• Title/Summary/Keyword: contents access

Search Result 1,142, Processing Time 0.031 seconds

FAST Search Engine Customizing for S&T Information Service (고객중심의 과학기술정보 서비스를 위한 FAST 검색엔진 커스터마이징)

  • Han, Hee-Jun;Yi, Tae-Seok;Kim, Sun-Tae;Yae, Yong-Hee;Lee, Sang-Gi;Yeo, Il-Yoen
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.480-483
    • /
    • 2008
  • According to develop the web technology, the data providers are trying to offer the efficient service for customers. Specially it is necessary to improve efficiency of the search function to help user access easily useful information their want. KISTI has introduced and customized the FAST search engine to improve search performance of the national science and technology information portal service system. But the design work for hardware and software implementation of search engine is important above all. In this paper, we discuss about the design and custormizing skill of FAST engine for the KISTI S&T information search service.

  • PDF

Implementation of Web services for Slip Data Process (전표데이터 처리를 위한 웹서비스 구현)

  • 황의철;정민영;정선태
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.57-64
    • /
    • 2003
  • A Web Service is an URL addressable set of functionality that is exposed over a network to serve as a building Hock for creating distributed applications. SOAP is a protocol that Web Service consumers often use, when they request and response to a Web Service, and it is a lightweight, XML-based protocol over HTTP for exchange to information in decentralized, distributed environments. A Web Service is very useful forimplementing common functions in especially a large size business area, because it is invoked by a protocol like HTTP or SOAP that we easily use, and by an XML-based data format In this paper, we implement Web Services that process dip data by computers in enterprise accounts in order to enhance the transparency and productivity of enterprises. we analyse the structure of slip data, design dip database, implement stored procedures for manipulating data of slip database, and make thorn controlled by Web Services. The result of this paper will contribute to the standardization and activation of accounting process systems for e-business area.

  • PDF

The Effect Common Health Disorders of Foreign Workers - Focused on Daegu and Kyungpook Region - (외국인 근로자들의 일상적인 건강장애에 미치는 영향 - 대구경북지역을 중심으로 -)

  • Kim, Seung-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.268-277
    • /
    • 2009
  • This study seeks to promote the mental and physical efficiencies of the foreign workers working in our country through the promotion of their health, and provide help in their effective use of medical treatments and granting appropriate medical benefits, and provide the basic information helpful in managing the health of the foreign workers who are playing a role in the advancement of the industry in Korea for the companies and employers that are employing them by researching the health condition and management status centering on the foreign workers from a part of Asia and South America who are working in our country. I made a regression analysis toward 231 foreign workers who have employed in industrial workplace from Mar. 1 to Jun. 30, 2008. The result said the factors that affect significant impact on common health disorder of foreign workers in their daily circumstances were staying period in Korea($\beta$=.270),difficulty to access hospital($\beta$=.268), inferior sanitation of work place($\beta$=.218), smoking or not($\beta$=.170), actual condition of health maintenance($\beta$=-.251).($R^2$=0.501)

Secure and Efficient Database Searching in RFID Systems using Tag-Grouping Based on Hash-Chain (RFID 시스템에서 Hash-Chain기반 Tag-Grouping을 이용한 안전하고 효율적인 데이터베이스 검색)

  • Lee, Byeung-Ju;Song, Chang-Woo;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.9-17
    • /
    • 2009
  • RFID (Radio Frequency Identification) is a next generation technology that will replace barcode. RFID can identify an object by reading ID inside a RFID tag using radio frequency. However, because a RFID tag replies its unique ID to the request of any reader through wireless communication, it is vulnerable to attacks on security or privacy through wiretapping or an illegal reader's request. The RFID authentication protocol has been studied actively in order to solve security and privacy problems, and is used also in tag search. Recently, as the number of tags is increasing in RFTD systems and the cost of data collection is also rising, the importance of effective tag search is increasing. This study proposed an efficient search method that solved through ta9 group the problem of large volume of database computation in Miyako Ohkubo's hash chain mechanism, which meets requirements for security and privacy protection. When we searched first the group of tags with access rate of 5 or higher in a database with 100,000 records, search time decreased by around 30%.

Method of Changing Password for Secure Cloud Storage based on Proxy Re-encryption Scheme (프록시 재암호화 기반의 보안 클라우드 저장장치를 위한 분실된 비밀번호 변경 기법)

  • Park, Young-Hoon;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.29-36
    • /
    • 2016
  • In cloud storages, as security of stored files and privacy of users become regarded as important concerns, secure cloud storages have been proposed, where stored files are encrypted with file owner's password and even the cloud service provider can not open the file contents. However, if the file owner forgets one's password, one can no longer access the file. To solve this problem, we propose a scheme for changing password for the secure cloud based on proxy re-encryption, which make the file owner enable to change password even when one forgets it. With the proposed scheme, only the file owner can change the password and re-encrypt the files securely because other user and even the service provider can not see the file contents.

A Study of Metadata for Composite Electronic Records Archiving: With a Focus on Digital Components of E-Learning Contents (복합전자기록물 아카이빙을 위한 메타데이터에 관한 연구 - 이러닝 콘텐츠의 디지털 컴포넌트를 중심으로 -)

  • Lee, Inhyeok;Park, Heejin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.3
    • /
    • pp.115-138
    • /
    • 2017
  • Electronic record types are becoming diverse, and "composite electronic records," which are made up of various types of electronic records associated with functionality or user interaction that does not exist in current electronic document formats, are increasing. To ensure a continuous access to composite electronic records, metadata construction is a prerequisite for electronic records archiving. In this paper, we propose a metadata that can support archiving of composite electronic records associated with interactive functionality. The common elements were derived from an analysis of both domestic and international file format registry projects, and metadata elements related to functional requirements were identified from the analysis of the records on nursing education e-learning contents. We proposed the metadata elements for archiving composite electronic records, which consist of 25 high-level elements and 138 subelements.

The Influence of Open Banking Characteristics on Intention to Use Open Banking (오픈 뱅킹의 특성이 오픈 뱅킹의 사용의도에 미치는 영향 )

  • Oh, Eun-Hae
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.312-321
    • /
    • 2021
  • With the full implementation of open banking in which both banks and fintech companies participate, changes in the whole society such as new types of products, services, and businesses are taking place. Whenever new systems and environments change, research on technology acceptance by system users has been continued, and this study also verified how the characteristics of open banking affect the perceived ease of use and usefulness of the Technology Acceptance Model, and the intention to use open banking. As a result of the study, it was found that both information provision, service interactivity, and system stability had a significant effect on perceived ease of use, usefulness, and intention to use open banking. In the future, open banking may bring significant benefits to data sharing, financial access, banking infrastructure, product innovation and pricing, but it is also expected to bring unexpected damage. Therefore, domestic financial institutions should actively cope with the situation where the business environment is greatly changing due to the digital environment change, and at the same time actively foster fintech companies and promote innovation in the financial industry.

ZMET-based Participation Motivation Analysis of Chinese Tourists's Floral Arrangement Courses Visit to Korea (ZMET을 활용한 방한 중국인 관광객의 꽃꽂이교육 관광콘텐츠 참여동기 연구)

  • Cui, Ru-Ru;Kim, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.223-235
    • /
    • 2019
  • In order to develop the marketing strategy of Korean floral arrangement courses for chinese tourists, this study aimed at gaining their participation motivation with application of the ZMET (Zaltman metaphor-elicitation technique). According to the results, 18 constructs ('a sense of accomplishment', 'Korean culture visit', 'teacher's high-quality service', 'professionalism', 'to be together', 'communication with others', 'joint pleasure', 'better than China', 'not available in China', 'healing', 'the feeling of happiness and love', 'easy access to art', 'wonderful life shot', 'beautiful interior', 'special design', 'expectation', 'close to nature', and 'nice daily-life decoration') were derived and 4 main constructs ('a sense of accomplishment', 'Korean culture visit', 'teacher's high-quality service', and 'professionalism') of the consensus map were analyzed. Therefore, the Korean floral arrangement courses for chinese tourists should open an adjustable level of difficulty of curriculum, offer an opportunity to experience other Korean culture and increase florist's abilities from various aspects.

Empirical Settlement Environment Satisfaction Evaluation of Public Institution Employees in Innocity (이전 공공기관 종사자의 혁신도시 정주환경 만족도 평가 분석 -광주·전남 공동혁신도시를 중심으로-)

  • Baek, Min;An, Hyung-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.12
    • /
    • pp.444-455
    • /
    • 2018
  • In regard to the growth and development of Innocity from improvements in Innocity settlement environment, this research examines the level of satisfaction of Innocity settlement environment to propose a political implications. We deduced the main cause of settlement environment satisfaction by performing logistic regression on the public institution employees level of satisfaction in respect to 4 Innocity characteristics?six physical properties, three social properties, five facility properties, three economical properties?and three general questions. As a result, the greatest factor of settlement environment was physical properties, such as natural environment and scenery, residential environment, availability of diverse uses in the surrounding area, and access to public transportation. In addition, social characteristics (relationships with neighbors), and facilities (availability of industrial, research and educational facilities) were also significant. This research provided political implications for future Innocity settlement environment improvements despite limiting factors such as residents' perception and limited surveyed sites.

Online Snapshot Method based on Directory and File Change Tracking for Virtual File System (가상파일시스템에서 디렉토리 및 파일 변경 추적에 기반한 온라인 스냅샷 방법)

  • Kim, Jinsu;Song, Seokil;Shin, Jae Ryong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.417-425
    • /
    • 2019
  • Storage snapshot technology allows to preserve data at a specific point in time, and recover and access data at a desired point in time. It is an essential technology for storage protection application. Existing snapshot methods have some problems in that they dependent on storage hardware vendor, file system or virtual block device. In this paper, we propose a new snapshot method for solving the problems and creating snapshots on-line. The proposed snapshot method uses a method of extracting the log records of update operations at the virtual file system layer to enable the snapshot method to operate independently on file systems, virtual block devices, and storage hardwares. In addition, the proposed snapshot mehod creates and manages snapshots for directories and files without interruption to the storage service. Finally, through experiments we measure the snapshot creation time and the performance degradation caused by the snapshot.