• Title/Summary/Keyword: Managed Service

Search Result 664, Processing Time 0.026 seconds

Design and Implementation of Remote Procedure Call Resource Service System based on the XML Considering the Request Delegation between the Servers (서버 간 요청 위임을 고려한 XML 기반 RPC 자원 서비스 시스템 설계 및 구현)

  • 김정희;곽호영
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1100-1110
    • /
    • 2003
  • Design and implementation of remote procedure cail (RPC) resource service system based on the XML considering the request delegation between the servers are described for the resource application and efficient processing of distributed environment. For this purpose, the request information about several server, which would be used by client, is encoded into XML document based on XML-DOM and transferred to server. Server classifies the client requests using objects which can deal with the XMLL-DOM. For the request delegation between the servers, server saves the request result of client in XMLL-DOM structure without replying it immediately, and makes the client request delegated to another server in XML-DOM's request information. In addition, the resource repository are managed for resource transparency of distributed environment. As a result, resource application and processing efficiency are improved by reduction of response time caused by integration of RPC and XML-RPC services and request delegation between the servers. Extension of asynchronous and average blocking time of client were reduced and information of resource which can be used by client was offered.

  • PDF

The context-aware service system development of the M2M base for the quick crime scene trace (신속한 범행현장 추적을 위한 M2M 기반의 상황인지 서비스 시스템 개발)

  • Lee, Jong-sung;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.659-662
    • /
    • 2012
  • In this paper, the service system the urgent of the danger area or the managed object region is proposed whether the system is autonomously the police or situation where it informs through the police car and it can convey the contextual information or not. In case the nodes location is continuously confirmed from the gateway and it queues and the event is generated in the server of system whether it is the situation, or not the system to be proposed transmits the event triggered message and system transmitting the video message to the nearby which the event is generated node. As a result of the test, in case the event was generated in the server whether it was the situation, or not it confirmed to transmit the video message as the route where it is stored in the server.

  • PDF

Antimicrobial susceptibility and genetic characteristics of Streptococcus uberis isolated from bovine mastitis milk (젖소 유방염 유즙에서 분리한 Streptococcus uberis의 항생제 감수성 및 유전학적 특성)

  • Lee, Gil;Kang, Hyun-Mi;Chung, Chung-il;Moon, Jin-San
    • Korean Journal of Veterinary Research
    • /
    • v.47 no.1
    • /
    • pp.33-41
    • /
    • 2007
  • Streptococcus spp. comprising Streptococcus (S.) uberis S. dysgalactiae strains is major causeof bovine mastitis from particularly well-managed or low somatic cell count herds that have successfullycontrolled contagious pathogens. In this study, antimicrobial susceptibility and genetic characteristics of S.uberis isolated from clinical or subclinical mastitis milk at 2003 were investigated. Eighty seven isolatesof Streptococus spp. were identified by the conventional biochemical methods. The antimicrobialsusceptibility by disk diffusion method was determined for 46 S. uberis, 11 S. bovis, 10 S. oralis, 6 S.uberis and 14 other Streptococcus spp.. Overall, the tested strains were susceptible to tetracycline (11.5%),amikacin (14.9%), streptomycin (16.1%), neomycin (26.4%), kanamycin (35.6%), gentamicin (65.2%),oxacillin (70.1%), ampicillin (75.9%), chloramphenicol (78.2%), and cephalothin (97.7%). Additionally, S.uberis strains were susceptible to pencillin G (97.8%), but resistant to erythromycin (76.0%) by minimalinhibitory concentration test. The multiple-drug resistance rate of isolated bacteria to 4 more thanamplification fingerprinting patterns amplifed with primer 8.6d showed that 3 to 8 number of distinguishableDNA fragments ranged from 180 bp to 1,20 bp. Thirty seven isolates of S. uberis strains were subtypedinto 8 distinct patterns. Each subtype revealed a typical pattern of antimicrobial susceptibilities. Thesefindings demonstrate that S. uberis isolates were mastitis pathogens of diverse serotypes, and oftenencountered the diverse resistant patterns.

Adjusting the Retry Limit for Congestion Control in an Overlapping Private BSS Environment

  • Park, Chang Yun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.1881-1900
    • /
    • 2014
  • Since 802.11 wireless LANs are so widely used, it has become common for numerous access points (APs) to overlap in a region, where most of those APs are managed individually without any coordinated control. This pattern of wireless LAN usage is called the private OBSS (Overlapping Basic Service Set) environment in this paper. Due to frame collisions across BSSs, each BSS in the private OBSS environment suffers severe performance degradation. This study approaches the problem from the perspective of congestion control rather than noise or collision resolution. The retry limit, one of the 802.11 attributes, could be used for traffic control in conjunction with TCP. Reducing the retry limit causes early discard of a frame, and it has a similar effect of random early drops at a router, well known in the research area of congestion control. It makes the shared link less crowded with frames, and then the benefit of fewer collisions surpasses the penalty of less strict error recovery. As a result, the network-wide performance improves and so does the performance of each BSS eventually. Reducing the retry limit also has positive effects of merging TCP ACKs and reducing HOL-like blocking time at the AP. Extensive experiments have validated the idea that in the OBSS environment, reducing the retry limit provides better performance, which is contrary to the common wisdom. Since our strategy is basically to sacrifice error recovery for congestion control, it could yield side-effects in an environment where the cost of error recovery is high. Therefore, to be useful in general network and traffic environments, adaptability is required. To prove the feasibility of the adaptive scheme, a simple method to dynamically adjust the value of the retry limit has been proposed. Experiments have shown that this approach could provide comparable performance in unfriendly environments.

Develop the Product Verification Process for the National R&D Project (국가연구개발프로젝트의 성과물 검증 프로세스 개발에 관한 연구)

  • Choi, Yo-Chul;Lee, Jae-Chon;Cho, Yeon-Ok;Kim, Sang-Ahm;Yoon, Hyuk-Jin
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.3
    • /
    • pp.382-387
    • /
    • 2009
  • When a system or service is realized, it needs to be verified by requirements. The process of verification is to check whether customers/stakeholders requirements have been property transformed into a system or service. A set of verification processes is described in the international or industrial standards. However, it is not appropriate to directly apply those verification processes in the national research and development projects. In particular, we noticed the problem in the development of safety systems, standards and process in the railway systems domain. As such, this paper is concerned with a detailed development of the verification process in that domain. Specifically, an effective and efficient verification process is presented regarding the safety systems and process, safety standards, and safety documents. Also, the verification process was modeled by a computer-aided systems engineering tool, Cradle(R). As a result, the outcomes of the verification process on be managed efficiently.

A Post-Management System of Digital Assets on Social network Services (소셜 네트워크 서비스에 게시된 디지털 자산의 사후 관리 시스템)

  • Moon, Wonsuk;Kim, Seoksoo
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.209-214
    • /
    • 2015
  • Social network services such as Facebook and Flickr is a very useful service that was the foundation of the Internet. If a state in which the Internet is connected, music, photos, and us to be able to share it freely post such as documents. However, even when the digital information posted in such social network services the user has died, and have been published, it is also used for people who do not intend the bad purposes some problems can occur. Facebook is trying to apply the findings Jed R. Brubaker of UC Irvine University in order to solve this problem. However, in Korea, such efforts, not much appears for now. Therefore, we proposed a method that can be managed by delegated Facebook, safely a Delegator digital information posted on social networking services such as Flickr. Our proposed system, as compared with Jed R. Brubaker and Jeong-Kyung Moon is executed previous studies, we studied a method proposed by the appropriate compensates points shortage is passed through the future research. And I consider to have been proposed a method to safely use posted digital assets in a social network service.

A Study on the Audit Model of Outsourcing Operation based on Availability Metrics in perspective of Service Level Agreenment (서비스 수준협약 관점에서 가용성 지표 중심의 아웃소싱 운영감리 모델에 관한 연구)

  • Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.183-196
    • /
    • 2015
  • In order to perform a successful outsourcing, we needs the SLA through improving the quality of IT services. In particular SLA metrics and evaluation criteria is an important factor as to substitute the IT viability of the company to promote IT Outsourcing. SLA metrics consist of technical, managerial, user perspective items, and has been managed to aim to provide reliable and continuous quality improvement of IT services. This study focuses on the HW availability metrics of SLA indicators of IT outsourcing. We propose the Infra availability criteria for the HW configuration level to meet the SLA contract and evaluation. We offer the Infra configuration standards of SLA contract, and propose criteria to determine the suitability of the target levels in IT operations audit environment. The proposed model was verified the necessity and effectiveness of the Infra configuration standards and operation audit check items through the surveys of experts and users.

Occurrence of Weed Flora and Their Yield Loss in Angelica gigas Upland Fields of Minor Crop in Korea (소면적 재배작물인 당귀밭에 발생하는 잡초현황과 잡초에 의한 피해)

  • Lee, In-Yong;Kim, Chang-Seok;Lee, Jeongran;Seo, Young Jin;Kim, Jong-Su;Seo, Hyun-A;Jang, Hyung-Mok
    • Weed & Turfgrass Science
    • /
    • v.5 no.2
    • /
    • pp.65-70
    • /
    • 2016
  • Investigation on weed flora in Angelica gigas upland fields was conducted to understand the current status of the weed flora and establish the control measures. Investigation was conducted twice, July and October in 2015. From this investigation, 105 species of 37 families including 27 exotics were identified and classified into 53 species of annuals, 24 species of biennials and 28 species of perennials. Dominance was the highest with Digitaria ciliaris, followed by Portulaca loeracea, Chenopodium album, Cyperus iria, Conyza canadensis, Galinsoga ciliata etc. in order. Chenopodium album was the highest in importance analysis and the followings were in order of Conyza canadensis, Galinsoga ciliata, Amaranthus lividus, Taraxacum offcinale etc. The yield of A. gigas was reduced 49.6% in no weeding plots comparing in weed managed plots.

A Study on Application of Ubiquitous Management System in National Park - Focused on the Technology Acceptance Model of Managers' - (국립공원 유비쿼터스 관리시스템 도입 방안 - 관리자 기술수용모델 적용을 중심으로 -)

  • Kim, Tong-Il;Kim, Seong-Il
    • Journal of Korean Society of Forest Science
    • /
    • v.99 no.3
    • /
    • pp.368-379
    • /
    • 2010
  • u-Park means national parks with environmentally sound information networks and integrated ubiquitous services are available. u-Park is totally managed based on u-IT (Ubiquitous IT Technologies) which provides ubiquitous service through sophisticated resources of national park and establishments. It is necessary in changing the existing park management system into u-IT based u-Park management system that park managers should accept new technology, u-Park management system, and be able to utilize it. The purposes of this research is to analyze managers' acceptance behavior on ubiquitous computing technology. Technology acceptance model (TAM) was introduced to specifies the causal relationships among variables related to managers' technology acceptance behavior. The hypothesized model was tested by surveying 157 managers at 5 national parks in Korea. TAM accounted for 55.2% of the variance in intention to use. The most important finding is that perceived compatibleness was the most influential variable in determining intention to use. This means that u-Park management system should be compatible with manager's task and business style.

Design and Implementation of Middleware for Smartphone Environments (스마트폰 환경을 위한 미들웨어 설계 및 구현)

  • Kim, Kyoung-Ju;Moon, Sang-Ho;Yu, Young-Jung;Park, Seong-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.597-604
    • /
    • 2011
  • The various Smartphone platforms that are used currently make difficult to build efficient applications("apps") for Smartphone. Introduction of middleware in the Smartphone environment is being studied to solve this problem. By enhancing interoperability between server systems and Smartphone platforms as introducing this middleware supports efficiently for Smartphone apps to be developed and managed. Thus, the development of this middleware for Smartphone has become essential for the purpose of responding actively to the rapidly expanding Smartphone market. In this research, we designed and implemented Smartphone middleware which optimizes the cost and time for developing new application service and maintaining it. In order to test this implemented middleware's performance and its capabilities, we also developed university Smartphone apps and activated campus twitter.