• Title/Summary/Keyword: Sharing Infrastructure

Search Result 343, Processing Time 0.032 seconds

A Study on the generation method of essential u-City service of each stage on a specified city. (특정도시의 단계별 필수기반 u-City 서비스 도출 방안에 관한 연구)

  • Park, Soon-Hyung
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.87-90
    • /
    • 2009
  • A u-city is a vision of a city with computers and sensors built in to its infrastructure, and data sharing among the various information systems. A u-City provides several u-City services to the u-City clients. The u-City services for local governments contain two types of functions: common function and specified function. It is needed a study on generation of specified service models of local governments. The proposed service model divides functions of the city into two service areas: common support service and specified support service. And we suggest the way to generate the u-services of each local government in this paper.

  • PDF

A Study on the Development of CITIS(Contractor Integrated Technical Information Services) (CITIS(Contractor Integrated Technical Information Services)구현에 관한 연구)

  • Jeong, Seok-Chan;Woo, Hoon-Shik;Cho, Chang-Hyuk;Paik, Jong-Myung;Ju, Kyung-Joon
    • IE interfaces
    • /
    • v.10 no.3
    • /
    • pp.1-10
    • /
    • 1997
  • CALS, being widely adopted by industry, is a strategy to share integrated digital product data through a set of standards to achieve effieciencies and competition in business. For CALS implemetation, creating a shared information system is necessary and CITIS is proposed for that. CITIS shall provide on-line access and automated exchange of all the technical information between contractor and service provider, and the function of CITIS is difined in MIL-STD-974. In this paper, regarding CITIS as a infrastructure of information for CALS, we proposed CITIS server system which comprise global data sharing software, global data management system, workflow manager, and configuration management maneger.

  • PDF

A Case Study on SCM Connection using The Rossetta-net Standard (SCM 구축을 위한 Rosetta-net표준 연계 응용 연구)

  • 김종기;서장훈;박명규
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2003.05a
    • /
    • pp.185-193
    • /
    • 2003
  • This paper is intended as an investigation of Build-up Method of SCM Connection applying EC Standard(Rossetta-net) to reduce the integration effort, and improve extensibility and interoperability of an eBusiness infrastructure.-Intiative way for I-commerce applications to quickly incorporate new standards. Let me summarize the main points that have been made in this paper. The sharing information for connection and the Rosetta-net standard of the existing SCM system, and PIP 3A4, order management module, of the Rosetta-net specifications for connection by the Rosetta-net. Lastly, That shows the process of the gateway for connecting among the existing SCM systems.

  • PDF

The Performance of Supply Chain Management in Textile Fashion Business

  • Shin, Sang-Moo
    • Journal of Fashion Business
    • /
    • v.11 no.3
    • /
    • pp.97-105
    • /
    • 2007
  • The purpose of this study was to investigate SCM performance of textile fashion business in a competitive market environment. For the methodology of this study, the questionnaire was developed based upon the literature. 230 questionnaires were distributed to the experts who operate SCM in textile fashion firms. The returned usable 149 were analyzed by SPSS10.0 with multiple regression analysis and Cronbach's Alpha for internal consistency and reliability. The results of this study were as follows: The SCM performance of the textile fashion firms was affected by information system, business environment, and partnership in a descending order. Analyzing on the business environment, CEOs' concern about incorporating SCM and the degree of assistance from government and textile fashion federation impacted the performance of SCM in a descending order. For information system, standardized computerization, information sharing, and computerization with infrastructure on intra/inter business impacted the SCM performance of the firms in a descending order. For partnership, strategic alliance, openness about corporate culture, and credibility of partnership impacted the SCM performance of the firms in a descending order.

Photovoice as a research method and a strategy for community health promotion (지역사회 건강증진 연구방법 및 전략으로서의 포토보이스)

  • Yoo, Seunghyun
    • Korean Journal of Health Education and Promotion
    • /
    • v.32 no.1
    • /
    • pp.77-87
    • /
    • 2015
  • Objectives: This study aims to explain the process of photovoice, to review relevant research cases, and to discuss the issues in photovoice applications for community health promotion. Methods: Literature review is performed on photovoice manuals, systematic review literature on international photovoice research, and Korean photovoice studies. The review was based on 8 research papers and 6 practice manuals. Results: Photovoice so far has specified its orientation to participatory research. Its implementation includes photovoice training, photo taking and sharing, interviews and discussions, photo exhibit, and social action planning for policy change. SHOWeD questions and the like guide photovoice discussions while they face some challenges in application. Social action planning for policy change part of the photovoice needs attention in implementation and evaluation. Conclusions: Adherence to the participatory principles and action research orientation in photovoice requires persistent efforts. Process and impact evaluation with development of photovoice research infrastructure will enhance photovoice application.

Localization of Mobile Users with the Improved Kalman Filter Algorithm using Smart Traffic Lights in Self-driving Environments

  • Jung, Ju-Ho;Song, Jung-Eun;Ahn, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.67-72
    • /
    • 2019
  • The self-driving cars identify appropriate navigation paths and obstacles to arrive at their destinations without human control. The autonomous cars are capable of sensing driving environments to improve driver and pedestrian safety by sharing with neighbor traffic infrastructure. In this paper, we have focused on pedestrian protection and have designed an improved localization algorithm to track mobile users on roads by interacting with smart traffic lights in vehicle environments. We developed smart traffic lights with the RSSI sensor and built the proposed method by improving the Kalman filter algorithm to localize mobile users accurately. We successfully evaluated the proposed algorithm to improve the mobile user localization with deployed five smart traffic lights.

Digital Contents Control for Desktop Virtualization: A Case of Virtual Folder Based Implementation (데스크톱 가상화에 따른 디지털콘텐츠 통제방안: 가상폴더방식의 구현사례)

  • Yoon, Han Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.1-9
    • /
    • 2014
  • Recently, with the enlargement of cloud computing, virtual desktop infrastructure(VDI) can be an alternative of the existing personal computer based information environment. For the case of partially introduced VDI coexisting with personal computer environment, we suggest a virtual folder based approach to control the overall digital contents within an organization with a case of implementation. Although a centralizing device was used for storage and sharing of organization's digital contents, it was not easy to accomplish centralizing digital contents completely. It is tried to prevent users from utilizing their own storage in their personal computers or virtual machines and to use virtual folder which transfer and store digital contents to and in EDMS. The virtual folder system of this paper looks like a real folder in a personal computer, but it is another virtual device for outer storage devices including EDMS. It can be an alternative and reference of digital contents control for future applications of cloud computing.

Weather Observation System Building in the Intertidal Zone (조간대 기상관측시스템 구축)

  • Jo, Won Gi;Kang, Dong-hwan;Lee, DongHyun
    • Journal of Environmental Science International
    • /
    • v.31 no.4
    • /
    • pp.357-363
    • /
    • 2022
  • In this study, we installed a weather observation tower tailored to the intertidal zone and established an intertidal weather observation system capable of real-time monitoring through a wireless network. This provided weather observation data representing the meteorological characteristics of the intertidal zone. To optimize this system in the future, we present practical directions for the development of observation equipment and for the data management and sharing, and we contribute to establishing the infrastructure.

A Study on the derivation of Korean Common Data Environment(CDE) requirements based on ISO 19650 for BIM sharing, collaboration and management (BIM 공유·협업·관리를 위한 ISO 19650 기반의 한국형 공통데이터환경(CDE) 요구사항 도출 연구)

  • Lee, Il-Gon;Kim, Hyun-Min;Choi, Jae-Woong
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.93-103
    • /
    • 2022
  • As the design environment of domestic infrastructure facilities shifts from a traditional co-work office system to a virtual digital co-work office, a CDE collaboration platform is required to build a digital co-work office suitable for the domestic design environment. In addition, a number of large multinational projects requiring collaboration from domestic and foreign construction companies are ordered, and procedures for performing tasks based on international standards such as ISO 19650 are required, so preparation for domestic designers is required. Therefore, this study aims to derive CDE requirements for the development of an ISO 19650-based CDE collaboration platform suitable for domestic design environments, and derived Korean CDE requirements based on ISO 19650 series and overseas CDE cases.

A Survey on Cloud Storage System Security via Encryption Mechanisms

  • Alsuwat, Wejdan;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.181-186
    • /
    • 2022
  • Cloud computing is the latest approach that is developed for reducing the storage of space to store the data and helps the quick sharing of the data. An increase in the cloud computing users is observed that is also making the users be prone to hacker's attacks. To increase the efficiency of cloud storage encryption mechanisms are used. The encryption techniques that are discussed in this survey paper are searchable encryption, attribute-based, Identity-based encryption, homomorphic encryption, and cloud DES algorithms. There are several limitations and disadvantages of each of the given techniques and they are discussed in this survey paper. Techniques are found to be effective and they can increase the security of cloud storage systems.