• Title/Summary/Keyword: description fields

Search Result 150, Processing Time 0.026 seconds

A Study on Considerations in the Authority Control to Accommodate LRM Nomen (LRM 노멘을 수용하기 위한 전거제어시 고려사항에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.109-128
    • /
    • 2021
  • This paper is to explore considerations in authority control to accommodate LRM nomen entities through the literature reviews, the analysis of RDA rules, and the opinion survey of domestic catalog experts. As a result, for authority control, considerations were proposed in the aspect of nomen's attribute elements, catalog description, and MARC authority format. First, it is necessary to describe in as much detail as possible the category, the scheme, intended audience, the context of use, the reference source, the language, the script, the script conversion as the attributes of the nomen with the status of identification, note, and indifferentiated name indicators added in RDA. Second, the description method of attribute elements and relational elements of nomen can be unstructured, structured, identifier, and IRI as suggested in RDA, and vocabulary encoding scheme (VES) and string encoding scheme (SES) should be written for structured description, Also, cataloging rules for structuring authorized access points and preferred names/title should be established. Third, an additional expansion plan based on Maxwell's expansion (draft) was proposed in order to prepare the MARC 21 authority format to reflect the LRM nomen. (1) The attribute must be described in 4XX and 5XX so that the attribute can be entered for each nomen, and the attributes of the nomen to be described in 1XX, 5XX and 4XX are presented separately. (2) In order to describe the nomen category, language, script, script conversion, context of use, and date of usage as a nomen attribute, field and subfield in MARC 21 must be added. Accordingly, it was proposed to expand the subfield of 368, 381, and 377, and to add fields to describe the context of use and date of usage. The considerations in authority control for the LRM nomen proposed in this paper will be the basis for establishing an authority control plan that reflects LRM in Korea.

Flow-induced pressure fluctuations of a moderate Reynolds number jet interacting with a tangential flat plate

  • Marco, Alessandro Di;Mancinelli, Matteo;Camussi, Roberto
    • Advances in aircraft and spacecraft science
    • /
    • v.3 no.3
    • /
    • pp.243-257
    • /
    • 2016
  • The increase of air traffic volume has brought an increasing amount of issues related to carbon and NOx emissions and noise pollution. Aircraft manufacturers are concentrating their efforts to develop technologies to increase aircraft efficiency and consequently to reduce pollutant discharge and noise emission. Ultra High By-Pass Ratio engine concepts provide reduction of fuel consumption and noise emission thanks to a decrease of the jet velocity exhausting from the engine nozzles. In order to keep same thrust, mass flow and therefore section of fan/nacelle diameter should be increased to compensate velocity reduction. Such feature will lead to close-coupled architectures for engine installation under the wing. A strong jet-wing interaction resulting in a change of turbulent mixing in the aeroacoustic field as well as noise enhancement due to reflection phenomena are therefore expected. On the other hand, pressure fluctuations on the wing as well as on the fuselage represent the forcing loads, which stress panels causing vibrations. Some of these vibrations are re-emitted in the aeroacoustic field as vibration noise, some of them are transmitted in the cockpit as interior noise. In the present work, the interaction between a jet and wing or fuselage is reproduced by a flat surface tangential to an incompressible jet at different radial distances from the nozzle axis. The change in the aerodynamic field due to the presence of the rigid plate was studied by hot wire anemometric measurements, which provided a characterization of mean and fluctuating velocity fields in the jet plume. Pressure fluctuations acting on the flat plate were studied by cavity-mounted microphones which provided point-wise measurements in stream-wise and spanwise directions. Statistical description of velocity and wall pressure fields are determined in terms of Fourier-domain quantities. Scaling laws for pressure auto-spectra and coherence functions are also presented.

IoT Security and Machine Learning

  • Almalki, Sarah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.103-114
    • /
    • 2022
  • The Internet of Things (IoT) is one of the fastest technologies that are used in various applications and fields. The concept of IoT will not only be limited to the fields of scientific and technical life but will also gradually spread to become an essential part of our daily life and routine. Before, IoT was a complex term unknown to many, but soon it will become something common. IoT is a natural and indispensable routine in which smart devices and sensors are connected wirelessly or wired over the Internet to exchange and process data. With all the benefits and advantages offered by the IoT, it does not face many security and privacy challenges because the current traditional security protocols are not suitable for IoT technologies. In this paper, we presented a comprehensive survey of the latest studies from 2018 to 2021 related to the security of the IoT and the use of machine learning (ML) and deep learning and their applications in addressing security and privacy in the IoT. A description was initially presented, followed by a comprehensive overview of the IoT and its applications and the basic important safety requirements of confidentiality, integrity, and availability and its application in the IoT. Then we reviewed the attacks and challenges facing the IoT. We also focused on ML and its applications in addressing the security problem on the IoT.

The Enhancement of intrusion detection reliability using Explainable Artificial Intelligence(XAI) (설명 가능한 인공지능(XAI)을 활용한 침입탐지 신뢰성 강화 방안)

  • Jung Il Ok;Choi Woo Bin;Kim Su Chul
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.101-110
    • /
    • 2022
  • As the cases of using artificial intelligence in various fields increase, attempts to solve various issues through artificial intelligence in the intrusion detection field are also increasing. However, the black box basis, which cannot explain or trace the reasons for the predicted results through machine learning, presents difficulties for security professionals who must use it. To solve this problem, research on explainable AI(XAI), which helps interpret and understand decisions in machine learning, is increasing in various fields. Therefore, in this paper, we propose an explanatory AI to enhance the reliability of machine learning-based intrusion detection prediction results. First, the intrusion detection model is implemented through XGBoost, and the description of the model is implemented using SHAP. And it provides reliability for security experts to make decisions by comparing and analyzing the existing feature importance and the results using SHAP. For this experiment, PKDD2007 dataset was used, and the association between existing feature importance and SHAP Value was analyzed, and it was verified that SHAP-based explainable AI was valid to give security experts the reliability of the prediction results of intrusion detection models.

Style Control of Structured Documents using DSSSL

  • Lee, Kyong-Ho;Lee, Jin-Ho;Choy, Yoon-Chul
    • Proceedings of the Korea Database Society Conference
    • /
    • 1997.10a
    • /
    • pp.455-462
    • /
    • 1997
  • SGML(Standard Generalized Markup Language) is the ISO standard fer describing the logical structure of documents and is also adopted as the CALS standard for document description. Since then, there have been growing interests in SGML application in a variety of fields. However because SGML doesn't provide a standard method for describing various processing informations, ie, formatting and transformation, most applications have applied methods that are system dependent. Recently, ISO defined DSSSL(Document Style Semantics and Specification Language) as a standard mechanism to specify the formatting, transformation and retrieval of structured documents. Therefore, in this paper, we present a DSSSL processing system far style control of structured documents such as SGML documents. The system processes DSSSL style sheet that describes layout of documents and browses the result of its application to a SGML document. We have conducted tests on a lot of SGML documents and DSSSL style sheets successfully. Now, we are developing the SGML document management system that supports creation, editing, storage and retrieval of SGML document based upon the DSSSL processor and the SGML parser which we have developed.

  • PDF

Aeroelastic stability analysis of a bridge deck with added vanes using a discrete vortex method

  • Taylor, I.;Vezza, M.
    • Wind and Structures
    • /
    • v.5 no.2_3_4
    • /
    • pp.277-290
    • /
    • 2002
  • A two dimensional discrete vortex method (DIVEX) has been developed at the Department of Aerospace Engineering, University of Glasgow, to predict unsteady and incompressible flow fields around closed bodies. The basis of the method is the discretisation of the vorticity field, rather than the velocity field, into a series of vortex particles that are free to move in the flow field that the particles collectively induce. This paper gives a brief description of the numerical implementation of DIVEX and presents the results of calculations on a recent suspension bridge deck section. The results from both the static and flutter analysis of the main deck in isolation are in good agreement with experimental data. A brief study of the effect of flow control vanes on the aeroelastic stability of the bridge is also presented and the results confirm previous analytical and experimental studies. The aeroelastic study is carried out firstly using aerodynamic derivatives extracted from the DIVEX simulations. These results are then assessed further by presenting results from full time-dependent aeroelastic solutions for the original deck and one of the vane cases. In general, the results show good qualitative and quantitative agreement with results from experimental data and demonstrate that DIVEX is a useful design tool in the field of wind engineering.

A study on the description of bibliographic records on the Internet Resources (인터넷 자원의 서지레코드 기술에 관한 연구)

  • Lee Myoung-Gyu
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.1
    • /
    • pp.219-241
    • /
    • 1999
  • For an efficient access to Internet resources, these resources need to be organized systematically for accessibility. and their cataloging technique has been developing. Consequently, after I compared and analyzed OCLC manual applying AACR2 techniques and procedures, with Dublin core metadata used for cataloging Internet resources, I examined their mapping into MARC format. Dublin core metadata elements should be transformed to MARC format fields. In methodology of integration into different types of the metadata, an update of MARC format and its new field should be provided. Especially, Internet resources cataloging experts familiar with these technology will be really wanted nowadays.

  • PDF

Development of Evaluation System for Defense Informatization Level

  • Sim, Seungbae;Lee, Sangho
    • Journal of Multimedia Information System
    • /
    • v.6 no.4
    • /
    • pp.271-282
    • /
    • 2019
  • There is a description that you cannot manage what you do not measure. The Korea Ministry of National Defense (MND) is conducting evaluations in various fields to obtain meaningful effects from IT investments, and views that the evaluation of the defense informatization sector is divided into defense informatization policy evaluation and defense informatization project evaluation. The defense informatization level evaluation can measure the informatization level of MND and the armed forces or organizations. Since the evaluation system being studied to measure the level of defense informatization is composed mainly of qualitative metrics, it is necessary to reconstruct it based on quantitative metrics that can guarantee objectivity. In addition, for managing the level of change by evaluation objects, the evaluation system should be designed with a focus on homeostasis of metrics so that it can be measured periodically. Moreover, metrics need to be promoted in terms of performance against targets. To this end, this study proposes to measure the level of defense informatization by dividing it into defense information network, computer systems, interoperability and standardization, information security, information environment, and information system use, and suggests their metrics.

Nonbinary Convolutional Codes and Modified M-FSK Detectors for Power-Line Communications Channel

  • Ouahada, Khmaies
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.270-279
    • /
    • 2014
  • The Viterbi decoding algorithm, which provides maximum - likelihood decoding, is currently considered the most widely used technique for the decoding of codes having a state description, including the class of linear error-correcting convolutional codes. Two classes of nonbinary convolutional codes are presented. Distance preserving mapping convolutional codes and M-ary convolutional codes are designed, respectively, from the distance-preserving mappings technique and the implementation of the conventional convolutional codes in Galois fields of order higher than two. We also investigated the performance of these codes when combined with a multiple frequency-shift keying (M-FSK) modulation scheme to correct narrowband interference (NBI) in power-line communications channel. Themodification of certain detectors of the M-FSK demodulator to refine the selection and the detection at the decoder is also presented. M-FSK detectors used in our simulations are discussed, and their chosen values are justified. Interesting and promising obtained results have shown a very strong link between the designed codes and the selected detector for M-FSK modulation. An important improvement in gain for certain values of the modified detectors was also observed. The paper also shows that the newly designed codes outperform the conventional convolutional codes in a NBI environment.

An Image-guided Radiosurgery for the Treatment of Metastatic Bone Tumors using the CyberKnife Robotic System

  • Cho, Chul-Koo
    • The Journal of the Korean bone and joint tumor society
    • /
    • v.13 no.1
    • /
    • pp.14-21
    • /
    • 2007
  • Bone is a common site for metastatic spread from many kinds of malignancies. The morbidity associated with this metastatic spread can be significant, including severe pain. When it comes to spinal metastasis, occupying nearly 40% of skeletal metastases, the risks of complications, such as vertebral body collapse, nerve root impingement, or spinal cord compression, are also significant. Because of the necessity of preserving the integrity of the spinal column and the proximity of critical structures, surgical treatment has limitations when durable local control is desired. Radiotherapy, therefore, is often used as an adjunct treatment or as a sole treatment. A considerable limitation of standard radiotherapy is the reported recurrence rate or ineffective palliation of pain, either clinically or symptomatically. This may be due to limited radiation doses to tumor itself because of the proximity of critical structures. CyberKnife is an image-guided robotic radiosurgical system. The image guidance system includes a kilovoltage X-ray imaging source and amorphous silica detectors. The radiation delivery device is a mobile X-band linear accelerator (6 MV) mounted on a robotic arm. Highly conformal fields and hypofractionated radiotherapy schedules are increasingly being used as a means to achieve biologic dose escalation for body tumors. Therefore, we can give much higher doses to the targeted tumor volume with minimizing doses to the surrounding critical structures, resulting in more effective local control and less severe side effects, compared to conventional fractionated radiotherapy. A description of this technology and a review of clinical applications to bone metastases are detailed herein.

  • PDF