• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 651, Processing Time 0.026 seconds

A Study on Social Capital of Strategy Alignment to IT Govenance in Digital Libraries (디지털도서관의 IT 거버넌스를 위한 전략적 연계의 사회적 자본 분석 모형)

  • Lee, Jeong-Soo;Kim, Seong-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.3
    • /
    • pp.295-316
    • /
    • 2009
  • This research applied the concepts of IT architecture and IT governance for managing with an integrated computing environment and organized structure, which base a digital library's management and operation. It also aims to analyze the structural system between information technology of human resources and strategy alignment elements of business, which both constitute the core content. Social network analysis software was used to investigate the complicated relationship between IT and business-related strategy alignment elements. The following is the results of carrying out this research on the social network structure and features of strategy alignment elements for a digital library. First, analysis indexes for strategy alignment elements and social network of a digital library were developed. Second, an analysis model was designed based on the analysis index for social network as to strategy alignment elements. Analysis model was appraised by collecting social network datasets for such strategy alignment elements as Communications, Competency and Value, Governance, Partnership, Scope and Architecture, and Skills against the Business strategy, Information strategy, Business and Technology of a digital library. As for the content of analysis, social network structure and specific features were analyzed in relation to a digital library's (1) General social network, (2) Structure of strategy alignment elements, (3) Strategy fit and Functional integration.

Retargetable Instruction-Set Simulator for Energy Consumption Monitoring (에너지 소비 모니터링을 위한 재목적 인스트럭션-셋 시뮬레이터)

  • Ko, Kwang-Man
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.3
    • /
    • pp.462-470
    • /
    • 2011
  • Retargetability is typically achieved by providing target machine information, ADL, as input. The ADL are used to specify processor and memory architectures and generate software toolkit including compiler, simulator, etc. Simulator are critical components of the exploration and software design toolkit for the system designer. They can be used to perform diverse tasks such as verifying the functionality and/or timing behavior of the system, and generating quantitative measurements(e.g., power energy consumption) which can be used to aid the design process. In this paper, we generate the energy consumption estimation simulator through ADL. For this goal, firstly, we describes the energy consumption estimation and monitoring informations on the ADL based on EXPRESSION. Secondly, we generate the energy estimation and monitoring simulation library and then constructs the simulator, RenergySim. Lastly, we represent the energy estimations results for MIPS R4000 ADL description. From this subjects, we contribute to the efficient architecture developments and prompt SDK generation through programmable experiments in the field of mobile software development.

Dynamic Customer Relationship Management through Information Technology: Conceptual Framework and Case Study (정보기술을 활용한 동적인 고객관계관리: 개념적 틀과 사례연구)

  • Park, Chung-Hoon;Kim, Young-Gul
    • Information Systems Review
    • /
    • v.4 no.1
    • /
    • pp.33-45
    • /
    • 2002
  • With the advance of information technology, it is possible to build the interactive communication channel among relationship participants with low cost, and this channel makes ties between consumers and company by enabling information sharing and exchange. In order to maintain customer relationship, it is necessary to support customer information that includes of-the-customer, for-the-customer, and by-the-customer information. From the three types of customer information, the proper information for the relationship management like the level and type of commitment can be extracted. Customer Information System (CIS), which includes database, communication channel, application program, should be designed to facilitate the customer relationship management. Since lots of investments to information system are required, it is not easy to implement. This paper develops a framework of dynamic customer relationship management and suggests an effective information technology strategy to support that.

A Study on Attack Pattern and Analysis System against SIP Signaling Message-based DoS (SIP 호 설정 메시지기반 서비스 거부 공격패턴 및 분석시스템에 관한 연구)

  • Ha, Do-Yoon;Kim, Hwan-Kuk;Ko, Kyoung-Hee;Lee, Chang-Yong;Kim, Jeong-Wook;Jeong, Hyun-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.653-654
    • /
    • 2009
  • 인터넷전화의 활성화와 더불어 SIP 프로토콜의 사용이 증가하고 있다. 최근 DDoS 공격이 주요위협으로 이슈가 되고 있으며, 향후 SIP관련 서비스 대상 서비스 거부 공격 위협도 증가할 것으로 예상된다. 본 논문에서는 SIP 프로토콜의 특성을 이용한 SIP서비스 거부 공격들의 유형을 살펴보고, SIP 프로토콜의 특성을 이용한 서비스거부 공격 탐지를 위한 고려사항을 바탕으로 분석시스템 아키텍처를 제안한다. SIP서비스 거부공격의 유형은 분류 기준에 따라 다양할 수 있으나, 본 논문에서는 SIP 프로토콜의 특성을 이용한 공격 기법을 대상으로 한다. SIP서비스 거부 공격 트래픽 분석을 위해 정보수집, 정보분석, 정보관리 기능을 고려한다.

Approaching Content Reuse for Efficient Technical Documentation (효율적인 기술문서화를 위한 콘텐트 재사용성 접근방법)

  • Koo, Heung-Seo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.113-118
    • /
    • 2010
  • The single-sourcing of content is extremely beneficial because when we are managing several projects with hundreds or thousands of documentation, we don't want to be changing the same content, or substantially similar content in multiple locations. The Darwin Information Typing Architecture (DITA) is an XML-based architecture for authoring, producing, and delivering technical documents. It consists of a set of design principles for creating Information -typed topic modules and for using that content in various ways. In this paper, we examine the approach of using The Darwin Information Typing Architecture for technical documents development to enhance the reuse of existing content components for difference information products.

A Study on the Implementation of Digital Twin Architecture and Detailed Technology for Agriculture and Livestock Industry (농·축산 산업을 위한 디지털 트윈 아키텍처 및 세부 기술 구현에 관한 연구)

  • Jeong, Deuk-Young;Kim, Se-Han;Lee, In-Bok;Yeo, Uk-Hyeon;Lee, Sang-Yeon;Kim, Jun-Gyu;Park, Se-Jun
    • Journal of Broadcast Engineering
    • /
    • v.26 no.4
    • /
    • pp.398-408
    • /
    • 2021
  • Since COVID-19, the world's food shortage population has more than doubled from 130 million to 270 million. In addition, as various issues related to the food industry such as climate change arise, the importance of agriculture and livestock is increasing. In particular, it is still difficult to utilize data generated in these field. Therefore, the objective of this study was to explain the limitations of using data based on fragmentary analysis and the necessity of Digital Twin. The additional objective was to propose an architecture and necessary technologies of a Digital Twin platform suitable for agricultural and livestock. It also proposed a Digital Twin-based service that could be used in the near future, such as labor reduction, productivity improvement, personalized consumption, transportation, and distribution by incorporating intelligent information convergence technology into facility horticulture and livestock farming.

The Study of Data Classification Rethesis on Korea Government DRM (Data Reference Model) - The Establishment of New Data Principal, Classfication and Case Verification - (범정부 데이터 참조모형 데이터 분류체계 재정립에 관한 연구 - 데이터 분류 원칙, 체계수립 및 사례 검증 -)

  • Koo, Ja-Myon;Park, Joo-Seok;Shin, Daul
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.2
    • /
    • pp.187-197
    • /
    • 2012
  • The investment on informatization has caused the increase in complexity of IT resources as well as inefficiency of Information system management and redundant investment. Thus, the idea of EA (Enterprise Architecture) was developed in order to manage the IT resources efficiently but the systematical guideline was insufficiently provided in data area.. Because of this, it is necessary to make full use of DRM (Data Reference Model) so we can enhance the sharing and reuse of data between several institutions in public sector by extracting and managing data behind processes. In this study, we recognize the necessity of improvement on data classification which is highly utilized and present the direction for the data classification rethesis.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

Performance Comparative Analysis Of Open Source Software for the New Generation of V-World Architecture Configuration (차세대 브이월드 아키텍처 구성을 위한 공개 소프트웨어 성능 비교 분석)

  • Jang, Han Sol;Jang, Jun Sung;Go, Jun Hee;Jang, In Sung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.3
    • /
    • pp.19-27
    • /
    • 2016
  • Advance in Information and Communication Technology (ICT) is intensely influenced to increase importance of Software on global ICT industries. The trend of technological development has been transformed from hardware-oriented environment to software-oriented environment. This industrial transformation brought novel trend to Software market. Open Source Software (OSS) has been widely distributed for private uses. At the same time, many governmental offices are planning to expand the use of OSS. In this paper, we analyze the strength and weaknesses of OSSs for both Web and WAS servers based on 4 types of testing environments which are created by the combination of 5 selected OSSs. We anticipated to learn the optimal system architecture design for the next generation of V-World through this research.

NFV 기반 네트워크 보안 서비스 시스템

  • Hyun, Sangwon
    • Review of KIISC
    • /
    • v.27 no.1
    • /
    • pp.18-24
    • /
    • 2017
  • 네트워크 기능 가상화(Network Function Virtualization, NFV) 기술은 기존에 물리적인 장비 형태로 제공되던 네트워크 기능들을 소프트웨어로 구현하여 가상의 인스턴스 형태로 제공하는 것을 말한다. 이런 NFV 기술을 통해 가용한 네트워크 자원들의 효율적인 활용과 가변적인 시스템 상황에 대한 유연한 대응이 가능하다. 이러한 NFV 기술이 점차 발전하면서 네트워크 보안 분야에서도 보안 서비스 벤더들이 자신들의 클라우드 시스템을 통해 소프트웨어 기반 다양한 네트워크 보안 기능들을 제공하는 시스템 형태가 점차 나타나고 있다. 본 논문에서는 NFV 기반 네트워크 보안 서비스 제공 시스템을 위한 참고 아키텍처로서 국제 인터넷 기술 표준화 단체인 IETF의 Interface to Network Security Functions (I2NSF) working group에서 제안한 I2NSF 시스템을 소개한다. 그리고 이러한 시스템 모델을 기반으로 NFV 기반 네트워크 보안 서비스 제공 시스템 설계 및 개발 시 고려해야 할 주요 연구이슈들에 관해 논의한다.