• Title/Summary/Keyword: Sharing Space

Search Result 443, Processing Time 0.029 seconds

Characterization of Uniform/Hybrid Complemented Group Cellular Automata with Rules 195/153/51 (전이규칙 195,153,51을 갖는 Uniform/Hybrid 여원 그룹 셀룰라 오토마타의 특성화)

  • Hwang, Yoon-Hee;Cho, Sung-Jin;Choi, Un-Sook;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.315-318
    • /
    • 2005
  • Recently, the advent of wireless communication and other handhold devices like Personal Digital Assistants and smart cards have made in implementation of cryptosystems a major issue. One important aspect of modern day ciphers is the scope for hardware sharing between the encryption and decryption algorithm. The cellular Automata which have been proposed as an alternative to linear feedback shift registers(LFSRs) can be programmed to perform the operations without using any dedicated hardware. But to generalize and analyze CA is not easy. In this paper, we characterizes uniform/hybird complemented group CA with rules 195/153/51 that divide the entire state space into smaller spaces of maximal equal lengths. This properties can be useful in constructing key agreement algorithm.

  • PDF

Dynamic Data Path Prediction use Extend EKF Movement Tracing in Net-VE (Net-VE에서 이동궤적을 이용한 동적데이터 경로예측)

  • Song, Sun-Hee;Oh, Haeng-Soo;Park, Kwang-Chae;Kim, Gwang-Jun;Ra, Sang-Dong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.81-89
    • /
    • 2008
  • Improved EKF suggests variable path prediction to reduce the event traffic caused by the information sharing among multi-users in networked virtual environment. The three dimensional virtual space is maintained consistently by endless status information exchange among dispersed users, and periodic status transmission brings traffic overhead in network. By using the error between the measured movement trace of dynamic information and the EKF predicted, we propose the method applied to predict the mobile packet of dynamic data which is simultaneously changing. And, the simulation results of DIS dead reckoning algorithms and EKF path prediction is compared here. It followed the specific path and while moving, the proposed method which it proposes predicting with DIS dead reckoning algorithm and to compare to the mobile path of the actual object and it got near it predicts the possibility of knowing it was.

  • PDF

The Characteristics of Foreign and Domestic C.Z.M Cases (국내외 연안구역관리(C.Z.M)의 특성 비교)

  • Oh, Ji-Hoon;Lee, Seok-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2693-2701
    • /
    • 2010
  • Coastal Zone is a integrated space including both coastal waters and inland. C.Z.M is a strategic practice system which can integrate and coordinate the coastal zone for preserving and making use of coastal resources. Through foreign and domestic C.Z.M Cases, this study analyzes the operating mechanism in the three aspects: role sharing among the administrative agencies, mediation and cooperation among the interested parties, and inducements of voluntary participation. And it achieves the common characteristics of C.Z.M: building the assessment system for establishing desirable policy directions, the stable support system for sustainable coastal management, the mediation system for cooperation of stakeholder, and the education system for reinforcing the management ability and inducing the voluntary participation. Finally it suggests the implications to build the coastal zone management system properly on the basis of common values in this mechanism.

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

Supporting Group Workspaces Based on WebDAV (웹데브 기반의 그룹 작업공간 지원)

  • Kim Dong-Ho;Shin Won-Joon;Park Jin-Ho;Lee Myung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.521-532
    • /
    • 2006
  • WebDAV is an IETF standard protocol which support asynchronous collaborative authoring on the Web. The recently published WebDAV Access Control Protocol provides various methods of controlling the resources on a WebDAV server and their properties, helping high-level group activities to be performed through the WebDAV server. Based on the WebDAV access control protocol, we developed Group Workspaces which support exchanging and/or sharing data among the group members. Any member of a Group Workspace can create and share resources among the members. Also, any member can add, change or delete the resources. To support the Group Workspaces, we developed a client application named GroupExplorer, which solely supports Group Workspaces. We constructed the server for Group Workspaces using Jakarta Slide - a WebDAV server supporting the WebDAV Access Control Protocol.

Effects Analysis of Electronic Journal Subscription on Special Library Operation : A Case Study in KIST (전자 학술지가 전문도서관 운영에 미치는 영향 분석 : KIST 사례를 중심으로)

  • Kang, Dae-Shin;Shin, Yong-Su;Shin, Mal-Suk;Yoon, Hyea-Jeong
    • Journal of Information Management
    • /
    • v.34 no.3
    • /
    • pp.69-85
    • /
    • 2003
  • This case study analyzed how electronic journal subscription had an effect on special library management including budget, information behavior, library operations, facilities, space et al. in KIST. This study suggests the followings; 1) Since electronic journals has an effect on overall operations of special libraries, draw big pictures not by functions. 2) Though the most method for subscription is consortium, it is necessary to build cooperation network for information sharing and vary cost architecture of information use. 3) Through job analysis, redesign jobs. 4) Reconstruct stacks and facilities. 5) It is necessary paradigm shift that it is more important to use than preserve materials in the special libraries.

Analysis and Suggestions of Digital Heritage Policy

  • Lee, Jongwook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.71-78
    • /
    • 2019
  • In this paper, we divided domestic and foreign digital cultural activation policies into four types. We also described projects of each policy and analyzed the limitations of the policy. Finally, we suggested solutions to overcome these limitations. Changes in daily life caused by the recent development of 5G network technology, augmented reality, and virtual reality technology have brought many changes in the way of preservation and utilization of cultural heritage. In particular, digital technology is used for digitization of cultural heritage, storing, and managing digital data, digitally restoring cultural heritage, and enabling time, space, multi-sensory experiences. For this purpose, new policies was required to utilize this. This study divides domestic and international digital heritage policies into digital infrastructure construction, sharing and communication platform construction, public relations, and demonstration contents production support policies. This study is meaningful in classifying the fields of digital heritage policy and introducing digital heritage policy trends. It is also meaningful to suggest ways to improve digital heritage policies through analysis of domestic and foreign cases.

A Repository Utilization System to optimize maintenance of IIoT-based main point Utilities (IIoT 기반한 핵심유틸리티의 유지보수 최적화를 위한 공동 활용 시스템)

  • Lee, Byung-Ok;Lee, Kun-Woo;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.89-94
    • /
    • 2021
  • Recently, manufacturing companies are introducing many intelligent production processes that apply IIoT/ICT to improve competitiveness, and a system that maintains availability, improves productivity, and optimizes management costs is needed as a preventive measure using environmental data generated from air ejectors. Therefore, in this study, a dedicated control board was developed and LoRa communication module was applied to remotely control it to collect and manage information about compressors from cloud servers and to ensure that all operators and administrators utilize common data in real time. This dramatically reduced M/S steps, increased system operational availability, and reduced local server operational burden. It dramatically reduced maintenance latency by sharing system failure conditions and dramatically improved cost and space problems by providing real-time status detection through wired and mobile utilization by maintenance personnel.

A Comparative Study of Mongolian and Korean Traditional Medicine (몽골과 한국 전통의학의 비교 연구)

  • Purevjav, Oyanga-Bileg;Ha, Won-Bae;Geum, Ji-Hye;Lee, Jung-Han
    • Journal of Korean Medicine Rehabilitation
    • /
    • v.31 no.4
    • /
    • pp.87-103
    • /
    • 2021
  • Objectives The purpose of this study was to investigate the development process and describe the diagnosis methods, theories and treatments of Mongolian traditional medicine and Korean traditional medicine through literature records and prior studies. Methods Literature records and previous studies on traditional medicine of both countries were collected through various sites in Mongolia (Esan, Mongoliajol, Kok, Yumpu, Scribd, Science and Technology Foundation [STF]) and Korea (Koreanstudies Information Service System [KISS], Korea Institute of Science and Technology Information [KISTI], National Digital Science Library [NDSL], Research Information Sharing Service [RISS], Oriental Medicine Advanced Searching Integrated System [OASIS]). Also the English database was searched through PubMed. In the case of Mongolian traditional medicine, medical books published in Mongolia were mainly referenced and used for research. Results Studying the development process, basic concepts and the system of diagnosis and treatment of the two traditional medicine, several commonalities and differences were revealed. Conclusions This study showed that the scope of diagnosis methods between Mongolian and Korean traditional medicine were slightly different, and that the medical terminology for the diagnosis method had slightly different contents from each other. Although there were many similarities in treatments of Mongolian and Korean traditional medicine, the Chuna therapy is found in Korean traditional medicine only. The basic theories constituting traditional medicine were the same, but the five-element theory used by the two countries differs in the following two factors. Mongolia uses elements of air and space as the theory of five elements, while Korea uses elements of wood and iron.

Crystal Structure and Magnetic Properties of Sodium-Iron Phosphates NaFe0.9Mn0.1PO4 Cathode Material

  • Seo, Jae Yeon;Choi, Hyunkyung;Kim, Chul Sung;Lee, Young Bae
    • Journal of the Korean Physical Society
    • /
    • v.73 no.12
    • /
    • pp.1863-1866
    • /
    • 2018
  • The sodium-iron phosphate maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ was synthesized using the ball mill method. The crystal structure and magnetic properties of the prepared materials were studied using X-ray diffraction (XRD), vibrating sample magnetometer (VSM), and $M{\ddot{o}}ssbauer$ spectroscopy. Structural refinement of maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ was analyzed using the FullProf program. From the XRD patterns, the crystal structure of maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ was found to be orthorhombic with the space group Pmnb. The lattice parameters of maricite-$NaFe_{0.9}Mn_{0.1}PO_4$ are as follows: $a_0=6.866{\AA}$, $b_0=8.988{\AA}$, $c_0=5.047{\AA}$, and $V=311.544{\AA}^3$. Maricite-$NaFePO_4$ has an edge-sharing structure that consists of $FeO_6$ octahedral. Under an applied field of 100 Oe, the temperature dependences of zero-field-cooled (ZFC) and field-cooled (FC) curves were measured from 4.2 to 295 K. $M{\ddot{o}}ssbauer$ spectra were also recorded at various temperatures ranging from 4.2 to 295 K. We thus confirmed that the $N{\acute{e}}el$ temperature of $NaFe_{0.9}Mn_{0.1}PO_4$ ($T_N=14K$) was lower than that of maricite-$NaFePO_4$ ($T_N=15K$).