• Title/Summary/Keyword: 프레임워크 개발

Search Result 1,730, Processing Time 0.022 seconds

Multifaceted Modeling Methodology for System of Systems using IEEE 1516 HLA/RTI (IEEE 1516 HLA/RTI를 이용한 복합 시스템의 다측면적인 모델링 방법론)

  • Kim, Byeong Soo;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.19-29
    • /
    • 2017
  • System Entity Structure/Model Base (SES/MB) enhances organizing model families and storing and reusing model components in the multifaceted system modeling. However, the real world can be described not only an individual system but also a collection of those systems, which is called system of systems (SoS). Because SES/MB has a limitation to simulate the SoS using HLA/RTI, an extended framework is required to simulate it. Therefore, this paper proposes System of Systems Entity Structure/Federate Base (SoSES/FB) for simulation in a distributed environment (HLA/RTI). The proposed method provides the library of federates (FB) and System of System Entity Structure (SoSES) formalism, which represents structural knowledge of a collection of simulators. It also provides a methodology for the development process of distributed simulation. The paper introduces the anti-missile defense simulation using the proposed SoSES/FB.

A Study of Web Application Security Quality Architecture Management Process referenced ISO/IEC9000 Model (ISO/IEC9000모델을 참조한 웹 애플리케이션 보안품질 관리체계 설계)

  • Kim, Jeom-Goo;Noh, Si-Choon;Lee, Do-Hyeon
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.11-17
    • /
    • 2012
  • According to ISO/IEC 9000, quality to satisfy users' requirements when using the product or service is defined as the characteristics of the synthesized concept. Secure web application coding information systems with the reliability and quality of service is one of the determining factor. Secure coding in order to achieve the quality based on the model is necessary. The reason is that the security is in quality properties in the range of non-functional requirements that necessitates. Secure coding for the design of quality systems based on the quality of the definition of quality attributes, quality requirements, quality attribute scenarios are defined, and must be set. To this end, referring to IEEE 1061 quality model for web application, quality model structure is developed. Secure web application architecture design is composed of coding quality of the model systems, web applications draw interest to stakeholders, decision drivers secure coding architecture, quality attributes, eliciting quality requirements of the security settings, creating web application architecture descriptions and security framework.

A Study on Multi-resolution Screen based Conference Broadcasting Technology (멀티 해상도 스크린 기반의 컨퍼런스 중계방송 기술 연구)

  • Kim, Young-ae;Yang, Ji-hee;Park, Goo-man
    • Journal of Broadcast Engineering
    • /
    • v.23 no.2
    • /
    • pp.253-260
    • /
    • 2018
  • Personalized media broadcasting services can produce their own broadcasting contents with a variety of creative themes if they have just a transmission platform and devices that can obtain videos and voices of producers without the existing expensive equipment. In this paper, we develop and implement a new broadcasting system by applying this service framework to events such as seminars or academic conferences. The devices can be installed at each conference rooms and the integrated system transmitted to users. They can watch via their multi-resolution screen, such as smart-phones, laptops, and tablet PCs. It has the advantage of being able to receive real-time streaming and VOD services as well as additional information related to the conference. It is expected to provide convenience by allowing attendees to access the information via their devices, thereby creating an impact on participation and the underlying technology for the future research.

Design and Application of Data Interchange Formats (DIFs) for Improving Interoperability in SBA (SBA 상호운용성 향상을 위한 데이터교환서식 설계 및 활용에 관한 연구)

  • Kim, Hwang Ho;Kim, Moon Kyung;Choi, Jin Young;Wang, Gi-Nam
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.275-285
    • /
    • 2012
  • DIFs (Data Interchange Formats) are needed to enhance interoperability of physically distributed organizations in SBA (Simulation Based Acquisition) process. DIFs play a role as a template of DPDs (Distributed Product Descriptions) and provide capability to use information directly without data format interchange process by allowing access to DPDs, which include various information and M&S (Modeling & Simulation) resources. This characteristic is essential for interoperability in ICE (Integrated Collaborative Environment) based SBA. This paper proposes a framework for the DIF and outputs from each phase of acquisition process for configuration data related to design and manufacturing in SBA process - Conceptual Data Model, Logical Data Model, Physical Data Model and Physical DIF based on XML. Finally, we propose the DIF model architecture and demonstrate the implementation of DIF example based on it.

An Ontological Approach for Conceptual Modeling of Mission Space in Military Modeling & Simulation (국방 Modeling & Simulation에서 임무공간 개념모델링을 위한 온톨로지 적용방안)

  • Bae, Young Min;Kang, Haeran;Lee, Jonghyuk;Lee, Kyong-Ho;Lee, Young Hoon
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.3
    • /
    • pp.243-251
    • /
    • 2012
  • This paper presents the Conceptual Models of the Mission Space-Korea (CMMS-K), which is an ontology-based conceptual modeling framework of the mission space. Through modeling and simulating military trainings, we can reduce the cost of actual military trainings in terms of time, space, and supplies. CMMS-K is being developed to improve the interoperability and reusability of defense models and simulations. CMMS-K reflects the needs and characteristics of Korean military while referring to existing military conceptual modeling frameworks. The main components of CMMS-K contain domain ontologies, a mission space model description language, a mission space modeling tool, and a CMMS-K management system. CMMS-K domain ontologies consist of entity and task ontologies. In this paper, the CMMS-K domain ontologies are described in detail and the feasibility of the proposed method is discussed with a case study.

A Study on the Design with RDF Authoring Tool for Metadata Management (메타데이터 관리를 위한 RDF 저작도구 설계에 관한 연구)

  • 최호찬;김차종
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.605-613
    • /
    • 2004
  • Recently, the semantic web stands out in the next generation web. To realize the semantic web, the metadata integration is required between different metadatas on the web for metadata management. Otherwise, the integrated structure is needed to accommodate all of semantic, syntax and structure. RDF is one of the core technology and is more efficient framework for technology and interchange of metadata in the web, In this paper, for metadata management, we designed and implemented the RDF authoring system which converts each of metadata into RDF and makes it easy to manipulate and manage the different metadatas. For this, we researched about the RDF creation using Dublin Core metadata, the conversion of XML document into RDF, the RDF expression by N-Triple form and the integration of WSDL and RDF, and implemented the system on the lava platform. Basically, users using this system can integrate and manage metadatas easily even if they are not expert.

Implementation of Security Plan from .NET Remoting Environment (닷넷 리모팅 환경에서의 보안 방안 구현)

  • Kim, Young-Sear
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.256-261
    • /
    • 2009
  • While .NET and J2EE bisects recent distributed environment, .NET displays "Remoting" as a technology to call remote object. Remoting is frequently used as a protocol in OLTP's WEB program development in form of RPC that exchange data in XML form under HTTP environment. Purpose of this research is to draw problems when applying security to .NET remoting technology that is recently used in web programming, and to find effective application plan by implementing. The main discussion is following. First, network layer security should be replaced to application layer security for better performance and flexibility. Second, the serialization procedure that is repeated in both remoting and encryption module should take place once. Lastly, implementation of "Surrogate" and "Compress" will be discussed that enables to eliminate unnecessary data(table relations, keys, etc) that is used in dataset object of .NET in order to reduce the size of data. It is possible to achieve improvement in speed by two times through immediate implementation in these cases. In order for easier use, component based framework should be supplied hereafter.

  • PDF

A Design of Context-Aware Middleware based on Web Services in Ubiquitous Environment (유비쿼터스 환경에서 웹 서비스에 기반한 상황 인식 미들웨어의 설계)

  • Song, Young-Rok;Woo, Yo-Seob
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.225-232
    • /
    • 2009
  • Context-aware technologies for ubiquitous computing are necessary to study the representation of gathered context-information appropriately, the understanding of user's intention using context-information, and the offer of pertinent services for users. In this paper, we propose the WS-CAM(Web Services based Context-Aware Middleware) framework for context-aware computing. WS-CAM provides ample power of expression and inference mechanisms to various context-information using an ontology-based context model. We also consider that WS-CAM is the middleware-independent structure to adopt web services with characteristic of loosely coupling as a matter of communication of context-information. In this paper, we describe a scenario for lecture services based on the ubiquitous computing e e e e e e to verify the utilization of WS-CAM We also show an example of middleware-independent system expansion to display the merits of web-based services. WS-CAM for lecture services represented context-information itodomaits as OWL-based ontology model effectively, and we confirmed the information is inferred to high level context-information by user-defined rules. We also confirmed the context-information is transferred to application services middleware-independently using various web methods provided by web services.

  • PDF

Design and Implementation of an IP-based Fixed VoIP Emergency System (IP-기반 고정형 VoIP 긴급통화 시스템 설계 및 구현)

  • Ko, Sang-Ki;Chon, Ji-Hun;Choi, Sun-Wan;Kang, Shin-Gak;Huh, Mi-Young
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.245-252
    • /
    • 2008
  • An emergency service over Voice over IP (VoIP) network is an essential condition, like the existing telecommunication services. To support for the emergency services, standardization works have been performed. The National Emergency Number Association (NENA) has been developing the framework and procedures for an emergency service for Non-IP based network, rather than protocols. In contrast, the Internet Engineering Task Force (IETF) has been only focused on end-to-end IP-based emergency calls. The NENA architecture is incompatible with the IETF protocols. To solve the problem, we design and implement a SIP-based VoIP emergency system by adopting the NENA architecture and by applying IETF protocols, for both IP-based Pubic Safety Answering Point (PSAP) and PSTN-based PSAP. It is implemented and tested under UNIX environment.

Information Activity Monitoring for Enhancing the Utilization of the Enterprise Information System (기업 정보 시스템의 활용도 향상을 위한 정보활동 모니터링)

  • Han, Kwan-Hee;Song, Hee-Seok
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.749-754
    • /
    • 2006
  • Recently, many enterprises are introducing information systems for their competitive advantages. For enhancing the utilization level of enterprise information system, it is quite important to monitor the usage states of the information systems continuously. However, most enterprise information systems lack this functionality. Proposed in this paper is the framework of IAM (Information Activity Monitoring), which is defined as real-time reporting and alerting of significant information-related activities. This IAM framework provides 4 different views about the information system (data, IT system, business process, and participant) and is implemented as a part of integrated design/manufacturing information system developed by aerospace parts manufacturer. By using the IAM function, IT personnel can monitor significant information-related activities systematically and feedback to their users timely, and ultimately enhance the utilization level of information system.