• Title/Summary/Keyword: Service Flow

Search Result 1,227, Processing Time 0.026 seconds

Automated Composition System of Web Services by Semantic and Workflow based Hybrid Techniques (시맨틱과 워크플로우 혼합기법에 의한 자동화된 웹 서비스 조합시스템)

  • Lee, Yong-Ju
    • The KIPS Transactions:PartD
    • /
    • v.14D no.2
    • /
    • pp.265-272
    • /
    • 2007
  • In this paper, we implement an automated composition system of web services using hybrid techniques that merge the benefit of BPEL techniques, with the advantage of OWL-S, BPEL techniques have practical capabilities that fulfil the needs of the business environment such as fault handling and transaction management. However, the main shortcoming of these techniques is the static composition approach, where the service selection and flow management are done a priori and manually. In contrast, OWL-S techniques use ontologies to provide a mechanism to describe the web services functionality in machine-understandable form, making it possible to discover, and integrate web services automatically. This allows for the dynamic integration of compatible web services, possibly discovered at run time, into the composition schema. However, the development of these approaches is still in its infancy and has been largely detached from the BPEL composition effort. In this work, we describe the design of the SemanticBPEL architecture that is a hybrid system of BPEL4WS and OWL-S, and propose algorithms for web service search and integration. In particular, the SemanticBPEL has been implemented based on the open source tools. The proposed system is compared with existing BPEL systems by functional analysis. These comparisions show that our system outperforms existing systems.

Design and Analsis of a high speed switching system with two priority (두개의 우선 순위를 가지는 고속 스윗칭 시스템의 설계 및 성능 분석)

  • Hong, Yo-Hun;Choe, Jin-Sik;Jeon, Mun-Seok
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.793-805
    • /
    • 2001
  • In the recent priority system, high-priority packet will be served first and low-priority packet will be served when there isn\`t any high-priority packet in the system. By the way, even high-priority packet can be blocked by HOL (Head of Line) contention in the input queueing System. Therefore, the whole switching performance can be improved by serving low-priority packet even though high-priority packet is blocked. In this paper, we study the performance of preemptive priority in an input queueing switch for high speed switch system. The analysis of this switching system is taken into account of the influence of priority scheduling and the window scheme for head-of-line contention. We derive queue length distribution, delay and maximum throughput for the switching system based on these control schemes. Because of the service dependencies between inputs, an exact analysis of this switching system is intractable. Consequently, we provide an approximate analysis based on some independence assumption and the flow conservation rule. We use an equivalent queueing system to estimate the service capability seen by each input. In case of the preemptive priority policy without considering a window scheme, we extend the approximation technique used by Chen and Guerin [1] to obtain more accurate results. Moreover, we also propose newly a window scheme that is appropriate for the preemptive priority switching system in view of implementation and operation. It can improve the total system throughput and delay performance of low priority packets. We also analyze this window scheme using an equivalent queueing system and compare the performance results with that without the window scheme. Numerical results are compared with simulations.

  • PDF

Development of Valuation Framework for Estimating the Market Value of Media Contents (미디어 콘텐츠의 시장가치 산정을 위한 가치평가 프레임워크 개발)

  • Sung, Tae-Eung;Park, Hyun-Woo
    • Journal of Service Research and Studies
    • /
    • v.6 no.3
    • /
    • pp.29-40
    • /
    • 2016
  • Since the late 20th century, there has been much effort to improve the market value of media contents which are commercialized in a digital format, by fusing digital data of video, audio, numerals, characters with IT technology together. Then by what criteria and methodologies could the market value for the drama "Sons of the Sun" or the animated film 'Frozen', often referred to in the meida, be estimated? In the circumstances there has been little or no research on the valuation framework of media contents and the status of their valuation system development to date, we propose a practical valuation models for various purposes such as contents trading, review of investment adequacy, etc., by formalizing and presenting a contents valuation framework for the four types of media of movies, online games, and broadcasting commercials, and animations. Therefore, we develope computational methods of cash flows which includes production cost by media content types, provide reference databases associated with key variables of valuation (economic life cycle, discount rates, contents contribution and royalty rates), and finally propose the valuation framework of media contents based on both income approach and relief-from-royalty method which has been applied to valuation of intangible assets so far.

A Method for Reducing Path Recovery Overhead of Clustering-based, Cognitive Radio Ad Hoc Routing Protocol (클러스터링 기반 인지 무선 애드혹 라우팅 프로토콜의 경로 복구 오버헤드 감소 기법)

  • Jang, Jin-kyung;Lim, Ji-hun;Kim, Do-Hyung;Ko, Young-Bae;Kim, Joung-Sik;Seo, Myung-hwan
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.280-288
    • /
    • 2019
  • In the CR-enabled MANET, routing paths can be easily destroyed due to node mobility and channel unavailability (due to the emergence of the PU of a channel), resulting in significant overhead to maintain/recover the routing path. In this paper, network caching is actively used for route maintenance, taking into account the properties of the CR. In the proposed scheme, even if a node detects that a path becomes unavailable, it does not generate control messages to establish an alternative path. Instead, the node stores the packets in its local cache and 1) waits for a certain amount of time for the PU to disappear; 2) waits for a little longer while overhearing messages from other flow; 3) after that, the node applies local route recovery process or delay tolerant forwarding strategy. According to the simulation study using the OPNET simulator, it is shown that the proposed scheme successfully reduces the amount of control messages for path recovery and the service latency for the time-sensitive traffic by 13.8% and 45.4%, respectively, compared to the existing scheme. Nevertheless, the delivery ratio of the time-insensitive traffic is improved 14.5% in the proposed scheme.

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.

A Case Study on the Smart Tourism City Using Big Data: Focusing on Tourists Visiting Jeju Province (빅 데이터를 활용한 스마트 관광 도시 사례 분석 연구: 제주특별자치도 관광객 데이터를 중심으로)

  • Junhwan Moon;Sunghyun Kim;Hesub Rho;Chulmo Koo
    • Information Systems Review
    • /
    • v.21 no.2
    • /
    • pp.1-27
    • /
    • 2019
  • It is possible to provide Smart Tourism Service through the development of information technology. It is necessary for the tourism industry to understand and utilize Big Data that has tourists' consumption patterns and service usage patterns in order to continuously create a new business model by converging with other industries. This study suggests to activate Jeju Smart Tourism by analyzing Big Data based on credit card usage records and location of tourists in Jeju. The results of the study show that First, the percentage of Chinese tourists visiting Jeju has decreased because of the effect of THAAD. Second, Consumption pattern of Chinese tourists is mostly occurring in the northern areas where airports and duty-free shops are located, while one in other regions is very low. The regional economy of Jeju City and Seogwipo City shows a overall stagnation, without changes in policy, existing consumption trends and growth rates will continue in line with regional characteristics. Third, we need a policy that young people flow into by building Jeju Multi-complex Mall where they can eat, drink, and go shopping at once because the number of young tourists and the price they spend are increasing. Furthermore, it is necessary to provide services for life-support related to weather, shopping, traffic, and facilities etc. through analyzing Wi-Fi usage location. Based on the results, we suggests the marketing strategies and public policies for understanding Jeju tourists' patterns and stimulating Jeju tourism industry.

A Study on Type Classification of Erosion Control Dam using Ecosystem Connectivity (생태연결성을 고려한 사방댐 유형분류에 관한 연구)

  • Koo, Gil-Bon;Kim, Min-Sik;Kim, Chul;Yu, Seung-mun
    • Journal of Korean Society of Forest Science
    • /
    • v.100 no.3
    • /
    • pp.483-493
    • /
    • 2011
  • Erosion control dams play a primary role in preventing or controlling natural disasters (landslide and debris flow etc.) and also conserve ecosystem in forested watersheds. This study examines structural characteristics of the dams such as the height of ecosystem control and the ecosystem permeability of the erosion control dams under standard drawings and the existing construction works. The objective of this study was to characterize the type classification of erosion control dams as ecosystem. Average permeability was highest on eco-piller dam (63.0%), followed in increasing order by wire rope (13.9%), silt dam (10.9%), multifunctional dam (7.2%), and gravity dam (0.4%). The height of ecosystem control was highest on gravity dam (3.2 m), followed in increasing order by multifunctional dam (1.7 m), wire rope dam (1.2 m), silt dam (0.6 m), and eco-piller dam (0.0 m). Criteria for defining the height of ecosystem control was indefinite. We grouped erosion control dams into three functional types (eco-connection, eco-semi connection, and eco-disconnection) by considering physical and structural characteristics such as the ecosystem permeability and the height of ecosystem control. The type of eco-connection (permeability > 20%) had connection areas from streambed to adjacent riparian areas, and these connection areas serve as ecosystem corridors for fauna and flora. Typical wildlife species includes mammals, reptiles, amphibians, and fishes. The type of eco-semi connection (5% < permeability < 20%) had < 2 m in the eco-barrier height from streambed, however, this type of dams partially serve as wildlife corridors and often provide fish ways. The type of eco-disconnection (permeability < 5%) had > 2 m in the eco-barrier height from streambed, thereby preventing wildlife movement.

A Study on Performance Evaluation based on Packet Dropping in ATM Network . New Scheme Proposal

  • Park, Seung-Seob;Yuk, Dong-Cheol
    • Journal of Navigation and Port Research
    • /
    • v.27 no.3
    • /
    • pp.283-288
    • /
    • 2003
  • Recently, the growth of applications and services over high-speed Internet increases, ATM networks as wide area back-bone has been a major solution. As the conventional TCP/IP suite is still the standard protocol used to support upper application on current. Internet, the issues regarding whether TCP/IP will operate efficiently on top of an ATM infrastructure and how to control its QoS still remain for studies. TCP uses a window-based protocol for flow control in the transport layer. When TCP uses the UBR service in ATM layer, the control method is only buffer management. If a cell is discarded in ATM layer, one whole packet of TCP will be lost; this fact occur the most TCP performance degradation. Several dropping strategies, such as Tail Drop, EPD, PPD, SPD, FBA, have been proposed to improve the TCP performance over ATM. In this paper, to improve the TCP performance, we propose a packet dropping scheme that is based on comparison with EPD, SPD and FBA. Our proposed scheme is applied to schemes discussed in the previous technology. Our proposed scheme does not need to know each connection's mean packet size. When the buffer exceeds the given threshold, it is based on comparison between the number of dropped packet and the approved packet. Our results are reported and discussed for comparing these discarding schemes under similar conditions. Although the number of virtual channel (VC) is increased, the simulation results showed that the proposed scheme can allocate more fairly each VC than other scheme.

The research for the management and financial affairs of geriatric hospital (노인병원의 운명 및 재무구조 특성에 관한 연구)

  • Kim, Do-Hun;Lee, Jong-Gil;Jung, Key-Stm;Lee, Chang-Eun
    • Korea Journal of Hospital Management
    • /
    • v.6 no.1
    • /
    • pp.1-17
    • /
    • 2001
  • According to the increase of the proportion of aged people, the medical demand for a senile chronic disease has been increased; therefore, aged people call for a geriatric hospital for special geriatric medical service. The main purpose of this study was to analyze the general characteristics and financial status of geriatric hospitals. For the study, a questionnaire was designed and sent to the geriatric hospitals to fill out the patient statistics, number of headcount by department, etc. to find out the stability, profitability, activity and so on financial statements of the hospitals were analyzed. The major findings of this study were as belows. 1. The ratio of the medical expenses to the revenue of the geriatric hospitals is much lower than acute care hospitals. But the probability of bankruptcy is higher due to the high ratio of the liabilities therefore it is required to stabilize the financial position by donating more money. 2. Government budget for the elderly people is not enough. To support the geriatric hospitals by going subsides, government should increase the budget. 3. Portion's of the patient of the geriatric hospitals are government support patient. Since the government doesn't pay the medical charges quickly, geriatric hospitals have a serious cash flow problem. Therefore, it is required that government is to prepay the bill. 4. Since geriatric hospitals treat elderly patient and most patients are government support patients, geriatric hospitals can be said to operate under the strict. 5. When we introduce the daily medical charge, the self-liability will be reduced on approximately 50% of current. This affection will bring a huge progressing financial structure to the medical profit of the geriatric hospital, and also patient family will feel less economical burden.

  • PDF

Detection of Traffic Anomalities using Mining : An Empirical Approach (마이닝을 이용한 이상트래픽 탐지: 사례 분석을 통한 접근)

  • Kim Jung-Hyun;Ahn Soo-Han;Won You-Jip;Lee Jong-Moon;Lee Eun-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.201-217
    • /
    • 2006
  • In this paper, we collected the physical traces from high speed Internet backbone traffic and analyze the various characteristics of the underlying packet traces. Particularly, our work is focused on analyzing the characteristics of an anomalous traffic. It is found that in our data, the anomalous traffic is caused by UDP session traffic and we determined that it was one of the Denial of Service attacks. In this work, we adopted the unsupervised machine learning algorithm to classify the network flows. We apply the k-means clustering algorithm to train the learner. Via the Cramer-Yon-Misses test, we confirmed that the proposed classification method which is able to detect anomalous traffic within 1 second can accurately predict the class of a flow and can be effectively used in determining the anomalous flows.