• Title/Summary/Keyword: AccessON

Search Result 11,239, Processing Time 0.04 seconds

Evaluation of the Complexity of the Product According to Access and Handling (취급성과 접근성을 고려한 제품의 복잡도 평가)

  • Mok, Hak-Soo;Shin, Hyun-Chang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.10
    • /
    • pp.91-101
    • /
    • 1997
  • In this paper, the complexity of the product is evaluated quantitatively regarding to access of assembly tools and handling of part. To evaluate the complexity of the product, we grasped factors that could influence on the complexity of the product with access and handling, and then we determined the criteria of comparison for each complexity factor. The criteria compare the complexities of product alternatives on each access and handling.

  • PDF

THE INFLUENCE OF DIFFERENT ACCESS CAVITY DESIGNS ON THE FRACTURE STRENGTH IN ENDODONTICALLY TREATED MANDIBULAR ANTERIOR TEETH (근관와동형태에 따른 근관치료된 하악절치의 파절강도)

  • Lee Young-Gyun;Shin Hye-Jin;Park Se-Hee;Cho Kyung-Mo;Kim Jin-Woo
    • Restorative Dentistry and Endodontics
    • /
    • v.29 no.6
    • /
    • pp.515-519
    • /
    • 2004
  • Straight access cavity design allows the operator to locate all canals, helps in proper cleaning and shaping, ultimately facilitates the obturation of the canal system. However, change in the fracture strength according to the access cavity designs was not clearly demonstrated yet. The purpose of this study was to determine the influence of different access cavity designs on the fracture strength in endodontically treated mandibular anterior teeth. Recently extracted mandibular anterior teeth that have no caries, cervical abrasion, and fracture were divided into three groups (Group 1 : conventional lingual access cavity, Group 2 : straight access cavity, Group 3 : extended straight access cavity) according to the cavity designs. After conventional endodontic treatment, cavities were filled with resin core material. Compressive loads parallel to the long axis of the teeth were applied at a crosshead speed of 2mm/min until the fracture occurred. The fracture strength analyzed with ANOV A and the Scheffe test at the 95% confidence level. The results of this study were as follows: 1. The mean fracture strength decrease in following sequence Group 1 (4558.90{\;}\pm{\;}77.40{\;}N$), Group 2 ($494.07{\;}\pm{\;}123.98{\;}N) and Group 3 ($267.33{\;}\pm{\;}27.02{\;}N). 2. There was significant difference between Group 3 and other groups (P = 0.00). Considering advantage of direct access to apical third and results of this study, straight access cavity is recommended for access cavity form of the mandibular anterior teeth.

The Relation of Cell Scale and Call Connection Level for the VBR Trafac in the Wireless ATM Access Transport (무선 ATM 액세스 전달구조에서 VBR 트래픽에 대한 셀 스케일과 호 접속레벨간의 관계)

  • Lee Ha-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.596-601
    • /
    • 2005
  • In this paper it is focused on the relation between CLR(Cell Loss Ratio) and blocking probability in the wireless ATM access transport. Traffic model of wireless ATH access transport is based on the cell scale, burst scale and call connection level. The CLR due to buffer overflow for wireless access node is derived for VBR traffic. The CLR due to transmission errors for wireless channel is derived. Using the CLR for both access node and wireless channel: the CLR of wireless ATM access transport is derived. The relation between CLR and blocking probability is analyzed for VBR traffic to evaluate performance of wireless ATM access transport.

A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing

  • Jing Yixin;Kim, Jin-Hyung;Jeong, Dong-Won
    • Journal of Information Processing Systems
    • /
    • v.2 no.1
    • /
    • pp.28-33
    • /
    • 2006
  • The initial research of Task Computing in the ubiquitous computing (UbiComp) environment revealed the need for access control of services. Context-awareness of service requests in ubiquitous computing necessitates a well-designed model to enable effective and adaptive invocation. However, nowadays little work is being undertaken on service access control under the UbiComp environment, which makes the exposed service suffer from the problem of ill-use. One of the research focuses is how to handle the access to the resources over the network. Policy-Based Access Control is an access control method. It adopts a security policy to evaluate requests for resources but has a light-weight combination of the resources. Motivated by the problem above, we propose a universal model and an algorithm to enhance service access control in UbiComp. We detail the architecture of the model and present the access control implementation.

A Study on the Elements for Open Access Policies of Universities (대학의 오픈액세스 정책 수립시 구성요소에 관한 연구)

  • Joung, Kyoung-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.2
    • /
    • pp.229-250
    • /
    • 2010
  • Open access policies are very important for the successful open access projects in any institutions. This study aims to propose elements to consider for establishing open access policies of universities. The 3 university institutional repositories' open access policies in Korea and foreign universities' policies registered in the ROARMAP are analyzed. The major categories proposed in the study are materials, time of deposition, depositors, copyright, level of requirement, exemption, usage, options for open access, and support.

  • PDF

The Influence of Financial Inclusion on MSMEs' Performance Through Financial Intermediation and Access to Capital

  • RATNAWATI, Kusuma
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.205-218
    • /
    • 2020
  • This study aims to analyze the influence of financial inclusion on micro-, small-, and medium-sized enterprises' (MSMEs) performance and examine the mediation role of financial intermediation and access to capital. The object of this study is MSMEs in Malang, Indonesia. The sample consists of 100 MSME actors in Malang City, which is determined using Roscoes theory. The data is collected using Simple Random Sampling method, by distributing questionnaire measured with Likert scales. The hypotheses proposed in this study are examined using Partial Least Square (PLS) model. The results of this study show that financial inclusion influences MSMEs' performance both directly and indirectly through mediation from financial intermediation and access to capital. The direct influence means that the efforts to increase access to financial services, especially access to credit financing for MSMEs, will be able to increase market share, number of workers, sales, as well as profit of the MSMEs. Increased financial inclusion has a major impact on improving MSMEs' performance through financial intermediation compared to access to capital. This means that the increase of financial access for MSMEs followed by an increase in financial intermediation in the form of a financial service approach to MSMEs will improve MSMEs' performance.

The Features of Restricted Access to Information at European and East Asian Libraries

  • Makhotina, Natalya;Pshenichnaya, Evgeniya
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.31-41
    • /
    • 2021
  • The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens' access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country's defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things (사물인터넷 센서퓨전 환경에서 동적인 상황을 고려한 데이터 접근제어 정책)

  • Song, You-jin;Seo, Aria;Lee, Jaekyu;Kim, Yei-chang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.409-418
    • /
    • 2015
  • In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorized users. To this end, after analysis of the existing research 'CP-ABE-based on context information access control scheme', then include dynamic conditions in the range of status information, finally we propose a access control policy reflecting the extended multi-dimensional context attribute. Proposed in this paper, access control policy considering the dynamic conditions is designed to suit for IoT sensor fusion environment. Therefore, comparing the existing studies, there are advantages it make a possible to ensure the variety and accuracy of data, and to extend the existing context properties.

Design of Access Control Model for Secure EDI Service (안전한 EDI 서비스를 위한 접근제어 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.23-37
    • /
    • 2000
  • EDI is basically the concept of computer-to-computer exchange of messages relating to various types of activities or business areas, such as banking, trade, medicine, publishing, etc. Therefore, security, reliability and special functionality will be implicit requirements of EDI systems. We will design access control model to content security of these requirements. Access controls in information systems are responsible for ensuring that all direct access to the entities occur exclusively according to the access modes and rules fixed by security policies. On this paper, security policies for access control model are presented from the viewpoints of identity-based, rule-based, role-based policy. We give a design of access control model for secure EDI service based on the derived access control rules and operations to enforce the defined security policies. The proposed access control model provides integrity, confidentiality and a flow control of EDI messages.

  • PDF

The study for improvement of traffic performance based on load balancing in wireless LAN (로드발랜싱기반 무선랜의 트래픽 성능 향상에 관한 연구)

  • Park, Chi-Ho;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.1-6
    • /
    • 2006
  • This paper proposes association algorithm using load balancing for efficient AP selection under environment of wireless local area network(WLAN). Our scheme measures arrival time of association information when establishing the connection between access points and access terminal, analyzes the load condition of AP, and applies load balancing. AT selects and sets up low traffic AP by measuring traffic of connected access terminal, which can prevent over-franc of access points under hotspot environment that users access simultaneously. According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.