• Title/Summary/Keyword: 분석네트워크 프로세스

Search Result 249, Processing Time 0.027 seconds

Analysis of the APS protocol for BSHR/2 networks (BSHR/2 네트워크를 위한 APS 프로토콜 분석)

  • 김성선;손희영;이상순
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.2
    • /
    • pp.108-115
    • /
    • 2001
  • SDH-based SHR networks are the reconfiguration process in case of failure and APS protocol used. In this study, addresses the maximum allowed recovery time in two fiber bidirectional networks. We analyse the APS protocol and derive the Processing time domains of each n order to cope with the maximum reconfiguration time of 50㎳, as specified in the ITU-T standard. We finally analyze the interleaved failures. One is the signal degrade then the signal failure, the other is the signal failure then the signal failure. Any case analysis is carried out. reconfiguration time can be guaranteed.

정보기술에 의한 HPR 과 병원 경영 환경변화의 기대효과

  • 사재학
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1998.03a
    • /
    • pp.191-197
    • /
    • 1998
  • IMF 체제와 의료시장 개방 체제속에서 경쟁우위와 합리적인 경영환경을 구축하기 위해서는 의료업계에서도 불합리한 구조적 개선과 다변화하는 고객서비스 개선을 위해 병원 조직의 효과성 또는 경영 합리화를 위해 구조조정이 불가피하다. 변화의 대응전략 하나로정보기술(Information Technology)에 의한 HPR(Hospital Process ReEngineering) 방법론을 적용시켜 조직의 리스트럭처링(Restructuring)과 프로세스 리엔지니어링(Process ReEngineering)개선으로 인한 경영환경 변화요인을 분석함으로써 기대되는 학습조직, 유연조직, 가상조직, 네트워크 조직, 인간존중조직의 구성효과와 서비스의 질적 향상, 조직의 재구성, 업무의 재분배,인적자원의 적재적소 배치, 사무환경개선, 업무처리과정이 표준와, 경영환경 개선의 기대효과와 정보기술은 단순한 프로세스의 개선, 효율화가 아니라 새로운 환경에 적합한 최적의 경영도구로 병원의 목적 달성에 간접적이 아닌 직접적인 도움을 주는 성공요인으로 평가하였다.

Social Network Approach for Sharing Knowledge: How Can the Structure and Characteristics of Social Networks Support for Sharing Knowledge? (지식 공유에 대한 소셜 네트워크 접근법 : 어떻게 소셜 네트워크의 구조와 특징이 지식 공유를 지원하는가?)

  • Lee, Jeong-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.2
    • /
    • pp.61-74
    • /
    • 2010
  • The knowledge sharing in a knowledge management process is much affecting generation and distribution of knowledge. Especially, the knowledge distribution is being revitalized with the center of social media service like twitter and library service 2.0 in the knowledge-based IT (Information Technology) environment. The present research analyzed the structure and characteristics of a social network inside an organization that is growing like an organism through self-organization through tools for SNA (Social Network Analysis) and multiple regression analysis of independent variables such as 1) a relationship between social network's structure and knowledge sharing, 2) a relationship between structural holes and knowledge sharing influence of centrality, 3) a relationship between individual ability and knowledge sharing of information technology and work recognition.

Research on BGP dataset analysis and CyCOP visualization methods (BGP 데이터셋 분석 및 CyCOP 가시화 방안 연구)

  • Jae-yeong Jeong;Kook-jin Kim;Han-sol Park;Ji-soo Jang;Dong-il Shin;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.177-188
    • /
    • 2024
  • As technology evolves, Internet usage continues to grow, resulting in a geometric increase in network traffic and communication volumes. The network path selection process, which is one of the core elements of the Internet, is becoming more complex and advanced as a result, and it is important to effectively manage and analyze it, and there is a need for a representation and visualization method that can be intuitively understood. To this end, this study designs a framework that analyzes network data using BGP, a network path selection method, and applies it to the cyber common operating picture for situational awareness. After that, we analyze the visualization elements required to visualize the information and conduct an experiment to implement a simple visualization. Based on the data collected and preprocessed in the experiment, the visualization screens implemented help commanders or security personnel to effectively understand the network situation and take command and control.

Data Rate Condition for Quantizer Achieving Practical Stability (실용적 안정성을 보장하는 양자화기 데이터 율 조건)

  • Yang, Janghoon
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.3
    • /
    • pp.228-232
    • /
    • 2018
  • Dealing with quntization error in a control system properly becomes much more important as many devices are connected through network and controlled. Thus, in this paper, we study a data rate condition on quantizer to achieve practical stability in a discrete time linear time invariant system with state feedback control. First, required data rate is shown to depend on eigenvalue of the closed loop system, the size of the initial state vector, the magnitude of initial quantization error, and control gain in the absence of process noise. It additionally depends on the maximum magnitude of process noise when noise is not zero. Asymptotic analysis shows that a new design method may be needed to reduce the date rate for a networked control in the presence of quantization error and noise.. We provide a simple numerical evaluation of uniform quantizer and logarithmic qunatizer to assess their characteristics of practical stability depending on data rate in the presence of noise.

A study on prioritizing the application areas for business development of IoT(Internet of Things) (사물 인터넷의 사업화 영역에 대한 우선순위 선정에 관한 연구)

  • Moon, Tae Hee;Kim, Taehoon;Ahn, Hyunchul
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.183-195
    • /
    • 2014
  • This study aims at identifying and prioritizing the application areas for business development of IoT(Internet of Things). In specific, we collected the opinions of the experts on IoT in Korea through the survey based on pairwise comparison, and then we analyzed them using AHP(analytic hierarchy process). As a result, we found that 'Public Safety & Security', 'Automotive & Transportation', and 'Utility & Energy' are the most promising area in realizing IoT-related businesses. Also, we found that the experts had different views according to the positions of their industry in IoT value chain. The analysis showed that the device industry prioritizes 'Public Safety & Security', whereas the network industry does 'Automotive & Transportation'. The experts from the service industry were found to regard 'Utility and Energy' as the most promising commercialization area of IoT.

Consideration factors in implementing blockchain technology-based DID platform using ANP methodology - From a two-sided market perspective - (ANP 방법론을 이용한 블록체인 기술 기반 DID 플랫폼 구현 시 고려요소 - 양면시장 관점에서-)

  • Choi, Seungho;Youn, Daemyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.4
    • /
    • pp.127-136
    • /
    • 2022
  • As technological development continues, platforms with more diverse structures are emerging. Existing research predicts that a new structure based on technology and innovation will affect the two-sided market. This study evaluated the decentralized identifier (DID) platform, a new platform based on blockchain technology, of the importance of this platform from the perspective of the two-sided market. Using the Analytic Network Process, IT, platform, and blockchain experts conducted a dual comparison survey. Data with a consistency ratio value of 0.1 or less were selected and analyzed for 12 data. The research results showed the importance of service quality, policy support, openness, and uncertainty. This study is expected to be used to support the development of strategic decision-making for blockchain and DID platform-based business companies.

The research regarding an information system risk management process modeling (정보시스템 위험관리 프로세스 모델링에 관한 연구)

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.157-164
    • /
    • 2006
  • From the hazard which it prepares in the hazards increase which it follows in information demand augmentation of information technical development and the consumer from inside systematizing integrity and solubility of information technological resources. inside against a confidentiality. The control against information and a system and a data outside is demanded. From the dissertation which it sees demand function and the structure which do information technical risk management system development it will be able to manage the danger which it infiltrates with the root which is various overview in hazard necessity it investigated the inside and outside of the country instance in the center and it analyzed. And it plans the dangerous civil official integrated process model ultimately as against a hazards it will be able to prepare in the dictionary in order, it put the place objective which it induces.

  • PDF

VPN-swIPe

  • 천광철
    • Review of KIISC
    • /
    • v.9 no.4
    • /
    • pp.11-18
    • /
    • 1999
  • VPN 또는 침입차단시스템 간 비밀 통신의 기본구조로 사용되는 IP 네트워크 보안 (IPnetwork-layer security)프로토콜인 swIPe 프로토콜에 대하여 설명한다. 우선 swIPe 프 로토콜에 대하여 분석하고 침입차단시스템에서 이를 실제로 적용하는 방법에 대하여 서술한 다. swIPe 프로토콜에서는 swIPe 개요, 개념적 구조 swIPe를 이용한 통신 절차, 패킷의 포 맷 encryption과 decryption 프로세스등을 서술하며 실제 적용에서는 Host-to -Host 터널링 침입차단시스템간 비닐통신 절차 swIPe driver에 대하여 설명한다.

  • PDF

전자상거래 보완을 관한 연구

  • 한국희
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.45-45
    • /
    • 1997
  • 최근 국내외에서 활발히 추진되고 있는 전자상거래는 비즈니스의 모든 프로세스를 전자화하고 디지털 통신망에 접속을 자동화하는 정보화 혁명으로써, 전자상거래의 보편화되면서 신용카드번호, 비밀번호 등 대금결제를 위한 중요한 개인 정보가 네트워크에 노출될 수밖에 없고 해커들의 공격 유형도 다양해 질 것으로 보인다. 본 논문에서는 전자상거래의 체계의 특징, 지불 시스템, 인증 시스템의 종류, 개인정보 위협요소들의 분석을 통해 전자상거래 최적환경을 만들기 위한 전자상거래 보안 시스템을 설계하였다.