• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 652, Processing Time 0.033 seconds

The Design of XMDR Data Hub for Efficient Business Process Operation (효율적인 비즈니스 프로세스 운용을 위한 XMDR 데이터 허브 설계)

  • Hwang, Chi-Gon;Jung, Gye-Dong;Choi, Young-Keun
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.149-156
    • /
    • 2011
  • Recently, enterprise systems require the necessity of integration for data sharing and cooperation. As a methodology for integration, Service-Oriented Architecture for service integration and Master Data for integration of data, which is used for service, were appeared. This paper suggests a method that operates BP(Business Process) efficiently. We make XMDR(eXtended Meta Data Registry) as knowledge-repository to support the BP and construct data hubs to operate it. XMDR manages MDM(Master Data Management) to integrate the data, resolves heterogeneity between the data and provides relationship to the business efficiently. This is composed of MDR(Meta Data Registry), ontology and BR(Business Relations). MDR describes relationship between meta data to solve structured heterogeneity. Ontology describes semantic heterogeneity and relationship between data. BR describes relationship between tasks. XMDR data hub supports the management of master data and interaction of different process effectively.

Design and Application of Data Interchange Formats (DIFs) for Improving Interoperability in SBA (SBA 상호운용성 향상을 위한 데이터교환서식 설계 및 활용에 관한 연구)

  • Kim, Hwang Ho;Kim, Moon Kyung;Choi, Jin Young;Wang, Gi-Nam
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.275-285
    • /
    • 2012
  • DIFs (Data Interchange Formats) are needed to enhance interoperability of physically distributed organizations in SBA (Simulation Based Acquisition) process. DIFs play a role as a template of DPDs (Distributed Product Descriptions) and provide capability to use information directly without data format interchange process by allowing access to DPDs, which include various information and M&S (Modeling & Simulation) resources. This characteristic is essential for interoperability in ICE (Integrated Collaborative Environment) based SBA. This paper proposes a framework for the DIF and outputs from each phase of acquisition process for configuration data related to design and manufacturing in SBA process - Conceptual Data Model, Logical Data Model, Physical Data Model and Physical DIF based on XML. Finally, we propose the DIF model architecture and demonstrate the implementation of DIF example based on it.

An Application of GRID Architecture on a Part of Urban Facilities Management Based on U-GIS (U-GIS 기반 도시시설물 관리 분야의 그리드(GRID) 아키텍처 적용 연구)

  • Nam, Sang-Kwan;Oh, Yoon-Seuk;Ryu, Seung-Ki;Kwon, Hyuk-Jong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.4
    • /
    • pp.113-124
    • /
    • 2009
  • A research of grid computing that is the combination of computer resources from multiple distributed administrative domains to get large amount of computing power is underway. This research is an application of grid technology on a urban facilities management system based on u-GIS. The sensors are set up in the urban facilities to make it monitoring. If an amount of sensors and gateways is increased, the server needs more computing resources to process the data. In this study we developed the skills that can distribute jobs to idle gateway, in case of the server capacity had approached threshold. It will be possible to develop of economic and efficient system that will apply to large amount of data processing about u-City.

  • PDF

Research on the current state of practical applications and limitations of quantum computing technology

  • Jaehyung, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.3
    • /
    • pp.1-9
    • /
    • 2023
  • In this paper, we identify the factors that hinder the application of quantum computing technology to solve meaningful real-world problems, and suggest related research trends and directions. To this end, we summarize the basic knowledge of quantum mechanics from the perspective of computer science, which is necessary to understand the difficulties in applying quantum computing technology, and analyze the currently commercialized quantum computers and quantum programming layers from the literature. Through an analysis of the current status and utilization of cloud-based commercial quantum computing services, we identify four factors that currently hinder the practical application of quantum computing: high barriers to entry for quantum computer programming, constraints on noisy intermediate-scale quantum computers, a still-growing open source ecosystem, and difficulties in simulating realistic problem sizes, and suggest trends and directions for related research. In doing so, it is expected to contribute to laying the groundwork for practical applications of quantum computing technology.

Image-Based Machine Learning Model for Malware Detection on LLVM IR (LLVM IR 대상 악성코드 탐지를 위한 이미지 기반 머신러닝 모델)

  • Kyung-bin Park;Yo-seob Yoon;Baasantogtokh Duulga;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.31-40
    • /
    • 2024
  • Recently, static analysis-based signature and pattern detection technologies have limitations due to the advanced IT technologies. Moreover, It is a compatibility problem of multiple architectures and an inherent problem of signature and pattern detection. Malicious codes use obfuscation and packing techniques to hide their identity, and they also avoid existing static analysis-based signature and pattern detection techniques such as code rearrangement, register modification, and branching statement addition. In this paper, We propose an LLVM IR image-based automated static analysis of malicious code technology using machine learning to solve the problems mentioned above. Whether binary is obfuscated or packed, it's decompiled into LLVM IR, which is an intermediate representation dedicated to static analysis and optimization. "Therefore, the LLVM IR code is converted into an image before being fed to the CNN-based transfer learning algorithm ResNet50v2 supported by Keras". As a result, we present a model for image-based detection of malicious code.

Blockchain Technology and Application

  • Lee, Sae Bom;Park, Arum;Song, Jaemin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.89-97
    • /
    • 2021
  • Blockchain is designed to collect and store the data recorded on the network in one block unit, and is connected and stored back and forth, and its form is similar to how the blocks are connected, so it is called a blockchain. Many companies are trying to popularize blockchain-based services at home and abroad, and blockchains are used in various industries. This study introduces the technical characteristics of the blockchain and deals with application services utilizing the blockchain. Introducing 5 types of blockchain architecture and core technologies and introducing blockchain application services that are used in payment services, blockchain service networks, blockchain real estate platforms, identity verification, cryptocurrency, diamond distribution path tracking, and blog information recording. do. It is expected to increase the understanding of the blockchain and provide usefulness in future blockchain research and service development.

A Study on the Influencing Factors in Using Army Logistics Information System (장비정비정보체계 사용 의도에 미치는 영향요인에 관한 연구)

  • Bae, Seongho;Jeong, Chanki
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.2
    • /
    • pp.181-195
    • /
    • 2013
  • This study is to investigate into the factors that influence the use of a military logistics information system in Korean army. We developed the research model based on DTPB (Decomposed Theory of Planned Behavior) because the DTBP is an appropriate model in a mandatary using environment through the study of previous technology-acceptance models. A questionnaire survey was conducted with Korean army solders and civilian components who use the army logistics information system and 266 valid questionnaires are recovered. The collected data were analyzed by SPSS and AMOS. The results show that perceived usefulness and ease of use did not affect the attitude of the use intention. The influence of colleagues and upper class officers was all satisfactory and computer self-efficiency affected perceived control of behavior. The results of this study will contribute to the further use of the military logistics information system and future development strategy.

Component Grid: A Developer-centric Environment for Defense Software Reuse (컴포넌트 그리드: 개발자 친화적인 국방 소프트웨어 재사용 지원 환경)

  • Ko, In-Young;Koo, Hyung-Min
    • Journal of Software Engineering Society
    • /
    • v.23 no.4
    • /
    • pp.151-163
    • /
    • 2010
  • In the defense software domain where large-scale software products in various application areas need to be built, reusing software is regarded as one of the important practices to build software products efficiently and economically. There have been many efforts to apply various methods to support software reuse in the defense software domain. However, developers in the defense software domain still experience many difficulties and face obstacles in reusing software assets. In this paper, we analyze practical problems of software reuse in the defense software domain, and define core requirements to solve those problems. To meet these requirements, we are currently developing the Component Grid system, a reuse-support system that provides a developer-centric software reuse environment. We have designed an architecture of Component Grid, and defined essential elements of the architecture. We have also developed the core approaches for developing the Component Grid system: a semantic-tagging-based requirement tracing method, a reuse-knowledge representation model, a social-network-based asset search method, a web-based asset management environment, and a wiki-based collaborative and participative knowledge construction and refinement method. We expect that the Component Grid system will contribute to increase the reusability of software assets in the defense software domain by providing the environment that supports transparent and efficient sharing and reuse of software assets.

  • PDF

Implementation of a Simulation Tool for Monitoring Runtime Thermal Behavior (실시간 온도 감시를 위한 시뮬레이션 도구의 구현)

  • Choi, Jin-Hang;Lee, Jong-Sung;Kong, Joon-Ho;Chung, Sung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.1
    • /
    • pp.145-151
    • /
    • 2009
  • There are excessively hot units of a microprocessor in today's nano-scale process technology, which are called hotspots. Hotspots' heat dissipation is not perfectly conquered by mechanical cooling techniques such as heatsink, heat spreader, and fans; Hence, an architecture-level temperature simulation of microprocessors is evident experiment so that designers can make reliable chips in high temperature environments. However, conventional thermal simulators cannot be used in temperature evaluation of real machine, since they are too slow, or too coarse-grained to estimate overall system models. This paper proposes methodology of monitoring accurate runtime temperature with Hotspot[4], and introduces its implementation. With this tool, it is available to track runtime thermal behavior of a microprocessor at architecture-level. Therefore, Dynamic Thermal Management such as Dynamic Voltage and Frequency Scaling technique can be verified in the real system.

A Web Service Development Process with MDA Applied (MDA를 적용한 웹서비스 개발 프로세스)

  • Yun Hong-ran;Park Jae-nyun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.4 s.100
    • /
    • pp.583-588
    • /
    • 2005
  • Being able to resolve huge problems deriving from integration of information systems in-house or business to business, the web service that uses the XML standard technology has recently taken a quick dominance the next generation e-business bases. It's one constant concern how to integrate, change, and maintain such systems as based on certain technologies according to the changes to information technology, which is on the ongoing process of evolution. To help solve those problems, OMG suggested a new software architecture called MDA(Model Driven Architecture). MDA runs a process that establishes a platform independent model(PIM), which is an analysis model used as part of the existing development procedures, and automatically converts it into a platform specific model(PSM), a design model, based on the established PIM. Such automatic conversion has lots of benefits including easy support for diverse platforms, reducing the coding time that usually consume a great deal of the developer's effort, and facilitating quality control in the aspect of development processes. By applying the MDA development process to a new web service development, you can choose web service as the target platform at the PIM of MDA and express PSM with a web service model, WSDL. This study set out to classify the web service development or integration processes by the provider md requester to identify the types of web service development processes, and to apply the MDA development process to web service development, thus suggesting a new kind of web service development process that can be referred to by both the web service provider and requester.