• Title/Summary/Keyword: Request Oriented

Search Result 60, Processing Time 0.027 seconds

Ultra Low Power Data Aggregation for Request Oriented Sensor Networks

  • Hwang, Kwang-Il;Jang, In
    • Journal of Information Processing Systems
    • /
    • v.10 no.3
    • /
    • pp.412-428
    • /
    • 2014
  • Request oriented sensor networks have stricter requirements than conventional event-driven or periodic report models. Therefore, in this paper we propose a minimum energy data aggregation (MEDA), which meets the requirements for request oriented sensor networks by exploiting a low power real-time scheduler, on-demand time synchronization, variable response frame structure, and adaptive retransmission. In addition we introduce a test bed consisting of a number of MEDA prototypes, which support near real-time bidirectional sensor networks. The experimental results also demonstrate that the MEDA guarantees deterministic aggregation time, enables minimum energy operation, and provides a reliable data aggregation service.

Feature-Oriented Requirements Change Management with Value Analysis (가치분석을 통한 휘처 기반의 요구사항 변경 관리)

  • Ahn, Sang-Im;Chong, Ki-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.33-47
    • /
    • 2007
  • The requirements have been changed during development progresses, since it is impossible to define all of software requirements. These requirements change leads to mistakes because the developers cannot completely understand the software's structure and behavior, or they cannot discover all parts affected by a change. Requirement changes have to be managed and assessed to ensure that they are feasible, make economic sense and contribute to the business needs of the customer organization. We propose a feature-oriented requirements change management method to manage requirements change with value analysis and feature-oriented traceability links including intermediate catalysis using features. Our approach offers two contributions to the study of requirements change: (1) We define requirements change tree to make user requirements change request generalize by feature level. (2) We provide overall process such as change request normalization, change impact analysis, solution dealing with change request, change request implementation, change request evaluation. In addition, we especially present the results of a case study which is carried out in asset management portal system in details.

  • PDF

A Method for Security Strengthening of Web Application using AOP (AOP를 이용한 웹 애플리케이션의 보안성 강화 방안)

  • Sun, Soo-Rim;Lee, Keum-Suck
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.119-128
    • /
    • 2009
  • As use of web applications and web-based information systems increases, so web application attacks are increasing. Recently, XSRF(Gross Site Request Forgery) attacks among a variety of web attacks become important because victim's damage caused by such attacks can be severe. But adding security functions for preventing XSRF attacks to existing developed and running software systems could affect move dangerous and expensive to companies and organizations. We suggest effectively adding these security functions to legacy systems, could separate concerns using advantage of the modularity offered by AOP(Aspect-Oriented Programming) methodology. In this paper, we have presented approach for detecting and preventing XSRF in JEE systems using aspect of AOP.

Implementation of Customer Request-oriented Homepage Automation System (고객 중심의 주문형 홈페이지 자동화시스템 구현)

  • 최재원;김진천
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.1
    • /
    • pp.110-117
    • /
    • 2001
  • In this paper we researched the homepage automation system and its implementation methods that made it possible for even the non-majors or the beginners to make a specific useful homepage with the simple manipulation of a mouse and the minimal input of necessary information. This system is the customer request-oriented homepage automation system that makes it possible with ease not only to manufacture homepage but also to maintain homepage without direct handling of homepage source.

  • PDF

MIS개발을 위한 체계적인 소프트웨어 평가 및 선정

  • Lee Gyu-Heon;Seo Nam-Su
    • Journal of the military operations research society of Korea
    • /
    • v.11 no.1
    • /
    • pp.47-54
    • /
    • 1985
  • In this paper, for the systematic software evaluation and selection objective, we first discussed the systems software which is distinctly different from applications oriented software in source, concept and use. We suggested the systematic procedures for the effective software evaluation and selection by analyzing categories of commercially available proprietary software, sources of information for software selection, request for information, request for proposal, user surveys as an aid to evaluation and evaluation of responses to the RFP.

  • PDF

An Extended-Weighted Buddy System for an Object-Oriented Computer (객체지향 컴퓨터를 위한 확장-가중치 버디 시스템)

  • Kim, Kwan-Joong;Kim, Byung-Gi
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.6
    • /
    • pp.1625-1635
    • /
    • 1997
  • An extension of the weighted buddy system, called the extended-weighted buddy system, for dynamic memory allocation in an object-oriented computer is presented. The extended-weighted buddy system allows block sizes of $2^k,\;3*2^k,\;5*2^k,\;7*2^k$, whereas the original weighted buddy system allowed block sizes of $2^k\;and\;3*2^k$. This extension is achieved at only the cost of additional 3 bits per block for memory management unit. Simulation results are presented which compare our method with the weighted buddy system. These results indicate that, for uniform request distributions, our system has less internal memory fragmentation than the weighted buddy system(approximately 60%). And, for exponential request distributions, it has less internal memory fragmentation than the weighted buddy method (approximately 50%). The external fragmentation is greater for this system than the weighted buddy system. But, our system has less total memory fragmentation for exponential request distributions, and two systems take a similar total memory fragmentation for uniform request distributions, so we can substitutes the extended-weighted buddy system for weighted buddy system.

  • PDF

Design and Implementation of A Diet Menu System on the WAP Environment (WAP 환경에서의 다이어트 식단 시스템의 설계 및 구현)

  • 윤수미;김미영;김상철
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.229-232
    • /
    • 2001
  • Wireless Internet based in WAP(Wireless Application Protocol) has been a very useful and attractive means picking up information through service irrelavant to time and space. And more the request of user has been diverse. In this paper, we implemented a Diet Menu System using expert knowledge-based rules on the WAP environment. This enables the moving man interested in diet to get information through wireless mobil hand phone. There are only connection-oriented system for this type of service till now. This paper has designed basic expert knowledge rules for result display, verified and implemented for WAP environment.

  • PDF

The Design of Security Information Management System of CORBA Security with Using (Repository를 활용한 CORBA Security의 보안정보관리 시스템 설계)

  • Ryu, Ki Young;Park, Sang Woo
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.59-66
    • /
    • 2003
  • In this paper the CORBA security services is designed and implemented conforming to the CORBA Security Services Specification. We implemented a Security Information Management system for object-oriented distributed systems based onthe CORBA (Common Object Request Broker Architecture) Security specification baseed on Repository.

  • PDF

Workflow Design on Product Data Management System Using Object-Oriented Modeling Technique (객체지향 방법론을 이용한 제품정보관리(PDM) 시스템에서의 워크플로우 설계)

  • 최종윤;최경희;안병하
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.145-157
    • /
    • 1999
  • The challenge is to maximize the time-to-market benefits of concurrent engineering while maintaining control of data and distributing it automatically to the people who need it when they need it. The way PDM systems cope with this challenge is that master data is held only once in a secure vault where its integrity can be assured and all changes to it monitored, controlled and recorded. The structure of PDM is various from vendor, but they have common module. That is PDM and it is most important. The goal is to design the workflow in PDM using object-oriented modeling method. The past methods have concentrated on the flow between workflow engine and agent, but this paper will focus on task. We will model task as individual object. This paper uses OMT(Object Modeling Technique) by James Rumbaugh for base modeling tool and uses DCOM(Distributed Component Object Model) for base ORB(Object Request Broker). Research object is to design the static object model, to design state change by dynamic model and to design data transition by functional model.

  • PDF

A Study on the Development of Framework Using Component Based Methodology (컴포넌트기반 방법론을 사용한 프레임워크 개발에 관한 연구)

  • Kim, Haeng-Gon;Han, Eun-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.842-851
    • /
    • 2000
  • Developers can reuse not only class code but also wide range of knowledge on domain by reusing framework. Existing Object-Oriented Methodology and Catalysis Methodology were presented when redefining component in the course of redesigning framework. However, existing methodologies have weakness that entire process is waterfall mode or design of interface lays too much stress on implementation stage. So, this thesis will present Component-Oriented Methodology for the reuse of framework, and construct the environment for framework and domain development. That is, domain is analyzed by input of domain knowledge on real world to create software based on component, and hotspot is identified through analyzed information, and refactoring by putting additional information on users and developers. After that, I will create domain framework and application framework depending on domain. In this Component-Oriented Methodology, information is searched, understood and extracted or composite through component library storage internally. Then this information is classified into the information on component, and used as additional information in redesigning. With this, developer can obtain reusability, easiness and portability by constructing infrastructure environment that allows to register, update and delete component through Component Management System(CMS) under he development environment which can be easily applied to his own application using framework component, in this thesis, CoRBA(Common Object Request Broker Architecture) environment.

  • PDF