• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 651, Processing Time 0.028 seconds

A Study on Dynamic Role-based Service Allocation for Service Oriented Architecture System (서비스 지향 아키텍처 시스템을 위한 동적 역할 기반 서비스 할당에 관한 연구)

  • Park, Yong B.;Kwon, Ye Jin
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.1
    • /
    • pp.12-20
    • /
    • 2018
  • Recently, web-based service software has been used as to combine various information or to share information according to the needs of users and the convergence of specialized fields and individual dependent systems. According to the necessity of the user, the proper service environment and the selective service environment according to the purpose and the needs of the user have been studied in a variety of specialized and combined professional research fields and industries. Software based on cloud systems and web services is being used as a tool for appropriate group and user groups and roles. A service system combined dynamically needs a module to manage a user through internal logic and grant a service access authentication. Therefore, it has been considered various approaches that a user who accesses the system is given a service access authority for a certain period of time. Also, when the deadline is over, the authority that you are given to access system will go through the process of expire the right. In this paper, we define the roles of users who access web services, manage user rights according to each role, and provide appropriate service resources to users according to their rights and session information. We analyzed the procedure of constructing the algorithm for the service according to the procedure of each user accessing the web service, granting the service resource and constructing a new role.

Implementation and Verification of IMT-Advanced Simulator for 4G Evaluation (4G 기술 평가를 위한 IMT-Advanced 시뮬레이터 구현 및 검증)

  • Kim, Dae-Jung;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.466-476
    • /
    • 2010
  • This paper proposes a novel simulator which is capable of loading different modules enabling to update the simulator easily when the 4G mobile communication technologies are revised. This simulator is not only designed based on IMT-Advanced channel model but also confirmed its reliability through mutual verification with Matlab based simulator developed by Winner+. The proposed simulator was evaluated on the basis of evaluation requirements on the IMT-Advanced. By comparing with experimental results for IEEE and 3GPP, it was also proved for the simulator to have a better performance.

A Study on Context Aware Agent Development for Mobile Convergence (모바일 컨버전스를 위한 상황인식 에이전트 개발에 관한 연구)

  • Kwon, Kyu-Heum;Shin, Ho-Jun;Kim, Seong-Won;Kim, Haeng-Kon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.271-274
    • /
    • 2005
  • 현재 무선인터넷의 중요성이 강조되면서 모바일 단말 장치는 모바일 비즈니스 프로세스에서 중요한 역할을 담당한다. 특히 모바일 장비는 차세대 기술인 임베디드와 유비쿼터스 컴퓨팅의 주요 단말 장치이며 개발 대상이다. 앞으로 차세대 이동통신망 중심의 융합 및 이동 단말의 컴퓨팅 능력이 고도화되면 언제, 어디서나, 누구와도 모든 정보를 이용할 수 있는 고속 멀티미디어 통신 환경 즉, 유비쿼터스 환경이 구축될 것이며 향후 이러한 환경에서 모바일 컨버전스 서비스는 특정 시점의 사용자 상황에 적절한 서비스를 제공하는 상황인식의 특성을 가지게 될 것이다. 따라서, 본 논문에서는 모바일 컨버전스를 위한 상황인식 에이전트 개발을 위한 컴퓨팅 아키텍처를 정의하고 개발을 용이하기 위해 재사용 가능한 컴포넌트를 기반으로 하여 모바일 컨버전스에 대한 분석 및 설계에 관하여 제시하였다. 이를 통해 모바일 환경에서 재사용성 및 이식성과 에이전트 개발에 대한 시간과 비용에 대한 절감을 기대할 수 있다.

  • PDF

포터블 멀티미디어 기기 분석을 통한 모듈화 된 포터블 멀티미디어 시스템 아키텍처 설계

  • Kim, Dong-Kyun;Kim, K.H.;Choi, S.K.;Lee, J.Y.;Lu, Y.J.;Pack, B.S.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10d
    • /
    • pp.769-772
    • /
    • 2006
  • 지식정보화의 사회적 발전에 따라 IT기술도 장소와 공간에 제약 받지 않는 이동성, 휴대성이 강조되고 있다. 이는 유비쿼터스 사회로의 급격한 진입이라는 시대적 상황과 맞물려 유비쿼터스 컴퓨팅 환경에 적합한 컴퓨팅 디바이스의 등장이 요구되고 있다. 본 논문에서는 다양한 포터블기기(PMP, UMPC, MP3, 게임기)들의 기능과 콘텐츠를 조사, 분석하여 차세대 포터블 멀티미디어 시스템에서 요구되는 기능을 도출하였으며 또한 이를 기반으로 모듈화 된 포터블 멀티미디어 시스템의 구조를 설계했다. 본 연구의 결과는 점차 성숙해가고 있는 포터블 멀티미디어 시스템 산업의 하드웨어적 표준을 제시함으로써 효율적인 개발 방안을 모색할 수 있을 것으로 기대된다.

  • PDF

TTA와 함께한 ICT표준자문서비스 - 엠투엠테크, IoT 표준으로 국내 승강기 시장 지킨다

  • TTA 표준화본부 표준확산부
    • TTA Journal
    • /
    • s.168
    • /
    • pp.100-103
    • /
    • 2016
  • (주)엠투엠테크는 승강기 산업분야에서 IoT 기반 스마트 디바이스를 개발 중인 스타트업 기업이다. 특히, 윈격진단, 포렌식 기능 등 확장된 관제서비스가 가능한 스마트 디바이스 개발에 주력하고 있다. 하나의 디바이스가 다양한 제조사의 승강기에 적용되려면 승강기의 주요 부품, 디바이스, 관제 센터 간의 표준화된 통신 체계가 필요하며, 기존 승강기의 안전을 담보할 수 있는 시스템 유지 관리 체계가 구축되어야 한다. 미래에는 전체 스마트 디바이스로의 연결을 더욱 확대하여 궁극적으로 스마트 빌딩, 도시로의 적용 역시 가능하게 할 단계적 진화 모델의 고려가 필요한 것도 물론이다. (주)엠투엠테크가 TIA의 중소 중견기업을 위만 표준 자문서비스를 신정만 것은 이 때문이었다. (주)엠투엠테크는 TTA 표준 자문전문가들과 함께 국제 표준을 기반으로 한 IoT 프로토콜을 적용해 제품을 업그레이드할 수 있는 시스템 아키텍처를 설계할 수 있었다.

  • PDF

Research on the linking method of ITA and BSC (ITA와 BSC의 연계 방안 연구)

  • Kim, Ji-Young;Cho, sung-nam;Chung, taik-yeong;Park, chan-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.947-950
    • /
    • 2007
  • Recently, most of the public institutions are developing ITA(Information Technology Architecture) & BSC (Balance ScoreCard) system. ITA's reference model is provided for the consistency, reusability, and interoperability. By the way, PRM(Performance Reference Model), one of the ITA reference models, is needed to link with BSC system. In this paper, we provide the linking method of ITA and BSC.

  • PDF

An Empirical Study on Influencing Factors of Enterprise Architecture Maturity Level : Focusing on the Public Agencies (정보기술아키텍처 성숙도에 영향을 미치는 요인에 관한 실증적 연구 : 공공기관을 중심으로)

  • Park, Hyun-Woo;Park, Il-Kyu;Kim, Sang-Hoon
    • Journal of Information Technology Services
    • /
    • v.8 no.4
    • /
    • pp.57-73
    • /
    • 2009
  • The rapid development of IT and the large-scale investment of IT motivate the public agencies to find the ways of effective IT management. Even though the public agencies adopt Enterprise Architecture (EA) as the new alternative for effective IT management, EA practices are still insufficient in the area of utilization and management after the adoption. Therefore, this research aims to identify the influencing factors for improving EA maturity level in terms of the long-term business activities such as establishment, management and utilization. Also, this research empirically identifies the influencing factors on the adoption and operation of EA in the public agencies, and clarifies how such factors impact on EA maturity level.

Recent Research & Development Trends in Automated Machine Learning (자동 기계학습(AutoML) 기술 동향)

  • Moon, Y.H.;Shin, I.H.;Lee, Y.J.;Min, O.G.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.4
    • /
    • pp.32-42
    • /
    • 2019
  • The performance of machine learning algorithms significantly depends on how a configuration of hyperparameters is identified and how a neural network architecture is designed. However, this requires expert knowledge of relevant task domains and a prohibitive computation time. To optimize these two processes using minimal effort, many studies have investigated automated machine learning in recent years. This paper reviews the conventional random, grid, and Bayesian methods for hyperparameter optimization (HPO) and addresses its recent approaches, which speeds up the identification of the best set of hyperparameters. We further investigate existing neural architecture search (NAS) techniques based on evolutionary algorithms, reinforcement learning, and gradient derivatives and analyze their theoretical characteristics and performance results. Moreover, future research directions and challenges in HPO and NAS are described.

A Study of Web Application Security Quality Architecture Management Process referenced ISO/IEC9000 Model (ISO/IEC9000모델을 참조한 웹 애플리케이션 보안품질 관리체계 설계)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.11-17
    • /
    • 2012
  • According to ISO/IEC 9000, quality to satisfy users' requirements when using the product or service is defined as the characteristics of the synthesized concept. Secure web application coding information systems with the reliability and quality of service is one of the determining factor. Secure coding in order to achieve the quality based on the model is necessary. The reason is that the security is in quality properties in the range of non-functional requirements that necessitates. Secure coding for the design of quality systems based on the quality of the definition of quality attributes, quality requirements, quality attribute scenarios are defined, and must be set. To this end, referring to IEEE 1061 quality model for web application, quality model structure is developed. Secure web application architecture design is composed of coding quality of the model systems, web applications draw interest to stakeholders, decision drivers secure coding architecture, quality attributes, eliciting quality requirements of the security settings, creating web application architecture descriptions and security framework.

Identification of Microservices to Develop Cloud-Native Applications (클라우드네이티브 애플리케이션 구축을 위한 마이크로서비스 식별 방법)

  • Choi, Okjoo;Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.51-58
    • /
    • 2021
  • Microservices are not only developed independently, but can also be run and deployed independently, ensuring more flexible scaling and efficient collaboration in a cloud computing environment. This impact has led to a surge in migrating to microservices-oriented application environments in recent years. In order to introduce microservices, the problem of identifying microservice units in a single application built with a single architecture must first be solved. In this paper, we propose an algorithm-based approach to identify microservices from legacy systems. A graph is generated using the meta-information of the legacy code, and a microservice candidate is extracted by applying a clustering algorithm. Modularization quality is evaluated using metrics for the extracted microservice candidates. In addition, in order to validate the proposed method, candidate services are derived using codes of open software that are widely used for benchmarking, and the level of modularity is evaluated using metrics. It can be identified as a smaller unit of microservice, and as a result, the module quality has improved.