• 제목/요약/키워드: 아키텍처 환경

Search Result 689, Processing Time 0.026 seconds

A Study of Establishment of Softwaresystem Configuration for Improving Health Information Sharing (의료정보 공유기능 향상을 위한 소프트웨어시스템 기반구성 방법에 관한 연구)

  • Han, Soon-Hwa;Ju, Se-Jin
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.11-18
    • /
    • 2014
  • The strength of our country is based on high-speed networks to build a nationwide health information network to improve the quality of health care is needed. However, nature of the medical services in the hospital medical record form, so that all departments characterize each medical department, a common format that can be used for all disease is a very difficult challenge. This study is one of the ways to improve this priority issue on health information sharing medical information system(PACS/HIS) information linkage between the problem of information, compatibility and security issues derived. The problem is derived from the requirements of theorem 3 to 6 items. This is effective in order to improve sharing of medical information for the purpose of designing the software system. Sharing of medical information software system design are derived from stakeholders, requirements analysis, architecture design, software framework, configuration, architecture evaluation process. This study is based on the medical information standardization environmental diagnosis of a medical information system design. Software design philosophy is based on a new framework for deriving the function and mechanism made up.

A Simulation Framework of Multi-Agent Based Small Engagement Using Cougaar Architecture (Cougaar Architecture 활용 다중 에이전트 기반 소규모 교전 시뮬레이션 Framework)

  • Hwam, Won-K.;Chung, Yong-Ho;Park, Sang-C.
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.101-109
    • /
    • 2011
  • M&S in the field of national defense is a battle system has been highly spotlighted for obtaining weapon systems, analyzing and experimentation of battle effects to reduce costs, time, and risks. It is classified as Campaign, Mission, Engagement, and Engineering levels by detail of description. In engagements, many situations on the battle field which are really unpredictable are required to be considered on the view of diverse tactics. Thus, engagement simulation is in demand to use for forecasting real-world battle situations by inserting various components which consists of real engaging situations into virtual local battle field. While developing the engagement simulation, adopting the concept of agent-based simulation gives it benefits which are improved autonomy, composability, and reusability of entities. It means reducing the time, cost and effort to develop the simulations. This paper concentrates on the framework of multi-agent based engagement simulation using Cougaar Architecture.

Implementation of Smartphone based Mobile Office for a Logistics Company using HTML5 (HTML5를 이용한 물류기업의 모바일 오피스 구현에 관한 연구)

  • Lim, Yongtaek;Byun, Haegwon;Yoo, Woosik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.433-442
    • /
    • 2012
  • This paper focuses on developing a smartphone-based mobile office system for a logistics company in Korea using HTML5. Mobile office is smart working environment of working out of a company office using mobile devices such as smartphones and portable computers which are connected to the company servers via WiFi or 3G/4G. Recently many companies are introducing mobile office information systems with the smartphone wave, but they are having difficulties in maintaining and updating their systems due to the transformative mobile application platform. Therefore, we need a platform-independent implementation tools for the mobile office application and HTML5 is one of the solution tools. In this paper, we develop mobile and web applications applicable to all kinds of mobile devices such as iOS, android and windows mobile etc using HTML5. The proposed mobile office system consists of groupware, marketing management, reporting module and transportation management system.

An adaptive load balancing method for RFID middlewares based on the Standard Architecture (RFID 미들웨어 표준 아키텍처에 기반한 적응적 부하 분산 방법)

  • Park, Jae-Geol;Chae, Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.73-86
    • /
    • 2008
  • Because of its capability of automatic identification of objects, RFID(Radio Frequency Identification) technologies have extended their application areas to logistics, healthcare, and food management system. Load balancing is a basic technique for improving scalability of systems by moving loads of overloaded middlewares to under loaded ones. Adaptive load balancing has been known to be effective for distributed systems of a large load variance under unpredictable situations. There are needs for applying load balancing to RFID middlewares because they must efficiently treat vast numbers of RFID tags which are collected from multiple RFID readers. Because there can be a large amount of variance in loads of RFID middlewares which are difficult to predict, it is desirable to consider adaptive load balancing approach for RFID middlewares, which can dynamically choose a proper load balancing strategy depending on the current load. This paper proposes an adaptive load balancing approach for RFID middlewares and presents its design and implementation. First we decide a performance model by a experiment with a real RFID middleware. Then, a set of proper load balancing strategies for high/medium/low system loads is determined from a simulation of various load balancing strategies based on the performance model.

A Study on the Mathematical Model of Capability based EA Framework for Align, Integration and Interoperability of Enterprise Resource (엔터프라이즈 자원의 정렬, 통합 및 상호운용성을 위한 능력기반 EA2I프레임워크의 수학적 모델에 관한 연구)

  • Park, Sanggun;Lee, Tae-gong;Son, Hyunsik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.111-120
    • /
    • 2012
  • Many Countries are recently focued on building capability based military and operating for the defense budget efficiency and operational effectiveness. The EA not only defines enterprise scope but also identifies relation among them, manage change and complexity. Accordingly, this research aims to build architecture framework which can achieve alignment, integration and interoperability by developing it with output. Through this, architecture framework can be changed into force development and operation. And it can be used for construction of effective force and operation for NCO by applying mathematical model and method of force priority development based on developed capabilities-based architecture framework.

An Ontological Approach for Conceptual Modeling of Mission Space in Military Modeling & Simulation (국방 Modeling & Simulation에서 임무공간 개념모델링을 위한 온톨로지 적용방안)

  • Bae, Young Min;Kang, Haeran;Lee, Jonghyuk;Lee, Kyong-Ho;Lee, Young Hoon
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.243-251
    • /
    • 2012
  • This paper presents the Conceptual Models of the Mission Space-Korea (CMMS-K), which is an ontology-based conceptual modeling framework of the mission space. Through modeling and simulating military trainings, we can reduce the cost of actual military trainings in terms of time, space, and supplies. CMMS-K is being developed to improve the interoperability and reusability of defense models and simulations. CMMS-K reflects the needs and characteristics of Korean military while referring to existing military conceptual modeling frameworks. The main components of CMMS-K contain domain ontologies, a mission space model description language, a mission space modeling tool, and a CMMS-K management system. CMMS-K domain ontologies consist of entity and task ontologies. In this paper, the CMMS-K domain ontologies are described in detail and the feasibility of the proposed method is discussed with a case study.

The Exploratory Study on Security Threats and Vulnerabilities for Mobile Office Environment (모바일오피스 환경에서의 보안위협 및 취약점에 대한 탐색적 연구)

  • Choi, Young-Jin;Ra, Jong-Hei;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.175-185
    • /
    • 2014
  • This study is based on the information security management system, the threat from mobile office, mobile office configuration item type, vulnerability analysis and control at the level of the current possibilities for technology to its purpose. To perform exploratory study for mobile Office to target the new technology, we were used the integrated research methods such as the documentary survey, expert FGI and real user's survey. To identify the main risk areas of mobile office services, we develop the mobile service layer model that separated the place, terminal, network, server according to service deliverly system. Finally, the result of survey for threats and vulnerabilities showed that the control of the terminal of user is a significant.

A Research of Design and Implementation of Visual Program to Displaying External Factors of Marine Buoy using Quest3D (Quest3D 기반 해상부표 동적안정성의 시각적 표현 프로그램 설계 및 구현에 관한 연구)

  • Lee, Seo-Jeong;Lee, Jae-Wook;Gug, Seung-Gi
    • Journal of Navigation and Port Research
    • /
    • v.36 no.8
    • /
    • pp.599-605
    • /
    • 2012
  • As vessels are faster and bigger, higher safety navigation techniques have been required. In marine traffic area, buoy is to be one of the most important equipment, so that it should be built stable and robust. Verification in design level is good to accomplish it. This paper tries to implement visual program to confirm the external stability, which shows the movement on water by external factors such as wind, tide and current. Considering further requirements for additional influences or functions, design architecture for program introduces the concept of software component. Using Quest3D as the graphic tool, visual programming with software component concept can be implemented.

A Generic Interface for Internet of Things (IoT) Platforms (IoT 플랫폼을 위한 범용 인터페이스)

  • Kim, Mi;Lee, Nam-Yong;Par, Jin-Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.1
    • /
    • pp.19-24
    • /
    • 2018
  • This paper presents an IoT platform of common interfaces that are flexible IoT applications and Connect the smart devices. The IoT platform includes automatic collaboration discovery the smart Device. It is different things case with connection each device through IoT Platforms are each device and application service. Due to these heterogeneities, it is quite advantages to develop applications working with derived IoT services. This circumstance needs the generic interface and results in a range of IoT architectures by not only the environments settings and discovery resource but also varied uniqe to implementation services working with IoT applications. Therefore, this suggestion of solve the problems and make it possible independent platforms always alive to connection with each devices based on the generic interface. The generic interface is heterogeneity-driven solve the problems and effectively contributions a platform that could be operated in diverse IoT Platforms.

Device Personalization Methods for Enhancing Packet Delay in Small-cells based Internet of Things (스몰셀 기반 사물인터넷에서 패킷 지연시간 향상을 위한 디바이스 개인화 방법)

  • Lee, ByungBog;Han, Wang Seok;Kim, Se-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.25-31
    • /
    • 2016
  • Recently, with greatly improving the wireless communication technology, new services are created using smart sensors, i.e., machine-to-machine (M2M) and Internet of Things (IoT). In this paper, we propose a novel IoT device (IoTD) personalization method that adopt Small-cell Access Points (SAPs) to control IoTDs using user equipments (UEs), e.g., smart phones and tablet PC, from service users. First, we introduce a system architecture that consists of UE, IoTD, and SAP and propose the IoTD personalization method with two procedures, i.e., IoTD profile registration procedure and IoTD control procedure. Finally, through simulations, we evaluated the system performance of the proposed scheme and it is shown that the proposed scheme outperforms the conventional scheme in terms of the packet delay, packet loss probability, and normalized throughput.