• Title/Summary/Keyword: subject access

Search Result 372, Processing Time 0.032 seconds

A Performance Analysis of CSMA in Wireless Networks Based on MIL-STD-188-220 (MIL-STD-188-220기반 무선네트워크의 CSMA 성능분석)

  • Seo, NanSol;Joo, JaeWoo;Jang, DohngWoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.11
    • /
    • pp.1129-1137
    • /
    • 2012
  • The wireless link of tactical datalink system provides a communication network to share digitalized tactical data in real-time. Also MAC(Multiple Access Control) of this system is subject to TDMA or CSMA according to a operated circumstance of target nodes to exchange the data reliably. In this paper, we verify the operability when we use CSMA scheme based on MIL-STD-188-220 in tactical datalink system which is basically designed with TDMA, and provide a mathematical analysis scheme to verify the operability and performance. Finally, by implementing CSMA scheme to a tactical datalink equipment we obtain practical results which can be compared with theoretical results.

Static performance analysis of deepwater compliant vertical access risers

  • Lou, Min;Li, Run;Wu, Wugang;Chen, Zhengshou
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.11 no.2
    • /
    • pp.970-979
    • /
    • 2019
  • Compliant Vertical Access Risers (CVARs) are compliant systems that incorporate a differentiated geometric configuration that allows the exploitation of oil and gas in deepwater fields and enables a number of operational advantages in the offshore system. One of the main features of CVAR systems is that they allow direct intervention procedures to be applied to the well bore, enabling workover operations to be performed directly from the production platform. Based on the principles of virtual work and variation, a static geometric nonlinear equation of CVARs is derived and applied in this study. The results of this study show that the two ends of the riser as well as the transition region are subject to high stress, while the positions of the floating platform exert significant effects on the geometry of the riser configuration. Compliance and buoyancy factors should be set moderately to reduce the CVAR stress. In addition, the buoyancy modules should be placed in the lower region, in order to maximize the operation advantages of CVAR.

Developing Subject Headings for Subject Access of Children's Picture Books (어린이 그림책의 주제접근을 위한 주제명표 개발)

  • Park, Ziyoung
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2012.08a
    • /
    • pp.105-108
    • /
    • 2012
  • 어린이 그림책의 효과적인 주제접근을 위해서는 주제명의 부여가 필수적이다. 그러나 어린이 그림책은 표제나 목차 등 자료 자체에서 주제명을 발췌하기가 어렵다. 또한 일반도서를 위한 주제명표를 그대로 사용하기도 적합하지 않다. 이에 본 연구에서는 어린이 그림책을 위한 별도의 주제명표를 개발하였다. 주제명표 개발을 위해서는 영미권의 그림책 주제명표를 참고하였으며, 이 과정에서 우리 문화와 언어에 맞도록 기존의 표목을 수정.추가하였다. 또한 그림책의 주요 독자층인 어린이에게 적합한 표목을 선정하기 위해 초등국어사전 등을 참고하였다. 그리고 시범적으로 구축된 주제명표를 어린이도서연구회의 추천그림책을 대상으로 적용하였다. 앞으로는 지속적인 주제명 부여 작업을 통해 주제명표를 정련하고, 그림책의 주제분석을 위한 지침을 추가적으로 제공할 필요가 있을 것이다.

  • PDF

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.

A Study on Developing a Name Access Point Control System to Improve the Performance of Information Retrieval from Institutional Repositories (기관 리포지터리의 검색기능 향상을 위한 인명 접근점제어 시스템 구축 연구)

  • Kim, Mi-Hyang;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.125-146
    • /
    • 2010
  • This study developed a name access point control system for better performance of information retrieval from institutional repositories, which are equipped with authorgenerated metadata processes for self-archiving. In developing name access point control data for the system, the primary data were created from the existing authority. However, unlike the existing authority data, the primary data did not use any authority forms. Instead, the data utilized all the forms provided by the resources as access points. Specifically, field of activity(subject) and title information on authorship were used to distinguish between persons who have the same name. The result showed that the system improved the performance of the information retrieval. The system has been also expected to be utilized over other metadata provided by libraries, in addition to the institutional repositories, in order to provide better quality information.

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

The Web Application of Constitution Analysis System - SCAT (Sasang Constitution Analysis Tool) - (웹 기반 통합체질진단 시스템 - SCAT (Sasang Constitution Analysis Tool) -)

  • So, Ji-Ho;Kim, Jang-Woong;Nam, Ji-Ho;Lee, Bum-Ju;Kim, Young-Su;Kim, Jong-Yeol;Do, Jun-Hyeong
    • Journal of Sasang Constitutional Medicine
    • /
    • v.28 no.1
    • /
    • pp.1-10
    • /
    • 2016
  • Objectives SCAT (Sasang Constitution Analysis Tool) is a system designed to provide the information needed to diagnose a sasang constitution diagnosis expert diagnosis. In order to determine the sasang constitution diagnosis requires the following four ways. This system provides objective information to the constitution diagnostic expert to collect such information.Methods SCAT was constructed by considering the user UI/UX to be easy to enter information. To provide a state of the subject in Table to make it easier to grasp the information of the subject also in constitution diagnostician.Results Provides objective data for experts to determine the constitutional history of the subject.Conclusions Professionals and ordinary users through the SCAT system can easily access the sasang constitution diagnosis. In the future through the advancement of the SCAT system will improve the user's convenience stability.

An Analysis on Teacher Librarians' Self-reported Appraisals about School Library-based Instruction (도서관 활용수업에 대한 사서교사의 자기평가 분석)

  • Song, Gi-Ho
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.3
    • /
    • pp.5-23
    • /
    • 2016
  • The aim of this study is to analyze the effect and limitation of teacher librarians' self-reported appraisals and suggest it's activation plans about school library based instruction (SLBI). According to results of analyses, the SLBI begin with subject teachers' demand for learning materials and teacher librarians play their educational role in Information search & access and representation & synthesis of information during the instruction. Compared with previous studies, the limitations of SLBI we can see in this study are restricted role of teacher librarians, exclusive attitude and antipathy to classroom opening of subject teachers under the SLBI. The bars of promoting the SLBI are also the difficulty of collaborative working with several same subject teachers and subject classroom system. The ways of activating the SLBI suggested in their self-reported appraisals are building intimacy with subject teachers and participating actively curriculum council, peer-supervision and demonstration classes.

An International Comparative Study of Upper Secondary Home Economics Education -Curriculum Analaysis Approach- (고등학교 가정과 교육의 국제비교연구 -교육과정을 중심으로-)

  • 윤인경
    • Journal of Korean Home Economics Education Association
    • /
    • v.1 no.1
    • /
    • pp.33-42
    • /
    • 1989
  • By the comparative analysis of high school Home Economics curricula in the U.S., Japan and Taiwan, this study first attempts to understand the current Home Economics education and to access its treads for each country. Based on the findings of the analysis, the study also seeks to get the major implications of the analysis for the betterment of the Korea Home Economics Education. The main sources of information and data analyzed here are: 1) curricula for both Oklahoma and Ohio state as representatives of the U.S.; 2) Home Economics Teaching Guidelines in Japan; and 3) Home Economics curriculum in Taiwan. Content Analysis technique is applied in this study. The major elements of contents include:1) structure of the curriculum; 2) subject name; 3) unit (time) allotment; 4) goals; 5) subject areas and content composition; and 6) other related characteristics for the implementation of the curriculum. Summarized results of the study outline as follows: 1) Home Economics is offered as independently required subject with equal status to Mathematics, Science, and Social Studies subject in all three countries; 2) Sex discrimination is prohibited both in the U.S. and Taiwan, while in Japan sex equity is not secured for Home Economics educations; 3) Time allotment for Home Economics in Japan and Taiwan is similiar to that in Korea;4) Subject areas cover such fields as Foods and Nutrition, Clothing and Textiles, Home Management, and Human Development in all three countries, which is similiar to those of Korea. In addition, Consumer Education and Career Education are also covered in the U.S., whereas in Japan Child Care is offered; and 5) Curriculum can be utilized as instructional planning material due to the clear specification of instructional methods, materials, and evaluation methods on the curriculum, especially in the U.S. and Taiwan.

  • PDF

Queuing Analysis for Overlay/Underlay Spectrum Access in Cognitive Radio Networks

  • Do, Cuong T.;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06d
    • /
    • pp.190-192
    • /
    • 2012
  • In this paper, we present theoretical queuing analysis for hybrid overlay/underlay Cognitive Radio (CR) system by applying M/M/1 queuing model where the rate of arrival and the service capacity are subject to Poisson alterations. Numerical results are used to prove a high degree of accuracy for the derived expressions. The result can be used as a benchmark to evaluate the performance of a hybrid overlay/underlay CR system.