• 제목/요약/키워드: Multiple Infrastructure

Search Result 346, Processing Time 0.031 seconds

Development of IT Architecture through Enterprise Architecture Planning - New Paradigm of Information Systems Planning - (전사적 아키텍처 기획(EAP)을 통한 IT 아키텍처의 구축 - 정보시스템 기획(ISP)의 새로운 패러다임 -)

  • Jang, Si-Young;Shin, Dong-Ik;Lee, Chung-Seop
    • Asia pacific journal of information systems
    • /
    • v.11 no.2
    • /
    • pp.159-180
    • /
    • 2001
  • Despite the large and ongoing investments in information systems and technologies, many organizations still suffer from the lack of integration and interoperability of multiple information systems, In order to deal with these enduring problems, a number of government organizations and corporate firms in the United States have developed and maintained IT architectures through enterprise architecture planning. An IT architecture is a decision-making framework for IT planners and developers, establishing guidelines for the individual IT resource owners and users. It provides guidance to those involved in building and maintaining IT systems and infrastructure. Enterprise architecture planning represents a new paradigm of information systems planning in that it addresses the long-term view of the enterprise organization from top-level principles to detailed technology architectures. This paper explores a couple of cases in the successful implementation of IT architectures in both public and private sectors, and proposes a step-by-step methodology for building an effective IT architecture.

  • PDF

Sustainable Buildings - or Sustainable Cities?

  • Schwettmann, Mark
    • International Journal of High-Rise Buildings
    • /
    • v.4 no.2
    • /
    • pp.103-107
    • /
    • 2015
  • China's rapidly growing cities offer a unique opportunity to create highly sustainable communities. Architects and their clients, typically real estate developers, are highly focused on strategies that are effective at reducing energy and water usage at the scale of the individual building or within a master plan of multiple related buildings. However, a closer look at energy consumption reveals that transportation uses more energy worldwide than residential and commercial buildings combined. In light of this, it is appropriate that China is making massive investments in transportation infrastructure like heavy rail rapid transit and grade separated expressways, but the end result of these investments to date has been to enable people to live further from where they work and shop rather than closer - while simultaneously not creating walkable communities. Using positive and negative examples from Asia and the rest of the world, this article will investigate the specific urban design policies such as height limits, setbacks, land use restrictions, parking ratios, and parcel size which might change to enable the creation of truly sustainable communities for China's 21st century.

Robust Web Server System Using Virtual Machine Against DOS Attack (가상머신을 이용한 DoS 공격에 강건한 웹 서버 시스템)

  • Park, Seung Kyu;Yang, Hawan Seok;Kim, Bae Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2013
  • The cloud computing is technology which gives flexible and solid infrastructure to IT environment. With this technology multiple computing environment can be consolidated in to a single server so that maximize system resource utilization. Better processing power can be achieved with less system resource. IT manager can cope with increasing unnecessary cost for additional server and management cost as well. This means a enterprise is able to provide services with better quality and create new services with surplus resource. The time required for recovery from system failure will be reduced from days to minutes. Enhanced availability and continuity of enterprise business minimize the codt and the risk produced by service discontinuity. In this paper, we propose framework architecture that is strong against denial-of-service attack.

The Analysis about Factors Affecting of Extinction Risk in Fishing Village (어촌 소멸위험의 영향 요인 분석)

  • Lee, Seo-Gu;Kim, Jung-Tae
    • The Journal of Fisheries Business Administration
    • /
    • v.51 no.1
    • /
    • pp.67-79
    • /
    • 2020
  • The purpose of this study is to propose a policy improvement plan by analysis of the extinction risk factors reflecting the specificity of fishing villages, fishing village support policies, and settlement conditions of fishing villages as one of the solutions to the immediate problem of fishing village extinction. The results of the study show the higher the level of number of fishing ports, number of returning rural population, and housing diffusion rate, the dependent variable extinction risk index was a positive effect while vacant house ratio and aged house ratio was analyzed to be in was a negative (-) relationship with the dependent variable.The policy implications through this study were to prepare an effective policy to reduce the risk of extinction, to improve urgent settlement conditions, and to prepare a condition to convert returning rural population into fishery population.

The Performance of Supply Chain Management in Textile Fashion Business

  • Shin, Sang-Moo
    • Journal of Fashion Business
    • /
    • v.11 no.3
    • /
    • pp.97-105
    • /
    • 2007
  • The purpose of this study was to investigate SCM performance of textile fashion business in a competitive market environment. For the methodology of this study, the questionnaire was developed based upon the literature. 230 questionnaires were distributed to the experts who operate SCM in textile fashion firms. The returned usable 149 were analyzed by SPSS10.0 with multiple regression analysis and Cronbach's Alpha for internal consistency and reliability. The results of this study were as follows: The SCM performance of the textile fashion firms was affected by information system, business environment, and partnership in a descending order. Analyzing on the business environment, CEOs' concern about incorporating SCM and the degree of assistance from government and textile fashion federation impacted the performance of SCM in a descending order. For information system, standardized computerization, information sharing, and computerization with infrastructure on intra/inter business impacted the SCM performance of the firms in a descending order. For partnership, strategic alliance, openness about corporate culture, and credibility of partnership impacted the SCM performance of the firms in a descending order.

Oil Field Geographical Information System Based on Remote Sensing, GIS and GPS

  • Wang, Ziyu;Chen, Xiuwan
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1310-1311
    • /
    • 2003
  • Oil Field Geographical Information System (OFGIS) manages multiple spatial data, attribute data, and topographic data, which include almost every kind of ground info rmation and underground information. Subsystems managed by OFGIS include petroleum exploration subsystem (PESS), petroleum development and engineering subsystem (PDESS), petrochemical subsystem (PCSS), petroleum storage and transportation subsystem (PSTSS), petroleum sale subsystem (PSSS), etc. A basic OFGIS framework consists of oil field infrastructure coverage (OFIC), oil field specialized information coverage (OFSIC) and oil field synthesis and decision service coverage (OFSDSC). Basic function of OFGIS includes database management, geographic information management, spatial information processing and application.

  • PDF

A Study on the IPv6 Multihoming Mechanism using Loadsharing Broker.

  • Kim, Dong-Kyun;Park, Hak-Soo;Kim, Seong-Hae;Whang, Il-Sun
    • Journal of Scientific & Technological Knowledge Infrastructure
    • /
    • s.7
    • /
    • pp.141-148
    • /
    • 2001
  • This paper describes a mechanisms for IPv6 multihomming with loadsharing broker, focusing on the interdomain scalability and load sharing with redundancy on IPv6 networks. Unlike currently-practiced IPv4 multihoming, this model does not impact the worldwide routing table size, also it provides inbound load sharing at site level based on router renumbering, and multiple-prefix assigning techniques of IPv6. The proposed model has four modules such as building interfaces MIB module, priority list maintaining module, load detection module, and RRP configuration module.

  • PDF

Modeling on Expansion Behavior of Gwangan Bridge using Machine Learning Techniques and Structural Monitoring Data (머신러닝 기법과 계측 모니터링 데이터를 이용한 광안대교 신축거동 모델링)

  • Park, Ji Hyun;Shin, Sung Woo;Kim, Soo Yong
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.6
    • /
    • pp.42-49
    • /
    • 2018
  • In this study, we have developed a prediction model for expansion and contraction behaviors of expansion joint in Gwangan Bridge using machine learning techniques and bridge monitoring data. In the development of the prediction model, two famous machine learning techniques, multiple regression analysis (MRA) and artificial neural network (ANN), were employed. Structural monitoring data obtained from bridge monitoring system of Gwangan Bridge were used to train and validate the developed models. From the results, it was found that the expansion and contraction behaviors predicted by the developed models are matched well with actual expansion and contraction behaviors of Gwangan Bridge. Therefore, it can be concluded that both MRA and ANN models can be used to predict the expansion and contraction behaviors of Gwangan Bridge without actual measurements of those behaviors.

Gateway Channel Hopping to Improve Transmission Efficiency in Long-range IoT Networks

  • Kim, Dae-Young;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1599-1610
    • /
    • 2019
  • Intelligent services have expanded as Internet of Things (IoT) technology has evolved and new requirements emerge to accommodate various services. One new requirement is transmitting data over long distances with low-power. Researchers have developed low power wide area (LPWA) network technology to satisfy the requirement; this can improve IoT network infrastructure and increase the range of services. However, network coverage expansion causes several problems. The traffic load is concentrated at a specific gateway, which causes network congestion and leads to decreased transmission efficiency. Therefore, the approach proposed in this paper attempts to recognize and then avoid congestion through gateway channel hopping. The LPWA network employs multiple channels, so wireless channel hopping is available in a gateway. Devices that are not delay sensitive wait for the gateway to reappear on their wireless channel; delay sensitive devices change the wireless channel along the hopping gateway. Thus, the traffic load and congestion in each wireless channel can be reduced improving transmission efficiency. The proposed approach's performance is evaluated by computer simulation and verified in terms of transmission efficiency.

ID-based group key exchange mechanism for virtual group with microservice

  • Kim, Hyun-Jin;Park, Pyung-Koo;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.932-940
    • /
    • 2021
  • Currently, research on network functions virtualization focuses on using microservices in cloud environments. Previous studies primarily focused on communication between nodes in physical infrastructure. Until now, there is no sufficient research on group key management in virtual environments. The service is composed of microservices that change dynamically according to the virtual service. There are dependencies for microservices on changing the group membership of the service. There is also a high possibility that various security threats, such as data leakage, communication surveillance, and privacy exposure, may occur in interactive communication with microservices. In this study, we propose an ID-based group key exchange (idGKE) mechanism between microservices as one group. idGKE defines the microservices' schemes: group key gen, join group, leave group, and multiple group join. We experiment in a real environment to evaluate the performance of the proposed mechanism. The proposed mechanism ensures an essential requirement for group key management such as secrecy, sustainability, and performance, improving virtual environment security.