• Title/Summary/Keyword: Access Restriction

Search Result 91, Processing Time 0.02 seconds

EFFECTS OF EARLY SKIP DAY FEEDING ON GROWTH PERFORMANCE AND BODY COMPOSITION IN BROILERS

  • Santoso, U.;Tanaka, K.;Ohtani, S.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.6 no.3
    • /
    • pp.451-461
    • /
    • 1993
  • Four hundred and eighty broiler chicks of both sexes were obtained from commercial hatchery (Hubbard) and raised on floor pens. All chicks were allowed free access to food from 0 to 7 and 20 to 56 days of age. At 7 days of age, all broilers were weighed individually, and divided into five groups as follows: 1. feed ad libitum as the control; 2. allowed free access to food 3 days and starved 1 day ($3{\times}1$); 3. allowed free access to food 2 days and starved 1 day ($2{\times}1$); 4. allowed free access to food 1 day and starved 1 days ($1{\times}1$) and; 5. allowed free access to food 2 days and starved 2 days ($2{\times}2$). Broilers were restricted for 12 days (d 7 through 17) of a 56-day trial. Broilers were fed a commercial starter diet (crude protein 23.8% and ME 3,070 kcal/kg) for 21 days, and commercial finisher diet (crude protein 20% and ME 3,160 kcal/kg) from 22 to 56 days of age. Although there was compensatory growth in some groups, (the $1{\times}1$ female group, and the $3{\times}1$ and $2{\times}1$ male grous), its level was not sufficient to achieve normal body weight at market age. There was sexual dimorphism for accelerated growth as well as differences in the ability to achieve a complete compensation of growth to the weight, feed conversion ratio, and body composition of ad libitum chicks. Early feed restriction could be used to reduce production cost because of the lower fed conversion ratio, mortality rate and the amount of starter diet consumed by broilers. The response of chicks to early feed restriction might depend on the degree of feed restriction, the method of feed restriction, duration of feed restriction, and sexes.

A Study on Security Kernel of Linux System (Linux 시스템의 보안커널에 관한 연구)

  • Han, Myung-Mook;Lee, Jun-Hwan
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.25-31
    • /
    • 2008
  • SELinux, security operating system, is the security system which implements mandatory access control using linux security module on the traditional linux kernel supporting discretionary access control. But intrusion detection and logging are lacked when system intrusions are happened. This study proposes a SELinux security kernel which performs detection of access violation and privilege restriction using dynamic access control. It detects the intrusion using security check when the abnormal access of system is happened, and dynamically changes the system privilege for the intruder through privilege restriction. Finally we prevent reintrusion and explain the result of experiment.

  • PDF

The Features of Restricted Access to Information at European and East Asian Libraries

  • Makhotina, Natalya;Pshenichnaya, Evgeniya
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.31-41
    • /
    • 2021
  • The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens' access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country's defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

Factors Related to Eating Breakfast of Middle and High School Students in Seoul (서울시 중.고등학생들의 아침식사 섭취 관련 요인)

  • Kim, Yang-Suk;Yoon, Ji-Hyun;Kim, Haeng-Ran;Kwon, Sung-Ok
    • Korean Journal of Community Nutrition
    • /
    • v.15 no.5
    • /
    • pp.582-592
    • /
    • 2010
  • The purpose of this study was to determine the factors related to eating breakfast for middle and high school students in Seoul using the Theory of Planned Behavior. Out of 2,280 questionnaires distributed to 22 schools, 2,060 were returned (90.4% response rate) and 1,899 were analyzed (83.3% analysis rate). Gender, self-perceived household income level and mother's working status were examined as demographic factors. "Attitude", "Subjective norm", "Perceived difficulty in access to breakfast", "Perceived time restriction" and "Self restriction to breakfast" were extracted as psychosocial factors as the results of factor analysis and reliability test using 17 items. In case of middle school students, boys were more likely to skip breakfast than girls. The students perceiving their household income level "low or middle low" were more likely to skip breakfast than those who perceived their household income level "high or middle high". The students whose mother had a job tended to skip breakfast than those whose mother had no job. In case of high school students, the students perceiving their household income level "low or middle low" tended to skip breakfast than those perceiving their household income level "high or middle high". The results of analysis of variance, all the psychosocial factors examined in this study-"Attitude", "Subjective norm", "Perceived difficulty in access to breakfast", "Perceived time restriction" and "Self restriction to breakfast"- were related to the frequencies of eating breakfast during weekdays in both the middle and high school students.

An Analysis of Usage of Sci-Hub in Korea (국내 Sci-Hub 이용 현황 분석)

  • Jeeyoung, Suh
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.473-490
    • /
    • 2022
  • This study was conducted to examine Sci-Hub, which provides the original text of academic papers to be provided for a fee by bypassing copyright, and to establish a basic basis for understanding the usage behavior of researchers with access restriction in Korea by analyzing the domestic Sci-Hub usage based on the dataset released by Sci-Hub in 2017. Therefore, after grasping the current status of the world related to Sci-Hub, the categories were set and analyzed by region where the dataset was downloaded, subject matter of academic papers, publisher, OA status, and published year. As a result of the study, the most downloaded areas were Seoul and the metropolitan area, and papers and journals in the field of natural science were downloaded the most, and about 20% of papers were in Open Access state. The papers published between 2010 and 2017 were the most downloaded, and IEEE's papers were the most downloaded, showing that recently published academic papers in the natural sciences were the most downloaded by the time they were downloaded.

Access Control of Pay TV Program in Digital Satellite Broadcasting System (디지털 위성방송 시스템에서 유료 TV방송 프로그램 접근제어)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3123-3132
    • /
    • 1997
  • In this paper, we describe access control system for protection of pay TV program in digital DBS(Direct Broadcast satellite) system. We also propose a possible access control system and operation scenario for scrambling and descrambling which are important in access control system. Transport stream structure and option, entitlement checking message and entitlement management message for access control on digital broadcasting system are described in this paper. Especially, the authentication based on Flat-Shamir and Gulllou-Quisquater schemes required for verification of proper subscriber as access control is oriented to smart card number and subscriber ID(Identity). It has less restriction than scheme oriented to descrambler number.

  • PDF

Analysis on the Plant and Site Characteristics for the Restoration of Sangrim Woodlands in Hamyang-Gun, Korea II (함양 상림 복원을 위한 식생 및 입지특성 분석 II)

  • Park, Jae-Hyeon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.13 no.6
    • /
    • pp.173-184
    • /
    • 2010
  • This study was conducted to establish a management plan for the Sangrim Woodlands restoration by analyzing the vegetation survey and the site characteristics of the Sangrim Woodlands Natural Monument (Natural Monument 154) in Hamyang-Gun, Gyoungsangnam-Do, Korea. According to the vegetation analysis, the species diversity by the location of Sangrim was higher near forest (1.000) than near urban (0.358) areas. Although forest occupied 53% of the Sangrim woodlands area, it is still insufficient, requiring to transform arable land, lawn, or house areas to the forest within the woodlands. Soil bulk density was increased in access areas frequently used by public, while it was decreased in closed areas. Soil hardness at 0-10 cm soil depth was generally improved in the closed areas, while became worse in the public access areas compared with the soil hardness in 2004.

Development of Web-Based Experiments for Undergraduate Mechatronics Education

  • KIM, Young-Suk;Yang, Seung-Han
    • Educational Technology International
    • /
    • v.14 no.2
    • /
    • pp.215-228
    • /
    • 2013
  • In engineering education practical experiments is very important for each student, but due to the limitation of time and available resources such as laboratory equipment, space and instructors enough hands-on real experiments could not be provided to all students enrolled in the program throughout the academic year. In this sense web-based remote experiments through internet become a solution for engineering education and an emerging new paradigm for students and teachers. This paper presents the development of the web-based remote vibration experiment system for mechatronics education. Students can access this experimental equipment through an internet and conduct vibration experiment remotely without any restriction on time and place. IP address for data communication and web-service are assigned in local computer and then students receive experimental results and the captured pictures using network. The developed system provides real-time feedback of the tested results. Ubiquitous access to the system gained popularity from students.

Context awareness Access Control for Ubiquitous Environment (유비쿼터스 환경을 위한 상황 인식 접근제어)

  • Shin, Dong-Wook;Hwang, Yu-Dong;Park, Dong-Gue
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.470-482
    • /
    • 2008
  • This paper propose role base access control model that use context information for ubiquitous environment. Concept of access control that use context information assigns permission that can approach in some information or object in part. And do so that can assigned user in part to it and acquire permission. So it can approach in information or object. Therefore, user approaches in information or object in assigned role, and the role that is allocated ro own is having. So, do so that can secure information or utilization of object safety. Proposa1 model investigated lacking restriction item in GEO-RBAC model. So, it considered that present new restriction condition and role conflict in various case. Also, to GEO-RBAC model proposed suitable model, analyzed old model's advantage, shortcoming. And it presented proposal model to GEO-RBAC because improving this.

  • PDF