• Title/Summary/Keyword: 서비스 요구사항 분석

Search Result 1,011, Processing Time 0.034 seconds

A Study on the Lightweight Cryptographic Algorithms for Remote Control and Monitoring Service based on Internet of Things (사물인터넷 기반 원격 제어 및 모니터링 서비스를 위한 경량 암호화 알고리즘 연구)

  • Jeong, Jongmun;Bajracharya, Larsson;Hwang, Mintae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.437-445
    • /
    • 2018
  • Devices have a lot of small breakdowns rather than big breakdowns. But it often wastes time and increases cost of maintenance, such as calling a service technician for small breakdowns. So, if we use remote control and monitoring service using Internet of Things, we can minimize the time period and cost for the maintenance. However, security is important because remote control and monitoring services contain personal information which when leaked, may be dangerous. There are many types of Internet based monitoring devices that are in use, but it is difficult to expect a high level of security because there are many cases in which the performance is minimal. Therefore, in this paper, we classify remote control and monitoring services based on Internet of Things type and derive encryption requirement for four types. We also compared and analyzed the lightweight cryptographic algorithms that can be expected to use high performance even on the Internet of Things. And it is derived that LED is used as a equipment management type, DESLX as a environment management type, CLEFIA as a healthcare management type and LEA as a security management type are the optimal lightweight cryptographic algorithms for each type.

Demand survey of spectrum information and a study on plan for disclosing spectrum information to the public (전파정보 수요조사와 개방 방안 연구)

  • Lim, Chang-Yong;Shin, Seung-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.253-259
    • /
    • 2017
  • As ICT industrial paradigm changes and wireless communication services evolve, demands on spectrum information are soaring. We conducted demand survey of experts and public in general on spectrum information and prioritized what we should disclose. And we looked into overseas cases and analyzed their policy, the current status, exceptions for opening spectrum information. In this paper, we suggested a direction on how to make spectrum information public in Korea. Also, we made a proposal to establish management system and legislation for opening spectrum information.

A Study on Standardization Activities of Internet with ATM (Internet과 ATM의 통합 표준화 동향 분석)

  • 이계상
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.1
    • /
    • pp.101-108
    • /
    • 1998
  • Recently, growing Internet traffic have come to mandate the speed-up of Internet links. Also, emerging real-time services generally require QoS (Quality of Service) guarantees in networks. ATM is considered to be the most promising subnetwork technology to meet these requirements efficiently. In this paper, we first analyze recent protocol standardization activities in IETF and ATM Forum for integrating Internet with ATM. This includes brief reviews of protocols such as IETF's IP/ATM, NHRP, RSVP and IS/ATM, as well as ATM Forum's LAN Emulation and MPOA. We then identify two types of integration methodologies, and suggest a classification of the integration. Our work might be helpful to outlook better the future direction of standardization in this field.

  • PDF

A Study on Development and Operation of Demand Response System (수요응답시스템 개발 및 운영 방안 연구)

  • Yu, In-Hyeob;Yang, Il-Kwon;Kim, Sun-Ic;Ko, Jong-Min;Jung, Nam-Jun;Oh, Do-Eun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.11a
    • /
    • pp.613-616
    • /
    • 2006
  • 본 연구에서는 신 수요관리 기법인 DR(Demand Response)시스템의 개발 및 운영현황을 알아 보았다. 특히 DR 시스템의 구성 방안과 각 모듈들의 설계시 검토 및 요구 사항을 분석하였다. 그리고 공급자와 수요자를 잇는 네트워크는 국가전력 IT과제에서 Portal의 개념을 도입하여 CP(Consumer Portal) 및 DP(Device Portal)에 의한 채널의 표준화를 시도하고 있다. DR의 개념은 수요관리와 가격 응답으로 공급자의 관리 기능과 가격 또는 인센티브 등이 제공되는 수요자가 참여하는 서비스의 양면을 가지고 있다. 이와 같은 시스템이 개발될 경우에는 전력사와 소비자 사이의 양방향 통신 채널이 형성되고 따라서 실시간 수요의 측정이 가능해진다. 또한 이를 토대로 DR 시스템을 사전 검토 및 계획상의 문제점을 분석하여 한국형 DR 시스템의 개발에 대한 기반을 조성하고자 하였다.

  • PDF

Performance Analysis of Population-Based Bandwidth Reservation Scheme with Various Request Reservation Ratios (요청 예약 비율에 따른 Population-Based Bandwidth Reservation 구조의 성능 분석)

  • Kwon, Se-Dong;Han, Man-Yoo;Park, Hyun-Min
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.385-398
    • /
    • 2002
  • To accommodate the increasing number of mobile terminals in the limited radio spectrum, wireless systems have been designed as micro/picocellular architectures for a higher capacity. This reduced coverage area of a cell has caused a higher rate of hand-off events, and the hand-off technology for efficient process becomes a necessity to provide a stable service. Population-based Bandwidth Reservation(PBR) Scheme is proposed to provide prioritized handling for hand-off calls by dynamically adjusting the amount of reserved bandwidth of a cell according to the amount of cellular traffic in its neighboring cells. We analyze the performance of the PBR scheme according to the changes of a fractional parameter, f, which is the ratio of request reservation to the total amount of bandwidth units required for hand-off calls that will occur for the next period. The vague of this parameter, f should be determined based on QoS(Quality of Service) requirement. To meet the requirement the value of Parameter(f) must be able to be adjusted dynamically according to the changing traffic conditions. The best value of f can be determined by a function of the average speed of mobile stations, average call duration, cell size, and so on. This paper considers the average call duration and the cell size according to the speed of mobile stations. Although some difference exists as per speed, in the range of 0.4 $\leq$ f $\leq$ 0.6, Blocking Probability, Dropping Probability and Utilization show the best values.

An Examination of Core Competencies for Data Librarians (데이터사서의 핵심 역량 분석 연구)

  • Park, Hyoungjoo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.301-319
    • /
    • 2022
  • In recent decades, research became more data-intensive in the fast-paced information environment. Researchers are facing new challenges in managing their research data due to the increasing volume of data-driven research and the policies of major funding agencies. Information professionals have begun to offer various data support services such as training, instruction, data curation, data management planning and data visualization. However, the emerging field of data librarians, including specific roles and competencies, has not been clearly established even though librarians are taking on new roles in data services. Therefore, there is a need to identify a set of competencies for data librarians in this growing field. The purpose of this study is to consider varying core competencies for data librarians. This exploratory study examines 95 online recruiting advertisements regarding data librarians posted between 2017 and 2021. This study finds core competencies for data librarians that include skills in technology, communication and interpersonal relationships, training/consulting, service, library management, metadata knowledge and knowledge of data curation. Specific core technology skills include knowledge of statistical software and computer programming. This study contributes to an understanding of core competencies for data librarians to help future information professionals prepare their competencies as data librarians and the instructors who develop and revise curriculum and course materials.

An Analysis of a Structure and Implementation of Error-Detection Tool of Cryptography API-Next Generation(CNG) in Microsoft (마이크로소프트의 차세대 암호 라이브러리 구조에 관한 연구 및 오류-검출 도구 구현)

  • Lee, Kyungroul;You, Ilsun;Yim, Kangbin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.153-168
    • /
    • 2016
  • This paper introduces a structure, features and programming techniques for the CNG(Cryptography API: Next Generation), which is the substitution of the CAPI(Cryptography API) from Microsoft. The CNG allows to optimize a scope of functions and features because it is comprised of independent modules based on plug-in structure. Therefore, the CNG is competitive on development costs and agility to extend. In addition, the CNG supports various functions for the newest cryptographic algorithm, audit, kernel-mode programming with agility and possible to contribute for core cryptography services in a new environment. Therefore, based on these advantageous functions, we analyze the structure of CNG to extend it for the enterprise and the public office. In addition, we implement an error-detection tool for program which utilizes CNG library.

A Technique of Deriving Concrete Object Model for C++ Programming (C++ 프로그래밍을 위한 구체적 객체 모델의 작성법)

  • Kim, Tae-Gyun;Im, Chae-Deok;Song, Yeong-Gi;In, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.731-746
    • /
    • 1997
  • The usage of object models for the development of software has been frowung due to the prevalence of the ob-ject oriented paradigm.The object moedels produced as results of requirments analysis and design activities are vety veneficial to the implementation phase.It is even possible for source code to be genrated automatically if object models are concrete enough.Therefore system analyzers and desingners should make an dffort to refine theabstrace ogject model defined at.an early stage in order to achieve a more conrete object model.In general,re-fining an abstrace object model into a concrete model depends too much on the desigver's infromal experience.In this paper,we persent the refinement techniques required for concreting an abstract object model bassed on OMT(Object Modeling Technique)'s notation,We will discuss the definition of the abstraction level of an object model and the transformational rules of refinement.These transformational rules are currently applied to the design of a software tool,named Process Modeler,which is a major component of the software development process modeling system for ICS(Information Communication Service). Finally we can achieve a concrete object model which can easily be translated into C++ source code.

  • PDF

User-oriented Information System: Focusing on STEM Field (이용자 중심 정보시스템: STEM 분야 중심으로)

  • Park, Minsoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.249-253
    • /
    • 2020
  • In order to effectively provide science, technology, engineering, and medicine (STEM) information, an analysis of information users' needs and understanding of information usage behavior must be preceded. Rapid changes and developments in information and communication technologies and the environment have greatly influenced the user's information usage environment. Based on the changes and characteristics of users' information use and their information needs analysis, active design and improvement of scientific and technical information service system is needed. For this study, a total of 816 participants participated: 204 people in four main contents (papers, reports, trends, and patents) through significant allocation extraction for STEM information users. A survey was conducted to grasp the status of the use of science and technology information using quantitative methods through online surveys for users of each content (papers, reports, trends, patents). Based on the analysis results, the implications for the improvement of STEM field information system were drawn.

Performance Analysis of Tradeoff between Energy Consumption and Activation Delay in UMTS State Transition Mechanism (UMTS 상태 천이 방식에서 에너지 소비와 활성 지연간의 트레이드오프 성능 분석)

  • Choi, Hyun-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1085-1092
    • /
    • 2012
  • Mobile communication systems define user state transition mechanisms in order to manage radio resources and battery power efficiently. In the state transition mechanism, a state with a higher energy consumption inherently offers a shorter access delay, so there is a tradeoff between the energy and delay performances. In this paper, we analyze the user state transition mechanism of UMTS by considering the bursty traffic attributes of mobile applications. We perform a numerical evaluation for both the energy consumption and the activation delay by Markov modeling of the state transition mechanism, and investigate their tradeoff relationship as functions of operational parameters. The resulting energy-delay tradeoff curves clearly show an achievable performance bound of the user state transition mechanism and also offer an optimal operation strategy to minimize the energy consumption while guaranteeing the delay requirement.