• Title/Summary/Keyword: 워크?

Search Result 22,140, Processing Time 0.044 seconds

A Review of Research on the Study Trends on Smart Work (스마트워크 연구경향분석)

  • Im, Kwang-Hyun;Lee, Dongjin;Kim, Jinhyuk
    • Informatization Policy
    • /
    • v.17 no.4
    • /
    • pp.3-22
    • /
    • 2010
  • The purpose of this study is to provide the fruitful directions for the future studies on smart work by analyzing the past and present trends that are related to smart work. For this, a wide range of materials and MA and PhD treatises produced from 1992 to the present have been collected and have been analyzed on the basis of various standards, including objective of study, approach method, methodology, method of data collection, statistical technique of analysis, summary of problems and alternativesto overcome limitations. Lessons and implications of this study for the possibility of smart work are presented. I hope this study will contributeto future studies concerned about smart work.

  • PDF

A Study on B2B Workflow Integration Technology (기업간 워크플로우 통합 기술에 대한 연구)

  • 정재윤;김훈태;김동수;강석호
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.1
    • /
    • pp.39-59
    • /
    • 2004
  • E-business automates overall activities in a company and allows distributed systems to communicate their information. The automation and information sharing improves its productivity and responsiveness. B2B workflow systems progress their business processes electronically and help the companies to monitor their execution and administrate the processes. This research analyzes the technologies and standards for B2B workflow integration, and proposes three approaches to implement effectively workflow integration. We analyze several existing workflow standards and business process definition languages, and compare their structures and features. And we examine the messaging technologies and architectures to implement business integration. Finally we extract a reference model for B2B workflow integration, and propose three types of workflow integration and implementation designs. This research helps companies to understand the workflow standards and the messaging technologies for B2B workflow integration, and to implement workflow integration systems that are suitable for their e-business environments.

  • PDF

Analysis of Scientific Item Networks from Science and Biology Textbooks (고등학교 과학 및 생물교과서 과학용어 네트워크 분석)

  • Park, Byeol-Na;Lee, Yoon-Kyeong;Ku, Ja-Eul;Hong, Young-Soo;Kim, Hak-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.427-435
    • /
    • 2010
  • We extracted core terms by constructing scientific item networks from textbooks, analyzing their structures, and investigating the connected information and their relationships. For this research, we chose three high-school textbooks from different publishers for each three subjects, i.e, Science, Biology I and Biology II, to construct networks by linking scientific items in each sentence, where used items were regarded as nodes. Scientific item networks from all textbooks showed scare-free character. When core networks were established by applying k-core algorithm which is one of generally used methods for removing lesser weighted nodes and links from complex network, they showed the modular structure. Science textbooks formed four main modules of physics, chemistry, biology and earth science, while Biology I and Biology II textbooks revealed core networks composed of more detailed specific items in each field. These findings demonstrate the structural characteristics of networks in textbooks, and suggest core scientific items helpful for students' understanding of concept in Science and Biology.

Vertical Handover Framework for Maritime Multi-band Networks (해상 멀티대역 네트워크를 위한 수직 핸드오버 프레임워크 설계)

  • Cho, A-Ra;Yun, Changho;Park, Jong-Won;Lim, Yong-Kon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2847-2856
    • /
    • 2014
  • It is necessary for maritime multi-band networks, which provide ships with diverse and seamless multimedia services, to perform vertical handover. As IEEE 802.21 WG has standardized vertical handover technologies for terrestrial wireless networks that do not consider VHF, HF, satellite networks, they cannot be directly applied to maritime multi-band networks. In this paper, the vertical handover framework for use in maritime mutlti-band networks is proposed, which includes the logical architecture, the communication reference model, re-defined handover primitives, and the handover process. The proposed vertical handover for maritime multi-band network can be applied in the ocean alone, as well as to the heterogeneous wireless networks which embrace both terrestrial and maritime networks.

A Design of a Selective Multi Sink GRAdient Broadcast Scheme in Large Scale Wireless Sensor Network (대규모 무선 센서 네트워크 환경을 위한 다중 Sink 브로드캐스팅 기법 설계)

  • Lee, Ho-Sun;Cho, Ik-Lae;Lee, Kyoon-Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.239-248
    • /
    • 2005
  • The reliability and efficiency of network must be considered in the large scale wireless sensor networks. Broadcast method must be used rather than unicast method to enhance the reliability of networks. In recently proposed GRAB (GRAdient Broadcast) can certainly enhance reliability of networks fy using broadcast but its efficiency regarding using energy of network is low due to using only one sink. Hence, the lifetime of networks is reduced. In the paper we propose the scheme of SMSGB (Selective Multi Sink Gradient Broadcast) which uses single sink of multi-sink networks. The broadcast based SMSGB can secure reliability of large scale wireless sensor networks. The SMSGB can also use the network's energy evenly via multi sink distribution. Our experiments show that using SMSGB was reliable as GRAB and it increased the network's lifetime by 18% than using GRAB.

  • PDF

A Study of Revitalizing Knowledge Management in Smartwork Environment (스마트워크 환경에서의 지식경영 활성화에 관한 연구)

  • Park, Dong-Jin;Kim, In-Whan;Lee, Yun-Jae
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.223-233
    • /
    • 2011
  • Smartwork will gradually move from the routine job to the knowledge based job. Therefore, supporting the personal level knowledge activities and the organizational level KM(Knowledge Management) will have a critical effect on the organizational performance. The purpose of this research is to develop strategies that revitalize the knowledge management for organizations that are trying to implement smartwork under such context. First of all, through the research results reviewed from areas such as current teleworking, telecommuting, mobile working and virtual organization, we identify the characteristics of the knowledge management for smartwork. And then, we develop and propose KM strategy that would supplement the existing knowledge management method and techniques in the smartwork environment. Academically, this paper emphasizes the further research needs about KM in terms of smart work. Operationally, it outlines and guides to the KM strategies for the government and enterprise planners that are designing smartwork.

Network Architecture and Routing Protocol for Supporting Mobile IP in Mobile Ad Hoc Networks (이동 애드 혹 네트워크의 Mobile IP 지원을 위한 네트워크 구조 및 라우팅 프로토콜)

  • Oh, Hoon;TanPhan, Anh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1A
    • /
    • pp.24-35
    • /
    • 2008
  • We propose a tree-based integrated network of infrastructure network and mobile ad hoc network to effectively support Mobile IP for mobile ad hoc networks and also proposed a network management protocol for formation and management of the integrated network and a tree-based routing protocol suitable for the integrated network. The integrated network has fixed gateways(IGs) that connect two hybrid networks and the mobile nodes in the network form a small sized trees based on the mobile nodes that are in the communication distance with a IG. A new node joins an arbitrary tree and is registered with its HA and FA along tree path. In addition, the proposed protocol establishes a route efficiently by using the tree information managed in every node. We examined the effectiveness of the tree-based integrated network for some possible network deployment scenarios and compared our routing protocol against the Mobile IP supported AODV protocol.

Routing Attack Detection for Performance Enhancement of AODV Protocol In Mobile Ad Hoc Networks (모바일 Ad Hoc 네트워크에서 AODV 프로토콜의 성능 향상을 위한 라우팅 공격 탐지)

  • Lee, Jae-Young;Choi, Seung-Kwon;Lee, Byong-Rok;Kim, Sun-Chul;Sin, Byoung-Gon;Cho, Yong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.6A
    • /
    • pp.632-641
    • /
    • 2007
  • Since the mobile node acts as the router, the Mobile Ad Hoc network requires the security methods that are different from that of network of the wire environment. Also, since the total network can't be included in the transmission area of the mobile node, when one node sends the message to the other node, we need the middle node. But if the middle node is the unreliable malicious node, we can't guarantee the secure message transmission. Also, because all nodes configuring the network are the mobile nodes, they use the restricted battery capacity and the restricted resources. Therefore, because we have trouble performing the encryption that many resources are required when we sending the message, it is vulnerable to the security than the network of the wire environment. Last, because the network topology continues to change by the mobility of nodes configuring the network, we need the security measure that matches the network characteristics. We suggest the routing attack detection for performance enhancement of AODV protocol in Mobile Ad Hoc networks.

An Exploratory Study on Security Threats of Smartwork Environment (스마트워크 환경에서의 보안 위협에 관한 탐색적 연구)

  • Ra, Jong-Hei;Choi, Young-Jin;Shin, Dong-Ik
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2012
  • Present many organizations are introduced to smartwork for reducing the operational cost and getting the labor's flexibility. The smartwork is the future-oriented worker's environment in which they can engage in their task, anytime and anywhere conveniently and efficiently. In spite of many smartwork advantages, the security problems are major issues and prevent to introducing and spreading of smartwork for organizations. Therefore, the success of the organization for smartwork environment is put in place appropriate security control model. This study is about security threats for smartwork security control model. We apply the exploratory method for this research, which are reviewing, analyzing of literature for extracting the security threats and clustering of the extracted security threats. Finally we define the 16's security threats according to the aspect of smartwork service layers.

A design of Key Exchange Protocol for User Centered Home Network (사용자 중심의 홈네트워크를 위한 키 교환 프로토콜 설계)

  • 정민아
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.654-660
    • /
    • 2004
  • In this paper, we define that pervasive home network, which provides necessary services for user properties and removes distractions to improve the quality of human life. So, user can enjoy home network technology including devices and softwares at any place with no knowledge of networked home, devices, and softwares. In this home network, a mobile agent, called LAFA, can migrate to unfamiliar home network and control the necessary devices. For this environment, we design security management module for authenticating user and home server that access some other home networks, and for protecting text, multimedia data, and mobile agent that are transferred between home networks. The security management module is composed of a key exchange management module and an access control management module, for key exchange management module, we propose a key exchange protocol, which provides multimode of authentication mode and key exchange mode. One of these two modes is selected according to the data type.