• Title/Summary/Keyword: Application deployment

Search Result 303, Processing Time 0.024 seconds

Mobile Agents Framework for Adaptability Support based on Meta Level (적응성 지원을 위한 메타 레벨 기반의 이동 에이전트 프레임워크)

  • Ghim, Soo-Joong;Yoon, Yong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.651-656
    • /
    • 2003
  • Emerging technologies, such as multimedia and mobile computing, require that middleware platforms can support high adaptability in order to provide more flexible services in heterogeneous environments. To support high quality of service in distributed wired/wireless environments, it will be necessary for applications and middleware to be aware of changes in users requirements as well as environmental conditions, also to be able to adapt their behaviour as such changes. According to the needs of adaptability supporting in middleware, we structure a component-based, mobile agents framework in base level and meta level by using reflection. We propose concepts of meta agents and meta-service agents that are able to reflect changes made by mobile agents to the system. At the meta level of our framework, meta agents monitor execution of mobile agents and it is possible to provide dynamic adaptation of users requirements, deployment of application services and service customization with meta agents and meta-service agents.

The Design and Implementation of BPEL for Spatial Analysis WPS model - With Emphasis on the Selection of Housing Units for Water Supply - (공간분석 WPS 모델을 위한 BPEL 설계 및 구현 - 상수도 보급 대상 가구 선정 사례 중심으로 -)

  • Lee, Ha Kyung;Yom, Jae-Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.5
    • /
    • pp.355-363
    • /
    • 2013
  • Analysis and sharing of spatial information can be made possible through the reuse of spatial analysis processes, and the sharing of spatial models on the web. However, the deployment of spatial analysis models is possible, only when the difficult tasks of model design and the exchange of spatial data are overcome. In this study, a WPS spatial analysis model is defined, based on the OGC standards, and applied to the 'Selection of Housing Units for Water Supply' application. BPEL was used to define the sequence of processes and to enable the exchange of spatial data. To this end, WSDL was defined for WPS and WFS accesses, the sequence of spatial processes was defined in BPEL, and XSLT was defined for the exchange of XML data. The WPS model was designed and deployed using the Apache ODE which provides RESTful binding. It is expected that effective decision making will be easier using the web based spatial analysis models which are realized by WPS Orchestration with BPEL, as presented in this study.

A Parallel Transmission Overlay Multicast Scheme for Massive Contents Delivery (대용량 콘텐츠 전송을 위한 병렬전송 오버레이 멀티캐스트)

  • Park, Jin-Hong;;Kim, Seon-Ho;Shin, Yong-Tae;Shin, Seok-Kyoo
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.593-602
    • /
    • 2005
  • Overlay multicast delivery method is a new approach in which multicast functionality is implemented at the end-hosts application layer in the timing of sparse deployment of IP multicast. However, existing overlay multicast protocols are not being standardization and many restrictions occur when delivering high capacity contents. Therefore, new delivery mechanism is required for the overlay multicast based high capacity contents delivery. In this paper. we separate group management and delivery management of overlay multicast and describe a capable group management. We also defined high speed delivery method better than that of existing overlay multicast through use of collaborated distribute downloading. This improved efficiency of massive contents transmission.

Application of Concurrent Engineering for Conceptual design of a Future Main Battle Tank (차세대 주력전차의 개념설계를 위한 동시공학의 적용)

  • 김진우;소한균
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.2 no.1
    • /
    • pp.38-60
    • /
    • 1999
  • The main objective of this study is systemization of the technique of ROC quantification and optimization of baseline design by applying CE principle to the acquisition process of a weapon system. QFD and TOA techniques can be employed to a good working example of the conceptual design of a future main battle tank. In this paper, Product Planning Phase, the first phase of four QFD phases, is deployed in terms of eight steps including customer requirements and final product control characteristics. TOA is carried out considering only combat weight. In order to perform combat weight analysis and performance TOA, Preliminary Configuration Synthesis Methodology is used. Preliminary Configuration Synthesis Methodology employs the method of least squares and described linear equations of weight interrelation equation for each component of tank. As a result of QFD based upon the ROC, it was cleared that armor piercing power, main armament, type of ammunition, cruising range, combat weight, armor protection, power loading, threat detection and cost are primary factors influencing design and that combat weight is the most dominant one. The results of TOA based on the combat weight constraint show that 5100 lb reduction was required to satisfy the ROC. The baseline design of a future main battle tank is illustrated with assumption that all phases of QFD are employed to development and production process of subsystems, components, and parts of main battle tank. TOA is applied in iterative process between initial baseline design and ROC. The detailed design of each component is illustrated for a future main battle tank.

  • PDF

Development of Modular HNS Accident Scenarios (모듈형 HNS 사고 시나리오 개발)

  • Ha, Min-Jae;Lee, Moon-Jin;Lee, Eun-Bang
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.165-172
    • /
    • 2017
  • Current scenarios for marine spill accidents were developed based on probable maximum spill accidents. However,, accidents of similar scale to maximum spill accidents are virtually non-existent, and training or deployment of response equipment based on these scenarios can be cost prohibitive. Current scenarios require realism for practical use and need to be designed for purpose of use. In this study we developed scenarios that may replace current scenarios by using the HNS accident standard codes based on past accident cases. Scenarios were developed by modularizing the HNS accident standard code, that is classified into three scenarios: Maximum Frequency Scenario, Maximum Damage Scenario, and Maximum Vulnerability Scenario. The situation of an accident presented in each scenario developed in this process is much like a real accident, and therefore, it is has practical application.

A Study on the Development of Educational Modules for Aids to Navigation Using the Aid to Navigation Simulator (항로표지 시뮬레이션 시스템을 활용한 항로표지 교육모듈 개발에 관한 연구)

  • Jeong, Woo-Lee;Jo, Gi-Jong;Moon, Serng-Bae
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.361-368
    • /
    • 2019
  • Aid to Navigation (AtoN) is the artificial facilities to facilitate the ship's safe navigation using light, shape, color, sound, and radio waves. IALA has developed and operated the educational course for expert groups for the design, deployment, and management of AtoN. Also, maritime educational institutes have operated various educational courses for safe navigation through the ship's operation and ECDIS curriculum for seafarers. However, education using the AtoN Simulator System is needed to prevent marine accidents caused by misunderstanding of the AtoN according to various topographical, environmental, and maritime traffic environments. In this study, the existing ship handling simulator and AtoN simulator were applied to develop educational modules for accurate understanding and application of AtoN in various environments, enhancing the quality of education from the existing theoretical point of view and improving practical use to maximize educational efforts.

On the Handling of Node Failures: Energy-Efficient Job Allocation Algorithm for Real-time Sensor Networks

  • Karimi, Hamid;Kargahi, Mehdi;Yazdani, Nasser
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.413-434
    • /
    • 2010
  • Wireless sensor networks are usually characterized by dense deployment of energy constrained nodes. Due to the usage of a large number of sensor nodes in uncontrolled hostile or harsh environments, node failure is a common event in these systems. Another common reason for node failure is the exhaustion of their energy resources and node inactivation. Such failures can have adverse effects on the quality of the real-time services in Wireless Sensor Networks (WSNs). To avoid such degradations, it is necessary that the failures be recovered in a proper manner to sustain network operation. In this paper we present a dynamic Energy efficient Real-Time Job Allocation (ERTJA) algorithm for handling node failures in a cluster of sensor nodes with the consideration of communication energy and time overheads besides the nodes' characteristics. ERTJA relies on the computation power of cluster members for handling a node failure. It also tries to minimize the energy consumption of the cluster by minimum activation of the sleeping nodes. The resulting system can then guarantee the Quality of Service (QoS) of the cluster application. Further, when the number of sleeping nodes is limited, the proposed algorithm uses the idle times of the active nodes to engage a graceful QoS degradation in the cluster. Simulation results show significant performance improvements of ERTJA in terms of the energy conservation and the probability of meeting deadlines compared with the other studied algorithms.

Operational Reliability Analysis of Guided Weapon Systems (유도무기 시스템의 운용 신뢰도 분석)

  • Ha, Ju Seok;Kim, Kyung Mo
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.95-101
    • /
    • 2017
  • Reliability is the priority matter in guided weapon systems. The reliability prediction data is used during the devel opment stage as the manufacturing cost is very high and the production quantity if quite limited. At the same time it takes relatively a long period of time to acquire a reliable operation data set after deployment such that in order t o determine the operational reliability, weapons must be tested and analyzed in real operating environments. For the research, the life distributions were estimated by using actual operation data and the reliability was calculated by ap plying the method of least squares and maximum likelihood estimation. Also, the comparisons were made between pr edicted reliability and actual operational reliability. As a result, the actual reliability of each system was higher than predicted reliability and it was considered that such a difference was caused by the fact that the application of the l atest designing technology and improved parts to the guided weapon systems was not reflected on the estimation of predicted reliability. It was possible to confirm the actual operational reliability of domestic (ROK) guided weapon sy stems through this research and the methods used here will contribute to the reliability analyses for the future guide d weapon systems to be developed.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

Location Tracking in Indoor Symbolic Space with RFID Sensors (RFID 센서를 이용한 실내 기호공간에서의 위치추적)

  • Kang, Hye-Young;Hwang, Jung-Rae;Li, Ki-Joune
    • Spatial Information Research
    • /
    • v.19 no.3
    • /
    • pp.53-62
    • /
    • 2011
  • Spatial information services in indoor space are an im portant application area of GIS as in outdoor space. Unlike in outdoor space, a position in indoor space is specified by a symbolic code such as room number, rather than coordinate. Therefore tracking in indoor space is no longer a prediction of coordinates but a symbolic estimation on the current position of a moving object. In this paper, we propose a framework for tracking moving objects in indoor symbolic space with RFID sensors. First, we introduce the concepts of indoor symbolic space and tracking in indoor symbolic space, and define the accessibility graph for trackable indoor symbolic space. Second, we propose a deployment method of RFID readers and a construction algorithm of accessibility graph for trackable indoor symbolic space. Third, a tracking method is proposed for moving objects in symbolic indoor space with RFID sensors. Finally, we present an implementation exmaple and the result of experiment with real data to validate the proposed method.