RLG metadata for preserving digital information and the Reference Model for an Open Archival Information System(OATS) to support the interoperability of digital archiving. And then this study investigated concretely element sets of the preservation metadata for digital information resources in the Cedars and OCLC/RLG embodied within the OAIS framework. As result of the study, the paper suggested basic plan required to provide preservation metadata elements to preserve digital information resources in Korea.

  • PDF

ON PRESERVING rg-CLOSED SETS

  • Park, Jin-Han;Park, Jin-Keun;Park, Seong-Jun
    • East Asian mathematical journal
    • /
    • v.16 no.1
    • /
    • pp.125-133
    • /
    • 2000
  • Weak forms of regular continuity and regular closure are introduced and used to strengthen some results concerning the preservation of rg-closed sets.

  • PDF