• Title/Summary/Keyword: 통합 관리 소프트웨어

Search Result 503, Processing Time 0.022 seconds

Establishment of the Organization's Measurement Repository based on CMMI (CMMI기반의 측정 저장소 구현)

  • Kim Yu-Ri;Han Hyuk-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.303-306
    • /
    • 2004
  • 프로세스 관리는 제품품질에 대한 요구가 높아져가는 상황에서 개발 완료 후 발생할 수 있는 결함을 사전에 식별 및 해결해줄 수 있다. 이러한 프로세스 관리 활동은 측정 활동을 통해 현재의 프로세스 품질과 향후 프로세스 개선에 관한 정보를 효과적으로 얻을 수 있다. 측정활동의 효율성을 높이기 위해서는 측정 활동에서 얻어진 측정 데이터와 그 외 관련 데이터들을 측정 저장소(Measurement Repository)에서 저장하고 관리해야 한다. SEI(Software Engineering Institute)에서 개발한 프로세스 개선 모델인 CMMI(Capability Maturity Model Integration)에서는 조직 성숙도 레벨 2에서는 프로젝트 차원의 측정 저장소를 다루고 있으며, 조직 성숙도 레벨 3 에서는 조직 차원의 측정 저장소 확립을 하나의 Specific Practice 로 설정하고 있다. 조직 차원의 측정 저장소는 각 프로젝트의 측정 데이터를 통합하여 관리하기 때문에 조직 전체에 일관되고 예측 가능한 측정활동을 지원한다. 그러나 CMMI 에서는 조직차원의 측정 저장소를 구현하기 위한 상세하고 체계적인 절차와 방법을 언급하고 있지 않아 조직에서는 실제 구현에 어려움을 겪고 있다. 이에 본 연구에서는 CMMI를 기반으로 PSM(Practical Software Measurement), ISO15939(소프트웨어 측정 프로세스 표준)등의 자료를 참조하여 조직에서 측정 저장소를 효과적으로 구현할 수 있도록 지원하는 절차와 방안을 연구하였다.

  • PDF

LISI Repository Development Framework based on J2EE for Interoperability Assessment Information Management (상호운용성 평가 정보 관리를 위한 J2EE 기반의 LISI 저장소 개발 프레임워크)

  • 조정희;정병훈;염근혁
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.11
    • /
    • pp.1439-1454
    • /
    • 2004
  • Recently, Levels of Information Systems Interoperability (LISI) that are used for assessing the information systems interoperability are defined according to the importance of interoperability among information systems. At that time, it is necessary to the construction of an assessment information repository to store and retrieve the interoperability assessment data efficiently. An LISI repository constructed for storing and retrieving an assessment information should support assessment systems that are developed in various Platforms and provide its functions by a standardized way. Business logics of LISI repository should be developed as distributed components, and we need to modify existing software design methods to show characteristics of LISI repository in addition to the standardized LISI data expression. Also a concrete method to recognize various implementation technologies and to apply them to implementation of LISI repository is needed. This paper provides a design method for developing an LISI repository that is considering the characteristics of LISI repository by three concerns, and an implementation scheme that can apply to the integration of the various repository implementation technologies systematically, as the LISI repository development framework for constructing the LISI repository. These help developers to construct the LISI repository effectively by providing concrete guidelines for considerations and appliable methods to construct the LISI repository.

Design and Implementation of an Automated Inter-connection Tool for Multi-Point OpenFlow Sites (다지점 오픈플로우 사이트들을 위한 자동화된 연동 도구의 설계 및 구현)

  • Na, TaeHeum;Kim, JongWon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.1-12
    • /
    • 2015
  • To realize futuristic services with agility, the role of the experimental facility (i.e., testbed) based on integrated resources has become important, so that developers can flexibly utilize the dynamic provisioning power of software-defined networking and cloud computing. Following this trend, an OpenFlow-based SDN testbed environment, denoted as OF@TEIN, connects multiple sites with unique SmartX Racks (i.e., virtualization-enabled converged resources). In this paper, in order to automate the multi-point L2 (i.e., Ethernet) inter-connection of OpenFlow islands, we introduce an automated tool to configure the required Network Virtualization using Generic Routing Encapsulation (NVGRE) tunneling. With the proposed automation tool, the operators can efficiently and quickly manage network inter-connections among multiple OpenFlow sites, while letting developers to control their own traffic flows for service realization experiments.

Reinforcement Learning-Based Resource exhaustion attack detection and response in Kubernetes (쿠버네티스 환경에서의 강화학습 기반 자원 고갈 탐지 및 대응 기술에 관한 연구)

  • Ri-Yeong Kim;Seongmin Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.81-89
    • /
    • 2023
  • Kubernetes is a representative open-source software for container orchestration, playing a crucial role in monitoring and managing resources allocated to containers. As container environments become prevalent, security threats targeting containers continue to rise, with resource exhaustion attacks being a prominent example. These attacks involve distributing malicious crypto-mining software in containerized form to hijack computing resources, thereby affecting the operation of the host and other containers that share resources. Previous research has focused on detecting resource depletion attacks, so technology to respond when attacks occur is lacking. This paper proposes a reinforcement learning-based dynamic resource management framework for detecting and responding to resource exhaustion attacks and malicious containers running in Kubernetes environments. To achieve this, we define the environment's state, actions, and rewards from the perspective of responding to resource exhaustion attacks using reinforcement learning. It is expected that the proposed methodology will contribute to establishing a robust defense against resource exhaustion attacks in container environments

A Study on the Construction Plan of 3D Geotechnical Information for the Support of Underground Space Safety (지하안전관리 지원을 위한 3차원 지반정보 구축 방안 연구)

  • PARK, Dong-Hyun;JANG, Yong-Gu;CHOI, Hyun-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.1
    • /
    • pp.23-34
    • /
    • 2018
  • Recently, mainly in downtown, there have been frequent safety incidents in underground space like ground subsidence and land sinking. Out of diverse coping measures, the government is carrying forward the establishment of underground space integrated map. As a core element of the underground space integrated map, the 3D geotechnical information is used as major data of underground space impact assessment obliged in accordance with the "Special Act on the Safety Control of Underground Space Safety". The construction method of 3D geotechnical information is drawn when establishing the basic establishment plan of underground space integrated map, and the continuous construction is performed by the Integrated DB Center of National Geotechnical Information. However, it is necessary to draw concrete measures with accuracy, efficiency, and utilization. This study drew the construction plan considering the accuracy, utilization, and efficiency of 3D geotechnical information for the support of underground space safety. For this, accuracy between elevation and underground level is compared using MVS and MakeJiban which are software to construct boring information with geotechnical information in geotechnical information portal system. In the results of general analysis, the milepost-based construction of whole strata in a lump would be the most suitable in the aspect of accuracy, utilization, and efficiency. Based on the results of this study, Plan to construct 3D geotechnical information will be pursued.

Enhancing Project Integration and Interoperability of GIS and BIM Based on IFC (IFC 기반 GIS와 BIM 프로젝트 통합관리 및 상호 운용성 강화)

  • Kim, Tae-Hee;Kim, Tae-Hyun;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.54 no.1
    • /
    • pp.89-102
    • /
    • 2024
  • The recent advancements in Smart City and Digital Twin technologies have highlighted the critical role of integrating GIS and BIM in urban planning and construction projects. This integration ensures the consistency and accuracy of information, facilitating smooth information exchange. However, achieving interoperability requires standardization and effective project integration management strategies. This study proposes interoperability solutions for the integration of GIS and BIM for managing various projects. The research involves an in-depth analysis of the IFC schema and data structures based on the latest IFC4 version and proposes methods to ensure the consistency of reference point coordinates and coordinate systems. The study was conducted by setting the EPSG:5186 coordinate system, used by the National Geographic Information Institute's digital topographic map, and applying virtual shift origin coordinates. Through BIMvision, the results of the shape and error check coordinates' movement in the BIM model were reviewed, confirming that the error check coordinates moved consistently with the reference point coordinates. Additionally, it was verified that even when the coordinate system was changed to EPSG:5179 used by Naver Map and road name addresses, or EPSG:5181 used by Kakao Map, the BIM model's shape and coordinates remained consistently unchanged. Notably, by inputting the EPSG code information into the IFC file, the potential for coordinate system interoperability between projects was confirmed. Therefore, this study presents an integrated and systematic management approach for information sharing, automation processes, enhanced collaboration, and sustainable development of GIS and BIM. This is expected to improve compatibility across various software platforms, enhancing information consistency and efficiency across multiple projects.

Automatic Merging of Distributed Topic Maps based on T-MERGE Operator (T-MERGE 연산자에 기반한 분산 토픽맵의 자동 통합)

  • Kim Jung-Min;Shin Hyo-Pil;Kim Hyoung-Joo
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.787-801
    • /
    • 2006
  • Ontology merging describes the process of integrating two ontologies into a new ontology. How this is done best is a subject of ongoing research in the Semantic Web, Data Integration, Knowledge Management System, and other ontology-related application systems. Earlier research on ontology merging, however, has studied for developing effective ontology matching approaches but missed analyzing and solving methods of problems of merging two ontologies given correspondences between them. In this paper, we propose a specific ontology merging process and a generic operator, T-MERGE, for integrating two source ontologies into a new ontology. Also, we define a taxonomy of merging conflicts which is derived from differing representations between input ontologies and a method for detecting and resolving them. Our T-MERGE operator encapsulates the process of detection and resolution of conflicts and merging two entities based on given correspondences between them. We define a data structure, MergeLog, for logging the execution of T-MERGE operator. MergeLog is used to inform detailed results of execution of merging to users or recover errors. For our experiments, we used oriental philosophy ontologies, western philosophy ontologies, Yahoo western philosophy dictionary, and Naver philosophy dictionary as input ontologies. Our experiments show that the automatic merging module compared with manual merging by a expert has advantages in terms of time and effort.

A Study of Software Architecture Design Methods for Multiple Access Con trol under Web-based Medical Information System Environment (웹 기반 의료정보시스템 다중 접근제어를 위한 소프트웨어아키텍쳐 설계방법)

  • Noh, Si-Choon;Hwang, Jeong-Hee
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.43-49
    • /
    • 2011
  • Web-based health information provides a lot of conveniences, however the security vulnerabilities that appear in the network environment without the risk of exposure in the use of information are growing. Web-based medical information security issues when accessing only the technology advances, without attempting to seek a safe methodology are to increase the threat element. So it is required. to take advantage of web-based information security measures as a web-based access control security mechanism-based design. This paper is based on software architecture, design, ideas and health information systems were designed based on access control security mechanism. The methodologies are to derive a new design procedure, to design architecture and algorithms that make the mechanism functio n. To accomplish this goal, web-based access control for multiple patient information architecture infrastructures is needed. For this software framework to derive features that make the mechanism was derived based on the structure. The proposed system utilizes medical information, medical information when designing an application user retrieves data in real time, while ensuring integration of encrypted information under the access control algorithms, ensuring the safety management system design.

Analysis of the AMQP for Data Message Queueing of Korean e-Navigation Operation System (한국형 e-Navigation 운영 시스템의 데이터 메시지 큐잉을 위한 AMQP 분석)

  • Jang, Won-Seok;Kim, Beom-Jun;Kang, Moon-Seog
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2017.11a
    • /
    • pp.22-24
    • /
    • 2017
  • The Korean e-Navigation operating system is designed to provide various services related to marine safety. These services are not configured to be provided in one software, but are made in separate software. In order to integrate the service software installed in the e-Navigation operating system, it is necessary to define the data message which can exchange data between the service software, Depending on the operating concept of the service, many messages are expected to be transmitted over the network in a short time. There is a need for a buffer or message queue to store messages as a way to manage messages efficiently. Therefore, in this paper, we analyze the types and characteristics of Advanced Message Queuing Protocol(AMQP) suitable for Korean e-Navigation operating system and shows that's result.

  • PDF

A Study on the WBI System Design & Implemented based on the Component (컴포넌트기반의 웹 기반 교육시스템 설계에 관한 연구)

  • Jeon, Ju-Hyeon;Hong, Chan-Gi
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.673-680
    • /
    • 2001
  • When the developers develop the software, the cost and time of the software development can be reduced by using blocks that are implemented previously. We call these implemented blocks components. In the early stage of Web-based Instruction, it didn't gain preference in spite of it's benefit of convenience. The main reason is, I think, the lack of generality at the education system which eventually results in unsatisfactory facilities compared with the requirement of teachers and students. And the early systems don't make good use of the plenty data in distributed environment, and don't show so good reliablity due to lack of systematic design and development. In this paper, we suggest WBI developing technology using the concept of WBSE. WBI developing is consist of component of pre-developed education software, integration of component using its reusability, and production of more requirement-satisfactory education software.

  • PDF