• Title/Summary/Keyword: Management of server system

Search Result 1,341, Processing Time 0.039 seconds

A design and implementation about the intelligent internet banner advertisement management and analysis system for eCRM (eCRM을 위한 지능형 인터넷 배너 광고 관리 및 분석 시스템의 설계 및 구현)

  • 박남섭;김정범;이윤정;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.319-321
    • /
    • 2002
  • eCRM이란 고객 관리 시스템에서 인터넷을 이용해 기존의 시스템을 재구성하는 것을 말한다. eCRM은 고객만족을 극대화 하면서 동시에 관련 비용을 감소시킬 수 있는 새로운 고객관리 개념이라고 할 수 있다. 본 논문은 eCRM의 근간이 될 수 있는 기술로서 인터넷 배너 광고 관리 및 분석 시스템을 제안한다. 즉, 광고를 원활하게 인터넷 사이트 상에 배포하고 광고를 집행한 후에 효과를 과학적으로 정확하게 산출하는 광고 관리와 소비자의 성향을 분석해 광고 분석에 필요한 시스템을 설계 및 구현한다. 또한 단순한 배너 광고의 분석결과만 도출하는 것이 아니라, 분석 자료를 바탕으로 배너 광고를 자동으로 관리 할 수 있는 지능형 시스템을 JSP(Java Server Pages) 기반으로 설계 및 구현한다.

  • PDF

Design of Node.js-based IRPE Software Configuration Management System (Node.js 기반의 IRPE 형상 관리 시스템 설계)

  • Jang, Yoon-Jeong;Kim, Min-A;Chae, Tae-Byeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.586-589
    • /
    • 2017
  • 소프트웨어 프로젝트 관리를 위한 여러 항목 중, 형상 관리는 매우 중요한 영역이다. 눈에 보이지 않는 소프트웨어의 결과물을 산출물인 문서로 설명, 이해, 관리하는 활동이기 때문이다. 형상 관리는 현재 한국항공우주연구원에서 운영 중인 지구관측위성에서도 중요하게 여겨지고 있다. 위성 영상 데이터의 효율적인 관리 등을 위해 형상 관리의 필요성이 계속해서 대두되어 왔다. 본 논문에서는, 기존에 다루어지는 일련의 과정들을 체계적으로 정리 및 새롭게 정의하고, 더불어 향상 관리 범위에 포함되어 있는 관리자 및 사용자가 필요로 하는 각 산출 문서의 내용을 편리하게 사용할 수 있도록 지원하는 Node.js 기반의 형상 관리 시스템 개발 방안에 대하여 기술하고자 한다. 아울러, 이 Node.js 플랫폼이 View단과 Server단을 하나로 통합하여 개발하는 방식이기 때문에, 우리가 필요로 하는 위성 영상 데이터의 효율적인 향상 관리 지원을 위한 시스템 개발에 적용해 보았다. 결과적으로, 제안하는 설계 방법이 적합하다는 것을 단계적 단위 시험을 통하여 확인하였다.

An Access Log Management System by User Directed Managing in Ubiquitous Environment (유비쿼터유비쿼터스 환경에서 프라이버시 보호를 위한 사용자 직접 관리 방식의 접근 기록 관리 시스템)

  • Lee, J.;Kim, S.
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.269-273
    • /
    • 2008
  • In ubiquitous environments, clients move between domains freely and its activities in the other domains are growth. Like this environment, the service provider makes access or activity records what they are provided to clients. This record can make a privacy problem to recognize a person or trace some works. So this record must be kept and managed by user instead of the service provider. In this paper, we propose a system that can gather those records from the service provider to home domain server which client's managing by themselves. In addition, if remote domain manager requests that record by the legal process, system can transfer only a range of information which allowed by client to keep personal privacy.

  • PDF

Service Delivery Time Improvement using HDFS in Desktop Virtualization (데스크탑 가상화에서 HDFS를 이용한 서비스 제공시간 개선 연구)

  • Lee, Wan-Hee;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.913-921
    • /
    • 2012
  • The current PC-based desktop environment is being converted into server-based virtual desktop environment due to security, mobility, and low upgrade cost. In this paper, a desktop virtualization system is implemented using an open source-based cloud computing platform and hypervisor. The implemented system is applied to the virtualziation of computer in university. In order to reduce the image transfer time, we propose a solution using HDFS. In addition, an image management structure needed for desktop virtualization is designed and implemented, and applied to a real computer lab which accommodates 30 PCs. The performance of the proposed system is evaluated in various aspects including implementation cost, power saving rate, reduction rate of license cost, and management cost. The experimental results showed that the proposed system considerably reduced the image transfer time for desktop service.

For the development of software industry, extensive software certification scheme (소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계)

  • Seo, Hee Suk;Kim, Sang Ho;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.

Workload Balancing on Agents for Business Process Efficiency based on Stochastic Model (통계적 모형의 업무부하 균일화를 통한 비즈니스 프로세스의 효율화)

  • Ha, Byung-Hyun;Seol, Hyeon-Ju;Bae, Joon-So;Park, Yong-Tae;Kang, Suk-Ho
    • IE interfaces
    • /
    • v.16 no.spc
    • /
    • pp.76-81
    • /
    • 2003
  • BPMS (Business Process Management Systems) is aninformation system that systematically supports designing, administrating, and improving the business processes. It can execute the business processes by assigning tasks to human or computer agents according to the predefined definitions of the processes. In this research we developed a task assignment algorithm that can maximize overall process efficiency under the limitation of agents' capacity. Since BPMS manipulates the formal and predictable business processes, we can analyze the processes using queuing theory to achieve overall process efficiency. We first transform the business processes into queuing network model in which the agents are considered as servers. After that, workloads of agents are calculated as server utilization and we can determine the task assignment policy by balancing the workloads. This will make the workloads of all agents be minimized, and the overall process efficiency is achieved in this way. Another application of the results can be capacity planning of agents in advance and business process optimization in reengineering context. We performed the simulation analysis to validate the results and also show the effectiveness of the algorithm by comparing with well known dispatching policies.

Performance Estimation of AS/RS using M/G/1 Queueing Model with Two Queues (M/G/l 대기모델을 이용한 자동창고 시스템의 성능 평가)

  • Lee, Moon-Hwan;Lim, Si-Yeong;Hur, Sun;Lee, Young-Hae
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.59-62
    • /
    • 2000
  • Many of the previous researchers have been studied for the performance estimation of an AS/RS with a static model or computer simulation. Especially, they assumes that the storage/retrieval (S/R) machine performs either only single command (SC) or dual command (DC) and their requests are known in advance. However, the S/R machine performs a SC or a DC. or both or becomes idle according to the operating policy and the status of system at an arbitrary point of time. In this paper, we propose a stochastic model for the performance estimation of a unit-load AS/RS by using a M/G/1 queueing model with a single-server and two queues. Expected numbers of waiting storage and retrieval commands, and the waiting time in queues for the storage and retrieval commands are found

  • PDF

A Study for the Designing and Efficiency Measuring Methods of Integrated Multi-level Network Security Domain Architecture (Multi-level 네트워크의 보안 도메인을 위한 통합 아키텍쳐 설계 및 효율성 측정방법 연구)

  • Na, Sang Yeob;Noh, Si Choon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.87-97
    • /
    • 2009
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. This study is based on analysis of diagnostic weakness structure in the network security domain. We propose an improved integrated multi-level protection domain for in the internal route of groupware. This paper's protection domain is designed to handle the malicious data traffic in the groupware and finally leads to lighten the load of data traffic and improve network security in the groupware. Infrastructure of protection domain is transformed into five-stage blocking domain from two or three-stage blocking. Filtering and protections are executed for the entire server at the gateway level and internet traffic route ensures differentiated protection by dividing into five-stage. Five-stage multi-level network security domain's malicious data traffic protection performance is better than former one. In this paper, we use a trust evaluation metric for measuring the security domain's performance and suggested algorithm.

A Study on the Validation of Vector Data Model for River-Geospatial Information and Building Its Portal System (하천공간정보의 벡터데이터 모델 검증 및 포털 구축에 관한 연구)

  • Shin, Hyung-Jin;Chae, Hyo-Sok;Hwang, Eui-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.17 no.2
    • /
    • pp.95-106
    • /
    • 2014
  • In this study, the applicability of a standard vector model was evaluated using RIMGIS vector data and a portal based river-geospatial information web service system was developed using XML and JSON based data linkage between the server and the client. The RIMGIS vector data including points, lines, and polygons were converted to the Geospatial Data Model(GDM) developed in this study and were validated by layers. After the conversion, it was identified that the attribute data of a shape file remained without loss. The GeoServer GDB(GeoDataBase) that manages a DB in the portal was developed as a management module. The XML-based Geography Markup Language(GML) standards of OGC was used for accessing to and managing vector layers and encoding spatial data. The separation of data content and expression in the GML allowed the different expressions of the same data, convenient data revision and update, and enhancing the expandability. In the future, it is necessary to improve the access, exchange, and storage of river-geospatial information through the user's customized services and Internet accessibility.

Applying TMO-Based Object Group Model to Area of Distributed Real-Time Applications and Its Analysis (분산 실시간 응용 분야에 TMO 기반 객체그룹 모델의 적용 및 분석)

  • 신창선;정창원;주수종
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.432-444
    • /
    • 2004
  • In this paper, we construct the TMO-based object group model on distributed environment, and analyze and evaluate the executability for distributed real-time service of our object group model by developing the distributed real-time application simulator applying the model. The Time-triggered Message-triggered Object(TMO) is a real-time server object having real-time property itself. The TMO-based object group is defined as a set of objects which logically reconfigured the physically distributed one or more TMOs on network by a given distributed application. For supporting group management of the server objects, the TMO-based object group we suggested provides the functions which register and withdraw the solver objects as a group member to an arbitrary object group, and also provides the functions which insert and delete the access rights of server objects from clients. Also, our model was designed and implemented to support the appropriate object selection and dynamic binding service for a single TMO as well as the duplicated TMOs, and to support the real-time scheduling service for the clients which are requesting the service. Finally, we developed the Defence System against Invading Enemy Planes(DSIEP) simulator as a practical example of distributed real-time application by applying our model, and evaluated the adaptability of distributed service strategies for the group components and the executability of real-time services that the TMO-based object group model provides.