• Title/Summary/Keyword: Mission-critical Service

Search Result 36, Processing Time 0.033 seconds

A Study of Digital Library Service Records and User Privacy (디지털도서관서비스기록과 이용자프라이버시에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

Launch Vehicle Telemetry MUX Test by using the Spacecraft Simulator

  • Won, Young-Jin;Lee, Jin-Ho;Yun, Seok-Teak;Kim, Jin-Hee;Lee, Sang-Ryool
    • Bulletin of the Korean Space Science Society
    • /
    • 2009.10a
    • /
    • pp.46.3-46.3
    • /
    • 2009
  • The SAR (Synthetic Aperture Radar) satellite has the advantage of implementing the imaging mission even though it is night time, cloudy weather, and all weather conditions, which is different from the satellite with the optical payload. This is the reason why the SAR satellite comes into the spotlight in the observation satellite field. The Korea Aerospace Research Institute (KARI) has been developing the first Korean SAR satellite and is currently integrating and testing the Flight Model. For the launch vehicle service, KARI finalized the selection of the launch vehicle service provider and finished Critical Design Review (CDR) of the interface between the bus and the launch vehicle. KARI and launch vehicle service provider also finished the test of the telemetry interface between the bus and the launch vehicle. The test of the telemetry interface has the purpose of checking the interface of the telemetry which is the SOH(State-of-Health) of the satellite in an early launch stage. For this test, KARI has finished the development of the spacecraft simulator which is composed of the bus simulator to generate the analog telemetry and the launch vehicle simulator to gather the telemetry. In this research, the result of the hardware implementation and the software implementation for the spacecraft simulator were described. Finally the results of the launch vehicle telemetry MUX test which were performed at the launch vehicle provider's design office by using the spacecraft simulator were summarized. It is expected that this simulator will be used in the next test after the manufacture of the launch vehicle.

  • PDF

Fail Over Analysis and Management for the Database Implement of the High Availability Solution (고가용성 데이터베이스 구축을 통한 장애 극복 분류 및 관리 기법)

  • Lee, Byoung-Yup
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.49-54
    • /
    • 2010
  • In these days, Internet environment are very quickly development as well On-line service have been using a online for the mission critical business around the world. As the amount of information to be processed by computers has recently been increased there has been cluster computing systems developed by connecting workstations server using high speed networks for high availability. As a result, this study on a cluster based DBMS and common solution of DBMS venders has been studying with a wide range, as well as It is not good study a management skill for the cluster-based DBMS efficiently and optimization. accordingly, This study find out optimization managements skill and theory of he High availability solution on cluster-based DBMS.

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF

Seismic isolation performance sensitivity to potential deviations from design values

  • Alhan, Cenk;Hisman, Kemal
    • Smart Structures and Systems
    • /
    • v.18 no.2
    • /
    • pp.293-315
    • /
    • 2016
  • Seismic isolation is often used in protecting mission-critical structures including hospitals, data centers, telecommunication buildings, etc. Such structures typically house vibration-sensitive equipment which has to provide continued service but may fail in case sustained accelerations during earthquakes exceed threshold limit values. Thus, peak floor acceleration is one of the two main parameters that control the design of such structures while the other one is peak base displacement since the overall safety of the structure depends on the safety of the isolation system. And in case peak base displacement exceeds the design base displacement during an earthquake, rupture and/or buckling of isolators as well as bumping against stops around the seismic gap may occur. Therefore, obtaining accurate peak floor accelerations and peak base displacement is vital. However, although nominal design values for isolation system and superstructure parameters are calculated in order to meet target peak design base displacement and peak floor accelerations, their actual values may potentially deviate from these nominal design values. In this study, the sensitivity of the seismic performance of structures equipped with linear and nonlinear seismic isolation systems to the aforementioned potential deviations is assessed in the context of a benchmark shear building under different earthquake records with near-fault and far-fault characteristics. The results put forth the degree of sensitivity of peak top floor acceleration and peak base displacement to superstructure parameters including mass, stiffness, and damping and isolation system parameters including stiffness, damping, yield strength, yield displacement, and post-yield to pre-yield stiffness ratio.

Efficient Resource Slicing Scheme for Optimizing Federated Learning Communications in Software-Defined IoT Networks

  • Tam, Prohim;Math, Sa;Kim, Seokhoon
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.27-33
    • /
    • 2021
  • With the broad adoption of the Internet of Things (IoT) in a variety of scenarios and application services, management and orchestration entities require upgrading the traditional architecture and develop intelligent models with ultra-reliable methods. In a heterogeneous network environment, mission-critical IoT applications are significant to consider. With erroneous priorities and high failure rates, catastrophic losses in terms of human lives, great business assets, and privacy leakage will occur in emergent scenarios. In this paper, an efficient resource slicing scheme for optimizing federated learning in software-defined IoT (SDIoT) is proposed. The decentralized support vector regression (SVR) based controllers predict the IoT slices via packet inspection data during peak hour central congestion to achieve a time-sensitive condition. In off-peak hour intervals, a centralized deep neural networks (DNN) model is used within computation-intensive aspects on fine-grained slicing and remodified decentralized controller outputs. With known slice and prioritization, federated learning communications iteratively process through the adjusted resources by virtual network functions forwarding graph (VNFFG) descriptor set up in software-defined networking (SDN) and network functions virtualization (NFV) enabled architecture. To demonstrate the theoretical approach, Mininet emulator was conducted to evaluate between reference and proposed schemes by capturing the key Quality of Service (QoS) performance metrics.

An IT/Medical Converged Solution based on the Expert System for Enhancing U-Healthcare Services in Middle-sized Medical Environment (중소형 의료 환경에서 U-헬스케어 서비스 향상을 위한 전문가 시스템 기반 IT/의료 융합 솔루션)

  • Ryu, Dong-Woo;Kang, Kyung-Jin;Cho, Min-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1318-1324
    • /
    • 2010
  • Recently, U-Healthcare is receiving attentions as a research for reducing the manpower, time in treatment, and etc. Although fundamental technologies, such as sensing, measuring, and etc. are sufficiently investigated. However, Technologies of IT/Medical convergence, which graft IT technologies to medical area, are still in germ. For this, we present a novel healthcare system, which can be applied to the middle sized medical environment, such as private hospital, home, or etc., by means of pre-verified technologies and the expert system. There exist IT element technologies are sufficiently developed in the fields, such as network, database or etc. due to the remarkable developments in IT technologies, and the healthcare is a mission-critical environment. Therefore, it is important not only to investigate novel approaches but also to utilize verified technologies for the U-Healthcare solution. Presented solution provisions automated medical services based on expert system by utilizing the measured data, such as body fat, blood pressure, blood glucose, and etc., in order to provide convenient treatment environment to doctors and nurses. In addition, since people, who do not have medical knowledge, can self-diagnose themselves, it is expected to cut medical costs in various areas. Especially, since each devices communicate with each other through standardized Bluetooth technology, Presented healthcare system is an extensible solution which can easily accept various medical devices. As a result of this, we can safely say that the self measurement and diagnosis services in U-Healthcare are now enhanced by reducing medical cost through our healthcare system.

Public Shared Service Centers for Collaborative Government: A Case Study of the United States and the United Kingdom (협업정부 구현을 위한 행정공유서비스센터 도입방안 연구 - 정부 공유서비스센터 선진국 사례연구를 기반으로 -)

  • Hong, Kil Pyo;Chung, Choong Sik;Kim, Pan Suk
    • Informatization Policy
    • /
    • v.21 no.3
    • /
    • pp.33-55
    • /
    • 2014
  • Public Shared Service Centers (PSSC) consolidate functions such as human resources, information technology, financial management or accounting into one office to serve an organization. A prominent example from the United States is the Federal Information Technology Shared Services Strategy. It supports mission, administrative, and infrastructure-related IT functions through providing organizations in the Executive Branch of the Federal Government (Federal Agencies) with policy guidance on the full range and lifecycle of intra- and inter-agency information technology (IT) shared services. This study looks at the Federal Information Technology Shared Services Strategy in order to draw lessons for fostering collaborative government through the use of PSSC. It finds the following factors are critical for success when implementing IT shared services: (1) agency leadership must be solidly behind their IT shared service plan, or the needed changes will not happen at the business unit, program, or system levels; (2) there must be a move away from internally-centered, program-specific thinking, and a move toward a paradigm of consuming and providing IT shared services with multiple groups whenever possible; and (3) successfully managing "loss of control" issues is central, and optimizing business processes is essential to move from stove-piped workflows to processes that work across the agency enterprise and beyond. Therefore, the study suggests that a Korean model of PSSC implementation be introduced, and that good IT Governance is a crucial component of PSSC strategies.

A Reservation-based HWMP Routing Protocol Design Supporting E2E Bandwidth in TICN Combat Wireless Network (TICN 전투무선망에서의 종단간 대역폭을 보장하는 예약 기반 HWMP 라우팅 프로토콜 설계)

  • Jung, Whoi Jin;Min, Seok Hong;Kim, Bong Gyu;Choi, Hyung Suk;Lee, Jong Sung;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.160-168
    • /
    • 2013
  • In tactical environment, tactical wireless networks are generally comprised of Tactical MANETs(T-MANETs) or Tactical WMNs(T-WMNs). The most important services in tactical network are voice and low rate data such as command control and situation awareness. These data should be forwarded via multi-hop in tactical wireless networks. Urgent and mission-critical data should be protected in this environment, so QoS(Quality of Service) must be guaranteed for specific type of traffic for satisfying the requirement of a user. In IEEE 802.11s, TDMA-based MAC protocol, MCCA(MCF Controlled Channel Access), has a function of resource reservation. But 802.11s protocol can not guarantee the end-to-end QoS, because it only supports reservation with neighbors. In this paper, we propose the routing protocol, R-HWMP(Reservation-based HWMP) which has the resource reservation to support the end-to-end QoS. The proposed protocol can reserve the channel slots and find optimal path in T-WMNs. We analyzed the performance of the proposed protocol and showed that end-to-end QoS is guaranteed using NS-2 simulation.

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.