• Title/Summary/Keyword: subject access

Search Result 372, Processing Time 0.03 seconds

A Construction of Indexing System for Sentence Retrieval (문장 검색을 위한 색인시스템 구축 : 초 .중등 학생의 한국어 및 영어 문장을 중심으로)

  • 이태영
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.145-163
    • /
    • 2003
  • An indexing language were studied to construct the sentences and paragraphs providing system aided to write a Korean or English composition. The indexing language includes the index terms like noun, predicate, and adverb. and also various index symbols. The subject name and the keyword Included the symbols, which Indicate the connectives between clauses in a sentence, is used as the access point. The search results show this system will be effective with large database and developed retrieval methods.

Time Slot Allocation for CDMA/TDD Indoor Wireless Systems

  • Lee Chae Y.;Sung Ki Won
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.144-151
    • /
    • 2002
  • Future wireless communication systems are expected to provide a broad range of multimedia services in which the asymmetry of traffic load between uplink and downlink is a significant feature. The rode division multiple access system with tune division duplex mode (CDMA/TDD) is a good solution to cope with the traffic asymmetry problem. However. the TDD system is subject to inter-cell interference compared to frequency division duplex (FDD) system. Since both uplink and downlink share the same frequency in TDD. uplink and downlink may interfere each other especially when neighboring cells require different rates of asymmetry. Thus, time slot allocation for tells is an important issue in TDD. In this paper. we propose a genetic algorithm based time slot allocation scheme which maximizes the residual system capacity. The proposed scheme allows that each cell employ different level of uplink/downlink asymmetry and satisfies the interference requirement.

  • PDF

An Education Model of a Nano-Positioning System for Mechanical Engineers

  • Lee Dong-Yeon;Gweon Dae-Gab
    • Journal of Mechanical Science and Technology
    • /
    • v.20 no.10
    • /
    • pp.1702-1715
    • /
    • 2006
  • The increasing use of nano-positioners in a wide variety of laboratory and industrial applications has created a need for nano-mechatronics education in all engineering disciplines. The subject of nano-mechatronics is broad and interdisciplinary. This article focuses on the way nano-mechatronics is taught in department of mechanical engineering at Korea Advanced Institute of Science and Technology (KAIST). As one model of nano-positioning systems, design and experimental methodology is presented in this article. For design phase, the stiffness and resonant frequencies are found analytically and verified by using a commercial finite element analysis program. Next, for experimental phase, various tests are performed to access the performances of the designed nano-positioner, for example, sine-tracking, multi-step response and travel-range check etc. Finally, the definition of 'separation frequency' is described and some comments are discussed.

A Fault Detection and Self-Recovery System for Space-Borne Dual Ring Counters (우주용 중복구조 링 카운터를 위한 고장 진단 및 자가 복구 시스템)

  • Kwak, Seong Woo;Yang, Jung-Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.1
    • /
    • pp.120-126
    • /
    • 2013
  • This paper proposes a novel scheme of fault detection and self-recovery for space-borne dual ring counters subject to transient faults. The considered ring counter is equipped with hardware redundancy, but it has a limited output domain where direct access to the current state is unavailable. We employ the theory of corrective control to detect any transient fault occurring to the counter bits and to realize immediate self-recovery of the ring counter back to the normal state. The structure of the fault-tolerant controller is designed to be minimal regardless of the counter size. To validate the applicability, we implement the proposed system on a commercial FGPA board.

A Systematic Study of Network Firewall and Its Implementation

  • Alsaqour, Raed;Motmi, Ahmed;Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.199-208
    • /
    • 2021
  • This is an era of technology and with the rapid growth of the Internet, networks are continuously growing. Companies are shifting from simple to more complex networks. Since networks are responsible to transmit huge data which is often sensitive and a point of concern for hackers. Despite the sizes of the networks, all networks are subject to several threats. Companies deploy several security measures to protect their networks from unauthorized access. These security measures are implemented from the device level to the network level. Every security layer adds more to the security of the company's network. Firewalls are the piece of software that provides internal and external security of the network. Firewalls aim to enhance the device level as well as network-level security. This paper aims to investigate the different types of firewalls, their architecture, and vulnerabilities of the firewall. This paper improves the understanding of firewall and its various types of architecture.

A Study on Database for Pulse Rate Diagnosis

  • S. C. Han;Kim, H. K.;Lee, Y. D.;W. Huh;Park, Y. B.
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 1998.06a
    • /
    • pp.539-542
    • /
    • 1998
  • In this paper, we devised pulse rate diagnosis database system for provide basic index of Cold-Hot diagnosis. The system consist of database part and pulse rate detection part that for detection pulse wave, respiration and ECG. The database is constructed windows95 platform using DAO(Data Access Object). Search algorithm used ISAM algorithm. The database consist of patient information and medical report for a subject and detected biological signals.

  • PDF

A New Integrative Approach to Geography Education in the Social Studies Subject - with respect to Replacement of Geographical Contents in the Elementary-leveled Learning - (지리 교과의 통합교육적 접근방안 - 초등 사회과 학습 내용 조직을 중심으로 -)

  • Kang, Kyoung-Won
    • Journal of the Korean association of regional geographers
    • /
    • v.7 no.1
    • /
    • pp.51-66
    • /
    • 2001
  • The curriculum of integrated social studies is not conceptually established, but various forms pursuing so-called perfect integrated subject have appeared from elementary school to high school. But we cannot find out desirable integration in the elementary school though the apparent goal is to integrate all kinds of social concepts into one unit. The current method of integration has some problems over advantages people initially expected by integration. It is problematic in that students learn fragmental knowledges of geography without capturing the whole geographical concept structure or obtaining their own geographical viewpoint. Therefore, we purpose to reinterpret integration of social studies and reorganize the current textbook into the right direction under the assumption that simple mixture of knowledges is far from our goal of true integration. For this purpose, we suggest a new method for social studies as an integrated subject. Instead of providing knowledges unrelated to each other into one bundle, it helps students to see the real world in his own knowledge framework equipped with geographical viewpoint. The text we claim will show students that geography consists of three key concepts: physical environment, man and environment, and spatial structure. With this text, they will have an easy access to the relationships between key concepts and details, and between geographical concepts and similar concepts from other disciplines. The proposal contributes to both upcoming textbook development and classroom teaching by eliminating problems in the current social studies teaching.

  • PDF

A comparative study on users' satisfaction about online catalog and card catalog (대학도서관의 온라인목록과 카드목록의 이용자 만족도 비교)

  • 강미혜
    • Journal of Korean Library and Information Science Society
    • /
    • v.24
    • /
    • pp.163-187
    • /
    • 1996
  • The library catalog is considered an important tool to provide library users with conveniences making a search for necessary information. Accordingly, the purpose of this study is to investigate "behaviors and attitudes" of library users in a university library using online and card catalogs together, to compare their distinctions between online and card catalogs and then to bring about reforms for the development of future cataloging, thereby improving the utilization of online catalog and its service expansion. For this, this paper carried out a survey research which was randomly questionaired 280 library users of four universities in Seoul from March 28th to April 16th 1996. Major findings are as follow : 1. Library users tended to use more online catalog(50.0%) than card catalog (21.9%). 2. The main reasons the library users us online catalog were time saving(24.0%), convenience of use(21.3%), multiple searching possibility (16.2%), and the preferences of card catalog were location of library materials(34.6%), time saving(17.5%), Bibliographic information(14.9%). 3. The major access points which library users utilized mostly in their online catalog are title(30.3%), author(29.2%) and subject heading (17.6%), and for card catalog, title(40.5%), author(34.6%) and call no.(11.1%). 4. The methods library users learned to use online catalog are terminal screen(44.7%), online manual(26.1%), and for card catalog, library orientation(42.6%), librarian's help(18.5%). 5. It was shown that library users were not mostly satisfied about their searching results: the users satisfied with online catalog in the order of partly(46.2%), as expected(42.3%), more than expected(10.4%), and with the card catalog in the order of partly(54.6%), as expected(27.3%), more than expected(10.4%). It was found that although library users preferred online catalog more than card catalog, 54.8% of the total catalog users were not satisfied about the search results they have had. 6. The items which library users want to add to online catalog are catalogs of materials other libraries have(41.6%), catalogs of the materials the library has(29.3%), titles of serial articles(17.7%). And the additional services library users want are checking function of loan materials and reservation of materials(15.5%), subject headings(14.5%), more terminals(13.4%), catalog use explanations(12.9%), multiple access points(11.0%), searching function of contents, abstracts, and indexes(9.6%). Considering the fact that library users tend to use more favorably online catalog than card catalog and the trend that library change from card catalog to online catalog, it is strongly recommended to su n.0, pply students with formal and informal training programs for online catalog use.talog use.

  • PDF

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.

Analysis of Open Access Status of Domestic Author's Papers Published in International Journals: Based on Highly Cited Papers (국내연구자가 출판한 국제학술지 논문의 오픈액세스 현황 - 고피인용된 논문 중심 -)

  • Cho, Jane
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.54 no.1
    • /
    • pp.325-341
    • /
    • 2020
  • This study used the Unpaywall API, one of the open tools to track the OA version, to empirically identify the OA of 3,905 papers that have been published by Korean corresponding authors since 2015 in international journals. As a result, the following facts were found. First, less than 30% of papers have been open accessed, and more than half of them were bronze OA. Secondly, the archiving site of the Green OA papers was found not to be domestic but mainly subject repositories or institutional repositories of overseas universities to which co-authors belong. Third, only 19.6% of research fund granted papers were open accessed and half of them were in the medical field. In contrast to the international trends in which the OA papers showed higher citations, the analyzed OA papers showed no higher citations than the non-OA papers.