• Title/Summary/Keyword: 정보기술 아키텍처

Search Result 657, Processing Time 0.03 seconds

A Study on the Agent Component Development Support to PDA (PDA 지원 에이전트 컴포넌트 개발에 대한 연구)

  • Kim Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.37-50
    • /
    • 2006
  • In the focusing on the important of wireless internet, mobile terminal device plays a central role in tracking and coordinating terms in mobile business processing. Especially, mobile device has been considered as a key technology for embedded software and ubiquitous era. Because existing web environments is moving to wireless internet, the new concepts for wireless internet computing environments has gained increasing interest. Mobile agents provide a new abstraction for deploying over the existing infrastructures. Mobile application systems require the flexibility, adaptability, extensibility, and autonomous. New software developments methodology is required to meet the requirements. In this paper, we present an agent architectures model that allows compassable components with pluggable and independable. Our approach involves wrapping components inside a servlet. We have used the model and components to develop the PDA mobile agent.

A Study on the Component Development For e-Business Application Systems (e-비즈니스 응용 시스템을 위한 컴포넌트 개발에 관한 연구)

  • Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1095-1104
    • /
    • 2004
  • An electronic services which are based on Internet/Intranet business transactions are available to e-market places and get the broader business concepts. Component-based e-commerce technology is a recent trend towards resolving the e-commerce chanange at both system and ap-plication levels. The basic capabilities of component based systems should include the plug and play features at various granularities, interoper-ability across networks and mobility in various networking environments. E-business application developers are attempting to more towards web-service as a mechanism for developing component-based web-applications. Traditional process and development models are inadequately architectured to meet the rapidly evolving needs for the future of scalable web services. In this thesis, we focus specifically on the issues of e-business system architecture based on web service for establishing e-business system. We specifies and identifies design pattern for applying e-business domain in the context of multiple entities. We investigate prototype and frameworks to develope components for e-business application based suggested process. We present a worked example to demonstrate the behavior of Customer Authentication System(CAS) development with component and recommend process. Final]Y, we indicate and view on future directions in component-based development in the context of electronic business.

WLAN CR Coexistence Beacon Protocol for Cognitive Radio-Based WLAN Network (무선인지 기술을 이용한 차세대 WLAN 네트워크에서의 WLAN CR 공존 비콘 프로토콜)

  • Kim, Hyun-Ju;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12B
    • /
    • pp.790-799
    • /
    • 2007
  • In this paper, we propose WLAN CR coexistence beacon protocol for thenext WLAN network. This method can provide WLAN with high-speed data rate in new WLAN architecture and network platform based on cognitive radio technology. WLAN CR devices that enter the CR network can know UHF channels by listening CR beacon including the coexistence parameter set and start using CR channel fast. During handover of WLAN device in UHF spectrums, WLAN device that lost their channel can change available channel by obtaining the current CR channel information from the CR beacon. In advance relaying coexistence parameter set to entire CR system, WLAN CR system can prepare own candidate channel set that is different with other CR system. In CR beacon and relay delay, we show the results that WLAN CR coexistence beacon protocol supports spectrum handover efficiently and decreases the probability of collision in candidate channel set.

A Design of Analyzing effects of Distance between a mobile device and Cloudlet (모바일 장치와 구름을 사이에 거리의 효과 분석설계)

  • Eric, Niyonsaba;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2671-2676
    • /
    • 2015
  • Nowadays, Mobile devices are now capable of supporting a wide range of applications. Unfortunately, some of applications demand an ever increasing computational power and mobile devices have limited resources due to their constraints, such as low processing power, limited memory, unpredictable connectivity, and limited battery life. To deal with mobile devices' constraints, researchers envision extending cloud computing services to mobile devices using virtualization techniques to shift the workload from mobile devices to a powerful computational infrastructure. Those techniques consist of migrating resource-intensive computations from a mobile device to the resource-rich cloud, or server (called nearby infrastructure). In this paper, we want to highlight on cloudlet architecture (nearby infrastructure with mobile devices), its functioning and in our future work, analyze effects of distance between cloudlet and mobile devices.

Processing Time Optimization of an Electronic Stability Control system design Using Multi-Cores for AURIX TC 275 (AURIX TC 275에서 멀티코어를 이용한 Electronic Stability Control의 수행시간 최적화)

  • Jang, Hong-Soon;Cho, Young-Hwan;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.5
    • /
    • pp.385-393
    • /
    • 2021
  • This study proposes a multi-core-based controller design for an ESC(Electronic Stability Control) system in an automotive multi-core processor. Considering the architectures of an automotive multi-core processor and an ESC system, the overall execution time has been optimized for multi-core platforms. The function module assignment, synchronization between cores, and memory assignment for core-dependent variables in automotive multi-core systems are evaluated. The ESC controller comprising five function modules is used herein. Based on the proposed design, the single-core controller is extended to multi-core controllers. Using multi-core optimization methods, such as function module assignment, semaphore, interrupt awakening, and variable assignment over cores, the ESC system is redesigned to a multi-core controller. Experimental results reveal that the execution time for the multi-core processor is reduced by 59.7% compared with that for the single-core processor.

A Tensor Space Model based Deep Neural Network for Automated Text Classification (자동문서분류를 위한 텐서공간모델 기반 심층 신경망)

  • Lim, Pu-reum;Kim, Han-joon
    • Database Research
    • /
    • v.34 no.3
    • /
    • pp.3-13
    • /
    • 2018
  • Text classification is one of the text mining technologies that classifies a given textual document into its appropriate categories and is used in various fields such as spam email detection, news classification, question answering, emotional analysis, and chat bot. In general, the text classification system utilizes machine learning algorithms, and among a number of algorithms, naïve Bayes and support vector machine, which are suitable for text data, are known to have reasonable performance. Recently, with the development of deep learning technology, several researches on applying deep neural networks such as recurrent neural networks (RNN) and convolutional neural networks (CNN) have been introduced to improve the performance of text classification system. However, the current text classification techniques have not yet reached the perfect level of text classification. This paper focuses on the fact that the text data is expressed as a vector only with the word dimensions, which impairs the semantic information inherent in the text, and proposes a neural network architecture based upon the semantic tensor space model.

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

Design and Implementation of Bigdata Platform for Vessel Traffic Service (해상교통 관제 빅데이터 체계의 설계 및 구현)

  • Hye-Jin Kim;Jaeyong Oh
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.887-892
    • /
    • 2023
  • Vessel traffic service(VTS) centers are equipped with RADAR, AIS(Automatic Identification System), weather sensors, and VHF(Very High Frequency). VTS operators use this equipment to observe the movement of ships operating in the VTS area and provide information. The VTS data generated by these various devices is highly valuable for analyzing maritime traffic situation. However, owing to a lack of compatibility between system manufacturers or policy issues, they are often not systematically managed. Therefore, we developed the VTS Bigdata Platform that could efficiently collect, store, and manage control data collected by the VTS, and this paper describes its design and implementation. A microservice architecture was applied to secure operational stability that was one of the important issues in the development of the platform. In addition, the performance of the platform could be improved by dualizing the storage for real-time navigation information. The implemented system was tested using real maritime data to check its performance, identify additional improvements, and consider its feasibility in a real VTS environment.

A Case Study on Implementing Microservice Architecture in Steel Manufacturing MES (철강 제조 MES의 마이크로서비스 아키텍처 적용 구축사례 연구)

  • Hoon Jeong;Jaekyoung Ahn
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.37-53
    • /
    • 2024
  • Recently, the application of microservice architecture has been increasing as information systems have shifted to cloud environments. The purpose of this paper was to analyze the case of applying microservice architecture to MES in the manufacturing field, summarize the results of how it was applied in practice, and find out the effects of the application. Based on the improvement project by applying microservice architecture to the existing steel manufacturing MES, 11 principles of microservice application were derived through literature research, and the implementation process and results were summarized according to these principles. In addition, through a comparison of systems in the service industry and the manufacturing industry, we investigated why the application of microservices was more active in the service industry and whether the application in the manufacturing industry can be expected to have the same effect. We also evaluated the results and changes in the overall system after implementation. In particular, we analyzed the SR (Service Request) processing status of users' requests for system changes and operators' requests to see how much the lead time was reduced. The results showed that 8 out of 11 microservice application principles were properly implemented according to the principles, but the remaining 3 were not applicable due to practical difficulties and organizational circumstances. Despite not following all of the principles, the project was able to be implemented without any problems, and the most noticeable change as a result of the microservices architecture was that the lead time was reduced by 9 days compared to the previous system. This proves that it is possible to quickly adapt to customer requirements, and it also proves that the system is more flexible and scalable than the existing monolithic system.