• Title/Summary/Keyword: Infrastructure of Information Technologies

Search Result 442, Processing Time 0.024 seconds

Best Practices in the Implementation of Research Infrastructure in the Academic Environment: Shortcomings and Revisions

  • Michal Lorenz;Ema Juranova;Michal Konecny;Hana Kubelkova;Veronika Wolfelova
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.13 no.4
    • /
    • pp.95-117
    • /
    • 2023
  • The Digitalia MUNI ARTS - a local node of the LINDAT/CLARIAH-CZ research infrastructure at the Faculty of Arts of Masaryk University constitutes a repository in the Islandora system. It is used for long-term preservation of research data together with their research environment in the form of digital platforms. We transfer the digital outputs of humanities scholars research to the repository according to a set plan, which is based on best practice recommendations for project management and digital curation. In this paper, we present how the results of interviews with platform developers and infrastructure stakeholders translate into the curation workflow, and a resulting model for migrating digital platforms to the repository. Reflecting on three types of problems we encountered during the implementation of platforms into the repository - communication problems, problems of external dependence, and management problems - we describe a modification of the migration process. We present six recommendations for repository administrators and curators in an academic setting - holding an introductory meeting with developers, researching significant and relevant theories of knowledge domain, consulting license experts, prioritizing requirements, and preparing handover protocol and progress reports.

Technical Advancements Needed for the Introduction of Distributed Water Infrastructure to Urban Wastewater Management Systems (분산형 물 인프라의 도시 하수관리 시스템 도입을 위한 기술적 발전방안)

  • Yongju Choi;Wooram Lee
    • Journal of Korean Society on Water Environment
    • /
    • v.39 no.1
    • /
    • pp.76-86
    • /
    • 2023
  • We are on the verge of paradigm shift for the design and operation of our urban water systems from treatment- and efficiency-based to recirculation- and sustainability-based. One of the most frequently suggested alternatives to embody this paradigm shift is to decentralize the currently highly centralized urban water infrastructure. However, claims for water infrastructure decentralization are often criticized due to poor economic feasibility, unstable performance, and unprofessional operation and maintenance. The current study critically reviews the literature to discuss the technical advancement needs to overcome such challenges. Firstly, decentralized water infrastructure was briefly defined and the rationale for the proposal of its introduction to the next-generation urban water systems was laid down. The main discussion focused on the following water technologies, which require special attention when working with decentralized water infrastructure: i) material collection, storage, and transport; ii) easily scalable water treatment; iii) sensor, information, and communications; and iv) system optimization. The principles, current development status, and challenges were discussed for each of the water technologies. The discussion on the water technologies has enabled the identification of future research needs for their application to the next-generation urban water systems which will be designed following decentralized water infrastructure. This paper will significantly improve the current understanding on water infrastructure decentralization and provides insight on future direction of water technology development.

A Study on the Basic Requirements and Operation Plan of E-trade Platform (전자무역 플랫폼의 기본요건과 운영방안에 관한 연구)

  • Lee, Sang-Jin
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.107-127
    • /
    • 2004
  • The rapid development of internet information technology has increased interest in e-Trade these days, but it is not activated greatly up to now. In order to promote e-Trade, it is essential to construct cooperative process such as connecting systems among trade related parties. Building e-Trade platform which is based on the infrastructure of the past trade automatic system is key point of promoting e-Trade. To do this, a study on the basic concept and specific components of e-Trade platform is needed absolutely. At this point of view, after this paper has examined domestic and foreign studies on the fundamental technologies about electronic commerce, it drew several key technologies that could be applied to e-Trade considering the current IT trend. Then it evaluates these technologies according to Technology Reference Model(TRM) of the National Computerization Agency. This will help us to show the operation strategy as well as the concept of future e-Trade platform and its composition. On the basis of the theoretical background, this paper classified NCA's technology model into 6 fields, which are application. data, platform, communication, security and management. Considering the key technologies, e-Trade platform has to be mutually connected and accept international standards such as XML. In the aspect of business side, trade relative agencies' business process as well as trading company's process has to be considered. Therefore, e-Trade platform can be classified into 3 parts which are service, infrastructure and connection. Infrastructure part is compared of circulating and managing system of electronic document, interface and service framework. Connecting service (application service) and additional service (application service) consist of service part. Connecting part is a linking mutual parts and can be divided into B2B service and B20 service. The organization operating this e-trade platform must have few responsibilities and requirements. It needs to positively accept existing infrastructure of trade automatic system and improving the system to complete e-trade platform. It also have to continuously develop new services and possess ability to operate the system for providing proper services to demanders. As a result, private sector that can play a role as TTP(Third Trust Party) is adequate for operating the system. In this case, revising law is necessary to support the responsibility and requirement of private sector.

  • PDF

A Review of Intelligent Self-Driving Vehicle Software Research

  • Gwak, Jeonghwan;Jung, Juho;Oh, RyumDuck;Park, Manbok;Rakhimov, Mukhammad Abdu Kayumbek;Ahn, Junho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5299-5320
    • /
    • 2019
  • Interest in self-driving vehicle research has been rapidly increasing, and related research has been continuously conducted. In such a fast-paced self-driving vehicle research area, the development of advanced technology for better convenience safety, and efficiency in road and transportation systems is expected. Here, we investigate research in self-driving vehicles and analyze the main technologies of driverless car software, including: technical aspects of autonomous vehicles, traffic infrastructure and its communications, research techniques with vision recognition, deep leaning algorithms, localization methods, existing problems, and future development directions. First, we introduce intelligent self-driving car and road infrastructure algorithms such as machine learning, image processing methods, and localizations. Second, we examine the intelligent technologies used in self-driving car projects, autonomous vehicles equipped with multiple sensors, and interactions with transport infrastructure. Finally, we highlight the future direction and challenges of self-driving vehicle transportation systems.

Network vision of disaster prevention management for seashore reclaimed u-City (해안매립 신도시의 재해 예방관리 네트워크 비젼)

  • Ahn, Sang-Ro
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.09a
    • /
    • pp.117-129
    • /
    • 2009
  • This paper studied the safety management network system of infrastructure which constructed smart sensors, closed-circuit television(CCTV) and monitoring system. This safety management of infrastructure applied to bridge, cut slop and tunnel, embankment etc. The system applied to technologies of standardization guidelines, data acquirement technologies, data analysis and judgment technologies, system integration setup technology, and IT technologies. It was constructed safety management network system of various infrastructure to improve efficient management and operation for many infrastructure. Integrated safety management network system of infrastructure consisted of the real-time structural health monitoring system of each infrastructure, integrated control center, measured data transmission using i of tet web-based, collecting data using sf ver, early alarm system which the dangerous event of infrastructure occurred. Integrated control center consisted of conference room, control room to manage and analysis the data, server room to present the measured data and to collect the raw data. Early alarm system proposed realization of warning and response within 5 minute or less through development of sensor-based progress report and propagation automation system using the media such as MMS, VMS, EMS, FMS, SMS and web services of report and propagation. Based on this, the most effective u-Infrastructure Safety Management System is expected to be stably established at a less cost, thus making people's life more comfortable. Information obtained from such systems could be useful for maintenance or structural safety evaluation of existing structures, rapid evaluation of conditions of damaged structures after an earthquake, estimation of residual life of structures, repair and retrofitting of structures, maintenance, management or rehabilitation of historical structures.

  • PDF

Enhancing the Customer Service Process through Information Technologies and Customer Knowledge in Call Centers : The Moderating Role of Computer Self-Efficacy (콜센터에서 정보기술과 고객지식을 이용한 고객서비스 프로세스 향상 : 컴퓨터 자기효능감의 조절역할)

  • Choi, Sujeong
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.185-203
    • /
    • 2017
  • Call center service is enabled by the use of a firm's various information technologies (IT) and accumulated knowledge. IT and knowledge resources have been considered a fundamental infrastructure for developing a firm's business capabilities. Recognizing this, this study examines whether a firm's IT and customer knowledge resources enhance its customer service process capability and thereby contribute to creating superior customer service, at the level of customer service representatives (CSRs). That is, constructs in this study were measured on a basis of CSRs' perception. Moreover, this study verifies the moderating role of CSRs' computer self-efficacy on the relationships between IT and customer knowledge resources and customer service process capability. To test the proposed hypotheses, this study conducted partial least squares (PLS) analysis with a total of 234 data which were collected on CSRs working at four call centers. The key findings are as follows: first, IT infrastructure integration and customer knowledge integration are positively associated with customer service process capability. Second, customer service process capability is a key determinant of customer service performance. Finally, CSRs' computer self-efficacy has a moderating effect on the relationship between IT infrastructure integration and customer service process capability. The details of the findings and implications are presented.

신규 가입자망 기술의 경제성 평가를 위한 망 구조모형과 그 응용

  • 류태규;이정동;김태유
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2000.11a
    • /
    • pp.45-67
    • /
    • 2000
  • Broadband access technologies plays an important role in the national information infrastructure. In the evolution path of the information infrastructure, the relative economics of alternative access technology is the most critical determining factor. In this paper, we discuss the economics of local loop access technologies of existing technologies, such as, ADSL, HFC, and new PLC. To do this, we suggest appropriate configuration of access network system and its associated numerical equations. To modelize access network system and drive the numerical equations, we consider the DS (Double Star) and the T&B (Tree & Brench) architecture and analyse the adequate block diagram of each access system for each technology We introduce the density of subscriber as a key variable and the equation of allocating optimal number of cell in a service area. We analyze the relative economics of local loop architecture in two different situations, that is, urban and rural. From the empirical implementation, we found that for the case of urban area, where the cost of cable and infrastructure is not necessary, there is not much difference in the cost per one subscriber. However, for the case of rural region, we found that there is remarkable difference in the cost per one subscriber among technologies. Therefore we conclude that the economics of local loop architecture is depend on the density of subscriber and existing network infrastructures. we hope that this paper contribute to the optimal technology selection of consmer, technology Providers, and government.

  • PDF

A Study on Security Requirements of Electric Vehicle Charging Infrastructure Using Threat Modeling (위협모델링을 이용한 전기차 충전 인프라의 보안요구사항에 대한 연구)

  • Cha, Ye-Seul;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1441-1455
    • /
    • 2017
  • In order to build a secure electric vehicle charging infrastructure, security research is required because various data including charging and payment data are transmitted in the electric vehicle charging infrastructure. However, previous researches have focused on smart grid related security research such as power system infrastructure rather than charging infrastructure for electric vehicle charging. In addition, research on charging infrastructure is still lacking, and research using a systematic methodology such as threat modeling is not yet under way. Therefore, it is necessary to apply threat modeling to identify security threats and systematically analyze security requirements to build a secure electric vehicle charging infrastructure. In this paper, we analyze the electric vehicle charging infrastructure by accurately identifying possible threats and deriving objective security requirements using threat modeling including Data Flow Diagram, STRIDE, and Attack Tree.

A study on the evolution of post-smartphone technologies in the 5G technology environment

  • Kwak, Jeong Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1757-1772
    • /
    • 2020
  • As the smartphone market becomes saturated, an innovative device equipped with new features is expected to appear soon in mobile communications. In particular, various possibilities were raised regarding the alternative technologies that can develop post-smartphones, which are differentiated from the current smartphones, as Korea commercialized the 5G infrastructure for the first time in the world. Under these circumstances, the Korean government announced the "5G+ Strategy for Realizing Innovative Growth" in April 2019, vowing to build an innovative industrial ecosystem quickly while creating various convergence services based on the 5G infrastructure. As described above, the policy importance of the alternative technologies that will develop post-smartphones is increasing, but the theoretical study on the technology evolution of post-smartphones has not been systematically conducted until now. This study reviewed the alternative technologies that can develop post-smartphones through documentary research, and data mining analysis was performed on the research result using actual data. The policy priority was also set quantitatively for the alternative technologies of post-smartphones in order to determine the alternative post-smartphone technology that the government should focus on given the constraint of limited resources. As a results, autonomous vehicle(43.68%) was found to be most important, followed by artificial intelligence(17.4%) and Internet of Things(13.1%), among alternative technologies that could develop into the post-smartphone.

Digital Forensic Investigation of Virtual Desktop Infrastructure (가상 데스크톱 환경에 대한 디지털 포렌식 연구)

  • Jang, Sanghee;Kim, Deunghwa;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.203-212
    • /
    • 2013
  • Recently, cloud computing is one of the parts showing the biggest growth in the IT market and is expected to continue to grow into. Especially, many companies are adopting virtual desktop infrastructure as private cloud computing to achieve in saving the cost and enhancing the efficiency of the servers. However, current digital forensic investigation methodology of cloud computing is not systematized scientifically and technically. To do this, depending on the type of each cloud computing services, digital evidence collection system for the legal enforcement should be established. In this paper, we focus on virtual desktop infrastructure as private cloud computing and introduce the most widely used around the world desktop virtualization solutions of VMware, Citrix, and Microsoft. And We propose digital forensic investigation methodology for private cloud computing that is constructed by these solutions.