• Title/Summary/Keyword: Entity-based

Search Result 761, Processing Time 0.027 seconds

Improving the Disaster Management Service in the Demander-Centered Approach (수요자 관점에서 접근한 재난관리서비스의 개선 방안)

  • Yoo, Hyun-Jung;Lee, Jae-Eun;Rho, Jin-Chul;Kim, Gyum-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.224-236
    • /
    • 2008
  • To enhance the quality of disaster management service, the paradigm shift is necessary from the supplier-centered approach to demander-centered approach. In this paper, demander means all the policy actors that participate in the field of disaster such as central & local governments, emergency rescue systems, civil volunteer groups as well as the disaster victims. In this study, we analyze the current problems of disaster management service in demanders' point of view through in-depth interviews and then address suggestions based on each entity's recognitions and understandings related. The results are as follows: 1) Lack of systemicity in the current disaster management service. 2) The mutual distrust and understanding among the policy actors participating in the disaster site. 3) In the field of disaster, not only the disaster victims but also people related to entities are deprived of a stable living due to a long period of rescue activities. Furthermore, the conflicts derived from allocations of the aid fund can bring about the collapse of local community involved in disaster. 4) The life of the disaster victims that have been damaged mentally and financially is earnestly necessary to be conveniently served by disaster management service.

A Study on Preference of Pavement Materials for Children's outing Playground in Apartment Complex - With Focus on Jeonju City - (아파트내 어린이 놀이터 포장재의 선호도에 관한 연구 - 전주시를 중심으로 -)

  • Jeong, Soo-Gyoung;Park, Yool-Jin
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.15 no.4
    • /
    • pp.97-109
    • /
    • 2012
  • In this study this writer carried out survey and analysis on paving materials of children's playground for 40 apartment buildings with each of such apartment containing 100 households or more and which were built within last 15 years in Jeonju. As a result of analysis of such questionnaires this author could draw following conclusion. In the second half of 1990s pavement materials which were used mainly were sand and during first half of 2000s they were mixture of sand and rubber block and around 2010 they were rubber block or rubber chip pavements. Such change seemed to be a result of consideration of convenience for management and safety rather than in deference to diversity of children's outing places. Survey on the current status of pavement materials revealed need for directives by the main entity for management and their firm resolve for its implementation. And there was need for their coping with problems such as pressure of treading or lack of it or poor condition of drainage in case of sand and phenomena of pitting or dipping down, discoloring and poor drainage in case of rubber chips and rubber blocks and loosening of gaps between rubber blocks etc. Result of analysing status of usage disclosed that 50.4% of the respondents to questionnaires stated that they had experience of accidents. With regard to cause of such accident it was found that 47.5% of accidents were attributable to play facilities and 19.5% were due to paving (floor) materials thus it was disclosed that not only play facilities but also pavement materials had impact on safety for the children. Result of analysing level of satisfaction with pavement materials showed that pavement by rubber chips and blocks had higher level of satisfaction which was reflection of fear on cleanness of sand. In terms of preference rubber chip and rubber block pavements were highest and the next one was sand. Reason for such preference was based on concern with safety.

The Design and Implementation of a Security Management Server for Pre-Distributed Key Exchange Method and Lightweight Key Distribution Protocol for Mobile Ad-hoc Node (이동 Ad-hoc 노드용 사전 키 분배 기법 및 경량 키 분배 프로토콜을 위한 보안관리 서버 시스템 설계 및 구현)

  • Yang, Jong-Won;Seo, Chang-Ho;Lee, Tae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.1-8
    • /
    • 2007
  • The Mobile Ad-hoc network does environmental information which an individual collects in nodes which are many as the kernel of the USN technology based on the radio communication. And it is the latest network description delivering critical data to the destination location desiring through a multi-hop. Recently, the Ad-hoc network relative technique development and service are activated. But the security function implementation including an authentication and encoding about the transmitted packets, and etc, is wirelessly the insufficient situation on the Ad-hoc network. This paper provides the security service of key exchange, key management. entity authentication, data enciphering, and etc on the Mobile Ad-hoc network. It implements with the Ad-hoc network security management server system design which processes the security protocol specialized in the Ad-hoc network and which it manages.

  • PDF

A Palynological Study of the Korean Oldenlandia L. (Rubiaceae) (한국산 백운풀속(꼭두서니과)의 화분학적 연구)

  • Nam, Bo Mi;Chung, Gyu Young
    • Korean Journal of Plant Taxonomy
    • /
    • v.41 no.2
    • /
    • pp.108-112
    • /
    • 2011
  • The pollen of 5 taxa on Korean Oldenlandia L. was investigated by LM and SEM. The pollen grains were monads, $20.7-36.0{\mu}$m in polar length, with an equatorial diameter of $21.0-38.4{\mu}m$. The pollen shapes were oblate-spheroidal or spherical (P/E ratio 0.93-1.00). The apertures numbered 3-7 in number, colporate in shape, with a colpus length of $4.2-20.4{\mu}m$ and a colpus width of $2.6-3.4{\mu}m$. The sexine was $0.9-2.4{\mu}m$ in terms of its thickness, the surface pattern was reticulate, scabrate or neither. Based on these results, the size of the pollen grain, the number of apertures, and the surface pattern of the sexine were all useful for an interspecific classification. The genus Neanotis, established via the pollen characteristics, was thought to be reviewed in its entity regarding the continuous variation of generic characteristics.

An Object Oriented Spatial Data Model Based on Geometric attributes and the Role of Spatial Relationships in Geo-objects and Geo-fields (지리-객체와 지리-필드에서 기하 속성과 공간관계 역할에 기반한 객체 지향 공간 데이터 모델)

  • Lee, Hong-Ro
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.516-572
    • /
    • 2001
  • Geographic Information System(CIS) deal with data which can potentially be useful for a wide range of applications. The information needed by each application can be vary, specially in resolution, detail level, application view, and representation style, as defined in the modeling phase of the geographic database design. To be able to deal with such diverse needs, GIS must offer features that allow multiple representation for each geographic entity of phenomenon. This paper addresses on the problem of formal definition of the objects and their relationships on the geographical information systems. The geographical data is divided into two main classes : geo-objects and geo-fields, which describe discrete and continuous representations of spatial reality. I studied the attributes and the relationship roles over geo-object and nongeo-object. Therefore, this paper contributed on the efficient design of geographical class hierarchy schema by means of formalizing attribute-domains of classes.

  • PDF

A Study on the Net Centric Entity Interoperability Layer (NCEI레이어 모델에 관한연구)

  • Son, Hyun-Sik;Lee, Tae-Gong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.269-277
    • /
    • 2012
  • The future battlefield environment has changed platform centric warfare into a network centric warfare. The NCO is a operational concept to improve combat power through information sharing, shared situational awareness, decision making and synchronized action based on powerful network grid. In addition, these operational environment is composed of physical, information, cognitive and social domains. The platform environment system is associated with the OSI 7 layer. However, OSI 7 layer is limited to express NCW environment including cognitive and social domains. Therefore, we requires a new model for expressing cognitive and social domains. After we developed a new model, this model applied to the NCW architecture taxonomy.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

A Study on the Development of a Construction Field Management Model based on BIM (BIM기반 건설현장 관리모델 개발에 관한 연구)

  • Jun, Young-Woong;Lee, Myoung-Sik
    • Journal of the Korea Institute of Building Construction
    • /
    • v.10 no.1
    • /
    • pp.127-135
    • /
    • 2010
  • As the amount of construction information used in the growing construction field increases, the importance of efficient construction field management has been growing. Accordingly, this study aims to identifythe application situation and possibility of BIM through theoretical examinations and domestic & overseas case studies of BIM, and attempts to suggest an approach to the formulation of an efficient construction field management model through the implementation of phase-oriented and cooperation entity-oriented analysis in the construction field. In the future, the conclusions of this study should be used to formulate an actual construction field management model and apply it in the field.

A Location Recognition and Notification Method of Attacker in Wireless Network Environment (모바일 환경에서의 공격자 위치 특정 및 알람 기법)

  • Bong, Jin-Sook;Park, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.15 no.7
    • /
    • pp.201-211
    • /
    • 2017
  • Wireless network using dynamic IP and mobile IP technology provides the user with convenience of access and movement. However, this causes the attacker who disguises normal user(pretending to be a regular user) to have more opportunity in regard to access and acquisition of information. This paper help the network administrator and the service provider quickly to recognize the attacker's intention to access network and service. Therefore network administrator and service provider can specify and respond the location of the attacker appropriately. To achieve above, we define an entity (W_L_M) that manages user information of WiFi and LTE network, and propose messages and procedures for attacker's location identification and alarm. The performance evaluation of this paper is based on qualitative analysis. By using the proposed method, some cost (message creation, processing and transmission) occurred but it was analyzed to be less than the total network operation cost. The proposal of this paper is a management method that utilizes existing network information and structure. This method can be used as a reference material to enhance security.

A Study on the Database Integration Methodology using XML (XML을 이용한 데이터베이스 통합방안에 관한 연구)

  • OH Se-Woong;Lee Hong-Girl;Lee Chul-Young;Park Jong-Min;Suh Sang-Hyung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.353-360
    • /
    • 2005
  • Database Integration problems has been recognized as a critical issue for effective logistics service in logistics environment. However, researches related to effective methodology for this have been studied theoretically in the DB schema integration, are insufficient in the side of the system realization. The aim of this paper is to present a schema integration technique to integrate DB using XML(eXtensible Markup Language) in the part of practical DB integration, a quantitative methodology for the identification of conflict that is a representative problem on database integration. To achieve this aim, we extracted the entity name and attribute name from DB schema and suggested a quantitative methodology to easily fine name conflict that frequently give raise to a trouble when schema integration, based on the level of semantic similarity between attributes and entities.

  • PDF