• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 657, Processing Time 0.028 seconds

An Empirical Study on Influencing Factors of Enterprise Architecture Maturity Level : Focusing on the Public Agencies (정보기술아키텍처 성숙도에 영향을 미치는 요인에 관한 실증적 연구 : 공공기관을 중심으로)

  • Park, Hyun-Woo;Park, Il-Kyu;Kim, Sang-Hoon
    • Journal of Information Technology Services
    • /
    • v.8 no.4
    • /
    • pp.57-73
    • /
    • 2009
  • The rapid development of IT and the large-scale investment of IT motivate the public agencies to find the ways of effective IT management. Even though the public agencies adopt Enterprise Architecture (EA) as the new alternative for effective IT management, EA practices are still insufficient in the area of utilization and management after the adoption. Therefore, this research aims to identify the influencing factors for improving EA maturity level in terms of the long-term business activities such as establishment, management and utilization. Also, this research empirically identifies the influencing factors on the adoption and operation of EA in the public agencies, and clarifies how such factors impact on EA maturity level.

Recent Research & Development Trends in Automated Machine Learning (자동 기계학습(AutoML) 기술 동향)

  • Moon, Y.H.;Shin, I.H.;Lee, Y.J.;Min, O.G.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.4
    • /
    • pp.32-42
    • /
    • 2019
  • The performance of machine learning algorithms significantly depends on how a configuration of hyperparameters is identified and how a neural network architecture is designed. However, this requires expert knowledge of relevant task domains and a prohibitive computation time. To optimize these two processes using minimal effort, many studies have investigated automated machine learning in recent years. This paper reviews the conventional random, grid, and Bayesian methods for hyperparameter optimization (HPO) and addresses its recent approaches, which speeds up the identification of the best set of hyperparameters. We further investigate existing neural architecture search (NAS) techniques based on evolutionary algorithms, reinforcement learning, and gradient derivatives and analyze their theoretical characteristics and performance results. Moreover, future research directions and challenges in HPO and NAS are described.

A Study of Web Application Security Quality Architecture Management Process referenced ISO/IEC9000 Model (ISO/IEC9000모델을 참조한 웹 애플리케이션 보안품질 관리체계 설계)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.11-17
    • /
    • 2012
  • According to ISO/IEC 9000, quality to satisfy users' requirements when using the product or service is defined as the characteristics of the synthesized concept. Secure web application coding information systems with the reliability and quality of service is one of the determining factor. Secure coding in order to achieve the quality based on the model is necessary. The reason is that the security is in quality properties in the range of non-functional requirements that necessitates. Secure coding for the design of quality systems based on the quality of the definition of quality attributes, quality requirements, quality attribute scenarios are defined, and must be set. To this end, referring to IEEE 1061 quality model for web application, quality model structure is developed. Secure web application architecture design is composed of coding quality of the model systems, web applications draw interest to stakeholders, decision drivers secure coding architecture, quality attributes, eliciting quality requirements of the security settings, creating web application architecture descriptions and security framework.

Identification of Microservices to Develop Cloud-Native Applications (클라우드네이티브 애플리케이션 구축을 위한 마이크로서비스 식별 방법)

  • Choi, Okjoo;Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.51-58
    • /
    • 2021
  • Microservices are not only developed independently, but can also be run and deployed independently, ensuring more flexible scaling and efficient collaboration in a cloud computing environment. This impact has led to a surge in migrating to microservices-oriented application environments in recent years. In order to introduce microservices, the problem of identifying microservice units in a single application built with a single architecture must first be solved. In this paper, we propose an algorithm-based approach to identify microservices from legacy systems. A graph is generated using the meta-information of the legacy code, and a microservice candidate is extracted by applying a clustering algorithm. Modularization quality is evaluated using metrics for the extracted microservice candidates. In addition, in order to validate the proposed method, candidate services are derived using codes of open software that are widely used for benchmarking, and the level of modularity is evaluated using metrics. It can be identified as a smaller unit of microservice, and as a result, the module quality has improved.

Architecture Design for Disaster Prediction of Urban Railway and Warning System (UR-DPWS) based on IoT (IoT 기반 도시철도 재난 예지 및 경보 시스템 아키텍처 설계)

  • Eung-young Cho;Joong-Yoon Lee;Joo-Yeoun Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.1
    • /
    • pp.163-174
    • /
    • 2024
  • Currently, the urban railway operating agency is improving the emergency telephone in operation into an IP-based "trackside integrated interface communication facility" that can support a variety of additional services in order to quickly respond to emergency situations within the tunnel. This study is based on this Analyze the needs of various stakeholders regarding the design of a system architecture that establishes an IoT sensor network environment to detect abnormal situations in the tunnel and transmits the collected information to the control center to predict disaster situations in advance, and defines the system requirements. In addition, a scenario model for disaster response was provided through the presentation of a service model. Through this, the perspective of responding to urban railway disasters changes from reactive response to proactive prevention, thereby ensuring safe operation of urban railways and preventing major industrial accidents.

Metadata Log Management for Full Stripe Parity in Flash Storage Systems (플래시 저장 시스템의 Full Stripe Parity를 위한 메타데이터 로그 관리 방법)

  • Lim, Seung-Ho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.11
    • /
    • pp.17-26
    • /
    • 2019
  • RAID-5 technology is one of the choice for flash storage device to enhance its reliability. However, RAID-5 has inherent parity update overhead, especially, parity overhead for partial stripe write is one of the crucial issues for flash-based RAID-5 technologies. In this paper, we design efficient parity log architecture for RAID-5 to eliminate runtime partial parity overhead. During runtime, partial parity is retained in buffer memory until full stripe write completed, and the parity is written with full strip write. In addition, parity log is maintained in memory until whole the stripe group is used for data write. With this parity log, partial parity can be recovered from the power loss. In the experiments, the parity log method can eliminate partial parity writes overhead with a little parity log writes. Hence it can reduce write amplification at the same reliability.

Development of lane-level location data exchange framework based on high-precision digital map (정밀전자지도 기반의 차로 수준의 위치정보 교환 프레임워크 개발)

  • Yang, Inchul;Jeon, Woo Hoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1617-1623
    • /
    • 2018
  • It is necessary to develop a next generation location referencing method with higher accuracy as advanced technologies such as autonomous vehicles require higher accuracy of location data. Thus, we proposed a framework for a lane-level location referencing method (L-LRM) based on high-precision digital road network map, and developed a tool which is capable of analyzing and evaluating the proposed method. Firstly, the necessity and definition of location referencing method was presented, followed by the proposal of an L-LRM framework with a fundamental structure of high-precision digital road network map for the method. Secondly, an architecture of the analysis and evaluation tool was described and then the Windows application program was developed using C/C++ programming language. Finally, we demonstrated the performance of the proposed framework and the application program using two different high precision digital maps with randomly generated road event data.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Implementation of a Large-scale Web Query Processing System Using the Multi-level Cache Scheme (계층적 캐시 기법을 이용한 대용량 웹 검색 질의 처리 시스템의 구현)

  • Lim, Sung-Chae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.7
    • /
    • pp.669-679
    • /
    • 2008
  • With the increasing demands of information sharing and searches via the web, the web search engine has drawn much attention. Although many researches have been done to solve technical challenges to build the web search engine, the issue regarding its query processing system is rarely dealt with. Since the software architecture and operational schemes of the query processing system are hard to elaborate, we here present related techniques implemented on a commercial system. The implemented system is a very large-scale system that can process 5-million user queries per day by using index files built on about 65-million web pages. We implement a multi-level cache scheme to save already returned query results for performance considerations, and the multi-level cache is managed in 4-level cache storage areas. Using the multi-level cache, we can improve the system throughput by a factor of 4, thereby reducing around 70% of the server cost.

Storage and a variety of perspectives for the most out of knowledge study relations law (지식의 저장과 활용을 극대화하기 위한 다양한 관점에 대한 관계 법칙 연구)

  • Yoon, KyungBae;Kwon, HeeChoul;Moon, HyunHee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.23-29
    • /
    • 2016
  • The purpose of this study is to study the laws of storage and utilization in various perspectives in order to maximize the storage of knowledge and to use stored knowledge. In other words, it analyzes the relationship rules in five viewpoints of 'human and knowledge', 'human and goods', 'the law of exact intersection with humans', 'human architecture formation process', 'human and knowledge' This course studies how to maximize the relationship rules between knowledge storage and utilization through knowledge management, intuition, rapid decision-making, and understanding of various knowledge. In order to maximize the value of knowledge in the organization, the knowledge management system obtained in this way systematically organizes various information about the knowledge creation of the members and distributes it to all employees to use it for their work. As an information management infrastructure, To effectively manage the various knowledge and know-how accumulated in the organization and to share them with each other.