• Title/Summary/Keyword: restrict information

Search Result 205, Processing Time 0.023 seconds

지역사회를 위한 정보봉사에 관한 일연구-대학도서관을 중심으로

  • 김남석
    • Journal of Korean Library and Information Science Society
    • /
    • v.1
    • /
    • pp.17-30
    • /
    • 1974
  • As a society rapidly advances in technology and industry, various demands for information arc increasing and becoming more specialized than every before. The college library can no longer restrict its service to the people or, the campus alone. There is no fundamental change in its place on a college campus, but it has an additional role to play: to meet the demands for information from the community outside of the campus. Thyre is no denying that there are public libraries meant to serve the comnlunity and some small spacialized libraries to support certain institutions. But it is also well known that these libraries are inadequate to satisfy the demands for information in a highly diversified and specialized soceity of today largely due to lack of facilities, funds. and personnel. Under these circdmstances, it is almost imperative that the college library open its door to the community. It was attempted in the article to point out the nccds of cooperation between the college library and the community for economic and intellectual advancement on thc campus and in the community. Various ways of making the college library available to the community werc also discussed.

  • PDF

The Research about Aerial photographing system(PKNU No.2) development

  • Kim, Ho-Yong;Choi, Chul-Uong;Lee, Eun-Khung;Jun, Sung-Woo
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.110-112
    • /
    • 2003
  • The researchers, who seek geological and environmental information, depend on the remote sensing and aerial photographic datum from various commercial satellites and aircraft. However, the adverse weather conditions and the expensive equipment can restrict that the researcher can collect their data anywhere and any time. To allow for better flexibility, we have developed a compact, a multispectral automatic Aerial photographic system. This system's Multi-spectral camera can catch the visible (RGB) and infrared (NIR) bands (3032${\ast}$2008 pixel) image. Our system consists of a thermal infrared camera and automatic balance control, and it managed and controlled by a palm-top computer. And it includes a camera gimbals system, GPS receiver, weather sensor and etc. As a result, we have successfully tested its ability to acquire aerial photography, weather data, as well as GPS data, making it a very flexible tool for environmental data monitoring.

  • PDF

Evaluation Method of College English Education Effect Based on Improved Decision Tree Algorithm

  • Dou, Fang
    • Journal of Information Processing Systems
    • /
    • v.18 no.4
    • /
    • pp.500-509
    • /
    • 2022
  • With the rapid development of educational informatization, teaching methods become diversified characteristics, but a large number of information data restrict the evaluation on teaching subject and object in terms of the effect of English education. Therefore, this study adopts the concept of incremental learning and eigenvalue interval algorithm to improve the weighted decision tree, and builds an English education effect evaluation model based on association rules. According to the results, the average accuracy of information classification of the improved decision tree algorithm is 96.18%, the classification error rate can be as low as 0.02%, and the anti-fitting performance is good. The classification error rate between the improved decision tree algorithm and the original decision tree does not exceed 1%. The proposed educational evaluation method can effectively provide early warning of academic situation analysis, and improve the teachers' professional skills in an accelerated manner and perfect the education system.

Security Design of Information Security for Wireless Local Area Network (무선 네트워크망의 정보보호를 위한 시스템 설계)

  • Kim, Jung-Tae;Jung, Sung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.729-732
    • /
    • 2003
  • Security and privacy issues complicate wireless local area network deployment. for a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This paper describes security issues related to wireless local area networks and presents a software approach for restricting and controlling wireless access. The system authenticates users on the basis of identity, privileges and access hardware by distributed software agents that implement security policy and restrict unauthorized access.

  • PDF

A study on edition statement of the oriental traditional books (고서의 판사항에 관한 연구)

  • 박재혁
    • Journal of Korean Library and Information Science Society
    • /
    • v.22
    • /
    • pp.327-349
    • /
    • 1995
  • In comparing with the role, scope, and description method of edition statement between monograph and old traditional books, There are some problems solving as follows : 1) Kind of issue offering information on variant imprint must be distinguished from edition merely identifying the newest thing among same materials in the edition area of old traditional books. 2) because of a rule that edition statement follow title statement according to ISBD, could not make a most of the characteristics of old traditional books. As a result of a n.0, pplication MARC format for solving above the problems, the followings have been identified. 1) Subfield in the 245tag can be made a distinction between kind of issue and edition with when describing edition statement of old traditional books. 2) As defining newly the Fixed-Length Data Elements of Marc format, not only basic index terms, such as author, title, etc., but also edition statement on variant kind of issue will be able to provide with restrict index terms.

  • PDF

Pseudo-symmetrically Dispersion-Managed Optical Transmission Links with Midway OPC for Compensating for Distorted WDM Signals

  • Lee, Seong-Real
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.4
    • /
    • pp.228-234
    • /
    • 2015
  • The system performance improvement in dispersion managed (DM) links combined with optical phase conjugator (OPC) for compensating for optical signal distortion due to group velocity dispersion and nonlinear fiber effects has been reported. However, in DM link combined OPC, the equalities of the lengths of single-mode fibers (SMFs), the length of dispersion compensating fibers (DCFs), the dispersion coefficient of DCF, and the residual dispersion per span (RDPS) with respect to an OPC restrict a flexible link configuration. Thus, in this paper, we propose a flexible optical link configuration with inequalities of link parameters, the so-called "pseudo-symmetric configuration." Simulation results show that, in the restricted RDPS range of 450 ps/nm to 800 ps/nm, the improvement in the system performance of the proposed pseudo-symmetrically configured optical links is better than that of the asymmetrically configured optical links. Consequently, we confirmed that the proposed pseudo-symmetric configuration is effective and useful for implementing a reconfigurable long-haul wavelength-division multiplexing (WDM) network.

A Fair Drop-tail Bandwidth Allocation Algorithm for High-speed Routers (고속 라우터를 위한 Drop-tail방식의 공정한 대역할당 알고리즘)

  • 이원일;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6A
    • /
    • pp.910-917
    • /
    • 2000
  • Because the random early detection(RED) algorithm deals all flows with the same best-effort traffic characteristic, it can not correctly control the output link bandwidth for the flows with different traffic characteristics. To remedy this problem, several per-flow algorithms have been proposed. In this paper, we propose a new per-flow type Fair Droptail algorithm which can fairly allocate bandwidth among flows over a shared output link. By evenly allocating buffers per flow, the Fair Droptail can restrict a flow not to use more bandwidth than others. In addition, it can be simply implemented even if it employs the per-flow state mechanism, because the Fair Droptail only keeps each information of flow in active state.

  • PDF

Enablers of the Adoption of Mobile Banking: From Economic-Psychological-Social Perspectives

  • YunJi Moon
    • Asia pacific journal of information systems
    • /
    • v.30 no.1
    • /
    • pp.72-93
    • /
    • 2020
  • With the proliferation of smart devices, mobile banking has become increasingly important. Customers can manage their banking needs without desktop computers or a face-to-face meeting with bank tellers. However, contrary to expectation of wide-spread use of mobile banking, several factors restrict its adoption. The purpose of this study is to explore what factors affect positively or negatively the adoption of mobile banking from economic (operational competence, convenience, mental accounting), psychological (hope, self-efficacy, optimism, resiliency) and social perspectives (normative social pressure, embarrassment avoidance). This paper suggests that three enablers would consequently affect a customer's perceived utilitarian and hedonic value in mobile banking, followed by trust and intention to use. In testing the hypothesized research model, survey and analysis of a structural equation model using Amos are conducted. The findings emphasize that banks need to focus on perceived utilitarian and hedonic values when considering economic, psychological and social enablers most salient to customers in order to promote greater adoption of mobile banking services.

Dynamic Web Information Predictive System Using Ensemble Support Vector Machine (앙상블 SVM을 이용한 동적 웹 정보 예측 시스템)

  • Park, Chang-Hee;Yoon, Kyung-Bae
    • The KIPS Transactions:PartB
    • /
    • v.11B no.4
    • /
    • pp.465-470
    • /
    • 2004
  • Web Information Predictive Systems have the restriction such as they need users profiles and visible feedback information for obtaining the necessary information. For overcoming this restrict, this study designed and implemented Dynamic Web Information Predictive System using Ensemble Support Vector Machine to be able to predict the web information and provide the relevant information every user needs most by click stream data and user feedback information, which have some clues based on the data. The result of performance test using Dynamic Web Information Predictive System using Ensemble Support Vector Machine against the existing Web Information Predictive System has preyed that this study s method is an excellence solution.

The Features of Restricted Access to Information at European and East Asian Libraries

  • Makhotina, Natalya;Pshenichnaya, Evgeniya
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.31-41
    • /
    • 2021
  • The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens' access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country's defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.