• Title/Summary/Keyword: IT 아키텍처

Search Result 805, Processing Time 0.028 seconds

Enterprise Architecture Modeling apply to real time web publishing based on XML with SVG (엔터프라이즈 아키텍처 모델의 웹 기반 시스템 적용을 위한 SVG Web Publishing)

  • Soo-Youn Bang;Jong-Woo Ha;Byung-Gul Ryu;Sang-Keun Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.455-458
    • /
    • 2008
  • 기업의 전사적 비즈니스와 IT 환경의 통합 청사진을 보여주는 엔터프라이즈 아키텍처의 효율적인 시스템 적용을 위하여는 조직의 비즈니스, 정보, 응용시스템, 기술 기반구조의 연관관계와 미래모델을 시각적으로 사용자에게 보여주어야 한다. 기존 ITAMS 혹은 EAMS 라고 불리는 시스템에 아키텍처 툴을 이용하여 EA 의 모델정보를 퍼블리싱하여 시각화하였는데 시스템과 아키텍처 툴간의 플랫폼의 이질성으로 인하여 아키텍처정보를 그래픽화하여 변환하고 해당정보를 시스템에서 보여주는데 실시간 적용이 불가능 했을 뿐 아니라 사용자의 편의성이 원활하지 않았다. 이에 본 연구는 XML 기반의 SVG 그래픽 도구를 이용하여 아키텍처 작업을 가능하게 하고 SVG 정보의 자동 생성 및 웹기반 모델링 툴을 구현하여 시스템과 모델링 툴의 단일 레파지토리화를 통하여 데이터의 이원화를 해소하고 사용자 편의성을 증대하는 패턴을 구현한다.

Architecture Evaluation Utilizing CBAM and AHP (CBAM과 AHP를 이용한 아키텍처 평가)

  • Lee, Ji-Hyun;Kang, Sung-Won;Cho, Jin-Hee;Kim, Jin-Sam
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.683-690
    • /
    • 2006
  • The CBAM (Cost Benefit Analysis Method) provides a method for deciding the best architectural strategy by considering cost, schedule, and risks as well as the benefits of the architectural strategy. But many parts of the CBAM do not Present quantitative evidence explicitly on whether it is the best architectural strategy among others because it depends on the stakeholders' consensus, vote, and/or intuition. In this study, we apply the AHP (Analytic Hierarchy Process) to CBAM to provide explicit quantitative evidence and to reduce the possibility of subjective decision-making errors that may occur in the CBAM.

GUI Testing for MVC Architecture based Applications (MVC 아키텍처 기반 애플리케이션의 GUI 테스팅)

  • Joo, Heeju;Lee, Changun
    • Journal of Software Engineering Society
    • /
    • v.24 no.1
    • /
    • pp.1-7
    • /
    • 2011
  • MVC(Model-View-Controller) architecture is well-known for high maintainability and it makes efficient development possible. Recently, it has been applied in many fields such as web, desktop and mobile applications. Therefore, effective testing for this architecture is strongly needed. Although much research has been done, there was not much efforts for exploiting MVC architecture in GUI testing. Therefore, in this paper, we propose a scheme for efficient and accurate GUI testing for MVC based applications. In this study we separate original state diagrams into view state diagram and model-controller state diagram. Then, we present a case study showing the effectiveness of our proposed scheme.

  • PDF

Performance Analysis of Speech Recognition Model based on Neuromorphic Architecture of Speech Data Preprocessing Technique (음성 데이터 전처리 기법에 따른 뉴로모픽 아키텍처 기반 음성 인식 모델의 성능 분석)

  • Cho, Jinsung;Kim, Bongjae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.69-74
    • /
    • 2022
  • SNN (Spiking Neural Network) operating in neuromorphic architecture was created by mimicking human neural networks. Neuromorphic computing based on neuromorphic architecture requires relatively lower power than typical deep learning techniques based on GPUs. For this reason, research to support various artificial intelligence models using neuromorphic architecture is actively taking place. This paper conducted a performance analysis of the speech recognition model based on neuromorphic architecture according to the speech data preprocessing technique. As a result of the experiment, it showed up to 84% of speech recognition accuracy performance when preprocessing speech data using the Fourier transform. Therefore, it was confirmed that the speech recognition service based on the neuromorphic architecture can be effectively utilized.

The Study for Methodology of Constructing Service Oriented Enterprise Architecture (서비스지향 전사적 아키텍처 구축방안 연구)

  • Kim, Sung-Min;Hwang, Sang-Kyu;Yun, Hong-Ran
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.419-423
    • /
    • 2006
  • 전사적 아키텍처 (Enterprise Architecture)는 단순한 정보자원관리의 수준을 넘어 한 조직의 비전을 달성하기 위해 정보자원을 전략적으로 활용 할 수 있는 도구로 발전하고 있다. 서비스 지향 아키텍처 (Service Oriented Architecture)는 EA구축 시 구성요소를 추출하고, 추출된 구성요소 간 전사적 정렬(alignment)을 유도해내는 도구로 활용할 수 있다. 서비스 지향 전사적 아키텍처 방법론(Service Oriented Enterprise Architecture Methodology)은 SOA기반의 EA구축방법론으로 상위 계획자 수준의 EA로부터 하위 개발자 수준 EA까지 조직의 정보자원을 어떻게 구분 짓고, 구분된 항목 간 연관정보를 어떻게 구성해야 할지에 대한 절차와 방향을 제시함으로써 전사적 정렬(Enterprise Alignment)을 위한 구체적 해결 방안을 제시하고 있다.

  • PDF

The Study for Methodology of Ontology-based Enterprise Architecture Interoperability (온톨로지 기반 전사적 아키텍처 상호운용성 방안 연구)

  • Hwang, Sang-Kyu;Kim, Wang-Suk;Byun, Young-Tae
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2006.05a
    • /
    • pp.424-429
    • /
    • 2006
  • 정부의 행정 서비스를 보다 효과적이고 효율적으로 제공하는 것은 정부혁신의 핵심키워드이다. 이를 위한 수단으로 정부 공공기관들은 전사적 아키텍처(Enterprise Architecture)를 적극적으로 도입, 활용해야 한다. 전사적 아키텍처란 아직까지도 진화중인 개념으로 해당 기관 정보화 업무의 전 영역을 업무 프로세스(Business Processes), 정보 흐름 및 관계(Information Flow and Relationships), 애플리케이션(Applications),데이터 명세 및 관계(Date Descriptions and Relationships), 그리고 기술 하부구조(Technology Infrastructure)로 구분 짓고 각각을 구조화된 산출물로 정리함으로써 공공정보화의 청사진을 제시한다. 이렇게 구축된 아키텍처 결과물은 기관 내 뿐 아니라 타 기관 EA와의 연계를 통해 상호 운용되어야 하며, 이 과정에서 어휘의미중의성(Word Sense Ambiguation)등 상호운용성 문제가 핵심 이슈로 대두되리라 예상된다. 공공분야로 한정짓더라도 200여 정부부처 EA간의 상호운용성 문제는 정부조직 간 경계를 넘어 통합된 EA정보를 취합, 활용하는 데 있어 가장 큰 장애요인이 되리라 예상된다. 본 논문에서는 온톨로지를 사용하여 각기 서로 다른 EA간 상호운용성 문제를 해결하는 방안에 대해 논의하고자 한다.

  • PDF

Design and Verification of the Class-based Architecture Description Language (클래스-기반 아키텍처 기술 언어의 설계 및 검증)

  • Ko, Kwang-Man
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.7
    • /
    • pp.1076-1087
    • /
    • 2010
  • Together with a new advent of embedded processor developed to support specific application area and it evolution, a new research of software development to support the embedded processor and its commercial challenge has been revitalized. Retargetability is typically achieved by providing target machine information, ADL, as input. The ADLs are used to specify processor and memory architectures and generate software toolkit including compiler, simulator, assembler, profiler, and debugger. The EXPRESSION ADL follows a mixed level approach-it can capture both the structure and behavior supporting a natural specification of the programmable architectures consisting of processor cores, coprocessors, and memories. And it was originally designed to capture processor/memory architectures and generate software toolkit to enable compiler-in-the-loop exploration of SoC architecture. In this paper, we designed the class-based ADL based on the EXPRESSION ADL to promote the write-ability, extensibility and verified the validation of grammar. For this works, we defined 6 core classes and generated the EXPRESSION's compiler and simulator through the MIPS R4000 description.

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

ISIS Architecture for Developing Complex Enterprise Applications (복잡한 엔터프라이즈 응용 개발을 위한 ISIS 아키텍처)

  • Jo, Eun-Hwan;Lee, Kap-Hoon;Lee, Min-Soo;Lee, Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.392-404
    • /
    • 2010
  • Recently, as both business processes and IT systems become ever more complex. Especially, enterprise applications tend to become unmanageably complex and increasingly costly to maintain. Therefore complexity is the insidious enemy of software development. It is critical to have a methodology that recognizes and manages this enemy effectively. In this paper, we propose ISIS (Integrated System of Independent Subsystems) - the architectural style needed to develop the complex enterprise applications. The ISIS was developed to meet the challenge of reducing the complexity of a larger enterprise application today. It gives us architecture models for reducing development complexity and composite application. The enterprise application is partitioned into a collection of independent subsystems using ISIS decomposition schemes and equivalence relations. We use middleware named ISIS engine that provides a service for subsystems interoperability by enabling the integration of distributed, cross-platform subsystems. We have implemented an ITSM system that achieves our objectives, reducing development complexity, using the ISIS architecture. Finally, ISIS architecture provides greater flexibility and productivity when an organization needs either to change its business processes, or to update the underlying systems.

Database Reverse Engineering Using Master Data in Microservice Architecture (마스터 데이터를 활용한 마이크로 서비스 아키텍처에서의 데이터베이스 리버스 엔지니어링)

  • Shin, Kwang-chul;Lee, Choon Y.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.523-532
    • /
    • 2019
  • Microservice architecture focuses on dividing it into small and lightweight services to build for the purpose of performing very close business functions. So it tends to concentrate only on agility, productivity, reliability, and ease of deployment of software development. Microservice architecture considers database as just a file or storage for storing and extracting data, emphasizing that data quality can be sacrificed for convenience and scalability of software development. Database reverse engineering for understanding database structure and data semantics is needed for data utilization for business decision making. However, it is difficult that reverse database engineering is applied in microservice architecture that neglects data quality. This study proposes database reverse engineering method that utilizes master data to restore the conceptual data model as a solution. The proposed method is applied to the return service database implemented by microservice architecture and verified its applicability.