• Title/Summary/Keyword: 서비스 프레임워크

Search Result 1,454, Processing Time 0.035 seconds

A Study on the Essence and Tendency of Modern Manager (현대 경영자로서의 본질과 성향 연구)

  • Yeom, Bae-Hoon;Kim, Hyunsoo
    • Journal of Service Research and Studies
    • /
    • v.10 no.3
    • /
    • pp.23-42
    • /
    • 2020
  • This study conceptualized the essence and propensity of modern management in service age, based on philosophy, and developed items to evaluate the conceptualized content. It was carried out as a new study to deepen the study of management philosophy and management theory by the new management framework. In order to establish the philosophical foundation of the modern management, the essence of the modern management was conceptualized based on the fundamental ideas of the East and West, and then an evaluation item was developed to put the essence and propensity of the modern management into practical use through analytical and empirical methods. After analyzing the representative ideas of mankind, it was derived that the Book of Change has the qualification as a philosophical model that can derive the essence of modern management. The Book of Change explains the reasoning of the world in the structure of two opposing parties, such as Taiji or Yin and Yang, and the process of acknowledging the contradictions within each opposing party and overcoming the contradictions through change is the central idea. Because you can see. After conducting a conceptual study, through empirical research, the essence and propensity of a modern manager should be conceptualized. The concept of essence and empirical study of the modern management using the leading role was conducted in two stages. First, a qualitative study using repetitive comparative analysis (CCM), focus group interview (FGI), and text mining was conducted to derive the essential and propensity conceptualization items that modern managers should possess. In addition, a quantitative study using factor analysis to develop sample items and develop measurement items through literature review and FGI was conducted to derive the essential concept of the modern management. Finally, the essence of modern management was derived: learning, preparation, challenge, inclusion, trust, morality, and sacrifice. In the future, it is necessary to conduct empirical research on the effectiveness of the essence of modern management for global and Korean representative companies.

M2M Network Platform Using the MSRP (MSRP를 이용한 M2M 플랫폼 구조)

  • Kim, Jung-Ho;Been, Jae-Man;Kang, Seung-Chan;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.752-757
    • /
    • 2016
  • Machine to Machine (M2M) communications is communications between a business application and devices via a communication network without any direct human interaction. The aim of our research is to connect any M2M device with an M2M AS (Application server) through an IMS (IP Multimedia Subsystem) Network Core using a M2M Gateway, in order to develop an M2M Horizontal Services Platform over IMS. An IP Multimedia Subsystem (IMS) is an architectural framework defined by the wireless standards body of the 3rd Generation Partnership Project (3GPP) for delivering IP multimedia services to mobile users. This paper shows the design and implementation of a Horizontal M2M Network Services Platform over an IP Multimedia Subsystem (IMS) using the Message Session Relay Protocol (MSRP). We summarize the protocols and architectures that formed the basis for the creation of our architecture. We provide a detailed description of our architecture design, describing the call flow of the proposed architecture and the entities operating in each process. We also describe the design and implementation process detailing the different tools used, explaining the selection of each component and its importance; also how we designed and implemented the M2M gateway, M2M Application Server, Open IMS Core, business application and M2M devices.

RDFS Rule based Parallel Reasoning Scheme for Large-Scale Streaming Sensor Data (대용량 스트리밍 센서데이터 환경에서 RDFS 규칙기반 병렬추론 기법)

  • Kwon, SoonHyun;Park, Youngtack
    • Journal of KIISE
    • /
    • v.41 no.9
    • /
    • pp.686-698
    • /
    • 2014
  • Recently, large-scale streaming sensor data have emerged due to explosive supply of smart phones, diffusion of IoT and Cloud computing technology, and generalization of IoT devices. Also, researches on combination of semantic web technology are being actively pushed forward by increasing of requirements for creating new value of data through data sharing and mash-up in large-scale environments. However, we are faced with big issues due to large-scale and streaming data in the inference field for creating a new knowledge. For this reason, we propose the RDFS rule based parallel reasoning scheme to service by processing large-scale streaming sensor data with the semantic web technology. In the proposed scheme, we run in parallel each job of Rete network algorithm, the existing rule inference algorithm and sharing data using the HBase, a hadoop database, as a public storage. To achieve this, we implement our system and evaluate performance through the AWS data of the weather center as large-scale streaming sensor data.

On the QoS Support in Medium Access Control for Medical Sensor Networks (의료용 센서 네트워크에서 QoS 지원의 매체접속제어)

  • Ashrafuzzaman, Kazi;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.151-158
    • /
    • 2010
  • In line with the requirement of appropriate protocol support for such mission-critical wireless sensor network (WSN) applications as patient monitoring, we investigate the framework for designing medium access control (MAC) schemes. The data traffic in medical systems comes with inherent traffic heterogeneity as well as strict requirement of reliability according to the varied extents of devise-wise criticality in separate cases. This implies that the quality-of-Service (QoS) issues are very distinctly delicate requiring specialized consideration. Besides, there are features in such systems that can be exploited during the design of a MAC scheme. In a monitoring or routine surveillance application, there are degrees of regularity or predictability in traffic as coordinated from a node of central control. The coordinator thus takes on the role of marshaling the resources in a neighborhood of nodes deployed mostly for upstream traffic; in a collision-free scheme, it schedules the time slots for each superframe based on the QoS specifications. In this preliminary study, we identify the key artifacts of such a MAC scheme. We also present basic performance issues like the impact of superframe length on delay incurred, energy efficiency achieved in the network operation as obtained in a typical simulation setup based on this framework.

Networked Airborne Relay-Based Positioning Scheme and Performance Enhancement Study Based on TDMA Networks (시분할다중접속 네트워크 기반의 공중 중계 기반 융합 측위 기법 및 성능 향상 연구)

  • Lee, Kyuman;Noh, Hongjun;Park, Hyungwon;Lim, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1824-1833
    • /
    • 2016
  • In this paper, we propose networked airborne relay-based positioning scheme (N-ARPS) based on time division multiple access (TDMA) networks to improve the performance of relative navigation (RelNav). To integrate the ARPS into TDMA, there are three problems such as slot allocation, selection of airborne relays, and method for signal loss to be solved. A subframe of N-ARPS is designed to assign the slots for broadcast and relay of navigation signals consecutively to minimize the effect of mobility. The selection algorithm determines the optimum set of airborne relays by selecting evenly distributed nodes depending on their distances to the master station. Finally, we uses precise position location information (PPLI) messages, which are received in data transmission period, to estimate a user position when the navigation signals are missing. The simulation results indicate that N-ARPS significantly improves user accuracy over RelNav.

Simulation in Nursing Education in South Korea: An Integrative Review (한국 간호교육에서의 시뮬레이션: 통합적 고찰)

  • Jang, Ae Ri;Kim, Ja Sook;Kim, Su Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.525-537
    • /
    • 2020
  • This study aimed to determine the current state and characteristics of simulation-based operating processes in nursing education based on the Jeffries theoretical framework in South Korea by taking an integrated look at study findings in order to provide a scientific basis for future simulation-based operating processes. We searched eight databases, including the Korea Education and Research Information Service, National Library, Korean Studies Information Service System, National Digital Science Library, Korea Institute of Science and Technology Information, KOREAMED, and Korean Medical Database, using terms "simulation" and "nursing" as keywords in November 2017 in the Korean language. Sixteen studies were identified, reviewed, and appraised in this integrative review. The literature was categorized into these themes: general study characteristics, operation method, teaching and learning methods, subject characteristics, outcome variables, and theoretical framework. The simulation processes in nursing education in South Korea that were analyzed in this study did not fully reflect the main concepts suggested in the NLN Jeffries simulation framework. Thus, simulation program developers need to consider and incorporate a variety of strategies, based on the identification of essential components, to improve simulation effectiveness.

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

Design and Implementation of the Smart Virtual Machine for Smart Cross Platform (스마트 크로스 플랫폼을 위한 스마트 가상기계의 설계 및 구현)

  • Han, Seong-Min;Son, Yun-Sik;Lee, Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.190-197
    • /
    • 2013
  • Since domestic and foreign platform companies and mobile carriers adopt and use different kinds of smart platforms, developers should develop or convert contents according to each smart platform to provide a single smart content for customers. It takes long time and a lot of money to convert the conventional smart contents in order to serve other smart platforms. For the reason, more attention has been paid on Smart Cross Platform or Hybrid Platform, the core technologies of OSMU(One Source Multi Use) in which, once a program is coded, it can be executed in any platforms regardless of development languages. As a result, PhoneGap and HTML5 based Sencha Touch have been introduced. In this paper, we developed the smart virtual machine, which is built in smart cross platform based smart devices, unlike Android, iOS, Windows Phone devices being dependent of platforms, and helps to download and execute applications, being independent of platforms. the smart virtual machine supports C/C++, and Java language, being differentiated from JVM by sun microsystems that supports only Java language and .NET framework by microsoft that supports only C, C++ and C#. Therefore, it provides contents developers with the environment where they can get a wide range of options in choosing a language and develop smart contents.

Implementation of Uncertainty Processor for Tracking Vehicle Trajectory (차량 궤적 추적을 위한 불확실성 처리기 구현)

  • Kim, Jin-Suk;Kim, Dong-Ho;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1167-1176
    • /
    • 2004
  • Along the advent of Internet technology, the computing environment has been considerably changed in many application domains. Especially, a lot of researches for e-Logistics have been done for the last 3 years. The e-Logistics means the virtual business activity and service architecture among the logistics companies based on the Internet technology. To construct effectively the e-Logistics framework, researches on the development of the Moving Object Technology(MOT) including GPS and GIS with spatiotemporal databases technique so far has been done The Moving Object Technology stands for the efficient management for the spatiotemporal objects such as vehicles, airplanes, and vessels which change continuously their spatial location along with time flows. However, most systems manage just only the location information detected lately by many reasons so that the uncertainty processing for the past and future location of the moving objects is still very hard. In this paper, we propose the moving object uncertainty model and system design for e-Logistics applications. The MOMS architecture in e-Logistics is suggested and the detailed explain of sub-systems including the uncertainty processor of moving objects is described. We also explain the comprehensive examples of MOMS and uncertainty processing in Delivery Parcel Application that is one of major application of e-Logistics domain.