• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 651, Processing Time 0.021 seconds

Total Information System for Urban Regeneration : City and District Level Decline Diagnostic System (도시재생 종합정보시스템 구축 - 시군구단위 쇠퇴진단시스템 구현을 중심으로 -)

  • Yang, Dong-Suk;Yu, Yeong-Hwa
    • Land and Housing Review
    • /
    • v.2 no.3
    • /
    • pp.249-258
    • /
    • 2011
  • In order to achieve an efficient urban regeneration of the nation, it is required to determine the extent of decline nation-wide and the declined areas for each district and also to evaluate the potentials of the concerned areas. For this task to be accomplished, a construction of a comprehensive diagnostic system based on spatial information considering diversity and complexity is required. In this study, a total information system architecture for urban regeneration is designed as part of the construction of such a diagnostic system. In order to develop the system, a city and district level unit decline diagnostic indicators has been constructed and a decline diagnostic system has been developed. Also, a scheme to promote the advancement of the system is proposed. The DB construction is based on the city and district level nation-wide and metadata for the concerned level is constructed as well. The system is based on the Open API and designed to be flexible for extension. Also, an RIA-based intuitive UI has been implemented. Main features of the system consist of the management of the indicators, diagnostic analysis (city and district level decline diagnosis), related information, etc. As for methods for the advancement, an information model in consideration of the spation relations of the urban regeneration DB has been designed and application methods of semantic webs. Also, for improvement methods for district unit analytical model, district level analysis models, GIS based spatial analysis platforms and linked utiliation of KOPSS analysis modules are suggested. A use of a total information system for urban regeneration is anticipated to facilitate concerned policy making through the identification of the status of city declines to identify and the understanding of the demands for regeneration.

A Survey of Weather Forecasting Software and Installation of Low Resolution of the GloSea6 Software (기상예측시스템 소프트웨어 조사 및 GloSea6 소프트웨어 저해상도 설치방법 구현)

  • Chung, Sung-Wook;Lee, Chang-Hyun;Jeong, Dong-Min;Yeom, Gi-Hun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.349-361
    • /
    • 2021
  • With the development of technology and the advancement of weather forecasting models and prediction methods, higher performance weather forecasting software has been developed, and more precise and accurate weather forecasting is possible by performing software using supercomputers. In this paper, the weather forecast model used by six major countries is investigated and its characteristics are analyzed, and the Korea Meteorological Administration currently uses it in collaboration with the UK Meteorological Administration since 2012 and explains the GloSea However, the existing GloSea was conducted only on the Meteorological Administration supercomputer, making it difficult for various researchers to perform detailed research by specialized field. Therefore, this paper aims to establish a standard experimental environment in which the low-resolution version based on GloSea6 currently used in Korea can be used in local systems and test it to present the localization of low-resolution GloSea6 that can be performed in the laboratory environment. In other words, in this paper, the local portability of low-resolution Globe6 is verified by establishing a basic architecture consisting of a user terminal-calculation server-repository server and performing execution tests of the software.

An Extension of the DBMax for Data Warehouse Performance Administration (데이터 웨어하우스 성능 관리를 위한 DBMax의 확장)

  • Kim, Eun-Ju;Young, Hwan-Seung;Lee, Sang-Won
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.407-416
    • /
    • 2003
  • As the usage of database systems dramatically increases and the amount of data pouring into them is massive, the performance administration techniques for using database systems effectively are getting more important. Especially in data warehouses, the performance management is much more significant mainly because of large volume of data and complex queries. The objectives and characteristics of data warehouses are different from those of other operational systems so adequate techniques for performance monitoring and tuning are needed. In this paper we extend functionalities of the DBMax, a performance administration tool for Oracle database systems, to apply it to data warehouse systems. First we analyze requirements based on summary management and ETL functions they are supported for data warehouse performance improvement in Oracle 9i. Then, we design architecture for extending DBMax functionalities and implement it. In specifics, we support SQL tuning by providing details of schema objects for summary management and ETL processes and statistics information. Also we provide new function that advises useful materialized views on workload extracted from DBMax log files and analyze usage of existing materialized views.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Study on Utilization Effect and Implementation Model of Directory Service Based Information Resource Management System (디렉터리 서비스 기반 정보자원 관리시스템의 활용 효과 및 구축 모델에 대한 연구)

  • Lee, Sung-Jun;Kim, Hyuk;Lee, Kwang Soo;Kim, Minsoo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.4
    • /
    • pp.427-439
    • /
    • 2014
  • Introduction of new information systems due to continuous progress of ICT has made the enterprise IT environment into a mixed pot of various IT resources. Rapidly changing business situation has emphasized the integration of organizational IT resources as one of key competitive advantages. Those distributed IT resources are now demanding to solve the problems not only on their own effective management but also on security and control issues against unauthorized infiltration and information leakages. Under the situation that the number of IT resources is constantly increasing, it is needed to study a management model and its implementation that integrally solves above all problems. In this paper, it is revealed that a directory service can be used to integrally manage distributed IT resources and a directory service based system model for distributed IT resource management is suggested. By implementing an HR solution over active directory service, it is demonstrated that our integrated management model for distributed resources is applicable to real business cases. It is expected that for small and medium sized enterprises with limited IT investments, directory service based IT resource management system can be a cost-effective solution for increasing security threats and lack of governance.

A Study of Modularity in the Perspective of Standardization: A Comparative Analysis of Electronic and Automotive Industries (표준화 정책 측면에서 모듈성 연구: 전자 산업과 자동차 산업 비교 분석)

  • Kim, Dong-hyu;Kang, Byung-Goo;Kim, Chulsik
    • Journal of Technology Innovation
    • /
    • v.23 no.3
    • /
    • pp.169-199
    • /
    • 2015
  • Information and communication technologies (ICT) have been combined with products from other industries to provide new functionality, as recently shown in the cases of Internet of Things (IoT). Modularity assumes a crucial role in such technological convergence, and has impacts on the relationship between organizations as well as competition within an industry. Interface standards, which ensure the connectivity between modules, serve as a critical factor in the process by which modularity affects organization systems and industry structure. To understand the aforementioned phenomenon, we studied modularity and interface standards with a focus on the interaction between technology and organization systems and subsequent changes in industrial dynamics. This paper examines previous literature on modularity and interface standards in the aspects of product architecture, organization systems, and institutional factors. With this analytical framework, we conducted a comparative analysis of electronic and automotive industries to derive implications for standardization policy. This research has shown the significance of external open interface standards in shaping an industrial landscape where a variety of module producers horizontally compete. It also advises that policymakers take into account product characteristics, engagement of leading firms in an industry, and institutional factors such as WTO law in the design of standardization policy.

Multi-Dimensional Keyword Search and Analysis of Hotel Review Data Using Multi-Dimensional Text Cubes (다차원 텍스트 큐브를 이용한 호텔 리뷰 데이터의 다차원 키워드 검색 및 분석)

  • Kim, Namsoo;Lee, Suan;Jo, Sunhwa;Kim, Jinho
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.63-73
    • /
    • 2014
  • As the advance of WWW, unstructured data including texts are taking users' interests more and more. These unstructured data created by WWW users represent users' subjective opinions thus we can get very useful information such as users' personal tastes or perspectives from them if we analyze appropriately. In this paper, we provide various analysis efficiently for unstructured text documents by taking advantage of OLAP (On-Line Analytical Processing) multidimensional cube technology. OLAP cubes have been widely used for the multidimensional analysis for structured data such as simple alphabetic and numberic data but they didn't have used for unstructured data consisting of long texts. In order to provide multidimensional analysis for unstructured text data, however, Text Cube model has been proposed precently. It incorporates term frequency and inverted index as measurements to search and analyze text databases which play key roles in information retrieval. The primary goal of this paper is to apply this text cube model to a real data set from in an Internet site sharing hotel information and to provide multidimensional analysis for users' reviews on hotels written in texts. To achieve this goal, we first build text cubes for the hotel review data. By using the text cubes, we design and implement the system which provides multidimensional keyword search features to search and to analyze review texts on various dimensions. This system will be able to help users to get valuable guest-subjective summary information easily. Furthermore, this paper evaluats the proposed systems through various experiments and it reveals the effectiveness of the system.

A Structured Methodology with Device Collaboration Diagram for Evaluating Context-Aware Systems (장비협업도를 활용한 상황인식 시스템에 대한 구조적 평가 방법론)

  • Kwon, Oh-Byung;Lee, Nam-Yeon
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.2
    • /
    • pp.27-41
    • /
    • 2007
  • Nowadays the context-aware systems have been regarded as a promising opportunity to create differentiated e-marketplaces. Context-aware system aims to provide personalized services by understanding the user's current situation which is automatically acquired from the context data. This aim naturally leads us to a motivation to evaluate to what extent a system is context-aware. Even though lots of endeavors have stated about the level of context-aware system, a structured evaluation has been so far very rare. Hence, the purpose of this paper is to propose a two-phased methodology for assessing context-aware systems. In the first phase, we perform a requisite analysis to discriminate a context-aware system from general or context-based systems. Once an information system is recognized as context-aware system, then level of collaboration, mobility and embeddedness is derived to determine the level of context-aware system in the second phase. To do so, device collaboration diagram (DCD) is proposed to visualize the system architecture. Moreover, readiness and level of system are Jointly considered in the phase to provide a development strategy for each context-aware system development project. To show the feasibility of the idea proposed in this paper, legacy context-aware systems are actually analyzed and evaluated.

  • PDF

An User Behavior Monitoring Techniques Based Intelligent Agent on the Web (웹 상에서 지능형 에이전트 기반 사용자 행위 모니터링 기법)

  • 강동원;이경미
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.8
    • /
    • pp.1109-1116
    • /
    • 2001
  • This paper describes a mechanism and its aspects for monitoring user actions and behaviors on the web operated under the layered architecture that utilizes intelligent agents, and by which personalized information services, for instance one-to-one marketing, is easily facilitated and developed. Intelligent agent is one of techniques which enables to automate the whole process for providing personalized services that includes monitoring, logging a user actions and analyzing behaviors based on his or her profiles, and then selecting, organizing customizable contents which are at last delivered to the users browser or mail box also by intelligent agents. Monitoring technologies can utilize to help better construct the process in providing personalized services in that those services require intelligence in operating. As a result, implementing effective personalized services, however, depends on how well to define various users interests and needs, and how correctly to detect and log the actions when hey are done by users.

  • PDF

Design and Implementation of App Control System for Improving the Security of the Mobile Application (모바일 애플리케이션의 보안성 향상을 위한 App 제어 시스템 설계 및 구현)

  • Lee, Yu-Jun;Jang, Young-Hwan;Park, Seok-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.243-250
    • /
    • 2016
  • Recently, with the rise of the mobile device, from mobile devices the user who owns the security, speed up the implementation of the guarantee management environment as businesses and individual equipment for the effcient management of the existing system, but the introduction of the MDM MDM App management features administrators to register the App until you can't prvent the security threat. Therefore, this paper addresses these issues in order to improve the security of your application for the control system. The proposed system is a function of the MDM authentication technology to design analysis, and system architecture to help prevent information disclosure within the design and implementation of Mobile-based application control system. Implementation of the control system to assess the security of the international common criteria security evaluation complete the test scenarios on the basis of the test items. An average of 40% of the test results to verify the results of this enhanced security.