• Title/Summary/Keyword: 통합아키텍처

Search Result 362, Processing Time 0.022 seconds

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

Study on UxNB Network Deployment Method toward Mobile IAB

  • Keewon Kim;Jonghyun Kim;Kyungmin Park;Tae-Keun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.105-114
    • /
    • 2023
  • In this paper, we propose a deployment and operation scheme of UxNB network toward mobile IAB. By operating a UxNB network based on SDN(Software Defined Network), UxNBs are deployed in areas where mobile communication services are desired. After deploying UxNB in the service area, IAB can be set up to perform mobile communication services. For this purpose, this paper first proposes a UxNB Network Controller consisting of a UAV Controller and an SDN Controller, and proposes the necessary functions. Next, we present a scenario in which a UxNB network can be deployed and operated in detail step by step. We also discuss the location of the UxNB network controller, how to deliver control commands from the UAV controller to the UxNB, how to apply IAB for UxNB networks, optimization of UxNB networks, RLF(radio link failure) recovery in UxNB networks, and future research on security in UxNB networks. It is expected that the proposed UxNB Network Controller architecture and UxNB network deployment and operation will enable seamless integration of UxNB networks into Mobile IAB.

EDF: An Interactive Tool for Event Log Generation for Enabling Process Mining in Small and Medium-sized Enterprises

  • Frans Prathama;Seokrae Won;Iq Reviessay Pulshashi;Riska Asriana Sutrisnowati
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.101-112
    • /
    • 2024
  • In this paper, we present EDF (Event Data Factory), an interactive tool designed to assist event log generation for process mining. EDF integrates various data connectors to improve its capability to assist users in connecting to diverse data sources. Our tool employs low-code/no-code technology, along with graph-based visualization, to help non-expert users understand process flow and enhance the user experience. By utilizing metadata information, EDF allows users to efficiently generate an event log containing case, activity, and timestamp attributes. Through log quality metrics, our tool enables users to assess the generated event log quality. We implement EDF under a cloud-based architecture and run a performance evaluation. Our case study and results demonstrate the usability and applicability of EDF. Finally, an observational study confirms that EDF is easy to use and beneficial, expanding small and medium-sized enterprises' (SMEs) access to process mining applications.

Case Study on the Leadership Shifts in Smart Phone Industry: Rise of China and Falling Behind of Korea (스마트폰 산업에서의 주도권 이전: 중국의 부상과 우리나라의 쇠퇴에 관한 사례 연구)

  • Kwak, Kiho;Lee, Eunju
    • Journal of Technology Innovation
    • /
    • v.26 no.2
    • /
    • pp.95-128
    • /
    • 2018
  • Since mid and late 2000s, the smartphones has been widely diffused and Korea ranked first in global smartphone market in 2011 thanks to its rapid adoption of Android operating system, technology capability accumulated in featurephone development, vertical integration on smartphone production and premium positioning. However, Korea fell behind because of the rise of another latecomer, China, in four years (2015) after it recorded the top position globally. How did the leadership change occurred in the smartphone industry so rapidly? In order to answer the question, we investigated three favorable windows of opportunity for the rise of China, which are technological, demand, and institutional, and the strategic responses of Chinese firms as well as the rigidity and complacency with the past success of Korean firms. Our findings contribute to the extension of 'catch-up cycle' theory as well as provide in-depth insights for strategies and policies settings to overcome the recent rise of China in information and communication technology sector for Korea.

A Data Taxonomy Methodology based on Their Origin (데이터 본질 기반의 데이터 분류 방법론)

  • Choi, Mi-Young;Moon, Chang-Joo;Baik, Doo-Kwon;Kwon, Ju-Hum;Lee, Young-Moo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.163-176
    • /
    • 2010
  • The representative method to efficiently manage the organization's data is to avoid data duplication through the promotion of sharing and reusing existing data. The systematic structuring of existing data and efficient searching should be supported in order to promote the sharing and reusing of data. Without regard for these points, the data for the system development would be duplicated, which would deteriorate the quality of the data. Data taxonomy provides some methods that can enable the needed data elements to be searched quickly with a systematic order of managing data. This paper proposes that the Origin data taxonomy method can best maximize data sharing, reusing, and consolidation, and it can be used for Meta Data Registry (MDR) and Semantic Web efficiently. The Origin data taxonomy method constructs the data taxonomy structure built upon the intrinsic nature of data, so it can classify the data with independence from business classification. Also, it shows a deployment method for data elements used in various areas according to the Origin data taxonomy structure with a data taxonomic procedure that supports the proposed taxonomy. Based on this case study, the proposed data taxonomy and taxonomic procedure can be applied to real world data efficiently.

Odysseus/m: a High-Performance ORDBMS Tightly-Coupled with IR Features (오디세우스/IR: 정보 검색 기능과 밀결합된 고성능 객체 관계형 DBMS)

  • Whang Kyu-Young;Lee Min-Jae;Lee Jae-Gil;Kim Min-Soo;Han Wook-Shin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.209-215
    • /
    • 2005
  • Conventional ORDBMS vendors provide extension mechanisms for adding user-defined types and functions to their own DBMSs. Here, the extension mechanisms are implemented using a high-level interface. We call this technique loose-coupling. The advantage of loose-coupling is that it is easy to implement. However, it is not preferable for implementing new data types and operations in large databases when high Performance is required. In this paper, we propose to use the notion of tight-coupling to satisfy this requirement. In tight-coupling, new data types and operations are integrated into the core of the DBMS engine. Thus, they are supported in a consistent manner with high performance. This tight-coupling architecture is being used to incorporate information retrieval(IR) features and spatial database features into the Odysseus/IR ORDBMS that has been under development at KAIST/AITrc. In this paper, we introduce Odysseus/IR and explain its tightly-coupled IR features (U.S. patented). We then demonstrate a web search engine that is capable of managing 20 million web pages in a non-parallel configuration using Odysseus/IR.

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF

A Development of Integrated Control System for Platform Equipments of Unmanned Surface Vehicle (USV) (무인수상정 플랫폼 장비의 통합 제어 시스템 개발)

  • Hwang, Hun-Gyu;Kim, Hyun-Woo;Kim, Bae-Sung;Woo, Yun-Tae;Shin, Il-Sik;Shin, Ji-Hwan;Lee, Young-Jin;Choi, Byung-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1611-1618
    • /
    • 2017
  • Recently, the development for USV-related technologies are actively growing up in military domain. The USV (unmanned surface vehicle) conducts various missions for national defense at maritime environment. For succeed the missions, the USV essentially needs an automatic and remote control platform which includes propulsion system, steering system, control system, power system and so on. In this paper, we developed an integrated control system for the platform equipments and verified effectiveness of the developed system. To do this, we designed a system architecture and implemented a main control system that processes and controls platform equipments by received command. Also we developed components of designed architecture such as engine control device, water-jet control device and power control device. For test and verify the developed system, we designed and made a test-bed of engine and water-jet with related parts, and proceeded a basin test for verifying the developed system based on the test-bed.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

LIG Corporate Image Re-establishment through New Corporate Image Strategy (LIG손해보험의 새로운 기업브랜드 전략을 통한 기업이미지 재정립 )

  • Ahn, Kwangho;Yoo, Changjo;Kim, Donghoon
    • Asia Marketing Journal
    • /
    • v.10 no.3
    • /
    • pp.103-125
    • /
    • 2008
  • After having changed its corporate brand from LG Fire & Marine Insurance to LIG Non-life Insurance in 2006, LIG Insurance has successfully built the corporate image as the leading insurance financial group by engaging in extensive corporate social responsibility activities. LIG, as 'a partner for sharing precious moments of life', intended to provide customers a new value of an insurance by building up the new corporate brand. It established three values to be shared internally. First was to instill a brand value orientation within the organization. Second, the firm identified the brand's value to be delivered to the customers. Third, they defined the image objective to be communicated to them. Based on these set of objectives, the company designed and implemented an integrated marketing communication(IMC) strategy over several years. The result was a successful transition to the new corporate brand name.

  • PDF