• Title/Summary/Keyword: 정보관리 아키텍처

Search Result 419, Processing Time 0.028 seconds

Scalability Estimations of a Workcase-based Workflow Engine (워크케이스 기반 워크플로우 엔진의 초대형성 성능 평가)

  • Ahn, Hyung-Jin;Park, Min-Jae;Lee, Ki-Won;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.89-97
    • /
    • 2008
  • Recently, many organizations such as companies or institutions have demanded induction of very large-scale workflow management system in order to process a large number of business-instances. Workflow-related vendors have focused on physical extension of workflow engines based on device-level clustering, so as to provide very large-scale workflow services. Performance improvement of workflow engine by simple physical-connection among computer systems which don't consider logical-level software architecture lead to wastes of time and cost for construction of very large-scale workflow service environment. In this paper, we propose methodology for performance improvement based on logical software architectures of workflow engine. We also evaluate scalable performance between workflow engines using the activity instance based architecture and workcase based architecture, our proposed architecture. Through analysis of this test's result, we can observe that software architectures to be applied on a workflow engine have an effect on scalable performance.

  • PDF

Domain Component Reference Architecture within Naval Combat System (함정 전투체계의 도메인 컴포넌트 참조 아키텍처)

  • Lee, Seonyeol;Chae, Heung-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1443-1450
    • /
    • 2019
  • The naval combat system is gradually evolving, actively accepting technological advances. The domain components of the naval combat system must also be adapted to the gradual evolution of the naval battle system. In other words, domain components should be easy to change. However, existing domain components do not fully consider changeability. In particular, when receiving more messages than planned from the middleware, it does not consider a way to process them in a timely manner. We propose a domain component reference architecture for timely processing of increased messages. The proposed architecture separates domain components so that business logic can operate independently, and sets up multiple business logic to operate simultaneously to handle increased messages. The track management domain component is designed using the proposed reference architecture to confirm the applicability.

A Study on the Grid Architecture of Urban Facility Management in u-City (u-City 도시시설물 관리 GRID 시스템 아키텍처에 관한 연구)

  • Kwon, Hyuk-Jong;Lim, Hyung-Chang;Kim, Won-Kyun;Oh, Yoon-Seuk;Nam, Sang-Kwan
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.06a
    • /
    • pp.492-496
    • /
    • 2008
  • 최근 u-City에서 추진되고 있는 도시시설물 관리 관리시스템은 USN을 기반으로 이루어지고 있으며, 도시시설물에 센서노드를 구축하고, 수집되는 Sensing 데이터를 활용하여 시설물관리를 지능화하고 있다. 본 논문은 관리 시설물에 따라 부착된 센서 데이터를 수집하여 활용함에 있어 GRID 기술을 적용하고, 이 GRID 시스템을 통해 시스템 자원에 대한 효용성을 높일 수 있는 도시시설물 관리 통합 GRID 시스템 구성을 제시하고자 한다.

  • PDF

Technical Architecture for Implementation and Adoption of Database Encryption Solution (데이터베이스 암호화 솔루션 구현 및 도입을 위한 기술적 아키텍처)

  • Lee, Byoung-Yup;Lim, Jongtae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2014
  • Through the development of internet mobile devices and online business activation, sensitive data of unspecified user is being easily exposed. In such an open business environment, the outflow of sensitive personal information has often been remarked on recently for which adoption of encryption solution for database became top priority in terms of importance. In 2011, government also legislated for the protection of personal information as an information network law, and is now applying the law to a variety of industries. Firms began to comply with these regulations by establishing various measures for protection of personal information and are now quickly introducing encryption solution to reinforce security of personal information they are managing. In this paper, I present architecture and technological parts that should be considered when introducing security solution.

Web Learning Systems Development based on Product Line (프로덕트 라인 기반의 웹 학습 시스템 개발)

  • Kim Haeng-Hon;Kim Su-Youn
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.589-600
    • /
    • 2005
  • Application developers need effective reuseable methodology to meet rapidly changes and variety of users requirements. Product Line and CBD(Component Based Development) offer the great benefits on quality and productivity for developing the software that is mainly associate with reusable architectures and components in a specific domain and rapidly changing environments. Product line can dynamically focus on the commonality and variety feature model among the products. The product line uses the feature modeling for discovering, analyzing, and mediating interactions between products. Reusable architectures include many variety plans and mechanisms. In case of those architecture are use in product version for a long time, It is very important in architecture product line context for product line design phase. Application developer need to identify the proper location of architecture changing for variety expression. It is lack of specific variety managements to design the product line architecture until nowdays. In this paper, we define various variety types to identify the proper location of architecture changing for variety expression and to design the reusable architecture. We also propose architecture variety on feature model and describe variety expression on component relations. We implemented the web learning system based on the methodology. We finally describe how these methodology may assist in increasing the efficiency, reusability, productivity and quality to develop an application. In the future, we are going to apply the methodology into various domain and suggest international and domestic's standardization.

Asynchronous Sensing Data Aggregation and Processing Mechanism for Internet of Things Environment (사물 인터넷 환경에서 비동기 센싱 데이터 수집 및 처리 메커니즘)

  • Kang, Yunhee;Ko, Wan-Ki
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.403-408
    • /
    • 2014
  • In the Internet of Things(IoT) era, many of the things or objects that enclose our environments are able to associate with those things on the Internet. To construct IoT systems, it needs to consider a component for acquiring and aggregating of sensory data via things with sensors and instruments, which is connected by diverse networks, in IoT environment. An IoT system is intrinsically distributed in a variety of ways. In addition, to manage an IoT system efficiently, interoperability is needed to meet requirements while the IoT system is designed to deliver data among its applications. In this paper, a reference architecture based on asynchronous messaging is defined and used for designing an IoT system. To apply the architecture, we discuss how to manage data streams with real-time characteristics and make a prototype based on pipe-and-filter to produce and consume them by a pub/sub messaging system NaradaBrokering.

The Architecture of an Intelligent Agent for RFID-based Home Networking (RFID기반의 홈네트워킹을 위한 지능형 에이전트 아키텍처)

  • Kim Dongkyu;Lee Woojin;Kim Juil;Chong Kiwon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.484-486
    • /
    • 2005
  • 기업이나 공공기관의 사무실 중심으로 구축되던 네트워크 환경이 가정 내의 디지털 가전기기로 확산되어가면서 홈네트워크 산업과 관련시장에 대한 관심이 높아지고 있다. 기존의 홈네트워크 구성은 주파수중첩, 새로운 가전기기 추가 시 네트워크 환경변화 등 여러 가지 문제점을 내포하고 있으며, 에이전트를 활용하여 홈오토메이션 기능을 제공하는 홈 네트워크 시스템을 제공하는 경우가 드물다. 따라서 본 논문에서는 RFID를 기반으로 하는 홈네트워크 아키텍처를 제시하고, RFID 기반의 홈네트워크를 효율적으로 관리하기 위한 지능형 에이전트를 제시한다. 제시한 지능형 에이전트는 홈네트워크 내의 정보가전기기에 대한 상태 정보를 분석하여 자율적으로 가정 내 상황을 학습하고 사용자에게 최적의 환경을 제공한다.

  • PDF

A Study of Advanced N-Tier Model for Improving Maintainability of Web Applications in Cloud Environment (클라우드 환경에서 웹 어플리케이션의 유지보수성 향상을 위한 N-계층 모델의 개선에 관한 연구)

  • Kim, In-Kyu;Shin, Joon-Chul
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.537-552
    • /
    • 2013
  • Software-as-a-Service (SaaS) has led to paradigm shifts in the information management area by combining it with SOA and Mashup. System developers now have more chances to access various high-quality functions through API opened on the web. But external resources are controlled by service providers so that it raises the component's uncertainty in system management which is related to external resources. In the cloud environment, components related to external resources causes negative effects on system's maintainability by making them dependant on service providers. This study proposes a way to enhance maintainability by using stable external resources. For this work, we suggest the N+1-tier model in which an external resource tier is added to the N-tier model. After that, we analyze how adding an external resource tier affects the decreasing complexity of maintainability and improving maintainability on web application.

A Study on Applying Zero Trust Architecture: Focusing on Implementing Remote Work System (제로 트러스트 아키텍처 적용 방안에 대한 연구: 재택근무 시스템 구성을 중심으로)

  • Jaewoo Do;Keumseok Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1001-1020
    • /
    • 2023
  • As massive increase in remote work since COVID-19, the boundaries between the inside and outside of corporate networks have become blurred. As a result, traditional perimeter security has stagnated business productivity and made it difficult to manage risks such as information leakage. The zero trust architecture model has emerged, but it is difficult to apply to IT environments composed of various companies. Therefore, using the remote work system configuration as an example, we presented a configuration and methodology that can apply zero trust models even in various network environments such as on-premise, cloud, and network separation. Through this, we aim to contribute to the creation of a safe and convenient cyber environment by providing guidance to companies that want to apply zero trust architecture, an intelligent system that actively responds to cyber threats.