• Title/Summary/Keyword: link integrity

Search Result 47, Processing Time 0.023 seconds

A Study on Referential Integrity Constraint on Web Page (웹 페이지에서 참조무결성 제약조건에 관한 연구)

  • 유남현;손철수;김원중
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.569-572
    • /
    • 2004
  • The Web site which many people manage and maintenance much HTML page is so difficult to solve broken link like as dangling reference and inaccurate contents reference. That is, in the case we update or delete connections structure between HTML documents, it is difficult to guarantee referential integrity of Web Pages. In this chapter, we surveyed and defined integrity constraints condition between the parent page and child page, and studied about method to express by extension UML. WWW, Constraints, UML

  • PDF

The Analysis and Implication of Link Integrity of Korean Public Institution Website from a Web Usability Perspective (웹 사용성 관점에서 공공기관 웹 사이트의 링크 유효성 분석 및 개선 과제)

  • Moon, Hyun Ju;Kim, Suk Il
    • 재활복지
    • /
    • v.17 no.4
    • /
    • pp.291-309
    • /
    • 2013
  • Web usability is utilized as a standard for constructing and managing website to be useful by people of all abilities and disabilities. Link integrity is one of main criteria for web usability evaluation. Links that are found to be broken or pointing to irrelevant information lead gradual degradation of link integrity over time. This study has conducted investigation for link integrity of Korean public institution website. Among 49 website that are accessible by an automatic link checker software, 91.8% of the website has more than one broken links. Also average number of broken links is 50.5 that is 0.33% of the number of links. 29 websites consist of internal broken links. And 22 website do not provide any information on the missing page. Broken links enlower website confidence by reducing web usability as well as they prohibit web search engine not to provide information on the website. Therefore, web developers and managers need to be aware of importance of link integrity and prohibit web usability degradation by performing link validation as a web management task or periodically.

The Design and Implementation of HTML Document Integrity Management System (HTML 문서의 무결성 유지 시스템의 설계 및 구현)

  • 조이기;이영운;황인문;양수영;김원중
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.380-383
    • /
    • 2002
  • It Is difficult to manage broken link with dangling reference, inaccurate reference m the manual site that is consist of HTML documents of much quantity as KLDP(Korean Linux Documentation Project, http:/ /kldp.org) Web site. In this paper. we define relationship and constrain renditions that exist between Web site's HTML documents. And we design and implement HIMS(HTML Document Integrity Management System), which notify user that integrity violation happens or launch trigger operation to keep integrity between HTML documents in case of insert, delete, update.

  • PDF

A Study on Data Recording and Play Method between Tactical Situations to Ensure Data Integrity with Data Link Processor Based on Multiple Data Links (다중데이터링크 기반에서 데이터링크 처리기와의 데이터 무결성 보장을 위한 전술상황전시기 간 데이터 기록 및 재생 방법 연구)

  • Lee, Hyunju;Jung, Eunmi;Lee, Sungwoo;Yeom, Jaegeol;Kim, Sangjun;Park, Jihyeon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.13-25
    • /
    • 2017
  • Recently, the high performance of tactical situation display console and tactical data links are used to integrate the operational situations in accordance with information age and NCW (Network Centric Warfare). The tendency to maximize the efficiency of task execution has been developed by sharing information and the state of the battle quickly through complex and diverse information exchange. Tactical data link is a communication system that shares the platform with core components of weapons systems and battlefield situation between the command and control systems to perform a Network Centric Warfare and provides a wide range of tactical data required for decision-making and implementation.It provides the tactical information such as tactical information such as operational information, the identification of the peer, and the target location in real time or near real time in the battlefield situation, and it is operated for the exchange of mass tactical information between the intellectuals by providing common situation recognition and cooperation with joint operations. In this study, still image management, audio file management, tactical screen recording and playback using the storage and playback, NITF (National Imagery Transmission Format) message received from the displayer integrates the tactical situation in three dimensions according to multiple data link operation to suggest ways to ensure data integrity between the data link processor during the entire operation time.

Effective Management for Retry Buffer on PCI-Express Interface (PCI-Express의 재전송 버퍼 관리 기법)

  • 장형식;현유진;성광수
    • Proceedings of the IEEK Conference
    • /
    • 2003.11b
    • /
    • pp.69-72
    • /
    • 2003
  • The PCI Express spec introduces retry buffer in Data Link Layer For data integrity. But this buffer have some restrictions as buffer's usage. So we proposed effective management for retry buffer on PCI-Express interface. Proposed buffer management give increase performance and data integrity simultaneously.

  • PDF

Weak Link Analysis of Motor Operated Gate Valves (모터 구동 게이트 밸브의 취약부 분석)

  • Bae, Yoon-Ho;Hong, Min-Ki;Lee, Kwang-Nam
    • Proceedings of the KSME Conference
    • /
    • 2001.06a
    • /
    • pp.328-332
    • /
    • 2001
  • The purpose of this paper is to address the structural integrity of the stem disc T-head connection of the motor operated valve assembly by comparing the previously developed methodology with the finite element analysis(FEA). From the experiences of the previously performed weak link analysis, the most of "weak links" when valve is opened are stem-disc T-head connections, and the bearing stress on the disc is the dominant stress. The results of FEA are compared with that of the classical approaches of the weak link analysis. The higher allowable thrust be represented by performing the elastic-plastic FEA.

  • PDF

A Web Link Architecture Based on XRI Providing Persistent Link (영속적 링크를 제공하는 XRI 기반의 웹 링크 구조)

  • Jung, Eui-Hyun;Kim, Weon;Park, Chan-Ki
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.247-253
    • /
    • 2008
  • Web 2.0 and Semantic Web technology will be merged to be a next generation Web that leads presentation-oriented Web to data-centric Web. In the next generation Web. semantic processing. Web Platform, and data fusion are most important technology factors. Resolving the Link Rot is the one of the essential technologies to enable these features. The Link Rot causes not only simple annoyances to users but also more serious problems including data integrity. loss of knowledge. breach of service. and so forth. We have suggested a new XRI-based persistent Web link architecture to cure the Link Rot that has been considered as a deep-seated Problem of the Web. The Proposed architecture is based on the XRI suggested by OASIS and it is designed to support a persistent link by using URL rewriting. Since the architecture is designed as a server-side technology, it is superior to existing research especially in Interoperability. Transparency and Adoptability. In addition to this, the architecture provides a metadata identification to be used fer context-aware link resolution.

  • PDF

Provable Security of 3GPP Integrity Algorithm f9 (3GPP 무결성 알고리즘 f9의 증명가능 안전성)

  • Hong, Do-won;Shin, Sang-Uk;Ryu, Heui-su;Chung, Kyo-Il
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.573-580
    • /
    • 2002
  • Within the security architecture of the 3GPP system there is a standardised integrity algorithm f9. The integrity algorithm f9 computes a MAC to authenticate the data integrity and data origin of signalling data over a radio access link of W-CDMA IMT-2000. f9 is a variant of the standard CBC MAC based on the block cipher KASUMI. In this paper we provide the provable security of f9 We prove that f9 is secure by giving concrete bound on an adversary's inability to forge in terms of her inability to distinguish the underlying block cipher from a pseudorandom permutation.

Link-State Routing Security Mechanism based on Double Hash Chain (이중 해쉬체인에 기반을 둔 Link-State 라우팅 보안 메커니즘)

  • 유병익;임정미;유선영;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.31-40
    • /
    • 2003
  • The current security issue for the Internet is focused on the security for user data. On the other hand, the research on the security for routing protocols is not so active, considering the importance of its role for the harmonious and accurate operation of the Internet. In this paper, we investigate the security problems of the link-state routing protocol which has been employed in the Internet, and suggest a new authentication mechanism for routing messages which complements and extends the previous ones. For this purpose, a concept of dual hash chains is newly introduced, which is provably secure, and we explain how to provide both the integrity and source authentication service for routing messages based on the session hash chains.

The Role of Mercury in the Etiology of Sperm Dysfunction in Holstein Bulls

  • Arabi, M.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.19 no.3
    • /
    • pp.335-340
    • /
    • 2006
  • A large number of toxicological substances and pharmacological and physical agents can cause reproductive intervention at the cellular and molecular level. The present study was designed to assess the effect of mercury ($HgCl_2$) at 50 to $550{\mu}M$ concentration ranges, in vitro, on the sperm membrane and DNA integrity, viability, and acrosomal status of normal bull spermatozoa. The samples were processed for sperm analyses using semen-diluting fluid (PBS, pH 7.2). We recorded a sharp increase in the lipid peroxidation/LPO rate; the highest was at $550{\mu}M$ mercury concentration, indicating a deleterious effect of mercury on the sperm membrane intactness. There was also a strong negative correlation between LPO rate and % viable spermatozoa (R = 0.987, p<0.001). Data obtained from a comet assay technique revealed that mercury is capable of inducing DNA breaks in the sperm nuclei. Interestingly, 92% of DNA breaks were double-stranded. The correlation between LPO rate and % DNA breaks was 0.984. Performing the gelatin test indicates that mercury is able to alter the integrity of acrosomal membranes showing an abnormal acrosome reaction. In this regard, a strong link was found between LPO rate and % halos (R = 0.990, p<0.001). Collectively, mercury proved to be a potent oxidant in the category of environmental factors affecting bull spermatozoa. Hence, considering the wide spread use of mercury and its compounds, these metals should be regarded with more concern.