• Title/Summary/Keyword: Legacy Systems

Search Result 337, Processing Time 0.033 seconds

Design of Collaborative System using Message exchange method based on Bridge XMDR (브리지 XMDR 기반의 메시지 교환방식을 이용한 협업 시스템 설계)

  • Moon, Seok-Jae;Lee, Soo-Youn;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.56-65
    • /
    • 2007
  • Existing application systems of enterprises can process and collect a lot of information within enterprises, but it could be difficult to share validated information with partners and other system in the process of contacting to other legacy systems required in cooperation environment. For solving these problems, EAI systems are introduced in cooperation environment so that data sharing and integration can be achieved. The integration based on EAI is not limited to particular business system but all systems of an enterprise so that standard of suitable metadata level is needed for forwarding consistently between each business of systems. Therefore this paper maintains consistency of data sharing and integrating among legacy systems in cooperative environment for proposing message exchanging based on bridge XMDR.

IEC 61970 CIM based Study on the application of model for Wide Area Monitoring And Control System (IEC 61970 CIM을 기반으로 한 Wide Area Monitoring And Control system 모델 적용 연구)

  • Cho, Jun-Hee;Oh, Young-Suk;Choi, Mi-Hwa;Shin, Seung-Hee;Kim, Ji-Young
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.178-179
    • /
    • 2011
  • The exchange of information with legacy systems is a main issue in the era of SMARTGRID. Because WAMAC(Wide Area Monitoring and Control) system has monitoring function, as well as control function, it is very necessary for WAMAC to exchange data and information with SCADA(Supervisory Control and Data Acquisition) / EMS(Energy Management System). IEC 61970 CIM(Common Information Model) is an abstract model that represents all the major objects in an electric utility enterprise typically involved in utility operations. In this paper, a proposal that adopting CIM to WAMAC model be submitted so that the integration of various legacy system and application for itself be able to be flexible.

  • PDF

Development of the Gateway in IEC61850 based Substation for Smart Grid (스마트 그리드용 IEC61850 기반 변전소에서의 게이트웨이 개발)

  • Yun, Seok-Yeul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.7
    • /
    • pp.1324-1330
    • /
    • 2011
  • This paper presents the development of gateway for smart grid for the interoperable communication between IEC 61850 station leveled devices and one of legacy Modbus, DNP3, and IEC60870-5-101/104/103 communication protocol devices of bay level in substation or for the exchange of information between IEC 61850 substation and SCADA control center. The data-mapping model is designed for the exchange of information and the gateway configuration tool is developed for generating meta-data based on XML Schema. this paper is mostly concerned with the design and realization of gateway system for the interoperable data communication between a legacy protocol device and IEC61850 based devices or systems.

Efficient Congestion Control for Interworking between 5G-System and LTE

  • Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.49-56
    • /
    • 2019
  • In this paper, we propose an efficient congestion control scheme for interworking between 5GS(5G system) and LTE(Long-Term Evolution), called ECC(Efficient Congestion Control). The proposed congestion control scheme (ECC) is considered for coexistence of 5GS and legacy LTE systems and provides a prompt service connectivity based on overriding method while the backoff timer is running in the UE. Also, we briefly introduce Rel-15 5GS from a congestion control perspective and the proposed ECC and simulation results for the existing legacy congestion control mechanism and ECC in the 5GS-LTE coexisting environment are presented. Lastly, the improvement direction is considered in future 3GPP 5GS phase 2 standard in this paper.

Shmuel N. Eisenstadt and the Comparative Political History of Pre-Eighteenth-Century Empires

  • De WEERDT, Hilde
    • Asian review of World Histories
    • /
    • v.4 no.1
    • /
    • pp.133-163
    • /
    • 2016
  • This essay critically analyses the legacy of Eisenstadt's The Political Systems of Empires for the comparative political history of pre-industrial empires. It argues that Eisenstadt has given us a rich toolkit to conceptualize the formation, maintenance, and dissolution of empires by theorizing the structural relationships between social groups in large-scale polities and among such polities, and by analysing global patterns of development in the distribution of the sources of social power. The Political Systems of Empires provides an inventory of key questions and dynamics that a comparative history of power relationships in empires cannot ignore. This essay, furthermore, discusses three methodological problems in Eisenstadt's work which have had a significant impact on comparative empire studies between the 1980s and the 2000s. The essay argues that certain shared features of comparative studies of pre-industrial empires help perpetuate Eurocentric analyses: the foregrounding of select empires and periods as ideal types (typicality), the focus on macro-historical structures and dynamics without the integration of social relationships and actions in historical conjunctures (the lack of scalability), and the search for convergence and divergence. These features need to be overcome to make Eisenstadt's legacy viable for comparative political history.

Power-Saving Mechanism Considering Round-Trip Delay in LTE Systems (LTE 시스템에서 양방향 지연을 고려한 전력절감 방식)

  • Choi, Hyun-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.12
    • /
    • pp.1045-1053
    • /
    • 2013
  • In this paper, we propose a new power-saving mechanism (PSM) for Long-Term Evolution (LTE) systems by considering a round-trip delay between a user equipment (UE) and its correspondence node. The proposed PSM changes the order of the operational procedures of the legacy LTE PSM by taking the traffic arrival pattern suffering the round-trip delay into account. After modeling the round-trip delay, we numerically analyze the proposed PSM with respect to energy consumption and buffering delay. Then, we characterize these performances by employing a simple energy-delay tradeoff (EDT) curve according to the operational parameters. The resulting EDT curve clearly shows that the proposed PSM outperforms the legacy LTE PSM in terms of both the energy consumption and buffering delay.

Modeling Components for mapping from XML DTD to RDB schema (XML DTD의 관계형 데이터베이스 스키마로의 자동변환을 위한 컴포넌트 모델링)

  • 이정수;방승윤;주경수
    • Journal of Internet Computing and Services
    • /
    • v.2 no.5
    • /
    • pp.81-91
    • /
    • 2001
  • XML is a standard markup language for exchange and storage of formed or well-formed information in World Wide Web, Because the source data of XML message for exchange of information in World Woo Web Is stored in legacy database systems. it is necessary the easier connection between XML application and database systems, In Oracle8i. 9i. informix and SQL2000. DBMS vendors extend their DBMSs for XML. This approach for the connection between XML application and database system is Platform-dependent and DBMS-dependent. Therefore it is necessary the platform- and DBMS-independent approach for the connection between XML application and database system, In this paper. we modeled a set of middleware components for relational database design based on XML DTD is modeled, Those components are modeled on object-based algorithm for connection between XML application and database system.

  • PDF

Fielding a Structural Health Monitoring System on Legacy Military Aircraft: a Business Perspective

  • Bos, Marcel J.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.35 no.6
    • /
    • pp.421-428
    • /
    • 2015
  • An important trend in the sustainment of military aircraft is the transition from preventative maintenance to condition based maintenance (CBM). For CBM, it is essential that the actual system condition can be measured and the measured condition can be reliably extrapolated to a convenient moment in the future in order to facilitate the planning process while maintaining flight safety. Much research effort is currently being made for the development of technologies that enable CBM, including structural health monitoring (SHM) systems. Great progress has already been made in sensors, sensor networks, data acquisition, models and algorithms, data fusion/mining techniques, etc. However, the transition of these technologies into service is very slow. This is because business cases are difficult to define and the certification of the SHM systems is very challenging. This paper describes a possibility for fielding a SHM system on legacy military aircraft with a minimum amount of certification issues and with a good prospect of a positive return on investment. For appropriate areas in the airframe the application of SHM will reconcile the fail-safety and slow crack growth damage tolerance approaches that can be used for safeguarding the continuing airworthiness of these areas, combining the benefits of both approaches and eliminating the drawbacks.

A Methodology for Assessing the Level of U-Transformation of Ubiquitous Services

  • Kwon, Oh-Byung;Kim, Ji-Hoon;Choi, Keun-Ho
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2005.12a
    • /
    • pp.359-366
    • /
    • 2005
  • As the ubiquitous computing technology (uT) is prevailing, applying uT is more likely to transform the legacy way of doing business to a new way with the goals of ubiquitous computing: strategic use of information resources by using them everywhere, every time, with any devices for any services. These opportunities naturally require the provision to assess the degree of the transformation from the legacy IT-based e-business to the uT-based business. However, research about assessing the degree of u-transformation has been still very few. Moreover, even deciding what is ubiquitous or not is obscure. Hence, this paper aims to propose the methodology for assessing the degree of u-transformation oriented by the teleology of ubiquitous service, which intends to fully make use of uT in creating new business of next generation. Through the literature review, we developed the methodology to check whether the provided service is ubiquitous or not based on the capabilities that technologies have. and then, the methodology developed to assess the technical requirements that the uT should have when the transformation is considered through the focus group interview based on the literature review of the capability. A two-layered approach is introduced to assess not only the level of ubiquity but also the degree of u-transformation.

  • PDF

An Exploratory Case Study on RPA Introduction for Manufacturing SMEs (중소·중견 제조기업 RPA 도입을 위한 사례 탐색 연구)

  • Kang, Young Sik;Shim, Seon Young
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.25-58
    • /
    • 2022
  • Purpose The purpose of this study is to analyzes the RPA fitting processes by the casese of manufacturing SMEs(Small and Medium-sized Enterprises) in an exploraty approach. Based on the findings on the RPA fitting processes, we intend to provide a cornerstone for developing a general-purpose RPA introduction model in the future. Design/methodology/approach In this study, empirical cases of RPA fitting processes were analyzed based on interviews with project managers of specialized IT suppliers in charge of RPA development and managers of IT departments of manufacturing SMEs that actually introduced RPA. In order to explore various RPA fitting process in the manufacturing value chain, a total of 7 manufacturing SMEs were interviewed, ranging from companies using a legacy system to companies without a legacy system. Over the primary and secondary activity processes, the details of RPA processes were analyzed in the steps of 'Frequency Identification, Input Processing, Source Identification, Inquiry and Processing, Information Registration, Result Reporting'. Findings From the analysis, we derived some exploratory results that the processes over 0.25 FTE and related with many suppliers and clients are fitting for RPA introduction in manufacturing SMEs Our results will provide basic data for the development of the future general-purpose RPA introduction model for manufacturing SMEs, providing practical reference for RPA introduction.