• Title/Summary/Keyword: Data Provider

Search Result 751, Processing Time 0.026 seconds

The Monitoring System for Semantic Web based Visual Media Retrieval Framework (분산 시각미디어 검색 프레임워크를 위한 모니터링 시스템)

  • Shim Jun-Yong;Kim Seh-Chang;Won Jae-Hoon;Kim Jung-Sun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.178-180
    • /
    • 2006
  • 기존의 Ontology를 이용한 이미지 검색 시스템이나. 간단한 구조를 가진 메타데이터 기반의 분산 이미지 검색 시스템들의 단정들을 극복하기 위해 다양한 이미지 제공자들의 자율성을 보장하면서, 시맨틱 기반의 이미지 검색을 지원하는 분산 시각미디어 검색 프레임워크가 제안되었다. 하지만 제안된 프레임워크에서는 Visual Media Data를 제공하는 Provider와 클라이언트의 Query를 처리해서 Provider에게 전달하는 Broker 사이의 연결 상태에 대한 신뢰성이 보장되지 않았고, 다수의 클라이언트 접속에 의해 발생하는 Broker 내부 컴포넌트들의 Overhead 문제를 효과적으로 해결할 수 없었다. 본 논문에서는 기존의 프레임워크에 Monitoring 시스템을 도입하여 Broker 내부 컴포넌트들의 수행시간을 측정하여 저장함으로써, 다수의 클라이언트 요구에 의해서 Overhead가 발생하는 컴포넌트들을 Monitoring 할 수 있고, Provider의 연결 상태를 정기적으로 확인하여 Broker 내부에 등록되어 있는 Provider의 도메인 리스트를 서버 상태가 확인된 리스트로 업데이트 시켜줌으로써 연결 상태에 대한 신뢰성을 제공할 수 있도록 하기 위한 Monitoring 시스템을 제안한다.

  • PDF

ASP Vendor Attributes that Affect ASP Client Satisfaction (ASP(Application Service Provider) 사용 기업 만족도에 영향을 미치는 공급사 특성에 관한 연구)

  • Kim, Gyeong-Min;Lee, Myung-Jin
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.65-80
    • /
    • 2004
  • The primary purpose of this study is to investigate ASP (Application Service Provider) vendor attributes that affect ASP client satisfaction. From the relevant literature, ASP vendor attributes that might affect the ASP client satisfaction were derived from which the survey questions were formulated. The survey was conducted among the companies that have adopted ASP. Through the factor analysis of the survey results, the following vendor attributes - vendor's IT infra structure, service reliability, service flexibility, vendor stability, IS maturity, information sharing - were derived ; and the relationships between those attributes and ASP client satisfaction were explored. The result of this study revealed that IT infra, service flexibility, vendor stability are related to ASP client satisfaction. The customer satisfaction factors in the traditional outsourcing -- reliability, IS maturity, information sharing were proved to be not applied in ASP environment. This study provides ASP vendors with guidelines on how to improve their ASP strategies to satisfy clients. The results of this study can also be used by client companies as a decision basis for ASP vendor selection.

  • PDF

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data

  • Lee, Hyunjo;Song, Youngho;Chang, Jae-Woo
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1087-1101
    • /
    • 2018
  • As cloud computing has become a widespread technology, malicious attackers can obtain the private information of users that has leaked from the service provider in the outsourced databases. To resolve the problem, it is necessary to encrypt the database prior to outsourcing it to the service provider. However, the most existing data encryption schemes cannot process a query without decrypting the encrypted databases. Moreover, because the amount of the data is large, it takes too much time to decrypt all the data. For this, Programmable Order-Preserving Secure Index Scheme (POPIS) was proposed to hide the original data while performing query processing without decryption. However, POPIS is weak to both order matching attacks and data count attacks. To overcome the limitations, we propose a group order-preserving data encryption scheme (GOPES) that can support efficient query processing over the encrypted data. Since GOPES can preserve the order of each data group by generating the signatures of the encrypted data, it can provide a high degree of data privacy protection. Finally, it is shown that GOPES is better than the existing POPIS, with respect to both order matching attacks and data count attacks.

Difference in Outpatient Medical Expenditure and Physician Practice Patterns between Medicaid and Health Insurance Patients (건강보험환자와 의료급여환자 간 의원 외래 의료이용 차이와 공급자 진료행태)

  • Joo, Jung-Mi;Kwon, Soon-Man
    • Health Policy and Management
    • /
    • v.19 no.3
    • /
    • pp.125-141
    • /
    • 2009
  • The purpose of this study was to examine the role of provider practice patterns in the difference in health expenditure between the two types of patients: Health Insurance and Medical Aid type 1. The study used the outpatient claim data for all Medicaid and health insurance patients of hypertension who received medical services from 8,454 primary care physicians during the first half of 2006. The data were stratified by patient's gender and age for the two groups of patients who received care from the same physician. The dependent variables were the differences in medical expenditure per case, patient days per case and medical expenditure per patient day between Medicaid patients and health insurance patients. Empirical results showed that physician characteristics, such as physicians under age 50, greater proportion of pediatric Medicaid patients, lower proportion of new Medicaid patients and the greater number of comorbidity of Medicaid patients are associated with the greater difference between the two types of patients (i.e., greater expenditure of Medicaid patients relative to health insurance patients). This study shows that factors associated with provider practice patterns need to be taken into account in Medicaid policy.

Investigating the Determinants of Major IT Incident Tickets: A Case Study of an IT Service Provider Firm for Logistics and Distribution Industry

  • Ro, Mohamad Izham Che;Lau, Wee-Yeap
    • Journal of Distribution Science
    • /
    • v.14 no.12
    • /
    • pp.61-69
    • /
    • 2016
  • Purpose - This study investigates the determinants that affect the number of IT Incident tickets of an IT Service Provider ("ITSP") to logistics industry in order to improve its management process by reducing the incident tickets. Research design, data, and Methodology - This study uses weekly data of IT incident tickets from September 2012 to June 2015. Correlation and regression analyses are conducted. Six identified determinants i.e., IT Change, User Errors, Shipment Volume, Network, Hardware and Software Issues are used as the explanatory variables. Results - Our findings show as following. First, our analysis indicates that IT Change is not a significant determinant as opposed to what commonly believed by many as the most important factor. Second, Software issue is the highest contributor to the Major IT incident tickets, followed by User Error, Network and Hardware issues. Third, it seems there is lead-lag relationship between IT Change and Major IT Incidents tickets as indicated by earlier studies. Fourth, the relationship between IT Change and Major IT tickets is also affected by shipment volume. Conclusions - As policy recommendation, all identified determinants should be treated according to priority. In addition, improving the way IT Changes are implemented will definitely reduce the IT incident tickets.

Design of a Data Grid Model between TOS and HL7 FHIR Service for the Retrieval of Personalized Health Resources (개인화된 건강 자원 조회를 위한 TOS 와 HL7 FHIR 서비스간의 데이터그리드 모델 설계)

  • Jeon, Young-Jun;Im, Seok-Jin;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.139-145
    • /
    • 2016
  • On the ICT healing platform designed to issue early disease alerts, TOS connected between the provider of personal health-related data and the service provider and relayed personalized health data. In the previous study, TOS proposed how to monitor the retrieval and management of document/measurement resources by taking mobile devices into account. Recently the healthcare field, however, defined the standard items needed for communication and data exchanges with a mobile device through HL7 FHIR. This study designed a data grid model between TOS and FHIR to provide personal health resources relayed through TOS in FHIR bundle search sets. The proposed design was organized as follows: first, it stated similarities between the method of TOS resource request and that of FHIR observation request. Then, it designed an eventbus module to process a retrieval request for FHIR service based on the imdb and cluster technologies. The proposed design can be used to expand the old service terminals of ICT healing platform to mobile health devices capable of using FHIR resources.

Address Permutation for Privacy-Preserving Searchable Symmetric Encryption

  • Choi, Dae-Seon;Kim, Seung-Hyun;Lee, Youn-Ho
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.66-75
    • /
    • 2012
  • This paper proposes a privacy-preserving database encryption scheme that provides access pattern hiding against a service provider. The proposed scheme uses a session key to permute indices of database records each time they are accessed. The proposed scheme can achieve access pattern hiding in situations in which an adversary cannot access the inside of the database directly, by separating the entity with an index table and data table and permuting both the index and position where the data are stored. Moreover, it is very efficient since only O(1) server computation and communication cost are required in terms of the number of the data stored. It can be applied to cloud computing, where the intermediate entities such as cloud computing service provider can violate the privacy of users or patients.

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

Development of the EPG Provider System based on DAB (DAB 기반의 EPG Provider 시스템 개발)

  • Jin Hyun-Joon;Park Nho-Kyung;Hwang Woon-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.12
    • /
    • pp.51-60
    • /
    • 2004
  • DAB(Digital Audio Broadcasting) is a new media service that can provide CD quality audio, various data service, interactive and high quality mobile communications through popular media such as terrestrial broadcasting, satellite, cable TV, and internet. In this paper, a new EPG(Electronic Program Guide) application model is proposed. The model is based on DAB and combines a DAB receiver and PCs so that it can take advantages of using various multimedia services and plenty of internet contents. The developed EPSD(EPG Provider System on DAB) has Web-based Server/Client structure and povides EPG functionalities to client PCs over internet. Therefore, the DAB receiver can be smaller and cheaper, and can develop abundant data services on internet. It can also provide high quality video services and be expected to become an important component in future home network systems.