• Title/Summary/Keyword: permission

Search Result 735, Processing Time 0.026 seconds

Building Mongolian ULIIMS(Ulaanbaatar Land Information Integration Management System) (몽골 울란바타르시 토지정보 통합관리시스템 개발)

  • Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.3
    • /
    • pp.164-179
    • /
    • 2013
  • Ulaanbaatar city, the capital of Mongolia and the center of Mongolian economy, increasingly needs to have a long-term urban planning and a system to impose a tax on land effectively as insufficient development of land and the moving of nomad into urban areas increases during its rapid growth. Therefore, Mongolian government has to prepare a land management system which provides the infrastructure to improve work efficiency and service quality by integrating digitalized data about land and main facilities and sharing data between related departments. This research analyzed the environment to operate the existing land management system and working environment and redesigned database. Furthermore, it integrated all the existing systems, configured service network, and made working environment for land registration, land permission, land payment management to be processed online. With this, it provides the foundation to improve quality of people's life through the preparation of long term urban planning, clean tax administration of real estate, and reconsideration of efficiency about urban infrastructure investment.

Performance Analysis of CDMA Reservation ALOHA for Multi-traffic Services (다중 트랙픽 지원을 위한 CDMA 예약 ALOHA 방안의 성능 분석)

  • Jo, Chun Geun;Heo, Gyeong Mu;Lee, Yeon U;Cha, Gyun Hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.1852-1861
    • /
    • 1999
  • In this paper, CDMA Reservation ALOHA scheme which can reduce multiple access interference and packet collision is proposed to support multi-traffic such as voice and random data with and without priority. In this scheme, the time slot is divided into two stage, access and transmission stage. Only packets with spreading codes assigned from base station in access stage can transmit their packets in transmission stage, so MAI can be reduced. To reduce packer collision in access stage, the code reservation and access permission probability are used. Code reservation is allowed for voice traffic and continuous traffic with priority using piggyback and access permission probability based on the estimation of the number of contending users in the steady-state is adaptively applied to each traffic terminal. Also, we analyzed and simulated the numerical performances required for each traffic using Markov chain modeling in a single cell environment.

  • PDF

The Development of the Wind Speed Measurement System using Deacon Equation Algorithm (Deacon 방정식 알고리즘을 적용한 풍속 측정 장치 개발)

  • Kim, Sang-Man;Moon, Chae-Joo;Jeong, Moon-Seon;Park, Byeong-Ju;Lee, Kyung-Sung;Park, Ji-Ye
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2011.04a
    • /
    • pp.213-216
    • /
    • 2011
  • The feasibility study must be conducted for construction of complex for generation of electric power such as items to get permission and grid connection etc. including wind resource to construct a complex for wind power generation. Since wind power can be used by converting only around 20~40% of energy coming in that kinetic energy of wind passes through blades and driving device into electric energy, when constructing a complex, the survey of wind resource takes up the most important part. Data logger used to measure this wind energy are expressed by calculating generally electromotive that is created from a sensor, variable-type, pulse-type signal to be proper for the actual value, and most data loggers have a type without considering geographical features. Besides, in the case of Met mast that is installed to survey the wind resource, since it is installed lower than the hub height of a wind power generator due to permission matters and the economic factors, the height of wind speed by utilizing Deacon equation is compensated to revise this. In this study, a device measuring wind speed was made by using algorithm that is possible to compensate the height of wind speed according to regional features and by applying Deacon equation, and the function of data storage through SD card or RS232 communication was added as well. Besides it's possible to check data more easily with a type of graph by using LCD touch screen for the convenience of users.

  • PDF

Children's Relational and Overt Aggression in relation to their Negative Emotionality, Emotional Regulation, and Maternal Parenting Behaviors (유아의 관계적 및 외현적 공격성에 대한 부정적 정서성, 정서조절, 어머니양육행동의 영향)

  • Kwon, Yeon-Hee
    • Korean Journal of Human Ecology
    • /
    • v.20 no.5
    • /
    • pp.927-940
    • /
    • 2011
  • This study examined the effects of children's negative emotionality, emotional regulation, and maternal parenting behaviors on their relational and overt aggression. The participants were 355 children(174 boys, 181 girls; aged 4-5 years old) and their mothers. The teachers completed rating scales to measure the children's aggression and emotion regulation. The children's negative emotionality and maternal parenting behaviors were assessed by a mother reported questionnaire. The collected data was analyzed using descriptive statistics, t-tests, correlations, and hierarchical multiple regressions. Results showed that Children's negative emotionality was positively related to their relational and overt aggression. Children's emotional regulation had a negative relation to their relational and overt aggression. Mother's limit-setting and rejection-neglect was significantly related to children's relational aggression, whereas mother's warmth-encouragement and rejection-neglect was negatively related to children's overt aggression. Hierarchical regression analysis indicated that the interaction of children's negative emotionality and mother's overprotection-permission predicted children's overt aggression. Children's negative emotionality, whose mothers demonstrated middle and high level of overprotection-permission, was associated significantly with overt aggression. In addition, the association between mother's parenting behaviors and children's aggressions were mediated by their emotion regulation. The findings point to similarities and differences between relational and overt aggression in relation to children's negative emotionality, emotional regulation and maternal parenting behaviors.

Analysis of Adjacent Channel Interference for WCDMA ATC Service Frequency Allocation Operating in MSS Band (MSS 대역 WCDMA ATC 서비스 주파수 할당을 위한 인접 채널 간섭 분석)

  • Kang, Young-Heung;Jeong, Nam-Ho;Oh, Dae-Sub
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.11
    • /
    • pp.1288-1296
    • /
    • 2012
  • A candidate hybrid satellite and terrestrial network architecture, MSS/ATC(Mobile Satellite Service/Ancillary Terrestrial Component), is proposed for utilizing efficiently the exist MSS bands. Studies on the adjacent channel interference from the existing terrestrial mobile services and MSS/ATC itself are important to allocate a new ATC service frequency in MSS band. In this paper, we have analyzed the minimum permission power of terrestrial base station and the capacity loss with parameters of ACIR, number of MS(mobile Station) and MES(Mobile Earth Station) in uplink, and also, the capacity performance based on 1 beam and 1 cell assumption for MSS/ATC in downlink. The ACIR requirements are estimated in two MSS/ATC frequency allocation scenarios for 5 MHz and 10 MHz guard band to share spectrum with adjacent systems, and according to these ACIR requirements the service coverage and the receiver filter for ATC system should be designed in near future.

Methodology for Intercepting the Ransomware Attacks Using File I/O Intervals (파일 I/O Interval을 이용한 랜섬웨어 공격 차단 방법론)

  • Youn, Jung-moo;Jo, Je-geong;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.645-653
    • /
    • 2016
  • Ransomware was first created in 1999, but its existence become widely known in Korean by 2015. As information and communication technology have developed, the storage capacity of computer has enlarged, it accordingly is getting more important to effectively manage these information, rather than the information itself. In such situation, the ransomware break into other people's computer and encrypt an files without a user's permission. So, it adversely affect the user. In this paper, we monitor an access of a specific process to the file. And on the basis of this monitoring information, we detect whether the abnormal approach happened. Through the detection result, we block the permission about access to the file for a specific process. Using this method, we propose a blocking technique for the ransomeware's abnormal approach and encryption to the files.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment (IPTV 서비스를 이용하는 사용자의 효율적인 성인인증 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.68-75
    • /
    • 2013
  • Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.

A Criminal Abortion and Protected in the Right to Life (낙태죄와 생명보호)

  • Jung, Hyo-Sung
    • The Korean Society of Law and Medicine
    • /
    • v.10 no.1
    • /
    • pp.323-361
    • /
    • 2009
  • In Korea, Abortion in the Criminal Law is an illegal act in exception of on which abortion may be carried out through the grounds are very limited and related such a emergency situation of women's physical health, rape, incest and genetic diseases. The Criminal Law regulates the mother's act of abortion and the doctor's surgical performance of abortion. The Mother and the Child Health Law prescribes the medical, ethical, and genetic grounds for the legal permission of abortion. Many people tend to abuse of abortion even though they are fully aware of its illegality. The law lead to be inconsistent with its enforcement. In this paper, I would like to suggest some proposals about the legal analysis of the Abortion Regulations th reform the existing regulation and increase th effectiveness of the regulations. Recently, in a case of the a maternity hospital where a midwife left alone a diabetes pregnancy women who had a baby, and the overweight baby(5.2Kg) died in the uterus due to hypoxic states. Supreme Court of Korea 2007.6.29. 2005do3832) had given a verdict of "not guilty". It looked like there were very fair with current crime law. But, we want this case to be investigated if there weren't any logical contradictions as well as concurrent translation within Constitution Law. Now the Mother and the Child Health Law prescribes the medical, ethical, and genetic grounds for the legal permission of abortion. But this law does not include social and economic grounds.

  • PDF

Modeling and Selecting Optimal Features for Machine Learning Based Detections of Android Malwares (머신러닝 기반 안드로이드 모바일 악성 앱의 최적 특징점 선정 및 모델링 방안 제안)

  • Lee, Kye Woong;Oh, Seung Taek;Yoon, Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.11
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose three approaches to modeling Android malware. The first method involves human security experts for meticulously selecting feature sets. With the second approach, we choose 300 features with the highest importance among the top 99% features in terms of occurrence rate. The third approach is to combine multiple models and identify malware through weighted voting. In addition, we applied a novel method of eliminating permission information which used to be regarded as a critical factor for distinguishing malware. With our carefully generated feature sets and the weighted voting by the ensemble algorithm, we were able to reach the highest malware detection accuracy of 97.8%. We also verified that discarding the permission information lead to the improvement in terms of false positive and false negative rates.