• Title/Summary/Keyword: 아키텍처 환경

Search Result 689, Processing Time 0.026 seconds

Lightweight Framework For Supporting Mobile Web Development (초고속 모바일 웹 개발을 위한 경량화 프레임워크)

  • Shin, Seung-Woo;Kim, Haeng-Kon
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.127-138
    • /
    • 2009
  • Mobile web applications are being used and changed rapidly due to the growth of mobile device performance. But, cost of development environment and standards make the high development cost and low productivity. It is main reason that the design and implementation of the applications are more time consuming than general computing environments. In this paper, we propose MWeb(MobileWeb)-Framework based on the agile methodology and Ruby on Rails that is a kind of framework for supporting mobile web application development using mobile web standards. This work consists of the mobile web development architecture and agile process model. MWeb-Framework will support the same user experience to the different devices. We validates the framework by implementing the case studies through suggested mobile web development framework. As a result, we can develop the mobile web applications with productivity and quality. In the future, we will suggest how to make the MWeb-Framework standardization and practically apply the frameworks the various case studies to improve framework potentially problems.

  • PDF

Real-Time Support on Multi-Processor for Windows (멀티프로세서 윈도우즈 상에서 실시간성 지원)

  • Song, Chang-In;Lee, Seung-Hoon;Ju, Min-Gyu;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.68-77
    • /
    • 2012
  • As the system development environment moves from single core to multi core-based platforms, it becomes more important to maintain compatibility between single core-based implementations and multi core-based implementations. Moreover, it is very important to support real-time on multi core platforms especially in cases of embedded software or test equipments which need real-time as well as correctness. Since Windows operating system dopes not support real-time in itself, it has been supporting real-time using expensive third-party solutions such as RTX or INtime. So as to reduce this kind of development expenses, in this paper, we propose RTiK-MP(Real-Time implant Kernel-Multi Processor) which supports real-time on Windows using the Local APIC of x86 architectures, and evaluate the performance of the proposed RTiK-MP after deploying it on portable missile test equipments.

An Exploratory Study on Security Threats of Smartwork Environment (스마트워크 환경에서의 보안 위협에 관한 탐색적 연구)

  • Ra, Jong-Hei;Choi, Young-Jin;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2012
  • Present many organizations are introduced to smartwork for reducing the operational cost and getting the labor's flexibility. The smartwork is the future-oriented worker's environment in which they can engage in their task, anytime and anywhere conveniently and efficiently. In spite of many smartwork advantages, the security problems are major issues and prevent to introducing and spreading of smartwork for organizations. Therefore, the success of the organization for smartwork environment is put in place appropriate security control model. This study is about security threats for smartwork security control model. We apply the exploratory method for this research, which are reviewing, analyzing of literature for extracting the security threats and clustering of the extracted security threats. Finally we define the 16's security threats according to the aspect of smartwork service layers.

Goal-based Evaluation of Contextual Situations for Self-adaptive Software (자기적응형 소프트웨어를 위한 목표 기반의 외부상황 평가 기법)

  • Kim Jae-Sun;Park Soo-Yong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.3
    • /
    • pp.316-334
    • /
    • 2006
  • In the traditional computing paradigm, developers design software to run in a fixed and well-defined environment. The real environment, however, is too complicated to analyze all situations perfectly. Consequently, traditional software, which is implemented only for what is wanted as input, often fails badly in real environment. As a new approach, self-adaptive software can avoid runtime failures adapting to unpredictable situations. Self-adaptive software must firstly evaluate the contextual situation to determine the need for adaptation. Existing researches do not support the abstraction mechanism for identifying contextual problem. Consequently, they can have troubles with identifying the contextual problem as the execution environment is getting complex. In addition, they cannot support the expandability for contextual problems, which software can evaluate. This paper suggests the goal-based evaluation method of contextual situation for coping with the limitations of existing researches.

Privacy Framework in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경내 개인정보보호 프레임워크 적용 방안)

  • Hong Seng-Phil;Lee Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.157-164
    • /
    • 2006
  • Information is playing a key role in sufficing the needs of individual members of the society in today's rapidly changing environment. Especially, the cases of illegal gathering of privacy information will increase and the leakage of privacy information will grow as the individual activities in the ubiquitous computing environment. In this paper, we suggested the privacy framework in order to make design and implementation of secure and effective privacy management system. Ant we also introduced the methodology which is represent to 5 specific stages in order to suggest to the privacy system development guideline from the standpoints of the privacy system operator or developer. Especially, we tried to determine whether the suggested methodology can be effectively used in the real computing environment or not by making necessary investments in management (privacy policy) and technical (system architecture) sides. We believe that the privacy framework and methodology introduced in this research can be utilized to suggest new approach for showing direction from the privacy protection perspective, which is becoming more important in ubiquitous environments, and practical application rather than providing conceptual explanation from the views of engineer or developer.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Technical Analysis of LoRa for Problems on Outdoor Culture Smart Farm (노지재배 스마트팜의 문제점을 해결하기 위한 LoRa 기술 분석)

  • Jaechan Lee;Sanghyeon Jeon;Junyoung Lee;Yeunwoong Kyung
    • Journal of Advanced Technology Convergence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Recently, there have been increasing interests in researches to apply wireless communication technologies for smart farm. This paper introduces the problems in the smart farm for the outdoor culture and technical considerations to solve the problems. As candidate technologies, this paper selects LoRa, Sigfox, NB-IoT, and Wi-Fi and then determines that LoRa is a suitable technology based on the CAPEX, coverage, transmission rate, battery, and the price. To provide technical analysis, this paper introduces technologies related to the physical and medium access control (MAC) layers as well as the security. Specifically, this paper includes the modulation technology in the physical layer, Class (Class A, B, and C) based protocol operations in MAC layer, and security architecture based on the LoRa version.

Design and Implementation of Bigdata Platform for Vessel Traffic Service (해상교통 관제 빅데이터 체계의 설계 및 구현)

  • Hye-Jin Kim;Jaeyong Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.887-892
    • /
    • 2023
  • Vessel traffic service(VTS) centers are equipped with RADAR, AIS(Automatic Identification System), weather sensors, and VHF(Very High Frequency). VTS operators use this equipment to observe the movement of ships operating in the VTS area and provide information. The VTS data generated by these various devices is highly valuable for analyzing maritime traffic situation. However, owing to a lack of compatibility between system manufacturers or policy issues, they are often not systematically managed. Therefore, we developed the VTS Bigdata Platform that could efficiently collect, store, and manage control data collected by the VTS, and this paper describes its design and implementation. A microservice architecture was applied to secure operational stability that was one of the important issues in the development of the platform. In addition, the performance of the platform could be improved by dualizing the storage for real-time navigation information. The implemented system was tested using real maritime data to check its performance, identify additional improvements, and consider its feasibility in a real VTS environment.

Analysis of Data Isolation Methods for Secure Web Site Development in a Multi-Tenancy Environment (멀티테넌시 환경에서 안전한 웹 사이트 개발을 위한 데이터격리 방법 분석)

  • Jeom Goo Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.35-42
    • /
    • 2024
  • Multi-tenancy architecture plays a crucial role in cloud-based services and applications, and data isolation within such environments has emerged as a significant security challenge. This paper investigates various data isolation methods including schema-based isolation, logical isolation, and physical isolation, and compares their respective advantages and disadvantages. It evaluates the practical application and effectiveness of these data isolation methods, proposing security considerations and selection criteria for data isolation in the development of multi-tenant websites. This paper offers important guidance for developers, architects, and system administrators aiming to enhance data security in multi-tenancy environments. It suggests a foundational framework for the design and implementation of efficient and secure multi-tenant websites. Additionally, it provides insights into how the choice of data isolation methods impacts system performance, scalability, maintenance ease, and overall security, exploring ways to improve the security and stability of multi-tenant systems.

Memory Update Strategies for the Buyer Agent in Electronic Commerce (전자상거래의 구매자 에이전트의 메모리 갱신 전략)

  • 김재욱;이재규
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.10a
    • /
    • pp.243-249
    • /
    • 1999
  • 구매 의사 결정 과정에서 구매자는 상품 정보와 가격 정보를 필요로 한다. 웹상의 판매자 위주의 시장으로부터 필요한 정보를 수집하려면, 구매자는 매번 구매 때마다 판매자의 사이트를 검색해야 한다. 심지어 구매자가 거래하고 있는 판매자로부터 과거에 구매한 경험이 있는 아이템을 구매하는 경우에도 마찬가지이다. 현재의 전자상거래 환경에서는, 이렇게 기억을 활용하지 않고(memory-less) 검색에만 의존하는 구매자의 행태가 일반적이다. 이 현상을 조직의 구매 경험이 구성원들에게 공유되어야 하는 기업 구매자의 경우에 있어서는 대단히 낭비적인 요소로 작용될 것이다. 구매자 에이전트에게 기억 능력을 부여하려면, 구매자 에이전트와 판매자 에이전트가 갖고 있는 정보간의 일관성을 유지해 주어야 할 필요가 있다. 최소의 노력으로 일관성을 유지하려면, 구매자 에이전트와 판매자 에이전트간에 체계적인 갱신 프로토콜이 필요하다. 본 연구에서는 6가지의 프로토콜(Instantaneous Pull, Periodic Pull, Instantaneous Push, Periodic Push, Instantaneous Solicited Push, Periodic Solicited Push)을 비교하고, 에이전트의 아키텍처와 KQML/XML에 기반 한 메시지 구조를 제시한다. 이들 프로토콜의 상황에 따른 수행 성능 평가가 진행 중이며, 이러한 상황에 적응할 수 있는 에이전트의 프로토타입이 현재 개발 중이다.

  • PDF