• Title/Summary/Keyword: duty our

Search Result 175, Processing Time 0.027 seconds

A Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선센서 네트워크에서 버스티 트래픽에 적합한 MAC 프로토콜)

  • Lee, Jin-young;Kim, Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.772-778
    • /
    • 2018
  • Due to the recent advances in computing, communication and micro-electromechanical technology, Wireless Sensor Networks (WSNs) applications have been extended from military to many commercial areas such as object tracking, wire detection, and vehicular sensor networks. In some applications bursty data from many sensor nodes may be generated and the generated data from the monitoring area may be sent in a limited time to the final destination, sink node. In this paper, we present a BTF-MAC protocol adequate for WSNs applications in which bursty data packets are required to be transmitted in a limited time. The BTF-MAC is a synchronous duty-cycle MAC protocol and uses a slot-reserved and operational period extension mechanism adapted to the traffics. Our numerical analysis and simulation results show that BTF-MAC outperforms other related protocols such as DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

Relationship of Job-stress, Work-family Conflict, and Mental Health according to Life-style of Married Office Worker (기혼 직장인의 라이프스타일에 따른 직무스트레스, 직장-가정 갈등 및 정신건강 간의 관계)

  • Jeon, Hae-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.378-385
    • /
    • 2011
  • The purpose of this study was to investigate the relationship of job-stress, job-family conflict, and mental health according to lifestyles of married office worker. Data were collected by structured questionnaires form 185 married office worker by convenient sampling methods from May to August 2011. In our research outcomes, it found that job-stress was positively related to job-family conflict in the self-belief type, family-centralized type, heeding duty type and creative type. Job-family conflict was negatively related to mental health in the heeding duty type. And job-stress was positively related to metal health in the creative type and individual success pursuing type. These findings show that it is necessary to develop therapeutic psychosocial nursing intervention and to locate social-support-resources for reducing high job-stress, solving job-family conflict, and improving mental health in the married office worker.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

The Effect of Military Crisis Management Communication on a Social Network Service :Focusing on the effect of message form on the crisis perception of soldiers (SNS를 통한 군(軍)의 위기관리 커뮤니케이션 전략 :메시지 형태가 장병의 위기 인식에 미치는 영향을 중심으로)

  • Kim, Tae Woong;Yang, Jong Hoon;Lee, Sang Eun
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.102-110
    • /
    • 2019
  • The military respond well to external publics in the event of a crisis int that they are operated based on the trust of the people. Unlike other organizations, however, the Korean military has the distinctiveness that soldiers experience military life as internal publics for a certain period of time and after serving in the army, they become those who evaluate the military as external publics. Therefore, it is important to examine what would be effective crisis management strategies in terms of communicating with active-duty soldiers. Given that active-duty soldiers are accustomed to using SNS these days, this study investigated whether message forms (digital image vs. text) affect the perception of the military in crisis, acceptance of the given message, and attitude toward the military. Our empirical findings suggest that image-based messages are more likely to increase levels of message acceptance than text-based messages. Based on the results, we discussed practical implications on communication strategies for managing the military in crisis.

Curriculum development group specializing in the Department of Hu-man Resources plan (군 전문인력 양성학과 교육과정 개발 방안)

  • Kim, Young Joung
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.195-202
    • /
    • 2013
  • Defense reform our military for the globalization of information. Scientific command structure, troop structure, unit structure, step-by-step into the power structure while promoting a history of quantitative-oriented structure, and structure of the quality of state-of-the-art technology-driven transition in the middle of the bottle numberplans about the current 3.3-fold increase in reducing the cadre(officers and NCOs). NCO groups in the executive, especially expanding the current level of 100% increase in the rate of long-serving, while ensuring a stable job and to superior resources to secure a stable policy through science. Military alliance is now underway. In the midst of this group, and urged the group at the University of the leading military and specialized resources to ensure each agreement required by subjects to reflect. Thus effectively improve the quality of education and the demands of the job analysis, DACUM curriculum development methods and procedures can be applied at the time of urgent need for foster an excellent resource for the discharge of curriculum development at the University of Selected as a core job, career, and job classification configuration inside of Duty according to KST derived from the group reflect on the training courses to meet the requirements in the curriculum through the development of curriculum, job definition, job model set to propose.

Study of the Plan for Revitalizing Reemployment and Inauguration of Retired Military Person (제대군인의 재취업 및 창업 활성화 방안에 대한 연구)

  • Lee, Jae-Hee;Ha, Kyu-Soo;Kim, Hong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.1
    • /
    • pp.83-108
    • /
    • 2007
  • This study conducted research over status of employment and living by collecting questions & answers from retired soldiers after service in ROK Army more than 5 years in last 5 years. As the methodology of this research, the status of employment has been provided from the Citizen Insurance Public Corporation, and conducted interviews for all individuals in addition to the receiving of questions & answers. Also, the statistic data prepared and submitted for Congressional Audit & Inspection from MND was also utilized for the purpose of research. In conclusion, the situation faced with retired soldiers after their retirement is showing the future of reflection of oneself to the personnel in active service who must do their best only for their duty to keep national security. If those personnel in active service are worrying about their future returning to civilian society after retirement, it will not only become an impediment to perform their duty but also bring invisible weakening of military power to defend our nation in result. This is the rationale for the necessity of providing support for social adaptation, reemployment and inauguration of retired soldiers.

  • PDF

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

The Mother-role Burden and Psychological well-being in Mid-life Women (중년기 여성의 어머니역할 수행부담과 심리적 복지)

  • 진미정
    • Journal of the Korean Home Economics Association
    • /
    • v.32 no.5
    • /
    • pp.1-14
    • /
    • 1994
  • This study was to identify variables which were related with middle aged women's identification of child mother-role burden and psychological well-being and to investigate the relationships of mother-role burden and psychological well-being in mid-life. The research data were collected from 578 who were 40-59 year old women in Seoul. The major findings were as follow; (1) the level of middle age women's identification of child was very high and the level of mother-role burden was moderate. the level of psychological well-being was slightly high. (2) Mid-life women's psychological well-being was related to education level income and job. (3) Identification of child was related to educational level having job and income. And mother-role burden was influenced only by education level. (4) Middle aged women's identification of child was positively related mother-role burden. Mother-role burden was negatively related to psychological well-being in mid-life. These findings represented middle aged mother in our society had considerable burden of child but their psychological well-being was not low. Possibly it is due to the fact mothers regard their burden of child as acceptable duty.

  • PDF

A Study on the Qualities of the Security and Secretary (경호비서에게 요구되는 자질)

  • Park, Ok-cheol
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.24-37
    • /
    • 2009
  • In the political and economic circles of our society, the security and secretary is always accompanying the society leaders, like shadows. The job of the security and secretary is a very difficult one that requires comprehensive and extensive capability and talent. From results of the prior studies, qualities of the security and secretary are divided into three groups. i.e. personal qualities, mental qualities and physical qualities. Each quality can be summarized as follows. Firstly, personal qualities mean honesty, responsibility, initiative, work ethic, sense of duty, modest attitude, kindness and loyalty. Secondly, mental qualities represent agility & composure, judgement, adaptability, memory, prediction, accuracy & reliability, observation and secret. Finally, physical qualities such as health, cleanliness, decent appearance, good feeling voice, physical strength and Martial arts for Protection. The security and secretary equipped with the above three requisites can be said to be the most ideal the security and secretary whom this age want and need.

  • PDF

A Delay Efficient and Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선 센서 네트워크에서 지연과 버스티 트래픽에 적합한 MAC 프로토콜)

  • Kim, Hye Yun;Kim, Seong Cheol
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.2
    • /
    • pp.254-260
    • /
    • 2017
  • Data packets from sensor nodes scattered over measuring fields are generally forwarding to the sink node, which may be connected to the wired networks, in a wireless sensor network. So many data packets are gathered near the sink node, resulting in significant data packet collisions and severe transmission latency. In an event detection application such as object tracking and military, bursty data is generated when an event occurs. So many data packet should be transmitted in a limited time to the sink node. In this paper, we present a delay efficient and bursty traffic friendly MAC protocol called DEBF-MAC protocol for wireless sensor networks. The DEBF-MAC uses a slot-reserved mechanism and sleep period control method to send multiple data packets efficiently in an operational cycle time. Our simulation results show that DEBF-MAC outperforms DW-MAC and SR-MAC in terms of energy consumption and transmission delay.