• Title/Summary/Keyword: Equal Access

Search Result 183, Processing Time 0.025 seconds

Performance evaluation of diversity reception of underwater acoustic code division multiple access using lake experiment (저수지 실험을 통한 수중 음향 코드 분할 다중 접속 방식의 다이버시티 수신 성능 검증)

  • Seo, Bo-Min;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.1
    • /
    • pp.39-48
    • /
    • 2017
  • CDMA (Code Division Multiple Access) is promising medium access control schemes for underwater acoustic sensor networks because of its robustness against frequency-selective fading and high frequency-reuse efficiency. In this paper, we design diversity schemes of underwater CDMA transceiver for the forward and reverse links. User data are multiplexed by Walsh code and a pseudo random noise code acquisition process is added for phase error correction before decoding the user data at the receiver. Then, the diversity reception using equal gain combining and maximal ratio combining is performed in order to minimize performance degradation caused by rich multipath fading of underwater acoustic channel. We evaluated the performance of diversity transceiver through lake experiment, which was performed at Lake Kyungcheon, Mungyeong city using two transmitters and two receivers placed 460 m apart at an average depth of 40 m. The lake experiment results show that user data are recovered with error-free in both of the forward and reverse links.

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

A study on Orientation and Morphology of clasts in Rockfall Talus in the Sukam area, Bukpyoung-eup, Gangwon-do, South Korea (테일러스 역의 방향성 및 형태 분포에 대한 연구 - 강원도 정선군 북평읍 숙암리 지내 사면을 중심으로 -)

  • Kim, Seung-Hyun;Koo, Ho-Bon;Baek, Yong
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.03a
    • /
    • pp.469-474
    • /
    • 2003
  • Talus topography is that rock clasts that is weathered is accumulated dropping in steep slope to action of gravity. Rock fall talus is formed by the accumulation of rock debris falling as individual particles from a cliff. If the collapse is produced in talus slope, it will be possible the loss of manpower and country. Despite correct access about talus is required, domestic research was scientific access about talus short. The aim of the present study is to review and compare fabric data derived from rock fall talus about orientation, distribution and morphology in Sukam area. These deposits tend to have approximately equal amounts of clasts oriented parallel and perpendicular to the dip direction of the slope. And, platy-shaped clasts dominate the proximal and intermediate parts of the talus, whereas blocky-shaped clasts is more common in the distal part.

  • PDF

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Analysis of the Library Service Satisfaction of College Students with Disabilities in Korea (장애 대학생의 도서관 서비스 만족도 분석)

  • Yoon, Hee-Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.2
    • /
    • pp.5-24
    • /
    • 2013
  • Many students with disabilities at the university face difficulties in educational inequity, cultural isolation, information illiteracy, and discrimination in the broad range of campus activities. The biggest barrier is the lack or difficulty of access to knowledge and information needed for learning. Libraries, therefore, must not discriminate against students with disabilities and should ensure equal access to and use of information resources and services. This paper analyzed the satisfaction and requirements on facility and space services, direct and indirect services, total library service of students with disabilities based on the results of the survey and interview. This paper suggested ways to improve service satisfaction of students with disabilities in a university library.

The Study on the Policies far Public Library Services to Older Persons (공공 도서관의 노인 서비스 정책에 관한 연구)

  • 김선호
    • Journal of Korean Library and Information Science Society
    • /
    • v.33 no.4
    • /
    • pp.101-123
    • /
    • 2002
  • UN has decided to observe the year 1999 as the International Year of Older Persons (IYOP). Since that year, older persons should have equal access to information in order to function effectively in an information society for all. Public library should be a important access point for older persons, and above all, be a leading ole to bridge digital devide in the regional community. There are, however, few policies or guidelines for public library services to older persons in Korea. This is a time fur developing these ones at the national level. In this study, the draft for public library services to older persons is suggested.

  • PDF

A Slot Concession Scheme for Fairness Control of DQDB in Web Environment (웹 환경에서 분산-큐 이중-버스의 공정성 제어를 위한 슬롯양보 방식)

  • 김재수;김정홍;황하응
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.133-140
    • /
    • 2002
  • Distributed-queue Dual-Bus (DQDB) shows an unfair behavior in bandwidth allocation due to the nature of unidirectional bus architecture. The study on fairness control method for DQDB has been performed under specific load types such as equal Probability load. symmetric load and asymmetric load type. A client-server load type is more practical traffic pattern than specific load type in Web environments. In this paper, we propose an effective fairness control method to distribute DQDB network bandwidth fairly to all stations under Web environments. The proposed method directly calculates an access limit from the bandwidth demand pattern. Based on an access limit, it controls the allocation of bandwidth by yielding empty slots in clients to servers. And we were certain that it outperforms other mechanisms from simulation results.

  • PDF

Texture Cache with Automatical Index Splitting Based on Texture Size (텍스처의 크기에 따라 인덱스를 자동 분할하는 텍스처 캐시)

  • Kim, Jin-Woo;Park, Young-Jin;Kim, Young-Sik;Han, Tack-Don
    • Journal of Korea Game Society
    • /
    • v.8 no.2
    • /
    • pp.57-68
    • /
    • 2008
  • Texture Mapping is a technique for adding realism to an image in 3D graphics Chip. Bilinear filtering mode of this technique needs accesses of 4 texels to process one pixel. In this paper we analyzed the access pattern of texture, and proposed the high performance texture cache which can access 4 texels simultaneously. We evaluated using simulation results of 3D game(Quake 3, Unreal Tournament 2004). Simulation results show that proposed texture cache has high performance on the case where physical size is less then or equal 8KBytes.

  • PDF

Development of non-destructive testing method to evaluate the bond quality of reinforced concrete beam

  • Saleem, Muhammad;Almakhayitah, Abdulmalik Mohammed
    • Structural Engineering and Mechanics
    • /
    • v.74 no.3
    • /
    • pp.313-323
    • /
    • 2020
  • Non-destructive tests are commonly used in construction industry to access the quality and strength of concrete. However, till date there is no non-destructive testing method that can be adopted to evaluate the bond condition of reinforced concrete beams. In this regard, the presented research work details the use of ultra-sonic pulse velocity test method to evaluate the bond condition of reinforced concrete beam. A detailed experimental research was conducted by testing four identical reinforced concrete beam samples. The samples were loaded in equal increments till failure and ultra-sonic pulse velocity readings were recorded along the length of the beam element. It was observed from experimentation that as the cracks developed in the sample, the ultra-sonic wave velocity reduced for the same path length. This reduction in wave velocity was used to identify the initiation, development and propagation of internal micro-cracks along the length of reinforcement. Using the developed experimental methodology, researchers were able to identify weak spots in bond along the length of the specimen. The proposed method can be adopted by engineers to access the quality of bond for steel reinforcement in beam members. This allows engineers to carryout localized repairs thereby resulting in reduction of time, cost and labor needed for strengthening. Furthermore, the methodology to apply the proposed technique in real-world along with various challenges associated with its application have also been highlighted.