• Title/Summary/Keyword: Service-Oriented Computing

Search Result 174, Processing Time 0.025 seconds

A Study on the Tasks of Public Librarians based on Job Analysis (직무분석을 통한 공공도서관 사서 직무에 관한 연구)

  • Hoang, Gum-Sook;Ahn, In-Ja;Lee, Jae-Kwun;Noh, Young-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.2
    • /
    • pp.407-427
    • /
    • 2008
  • The purpose of this study are to analyze tasks of the public librarians through Job Analysis ('DACUM') and to survey the demands of professional librarian (professional librarian types), As the results, In public libraries, technical services (classification, cataloging etc.,) is reduced, while reading, culture (continued education), and information service are increased. Also, we identified 5 types of professional librarian which is composed 4 function oriented types, and 1 user oriented types, is suggested : reading coach, cultural service librarian, external work librarian, computing support librarian, children librarian.

  • PDF

Efficient Provisioning for Multicast Virtual Network under Single Regional Failure in Cloud-based Datacenters

  • Liao, Dan;Sun, Gang;Anand, Vishal;Yu, Hongfang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2325-2349
    • /
    • 2014
  • Network virtualization technology plays a key role in cloud computing, which serves as an effective approach for provisioning a flexible and highly adaptable shared substrate network to satisfy the demands of various applications or services. Recently, the problem of mapping a virtual network (VN) onto a substrate network has been addressed by various algorithms. However, these algorithms are typically efficient for unicast service-oriented virtual networks, and generally not applicable to multicast service-oriented virtual networks (MVNs). Furthermore, the survivable MVN mapping (SMVNM) problem that considers the survivability of MVN has not been studied and is also the focus of this work. In this research, we discuss SMVNM problem under regional failures in the substrate network and propose an efficient algorithm for solving this problem. We first propose a framework and formulate the SMVNM problem with the objective of minimizing mapping cost by using mixed integer linear programming. Then we design an efficient heuristic to solve this problem and introduce several optimizations to achieve the better mapping solutions. We validate and evaluate our framework and algorithms by conducting extensive simulations on different realistic networks under various scenarios, and by comparing with existing approaches. Our simulation experiments and results show that our approach outperforms existing solutions.

Evaluation of Web Service Similarity Assessment Methods (웹서비스 유사성 평가 방법들의 실험적 평가)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.1-22
    • /
    • 2009
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component based software development to promote application interaction and integration both within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web service repositories not only be well-structured but also provide efficient tools for developers to find reusable Web service components that meet their needs. As the potential of Web services for service-oriented computing is being widely recognized, the demand for effective Web service discovery mechanisms is concomitantly growing. A number of techniques for Web service discovery have been proposed, but the discovery challenge has not been satisfactorily addressed. Unfortunately, most existing solutions are either too rudimentary to be useful or too domain dependent to be generalizable. In this paper, we propose a Web service organizing framework that combines clustering techniques with string matching and leverages the semantics of the XML-based service specification in WSDL documents. We believe that this is one of the first attempts at applying data mining techniques in the Web service discovery domain. Our proposed approach has several appealing features : (1) It minimizes the requirement of prior knowledge from both service consumers and publishers; (2) It avoids exploiting domain dependent ontologies; and (3) It is able to visualize the semantic relationships among Web services. We have developed a prototype system based on the proposed framework using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web service registries. We report on some preliminary results demonstrating the efficacy of the proposed approach.

  • PDF

Data Model Study for National Research Data Commons Service (국가연구데이터커먼즈 서비스를 위한 데이터모델 연구)

  • Cho, Minhee;Lee, Mikyoung;Song, Sa-kwang;Yim, Hyung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.436-438
    • /
    • 2022
  • National Research Data Commons aims to build a system that can be used jointly by arranging analysis resources such as computing infrastructure, software, toolkit, API, and services used for data analysis together with research data to maximize the use of research data. do. The sharing and utilization system for publications and research data in the R&D process is well known. However, the environment in which data and tightly coupled software and computing infrastructure can be shared and utilized is insignificant and there is no management system. In this study, a data model is designed to systematically manage information on digital research resources required in the data-oriented R&D research process. This will be used to register and manage digital research resource information in the National Research Data Commons Service.

  • PDF

PowMash: End-User Service Mashup Using a Presentation-Authoring Scheme (PowMash: 프레젠테이션 작성 스킴 기반 최종 사용자 서비스 매쉬업)

  • Nam, Sanggyu;Dominguez, Noe;Ko, In-Young
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.12
    • /
    • pp.684-690
    • /
    • 2017
  • Researchers have suggested several methods for utilizing various kinds of services in an Internet of Things (IoT) environment. These methods require users to learn some new kinds of tools or expertise in programming. In this paper, we propose a new paradigm, which allows end-users to build IoT-service mashups based on a presentation-authoring scheme. We have also included a framework for this procedure. The design of a mashup model in this framework was based on a task-oriented service framework. Users can build a mashup of this framework in the presentation-file format, convert it into a service flow, and deploy it for running in an IoT environment. In addition, we use a case study to show how PowMash supports end-users' service mashups in an IoT environment.

Design and Implementation of Visual/Control Communication Protocol for Home Automated Robot Interaction and Control (홈오토메이션을 위한 영상/로봇제어 시스템의 설계와 구현)

  • Cho, Myung-Ji;Kim, Seong-Whan
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.27-36
    • /
    • 2009
  • PSTN (public switched telephone network) provides voice communication service, whereas IP network provides data oriented service, and we can use IP network for multimedia transport service (e.g. voice over IP service) with economic price. In this paper, we propose RoIP (robot on IP) service scenario, signaling call flow, and implementation to provide home automation and monitoring service for remote site users. In our scheme, we used a extended SIP (session initiation protocol) for signaling protocol between remote site users and home robots. For our bearer transport control, we implemented H.263 video codec over RTP (real-time transport protocol) and additionally DTMF (dual tone multi-frequency) transport for robot actuator control. We implemented our scheme on home robots and experimented with KTF operator network, and it shows good communication quality (average MOS = 9.15) and flexible robot controls.

  • PDF

A Study for u-Healthcare Networking Technology Framework Approach Based on Secure Oriented Architecture(SOA) (Secure Oriented Architecture(SOA)에 기반한 u-Healthcare 네트워크 보안기술 프레임워크 모델)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.101-108
    • /
    • 2013
  • Sensor network configurations are for a specific situation or environment sensors capable of sensing, processing the collected information processors, and as a device is transmitting or receiving data. It is presently serious that sensor networks provide many benefits, but can not solve the wireless network security vulnerabilities, the risk of exposure to a variety of state information. u-Healthcare sensor networks, the smaller the sensor node power consumption, and computing power, memory, etc. restrictions imposing, wireless sensing through the kind of features that deliver value, so it ispossible that eavesdropping, denial of service, attack, routing path. In this paper, with a focus on sensing of the environment u-Healthcare system wireless security vulnerabilities factors u-Healthcare security framework to diagnose and design methods are presented. Sensor network technologies take measures for security vulnerabilities, but without the development of technology, if technology is not being utilized properly it will be an element of threat. Studies suggest that the u-Healthcare System in a variety of security risks measures user protection in the field of health information will be used as an important guide.

Real-Time Vital Sign Information System Implementation uisng TMO(Time-Triggered and Message-Triggered Object) (시간구동 및 메시지 구동 객체를 이용한 실시간 생체정보 시스템 구현)

  • Kim, Chun-Suk;Kim, Gwang-Jun;Jo, Ui-Ju
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.6
    • /
    • pp.678-685
    • /
    • 2010
  • One of the computer application fields which started showing noticeable new growth trends in recent years is the real time communication distributed computing application field. Object-oriented(OO) real time(RT) distributed computing is a form of real-time distributed computing realized with a distributed computer system structured in the form of an object network. In this paper, we describes the application environment as the patient monitor telemedicine system with TMO structure. Vital sign information web viewer systems is also the standard protocol for medical image and transfer. In order to embrace new technologies as telemedicine service, it is important to develope the standard protocol between different systems in the hospital, as well as the communication with external hospital systems. We implemented integration patient monitor telemedicine system between vital sign web viewer systems and hospital information systems.

Performance and Energy Oriented Resource Provisioning in Cloud Systems Based on Dynamic Thresholds and Host Reputation (클라우드 시스템에서 동적 임계치와 호스트 평판도를 기반으로 한 성능 및 에너지 중심 자원 프로비저닝)

  • Elijorde, Frank I.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.39-48
    • /
    • 2013
  • A cloud system has to deal with highly variable workloads resulting from dynamic usage patterns in order to keep the QoS within the predefined SLA. Aside from the aspects regarding services, another emerging concern is to keep the energy consumption at a minimum. This requires the cloud providers to consider energy and performance trade-off when allocating virtualized resources in cloud data centers. In this paper, we propose a resource provisioning approach based on dynamic thresholds to detect the workload level of the host machines. The VM selection policy uses utilization data to choose a VM for migration, while the VM allocation policy designates VMs to a host based on its service reputation. We evaluated our work through simulations and results show that our work outperforms non-power aware methods that don't support migration as well as those based on static thresholds and random selection policy.

DOVE : A Distributed Object System for Virtual Computing Environment (DOVE : 가상 계산 환경을 위한 분산 객체 시스템)

  • Kim, Hyeong-Do;Woo, Young-Je;Ryu, So-Hyun;Jeong, Chang-Sung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.120-134
    • /
    • 2000
  • In this paper we present a Distributed Object oriented Virtual computing Environment, called DOVE which consists of autonomous distributed objects interacting with one another via method invocations based on a distributed object model. DOVE appears to a user logically as a single virtual computer for a set of heterogeneous hosts connected by a network as if objects in remote site reside in one virtual computer. By supporting efficient parallelism, heterogeneity, group communication, single global name service and fault-tolerance, it provides a transparent and easy-to-use programming environment for parallel applications. Efficient parallelism is supported by diverse remote method invocation, multiple method invocation for object group, multi-threaded architecture and synchronization schemes. Heterogeneity is achieved by automatic data arshalling and unmarshalling, and an easy-to-use and transparent programming environment is provided by stub and skeleton objects generated by DOVE IDL compiler, object life control and naming service of object manager. Autonomy of distributed objects, multi-layered architecture and decentralized approaches in hierarchical naming service and object management make DOVE more extensible and scalable. Also,fault tolerance is provided by fault detection in object using a timeout mechanism, and fault notification using asynchronous exception handling methods

  • PDF