• Title/Summary/Keyword: state information

Search Result 9,808, Processing Time 0.039 seconds

A Study on the Optimal User/Librarian Interface in Information Searching (정보탐색에 있어서 이용자/사서의 최적화 접속에 관한 연구)

  • Kim Sun-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.26
    • /
    • pp.167-185
    • /
    • 1994
  • The purpose of this study is to develop the optimal user/librarian interface in information searching. In order to achive the purpose, the 150 unskilled students as subjects have participated in the study. According to the change of the subjects' psychological information states by the access points within the library system, the subjects have been classified into the five types of model: the initial information state, the accepted identification information state, the bibliographic information state, the stack information state, and the location information state. Librarian's searching support is done for 10 minutes at the each access points. To develop the optimal user/librarian interface, the expected values of the models are calculated. The resultants are as follows: 1) The expected value of the initial information states model is 18.94: 2) The expected value of the accepted identification information model is 27.06: 3) The expected value of the bibliographic information state model is 27.06: 4) The expected value of the stack information state model is 22.38: 5) The expected value of the location information state model is 22.38. Those expected values are compared with each other. The model with the lowest expected value is chosen as the optimal user/librarian interface model. In the result, the user's initial information state model of the optimal user/librarian interface in information searching is developed. In order to search the information with the most effect, user must be interfaced with the librarian at his/her own initial information state.

  • PDF

On QoS Routing and Path Establishment in the Presence of Imprecise State Information

  • Yuan, Xin;Duan, Zhenhai
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.356-367
    • /
    • 2007
  • In large networks, maintaining precise global network state information is impossible. The imprecise network state information has significant impacts on Quality-of-Service(QoS) routing and path establishment. In this paper, we develop analytical models for investigating the QoS routing schemes that are designed to tolerate imprecise network state information, and study the performance of various QoS routing schemes, including randomized routing, multi-path routing, and probability based routing, using both the models and simulations. We further propose a new mechanism, called local rerouting, that improves the effectiveness of QoS path establishment in the presence of imprecise global network state information. Local rerouting is orthogonal to existing schemes for dealing with imprecise state information and can be used in conjunction with them to alleviate the impacts of the imprecise information. The results of our performance study indicate that local rerouting is robust and effective.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

The Effect of Preparatory Information on the State Anxiety Depending on Coping Styles of Patients Undergoing Cardiac Catheterization (예비감각정보가 심도자 검사환자의 대응양상에 따라 상태불안에 미치는 영향)

  • 김조자;김기연
    • Journal of Korean Academy of Nursing
    • /
    • v.27 no.3
    • /
    • pp.648-659
    • /
    • 1997
  • The purpose of this study was to study what effect providing the patient with preparatory concrete information had on the state anxiety depending on coping styles of patients undergoing cardiac catheterization. State Anxiety scores for 32 patients who had cardiac catheterization were examined after information was provided about the test using an audio tape. The state anxiety of patients who had a high trait anxiety level was compared to that of those who had a low trait anxiety level. The state anxiety of those who had a monitor type were compared to those of patients who had blunter type. The Trait and State Anxiety Scale of Spielberger, Miller's Behavioral Style Scale, and Krantz's Health Opinion Survey and Visual Analog Scale (Ⅰ, Ⅱ) were used. Findings were as follows : 1. Among the demographic characteristics, gender difference of the patients was significantly different for the trait anxiety level. Female patients had higher trait anxiety level than male patients. 2. Analysis of state anxiety scores indicated that the mean score of the state anxiety prior to the test was higher than the mean score of the state anxiety examined after the test. The difference was statistically significant. 3. Among the patients, 14 patients (43. 7%) used monitor type, while 18 patients (56. 3%) used blunter type. The means of preference for information measured on the Krantz' subscale was 2. 45. 4. The study results indicate that the state anxiety level of those who had a low trait anxiety level was lower than that of those who had a high trait anxiety level. 5. State anxiety levels depending upon the kind of coping style which patients used during the test were not significantly different. This study did not identify the influence of preparatory concrete information on the state anxiety depending on coping styles, and there fore a quasi-experimental study using a large sample according to different types of information, and the amount of information, coping styles is recommended.

  • PDF

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

Discrete-Time Output Feedback Algorithm for State Consensus of Multi-Agent Systems (다 개체 시스템의 상태 일치를 위한 이산 시간 출력 궤환 협조 제어 알고리즘)

  • Kim, Jae-Yong;Lee, Jin-Young;Kim, Jung-Su
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.3
    • /
    • pp.625-631
    • /
    • 2011
  • This paper presents a discrete-time output feedback consensus algorithm for Multi-Agent Systems (MAS). Under the assumption that an agent is aware of the relative state information about its neighbors, a state feedback consensus algorithm is designed based on Linear Matrix Inequality (LMI) method. In general, however, it is possible to obtain its relative output information rather than the relative state information. To reconcile this problem, an Unknown Input Observer (UIO) is employed in this paper. To this end, first it is shown that the relative state information can be estimated using the UIO and the measured relative output information. Then a certainty-equivalence type output feedback consensus algorithm is proposed by combining the LMI-based state feedback consensus algorithm with the UIO. Finally, simulation results are given to illustrate that the proposed method successfully achieves the state consensus.

State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents

  • Kryshtanovych, Myroslav;Britchenko, Igor;Losonczi, Peter;Baranovska, Tetiana;Lukashevska, Ulyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.33-38
    • /
    • 2022
  • The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national security of any state. As a result of the study, key elements of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents were identified.

An Analysis of the State Library Services in the United States (미국 주 도서관 서비스의 분석)

  • Kwak, Chul-Wan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.203-218
    • /
    • 2007
  • The purpose of this study was to investigate the state library services in the United States in order to consider what services are needed for regional libraries in Korea. The data were collected from library statistics and library web pages. The analyses particularly focused on examining the residental service and library service of state libraries. The analyses revealed that the state libraries provide funds, services, and training to local libraries, but the service levels are varied among states. State libraries provide state historical information and genealogy information to residential users, and focus on the information needs for handicapped people. Based upon the analysis of U.S. state libraries, Korea regional libraries would provide services different from local public libraries. Also, regional libraries would be operated based upon the regional characteristics.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

Collaborative Inference for Deep Neural Networks in Edge Environments

  • Meizhao Liu;Yingcheng Gu;Sen Dong;Liu Wei;Kai Liu;Yuting Yan;Yu Song;Huanyu Cheng;Lei Tang;Sheng Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1749-1773
    • /
    • 2024
  • Recent advances in deep neural networks (DNNs) have greatly improved the accuracy and universality of various intelligent applications, at the expense of increasing model size and computational demand. Since the resources of end devices are often too limited to deploy a complete DNN model, offloading DNN inference tasks to cloud servers is a common approach to meet this gap. However, due to the limited bandwidth of WAN and the long distance between end devices and cloud servers, this approach may lead to significant data transmission latency. Therefore, device-edge collaborative inference has emerged as a promising paradigm to accelerate the execution of DNN inference tasks where DNN models are partitioned to be sequentially executed in both end devices and edge servers. Nevertheless, collaborative inference in heterogeneous edge environments with multiple edge servers, end devices and DNN tasks has been overlooked in previous research. To fill this gap, we investigate the optimization problem of collaborative inference in a heterogeneous system and propose a scheme CIS, i.e., collaborative inference scheme, which jointly combines DNN partition, task offloading and scheduling to reduce the average weighted inference latency. CIS decomposes the problem into three parts to achieve the optimal average weighted inference latency. In addition, we build a prototype that implements CIS and conducts extensive experiments to demonstrate the scheme's effectiveness and efficiency. Experiments show that CIS reduces 29% to 71% on the average weighted inference latency compared to the other four existing schemes.