• Title/Summary/Keyword: Event Sourcing

Search Result 5, Processing Time 0.016 seconds

BSM framework using Event-Sourcing and CQRS pattern in V2X environment

  • Han, Sangkon;Goo, EunHee;Choi, Jung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.169-176
    • /
    • 2022
  • With the continuous development of technologies related to 5G, artificial intelligence, and autonomous vehicle systems, standards and services for V2X and C-ITS environments are being studied a lot. BSM (basic safety message) was adopted as a standard for exchanging data between vehicles based on data collected and generated by vehicle systems in a V2V environment. In this paper, we propose a framework that can safely store BSM messages and effectively check the stored messages using Event-Sourcing and CQRS patterns. The proposed framework can securely store and manage BSM messages using hash functions. And it has the advantage of being able to check the stored BSM data in real time based on the time series and to reproduce the state.

Persistence of Information Systems (IS) Sourcing Relationship: An Event-Time Survival Analysis (정보시스템 아웃소싱의 관계 지속성에 관한 연구 : Time-Event Survival 분석)

  • Nam, Kichan;Goo, Jahyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.3
    • /
    • pp.1-30
    • /
    • 2003
  • This study attempts to understand factors influencing the persistence of companie's outsourcing arrangements using the techniques of survival analysis. It provides an insight into the dynamics of outsourcing relationships between clients and vendors. This is particularly relevant considering that current IS sourcing arrangements are strategic and long term, and require close interdependent relationships between the client and the vendor.

Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain (이벤트 소싱 패턴과 블록 체인을 활용한 모바일 게임 클라이언트 메모리 조작 방지 방안)

  • Park, Jihun;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.477-486
    • /
    • 2022
  • This study aims to present a method using event sourcing patterns and blockchain as a way to cope with vulnerabilities in memory manipulation at the client level. To verify the plan, the method of running the memory operation application was analyzed, and the performance was compared and analyzed when the memory operation prevention plan was applied by fabricating a test application. As a result of the analysis, the usage of memory increased compared to the method of XOR operation by storing major data in one memory, but it was possible to prevent the operation of the memory operation program without significantly affecting the performance of the game.

Crowdsourcing based Local Traffic Event Detection Scheme (크라우드 소싱 기반의 지역 교통 이벤트 검출 기법)

  • Kim, Yuna;Choi, Dojin;Lim, Jongtae;Kim, Sanghyeuk;Kim, Jonghun;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.83-93
    • /
    • 2022
  • Research is underway to solve the traffic problem by using crowdsourcing, where drivers use their mobile devices to provide traffic information. If it is used for traffic event detection through crowdsourcing, the task of collecting related data is reduced, which lowers time cost and increases accuracy. In this paper, we propose a scheme to collect traffic-related data using crowdsourcing and to detect events affecting traffic through this. The proposed scheme uses machine learning algorithms for processing large amounts of data to determine the event type of the collected data. In addition, to find out the location where the event occurs, a keyword indicating the location is extracted from the collected data, and the administrative area of the keyword is returned. In this way, it is possible to resolve a location that is broadly defined in the existing location information or incorrect location information. Various performance evaluations are performed to prove the superiority and feasibility of the proposed scheme.

A Study on the Supply Chain Security and Risk Management Strategies of Global Companies (글로벌 기업의 공급사슬보안 및 위험관리전략에 관한 연구)

  • Yang, Jung-Ho
    • Management & Information Systems Review
    • /
    • v.27
    • /
    • pp.149-172
    • /
    • 2008
  • Since the 9/11 terror attack, the event which caused supply chain disruption, supply chain security has becomes more important than ever before. Furthermore, such company's logistics strategies conflicting supply chain security as increased global sourcing, JIT manufacturing are increasing supply chain vulnerability. It could burden for global companies to strengthen supply chain security because not only it requires additional investment cost but also changes of companiy's global logistics strategy. However, on the other hand, supply chain visibility and resilience can be improved through supply chain security. In addition, it allows companies to stabilize supply chain structure as well as rapid and flexible response to market demand. The key issue is balancing between efficiency and supply chain security. To do this, identifying risk elements under the supply chain and assessing vulnerability of each supply chain components should be performed before developing efficient supply chain security management system without obstructing supply chain efficiency.

  • PDF