• Title/Summary/Keyword: Backend

Search Result 65, Processing Time 0.027 seconds

Design and Implementation of WMI based VOD Service for efficient Load Balance Policy (효율적인 부하 분산 정책을 위한 WMI 기반 VOD 서비스의 설계 및 구현)

  • Bang, Han-Min;Jung, In-Bum
    • Journal of Industrial Technology
    • /
    • v.29 no.A
    • /
    • pp.123-126
    • /
    • 2009
  • Cluster-based servers are utilized for large scale streaming services. These servers show good performance under fair resource usage balance policies between backend nodes. In this paper, cluster-based VOD servers are implemented based on WMI functions. Based on these functions, the information of resource usages in backend nodes can be exchanged and also the working states of cluster nodes can be monitored periodically. In experiences, we find motivations to design an effective load balancing policy. In addition, to provide reliable streaming services, the method to detect a partial failure in cluster-based servers is proposed.

  • PDF

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.

User Behavior of Mobile Enterprise Applications

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3972-3985
    • /
    • 2016
  • Organizations have been implementing mobile applications that actually connect to their backend enterprise applications (e.g. ERP, SCM, etc.) in order to increase the enterprise mobility. However, most of the organizations are still struggling to fully satisfy their mobile application users with the enterprise mobility. Even though it has been regarded as the right direction that the traditional enterprise system should move on, the studies on the success model for mobile enterprise applications in user's acceptance perspective can hardly be found. Thus, this study focused not only to redefine the success of the mobile enterprise application in user's acceptance persepective, but also to find the impacts of the factors on user's usage behavior of the mobile enterprise applications. In order to achieve this, we adopted the Technology Acceptance Model 2 (TAM2) as a model to figure out the user's behavior on mobile applications. Among various mobile enterprise applications, this study chose mobile ERP since it is the most representing enterprise applications that many organizations have implemented in their backend. This study found that not all the constructs defined by Davis in TAM2 have a significant influence on user's behavior of the mobile-ERP applications. However, it is also found that most social influence processes of TAM2 influence user's perception of the degree of interaction by mobile-ERP applications.

SPA ViewModel Transformation for RESTful API (RESTful API를 위한 SPA ViewModel 변환)

  • Dong-il Cho
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.9-15
    • /
    • 2023
  • Single-Page Application(SPA) requires data transformation for communication with RESTful API. The Backend for Frontend(BFF) pattern handles this transformation in the server, but there is some problem that increases the number of communication and makes development and distribution difficult. In this study, we propose an architecture that maps the ViewModel of SPA and the model of RESTful API directly in SPA. The proposed architecture automatically generates a mapping model between the RESTful API model and the ViewModel using the OpenAPI specification, which is the document model of the RESTful API. The data transfer component of SPA automatically converts RESTful API data and ViewModel using the created model. As a result of comparison with the existing BFF method through case study, the proposed architecture showed higher development productivity than BFF, and as a result of load tests, it recorded about 6% lower server CPU occupancy compared to BFF.

THE SUBMILLIMETER ARRAY: CURRENT STATUS AND FUTURE PLAN

  • OHASHI NAGAYOSHI
    • Journal of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.103-106
    • /
    • 2005
  • The Submillimeter Array (SMA), a collaborative project of the Smithsonian Astrophysical Observatory (SAO) and the Academia Sinica Institute of Astronomy & Astrophysics (ASIAA), has begun operation on Mauna Kea in Hawaii. A total of eight 6-m radio telescopes comprise the array with currently working receiver bands at 230, 345, and 690 GHz. The array will have 8 receiver bands covering the frequency range of 180-900 GHz. The backend is flexible analog-digital correlator with a full bandwidth of 2GHz, which is very powerful to cover several line emissions simultaneously. The current status and future plans of the SMA are described with emphasis on Taiwanese efforts.

On the Application of TOC to B2B e-commerce (B2B 전자상거래에서 TOC의 역할)

  • 정남기
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.206-208
    • /
    • 2000
  • This paper focuses on what the philosophy and methodology of the Theory of Constraints contribute to B2B e-commerce. Typical characteristics of TOC methods applicable to B2B are explored in comparison with traditional MRP, JIT, TQM and cost accounting. Addressed are expected changes in various backend business areas supporting e-commerce. TOC provides B2B management with the capability of logistics transparency, speedy decision making, and better cashflow.

  • PDF

SRAO Dual-Pole System Software Development

  • Kang, Hyun-Woo;Kim, Chang-Hee;Yang, Hee-Su;Park, Yong-Sun
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.1
    • /
    • pp.44.2-44.2
    • /
    • 2010
  • Recently, SRAO has upgraded from one-pole system software to dual-pole system software. We present the new dual-pole system software and how it works in detail. Dual-pole observation is enabled with just some commands. To do so, backend-system controls two different hardwares, proceeds two different data and make two files at one observation.

  • PDF

ENI 스퍼터를 이용한 Cu Seed Layer 증착

  • Lee, Bong-Ju;Im, Seon-Taek;Park, Yeong-Chun;Yu, Seok-Jae
    • Proceedings of the Korean Institute of Surface Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.3-4
    • /
    • 2008
  • 로직 디바이스에서는 알루미늄을 대신하여 구리로 backend-of-line(BEOL) 금속화공정이 대체되고 있다. 그러나 메모리 디바이스에서 구리 배선으로의 전환이 쉽지 않다. Cu-seed layer는 구리 배선을 메모리 디바이스에 적용하기 위해서 필요한 gap-fill 확장성을 개선하기 위한 중요한 부분을 차지한다. Cu-seed layer 증착을 위한 향상된 PVD 장비인 Eni 스퍼터를 소개한다.

  • PDF

Consideration of CTS using Efficient Buffer Insertion for SoC in Multiple Clock Domain (다중 클록 영역의 SoC를 위한 효율적인 버퍼삽입 방식의 CTS에 대한 고려)

  • Seo, Yong-Ho;Choi, Eui-Sun;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.4
    • /
    • pp.643-653
    • /
    • 2012
  • In this paper, we consider a clock tree synthesis technique (CTS) based on buffer insertion method in the multiple clock domain. We propose some detail techniques about the preparing items and the practical method for implementing CTS. We also propose a post processing after CTS implementation. Until now, the buffer insertion-based CTS technique has been widely used, and this paper discusses especially it's practical technique to be applied in the commercial fields to develop ASIC and SoC. CTS is very dependent on the used tool. We use Astro of Synopsys and propose the empirical and theoretical information of the detail techniques for implementing CTS using this tool. We expect that the proposed technique becomes to be good guidelines to backend designers.