• Title/Summary/Keyword: Submission Time

Search Result 73, Processing Time 0.02 seconds

Integrated Linux Cluster System Administration Tool (리눅스 클러스터 시스템 통합 관리 도구)

  • 김은회;김지연;박용관;권성주;최재영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.639-646
    • /
    • 2002
  • In this paper, we discuss the system configuration and the design issues of CATS-i, a set of installation and administration tools for Linux cluster systems. CATS-i enables users to manage cluster systems easily, quickly, and safety. It integrates many functions, ranging from installing operating systems and applications to real-time monitoring and management of various important resources. In addition, batch job submission and management are included. These functions support a single system image. Finally, a powerful graphic user interface based on Java lets users quickly understand the cluster status and conveniently use the CATS-i on the Web.

Integrity of Authorship and Peer Review Practices: Challenges and Opportunities for Improvement

  • Misra, Durga Prasanna;Ravindran, Vinod;Agarwal, Vikas
    • Journal of Korean Medical Science
    • /
    • v.33 no.46
    • /
    • pp.287.1-287.14
    • /
    • 2018
  • Integrity of authorship and peer review practices are important considerations for ethical publishing. Criteria for authorship, as delineated in the guidelines by the International Committee of Medical Journal Editors (ICMJE), have undergone evolution over the decades, and now require fulfillment of four criteria, including the need to be able to take responsibility for all aspects of the manuscript in question. Although such updated authorship criteria were published nearly five years ago, still, many major medical and specialist journals have yet to revise their author instructions to conform to this. Inappropriate authorship practices may include gift, guest or ghost authorship. Existing literature suggests that such practices are still widely prevalent, especially in non-English speaking countries. Another emerging problem is that of peer review fraud, mostly by authors, but also rarely by handling editors. There is literature to suggest that a proportion of such fake peer review may be driven by the support of some unscrupulous external editing agencies. Such inappropriate practices with authorship malpractices or disagreement, or peer review fraud, have resulted in more than 600 retractions each, as identified on the retractions database of Retractionwatch.com. There is a need to generate greater awareness, especially in authors from non-English speaking regions of the world, about inappropriate authorship and unethical practices in peer review. Also, support of any external editing agency should be clearly disclosed by authors at the time of submission of a manuscript.

Phases of Alienation in Le Torrent by Anne Hébert (안느 에베르의 중·단편집 『격류』에 드러나는 소외의 시대상)

  • Kang, Choung-Kwon
    • Cross-Cultural Studies
    • /
    • v.39
    • /
    • pp.7-32
    • /
    • 2015
  • In 1950, Anne $H{\acute{e}}bert$ published Le Torrent, a collection of seven short stories. These stories containing many shocking themes and expressions have placed her one of the pioneers of modern novels in Quebec. This paper tries to analyze several phases of alienation described in the novels and the reactions of alienated caracters in their situation. Some examples of alienated and mentally or physically deformed characters in Le Torrent are Fran?ois, $St{\acute{e}}phanie$, Stella, etc. Although the author wanted readers to interpret these characters on ther individual level, this paper interprets them differently. The result of this study is as following. Alienation doesn't come from one's interior but his exterior. Society and history are major agents of alienation. The injustice of life imposed on the caracters results from political and religious underdevelopment, cultural lowness, absence of social security system and of universal education at that time. The conquest of Quebec by England left a deep and historical wound on the French Canadians. This fact is, in my opinion, one of the essential themes of Anne $H{\acute{e}}bert^{\prime}s$ novels. In spite of all these alienating situations, the reactions showed by the caracters of the novels are limited to escapist illusion, self-destruction, mistaken revenge, eternal submission, etc. In conclusion, Le Torrent by Anne $H{\acute{e}}bert$ which deeply approached themes of violence and alienation could be called authentic landscape of the inner world of Quebecois before 'la Revolution tranquille.'

A Study on the Use of the e-PSM system and Improvement of Fulfillment Rate (e-PSM 시스템의 사용실태와 이행률 향상방안)

  • An, Yun-Ji;Cho, Song-Hee;Hyun, Yu-Jin;Shin, Ye-Jin;Gal, Won-Mo
    • Journal of the Korean Institute of Plant Engineering
    • /
    • v.23 no.4
    • /
    • pp.85-92
    • /
    • 2018
  • With the increasing use of chemicals in domestic businesses, the possibility of fire explosion and poisonous material leakage accidents is also increasing. Accordingly, the Korea Occupational Safety and Health Agency(KOSHA) has implemented the process safety management (PSM) system for a long time. However, process safety report submission has been providing and operating e-PSM since 2016 to address these problems as it is difficult to increase budget spending due to the need for professional capabilities and commissioning the report to consulting institutions. Therefore, this study conducts questionnaires on whether e-PSM system that is well utilized in the field, focusing on existing PSM business sites. In order to find out the activation method that can solve the deficiency factors by analyzing various inconveniences and problems accurately, we propose three improvement methods as educational aspect, promotional direction of e-PSM system, and institutional aspect.

Does Cloned Template Text Compromise the Information Integrity of a Paper, and is it a New Form of Text Plagiarism?

  • Jaime A. Teixeira da Silva
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.13 no.2
    • /
    • pp.23-35
    • /
    • 2023
  • Word templates exist for select journals, and their primary objective is to facilitate submissions to those journals, thereby optimizing editors' and publishers' time and resources by ensuring that the desired style (e.g., of sections, references, etc.) is followed. However, if multiple unrelated authors use the exact same template, a risk exists that some text might be erroneously cloned if template-based papers are not carefully screened by authors, journal editors or proof copyeditors. Elsevier Procedia® was used as an example. Select cloned text, presumably derived from MS Word templates used for submissions to Elsevier Procedia® journals, was assessed using Science Direct. Typically, in academic publishing, identical text is screened using text similarity software during the submission process, and if detected, may be flagged as plagiarism. After searching for "heading should be left justified, bold, with the first letter capitalized", 44 Elsevier Procedia® papers were found to be positive for vestigial template text. The integrity of the information in these papers has been compromised, so these errors should be corrected with an erratum, or in the case of extensive errors and vast tracts (e.g., pages long) of template text, papers should be retracted and republished.

Confucianism in Vietnam: A Hauntology-based Analysis of Political Discourse

  • LINH Trinh Ngoc
    • Journal of Daesoon Thought and the Religions of East Asia
    • /
    • v.3 no.1
    • /
    • pp.87-108
    • /
    • 2023
  • From the time it was propagated to Vietnam until it was forced to relinquish its leadership position in both politics and philosophy, Confucianism in Vietnam was never orthodox Confucianism. This study employs the theory of invented tradition to examine how Confucianism penetrated the ethnic Vietnamese community at the turn of the first millennium and points out its vital requirement: the construction of a Chinese-style centralized administrative government based on Neo-Confucianism. This requirement unfolded during the Le So Dynasty in the fifteenth century. Moreover, the theory of invented tradition can also be applied to discover the motivation behind Neo-Confucianism's process of manufacturing orthodoxy to speed up the goal of Sinicization. Somehow, the launching of the imperial examination system, meant to fulfill a system of bureaucracy, ended up resolving one of the greatest challenges of medieval times. It is to seek the ruler's uncritical submission to the ruled. This article applies hauntology to analyze two forms of Confucianism discourse in Vietnam. In doing so, this study determined that Confucianism evolved into its own unique system of thought in Vietnam and in the end, was not even recognizable as Confucianism. Throughout Vietnam's turbulent history, Confucianism shifted from a symbol of progress to one of backwardness. This culminated Vietnam's preoccupation with the de-Sinicization during the early twenty-first century.

An Implementation of A Recruiting System for Real-time Communication Matching based on Android Platform (실시간 양방향 의사정합을 위한 안드로이드 리쿠르팅 시스템의 구현)

  • Ihm, Sun-Young;Park, Young-Ho
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.107-114
    • /
    • 2011
  • Recently, interests for recruiting and the rates of using smart phones are growing fast. The paper proposes Recruid, which is a smart phone application based on android platform, that helps real-time communication matching between users. They can use every services of Recruid anywhere and anytime which reflects mobility characteristics of smart phones, and also use additional services on web pages. Recruid provides three main services. First, it provides mobile subscription and submission functionality on high mobility and convenience. Second, it provides group service that user can make their own groups. Last, it also provides reliability evaluation mechanism of activity data in Recruid thus, Recruid provides high credibility to users. The paper presents implementation of Recruid and shows the snapshots of the presented system.

A Study on Digital Evidence Collection System in Cyberspace (사이버 공간 내 디지털 증거 수집 시스템에 관한 연구)

  • Jeong, Hyojeong;Choi, Jong-hyun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.869-878
    • /
    • 2018
  • Digital Evidence Data in cyberspace is easy to modify or delete, and changes are reflected in real time, so it is necessary to acquire evidence data quickly. Collecting evidence on the client side is advantageous in that data can be acquired without time delay due to additional administrative procedures, but collection of large data is likewise vulnerable to collection time delay problem. Therefore, this paper proposes an automated evidence collection method on the client side, focusing on the major web-based services in cyberspace, and enables efficient evidence collection for large volumes of data. Furthermore, we propose a digital evidence collection system in cyberspace that guarantees the integrity of the collected digital evidence until the court submission.

Computer Security Incident Inspection and Response based on Digital Forensics in Windows10 environment (윈도우10 환경의 디지털 포렌식 기반 침해사고 진단 및 대응)

  • HyunWoo Kim;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.35-49
    • /
    • 2023
  • Recently, real-time cyber threats are constantly occurring for various reasons. Most companies have the characteristic of digitizing important internal information and storing it centrally, so it can be said that the impact is very high when an Computer Security Incident occurs. All electronic device information collected and analyzed in the process of responding to an Computer Security Incident has the characteristic of being subject to change at any time. Submission of related evidence is required in future investigations and courts. At this time, the basic principles of digital forensics, such as the principle of integrity and the principle of chain of custody, must be followed to ensure legitimacy and accuracy of the evidence. In this paper, we propose a digital forensic-based Computer Security Incident Inspection and Response procedure in the Windows 10 environment to secure the legitimacy and accuracy of digital evidence collected and analyzed when an intrusion occurs, prevent intrusion in advance, and quickly recognize it.

  • PDF

A Study on the Reformation of the Contract Time Extension Process in the Public Construction projects (공공건설사업에서 계약기간 연장처리방법 개선에 관한 연구)

  • Cho Young-Jun;Lee Sang-Beom
    • Korean Journal of Construction Engineering and Management
    • /
    • v.6 no.3 s.25
    • /
    • pp.81-89
    • /
    • 2005
  • Delay schedule coming about duration extension is happening essentially because public construction project consist of many sub contractor. The method which can calculate delay day is suggested by many studies in case of happing delay schedule, but It is difficult to apply to real construction project because there is no mention about the control of The law of contract according to delay schedule. The law of Contract which is cost of account has more uncertain problem than FIDIC condition of contract. This study suggests method which can make extension of duration procedure clear in case of happing the reason of design change related with activity duration during carrying on construction, and a submission process of the reason of duration extension and modify schedule making way about section which is basis of calculating contract amount clear.