• Title/Summary/Keyword: Internet Service Leasing

Search Result 7, Processing Time 0.023 seconds

Implementation Techniques of a Workflow-based Service Broker for Service Leasing over the Internet (인터넷 서비스 임대를 위한 워크플로우 기반 서비스 중개자 구현기법)

  • Lee, Yong-Ju
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.277-288
    • /
    • 2002
  • A service broker supporting customers plays an important role in internet marketplaces. Recently. several intelligent brothers have been developed for electronic commerce, outline shopping mall, and electronic marketplaces. While these systems provide interesting shopping experiences, they fall short in fully exploiting the capabilities, such as the service integration and automatic execution required by internet market places. In this respect, we propose a workflow-based service broker system. Dependent services in our approach are modeled as workflow processes, which are automatical1y processed by a workflow engine. In the proposed system all data exchanges are realized through XML providing platform independent, extensible, open. and interoperable architecture.

Design and Implementation of an XML-based Planning Agent for Internet Marketplaces (인터넷 마켓플레이스를 위한 XML 기반 계획 에이전트의 설계와 구현)

  • Lee, Yong-Ju
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.211-220
    • /
    • 2001
  • A planning agent supporting customers plays a distinguished role in internet marketplaces. Although several internet marketplaces have been built with the maturity of tools based on internet and distributed technologies, there has been no actual study up to now with respect to the implementation of the planning agent. This paper describes the design and implementation of an XML-based planning agent for internet marketplaces. Since implementing internet marketplaces encounter problems similar to those in other fields such as multidatabase or workflow management systems, we first compare those features. Next we identify functions and roles of the planning agent. The planning agent is implemented using COM+, ASP, and XML, and demonstrated using real data used in an existing system.

  • PDF

Combinatorial Auction-Based Two-Stage Matching Mechanism for Mobile Data Offloading

  • Wang, Gang;Yang, Zhao;Yuan, Cangzhou;Liu, Peizhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2811-2830
    • /
    • 2017
  • In this paper, we study the problem of mobile data offloading for a network that contains multiple mobile network operators (MNOs), multiple WiFi or femtocell access points (APs) and multiple mobile users (MUs). MNOs offload their subscribed MUs' data traffic by leasing the unused Internet connection bandwidth of third party APs. We propose a combinatorial auction-based two-stage matching mechanism comprised of MU-AP matching and AP-MNO matching. The MU-AP matching is designed to match the MUs to APs in order to maximize the total offloading data traffic and achieve better MU satisfaction. Conversely, for AP-MNO matching, MNOs compete for APs' service using the Nash bargaining solution (NBS) and the Vickrey auction theories and, in turn, APs will receive monetary compensation. We demonstrated that the proposed mechanism converges to a distributed stable matching result. Numerical results demonstrate that the proposed algorithm well capture the tradeoff among the total data traffic, social welfare and the QoS of MUs compared to other schemes. Moreover, the proposed mechanism can considerably offload the total data traffic and improve the network social welfare with less computation complexity and communication overhead.

The Security Architecture for Secure Cloud Computing Environment

  • Choi, Sang-Yong;Jeong, Kimoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.81-87
    • /
    • 2018
  • Cloud computing is a computing environment in which users borrow as many IT resources as they need to, and use them over the network at any point in time. This is the concept of leasing and using as many IT resources as needed to lower IT resource usage costs and increase efficiency. Recently, cloud computing is emerging to provide stable service and volume of data along with major technological developments such as the Internet of Things, artificial intelligence and big data. However, for a more secure cloud environment, the importance of perimeter security such as shared resources and resulting secure data storage and access control is growing. This paper analyzes security threats in cloud computing environments and proposes a security architecture for effective response.

Problem and Improvement of the Computerization Practice Real - estate Registration

  • Youn, Sung-Ho;Kim, Moon-sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.161-168
    • /
    • 2016
  • It has become the information medium that mediate between individuals of marketing with the new information media that use of the Internet in accordance with the progress of the IT industry- real estate marketing, real estate leasing, real estate auctions, etc. The real estate registration services should be disclosed to outside that include a schedule details the public book-register and problems caused by it should be reasonably resolved by handling a large amount of real estate registration work quickly, accurately handling to utilize Information Technology(IT) through the information system construction as the feature to process the information of register entries. Computerization of real estate registration will raise the efficiency of the registration as well as people can see the information related to real estate on the basis of published content without limitation the time and place and will pursue the ideal and reliability of the registration -web accessibility improving of the Internet Registry and permanent storage of preserving documents by electronic means. It is very large that impact on the real estate transaction if the accuracy of legal registration choosing formalism in the processing of real estate registration business through the Internet than written application is highly probable to occur incorrect registration. Also, It is necessary to manage it effectively -if you do not quickly and exactly respond to it, there is problems such as delays or poor registration service because real estate business activated and real estate registration services also increased sharply. In this paper, we will identify the problems of the real estate registration work and suggest improvements about it.

Fandom-Persona Design based on Social Network Analysis (소셜 네트워크 분석을 이용한 팬덤 페르소나 디자인)

  • Sul, Sanghun;Seong, Kihun
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.87-94
    • /
    • 2019
  • In this paper, the method of analyzing the unformatted data of consumers accumulated on social networks in the era of the Fourth Industrial Revolution by utilizing data from the service design and social psychology aspects was proposed. First, the fandom phenomenon, which shows subjective and collective behavior in a space on a social network rather than physical space, was defined from a data service perspective. The fandom model has been transformed into a collective level of customer Persona that has been analyzed at a personal level in traditional service design, and social network analysis that analyzes consumers' big data has been presented as an efficient way to pattern and visually analyze it. Consumer data collected through social leasing were pre-processed by column based on correlation, stability, missing, and ID-ness. Based on the above data, the company's brand strategy was divided into active and passive interventions and the effect of this strategic attitude on the growth direction of the consumer's fandom community was analyzed. To this end, the fandom model of consumers was proposed by dividing it into four strategies that the brand strategy had: stand-alone, decentralized, integrated and centralized, and the fandom shape of consumers was proposed as a growth model analysis technique that analyzes changes over time.

Survey and Improvement Scheme for Safety Certification System of Temporary Equipment and Materials (가설기자재 관련 안전인증제도 실태조사 및 개선방안)

  • Won, Bang-Hee;Yoon, Kyeong-Won;Jeon, Sang-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.92-102
    • /
    • 2016
  • In this study, the systems and standards for temporary equipment and materials established in domestic and foreign countries are examined to provide improvement schemes and to insure their safety. Statistical analyses of the data obtained from the internet and/or field visit surveys of employees working in manufacturing, leasing, and construction companies related to temporary equipment and materials and improvement schemes were conducted to evaluate the implementation of a safety certification system for currently used temporary equipment and materials. This safety certification system has been enforced since 2009, but the number of accidents at construction sites, which are reported by the 'serious accident cases and measures in construction sites' group of the Korea Occupational Safety & Health Agency (KOSHA), has increased. The respondents' answers regarding the suitability of the items, which are required for the safety certification of the equipment and materials, were 'yes (36%)', 'no (30%)', and 'unknown (35%)'. Less than half of the answers regarding the current system were positive and most of the respondents answered that the current system does not reflect the evolution of the construction environment. A system is needed to approve items certified in foreign countries and newly developed materials and items, in addition to the (automatic) registration for the reuse of temporary equipment and materials, and improvements are needed in their safety. In this study, after examining the size and practicability of the items requiring approval from the current system, the certification methods are reevaluated and improvement schemes are provided for the system.