• Title/Summary/Keyword: AccessON

Search Result 11,283, Processing Time 0.036 seconds

Problems on ownership and access in future librarty (미래도서관에서의 소장(ownership)과 접근(access)의 문제)

  • 양재한
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.19-50
    • /
    • 1996
  • The purpose of this paper is to study on ownership and access in future library. For this purpose, this is criticized about recognition regarding future library of Library and Information Science researchers in Korea. And, this is reviewed the present stages of collection development and a role of future books, future libraries and future librarians in Korea. The result of this study is known unrealistic reality analysis and forecast surrounding future library discourse and at the same time that following Western model is not fit for future library in Korea. This study is proposed resolving of problems to access based on physical collection in future library.

  • PDF

A Study on the Characteristics of Open Access in Korean Scholarly Journals: Focused on KCI Journals (국내 학술지의 오픈액세스 특성에 관한 연구: KCI 등재지를 대상으로)

  • Kim, Gyuhwan;Joung, Kyoung Hee
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.3
    • /
    • pp.251-267
    • /
    • 2017
  • This study aimed to analyze open access features of 1,890 Korean scientific journals registered in the Korea Citation Index (KCI). To this end, this study classified open access features of the target scientific journals into two main aspects, free access and free redistribution. The analysis results indicated that the target scientific journals had strong free access aspects. Based on websites, 67% of the target scientific journals allowed for free access without a login process and based on free database, 48% provided free access. On the other hand, the target scientific journals had weaker free redistribution aspects compared to their free access aspects. Only 14% of them offered the CC (creative commons) license. Another finding was that there were clear differences in open access aspects by academic field. Medicine, pharmacy, natural science, agriculture, fisheries, oceanography, and engineering had stronger open access aspects than humanities, sociology, arts, physical education, and interdisciplinary science. It appears that the difference was caused by the presence or absence of organizations supporting distribution of scientific journals of the fields concerned. To narrow the gap, it is recommended that the open access governance system is established to set up open access policies for Korean scientific journals regardless of academic fields and to support them.

ENTERPRISE WIDE CENTRALIZED APPLICATION LEVEL ACCESS CONTROL USING XACML

  • Shaikh, Riaz A.;Rajput, Saeed;Zaidi, S.M.H.;Sharif, Kashif
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.62-67
    • /
    • 2005
  • In traditional approach, enterprise-wide consistent security policy enforcement for applications is very difficult task. Therefore, industry is now moving towards new unified enterprise application security concept that consist of centralized authentication and authorization mechanism. The eXtensible Access Control Markup Language (XACML); an XML-based standard defined by OASIS, is most suitable choice which can support centralized, role based, context aware access control mechanism. It is designed to provide universal standard for writing authorization policies and access control request/response language for managing access to the resources. This paper includes a brief overview on XACML and discusses its benefits, limitations and a data flow process. We propose a new generic access control architecture that supports enterprise wide centralized application level access control mechanism using XACML. The other benefits which can be achieved through this architecture are, reduce adnministration cost and complexity, support of heterogeneous computing platforms, centralized monitoring system, automatic fail over, scalability and availability, open standard based solution and secure communication.

  • PDF

LED-QR Authentication Technology for Access Control and Security

  • Chung, Youngseek;Jung, Soonho;Kim, Junwoo;Lee, Junghoon;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.69-75
    • /
    • 2015
  • There are several possible places which are accessible in many buildings and facilities, various types of systems have been utilized such as access control or surveillance depending on the purpose. Especially if security is important, it must go through the various authentication procedures when people can access. Until now many access control systems have been proposed and developed, they are applied and utilized to companies which security is needed. However, as time passes the problems with existing access control systems occur or the vulnerabilities related to access control are reported, as technology advances. The solution to this, we propose authentication technology related to access control using LED-QR tag.

Current treatment status and medical costs for hemodialysis vascular access based on analysis of the Korean Health Insurance Database

  • Lee, Hyung Seok;Ju, Young-Su;Song, Young Rim;Kim, Jwa Kyung;Choi, Sun Ryoung;Joo, Narae;Kim, Hyung Jik;Park, Pyoungju;Kim, Sung Gyun
    • The Korean journal of internal medicine
    • /
    • v.33 no.6
    • /
    • pp.1160-1168
    • /
    • 2018
  • Background/Aims: The Republic of Korea is a country where the hemodialysis population is growing rapidly. It is believed that the numbers of treatments related to vascular access-related complications are also increasing. This study investigated the current status of treatment and medical expenses for vascular access in Korean patients on hemodialysis. Methods: This was a descriptive observational study. We inspected the insurance claims of patients with chronic kidney disease who underwent hemodialysis between January 2008 and December 2016. We calculated descriptive statistics of the frequencies and medical expenses of procedures for vascular access. Results: The national medical expenses for access-related treatment were 7.12 billion KRW (equivalent to 6.36 million USD) in 2008, and these expenses increased to 42.12 billion KRW (equivalent to 37.67 million USD) in 2016. The population of hemodialysis patients, the annual frequency of access-related procedures, and the total medical cost for access-related procedures increased by 1.6-, 2.6-, and 5.9-fold, respectively, over the past 9 years. The frequency and costs of access care increased as the number of patients on hemodialysis increased. The increase in vascular access-related costs has largely been driven by increased numbers of percutaneous angioplasty. Conclusions: The increasing proportion of medical costs for percutaneous angioplasty represents a challenge in the management of end-stage renal disease in Korea. It is essential to identify the clinical and physiological aspects as well as anatomical abnormalities before planning angioplasty. A timely surgical correction could be a viable option to control the rapid growth of access-related medical expenses.

A Multi-Level Access Control Scheme on Dynamic Multicast Services (동적 멀티캐스트 서비스상의 다단계 접근통제 기법)

  • 신동명;박희운;최용락
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.47-58
    • /
    • 2002
  • The access control techniques, which can control unauthorized members to access to multicast service, have not been studied very often while there are a lot of on-going study on secure multicast architecture, multicast key distribution and sender authentication scheme have been studied. Multi level access control scheme in multicast can be used in a remote secure conference or to provide graduated multimedia services to each customers. In fact, multicast network has its own virtual networks according to different security levels. However, Early schemes are not effective when it protects unauthorized access in multi-access network environment. Furthermore this scheme does not provide us with hierarchical access control mechanism. This paper, therefore, proposes hierarchical access control scheme to provide the effectiveness in network layer by security level comparison. And we also suggests hierarchical key distribution scheme for multi level access control in application layer and effective hierarchical key renewal scheme in dynamic multicast environment which is easy to join and leaving the multicast group.

A Study on the Description of Personal Name Access Point Control Ontology Using Axiom Definition (공리정의를 이용한 인명접근점제어 온톨로지 기술에 관한 연구)

  • Kang, Hyen-Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.46 no.2
    • /
    • pp.157-174
    • /
    • 2012
  • This study tries to describe personal name access point control ontology for the American novelist Mark Twain using RDF/OWL axiom to control access point based on the ontology. The Axiom used in this study are disjoint with class, domain and range, property cardinality, inverse functional property, individual and literal data property. As a result, in the ontology environment we can accept various access points as equal access points exclusive of authority heading and heading concept. It can successfully describe Mark Twain's personal name access point control ontology and display using the OntoGraf.

Utilization of Open Access Repositories for Visibility of Academic Publications by Lecturers in South-East, Nigeria

  • Orsu, Nkem Emilia
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.4
    • /
    • pp.47-68
    • /
    • 2019
  • The study investigates the utilization of open access repositories for visibility of academic publications by lecturers in South-East, Nigeria. The specific objectives were to investigate the types of academic publications available, platforms used in self-archiving, level of satisfaction derived by lecturers with the contribution of open access repositories, challenges and strategies. It adopted descriptive survey design. Proportionate stratified sampling technique was used to draw a sample size of 418 from the total population of 4,187 lecturers. Questionnaire and observation check list were used for data collection. Frequency count, percentage, and mean score were used to analyze the data. The study revealed that there are enough academic publications available such as books, journals, projects, and thesis with the exception of handouts. It also revealed that Google Scholar, Research Gate and Open Access Journal were the main platforms lecturers use in self-archiving; while other platforms like Institutional Repositories, among others were minimally employed. Lecturers are less satisfied with the contribution of open access repositories. All the suggested challenges such as inadequate power supply, poor network, lack of awareness and inadequate research grants were all accepted. Similarly, all the suggested strategies for improving them were accepted. Recommendations were made based on the findings such as more awareness creation on importance of open access repositories; re-training of lecturers and provision of adequate ICT infrastructures that will improve the utilization of open access repositories by lecturers which could enhance the global visibility of academic publications from the Nigerian Universities.

Random Access Method for the IEEE 802.16 Networks (IEEE 802.16 망을 위한 랜덤 액세스 기법)

  • Kim, Myeong-Hwan;Kook, Kwang-Ho;Lee, Kang-Won;Kim, Young-Il
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.11-19
    • /
    • 2008
  • To enhance the performance of the IEEE 802.16 broadband wireless access system, it is necessary to improve the efficiency of the radio link. The efficiency of the uplink can be improved by using more efficient random access method. As new random access methods, we propose a RA_NBRM method which is based on the number of bandwidth request messages and a RA_CRA method which is based on the conflict resolution algorithm. The simulation results show that the performance of the new methods is superior to that of the existing binary exponential backoff method.

  • PDF

Performance Relation Analysis of CLR, Buffer Capacity and Delay Time in the ATM Access Node (ATM 접속노드에서 셀 손실율과 버퍼용량 및 지연시간의 상관관계 분석)

  • 이하철;이병섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.945-950
    • /
    • 2002
  • In this paper the performance evaluations on Asynchronous Transfer Mode(ATM) access node are performed in the ATM access network which consists of access node and channel. The performance factors of access node are Cell Loss Ratio(CLR), buffer capacity and delay time. Both the ATM cell-scale queueing model and burst-scale queueing model are considered as the traffic model of access node for various traffic types such as Constant Bit Rate(CBR), Variable Bit Rate(VBR) and random traffic in the ATM access networks. Based on these situations, the relation of CLR, buffer capacity and delay time is analyzed in the ATM access node.