• Title/Summary/Keyword: Software Organization

Search Result 517, Processing Time 0.025 seconds

Characteristics and Implications of Marseille's Euromméditerranée as an Integrated Urban Regeneration Project (통합형 도시재생사업으로서 마르세유 유로메디테라네의 특성과 시사점)

  • Wonseok Park
    • Land and Housing Review
    • /
    • v.15 no.1
    • /
    • pp.99-115
    • /
    • 2024
  • This study aims to investigate Marseille's Euromméditerranée project and provide policy implications for revitalizing domestic urban regeneration projects. First, we identify Euroméditerranée as a pivotal urban regeneration effort, executed by EPAEM-an organization fostering governance-driven project advancement through collaboration and investment from both central and local governments. This endeavor has significantly contributed to revitalizing Marseille, enriching the quality of life for its residents. Second, this urban regeneration project has the following notable features: consolidated approach with combination of full redevelopment and rehabilitation, integrated regeneration covering hardware-like physical regeneration and software-like economic, cultural, and environmental regeneration; government-type urban regeneration project structure. Finally, we suggest that policymakers should consider the economic scale in urban regeneration projects, national-level government organizations, and efficient public-private partnerships.

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

Boot storm Reduction through Artificial Intelligence Driven System in Virtual Desktop Infrastructure

  • Heejin Lee;Taeyoung Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.1-9
    • /
    • 2024
  • In this paper, we propose BRAIDS, a boot storm mitigation plan consisting of an AI-based VDI usage prediction system and a virtual machine boot scheduler system, to alleviate boot storms and improve service stability. Virtual Desktop Infrastructure (VDI) is an important technology for improving an organization's work productivity and increasing IT infrastructure efficiency. Boot storms that occur when multiple virtual desktops boot simultaneously cause poor performance and increased latency. Using the xgboost algorithm, existing VDI usage data is used to predict future VDI usage. In addition, it receives the predicted usage as input, defines a boot storm considering the hardware specifications of the VDI server and virtual machine, and provides a schedule to sequentially boot virtual machines to alleviate boot storms. Through the case study, the VDI usage prediction model showed high prediction accuracy and performance improvement, and it was confirmed that the boot storm phenomenon in the virtual desktop environment can be alleviated and IT infrastructure can be utilized efficiently through the virtual machine boot scheduler.

Study on Automation of Comprehensive IT Asset Management (포괄적 IT 자산관리의 자동화에 관한 연구)

  • Wonseop Hwang;Daihwan Min;Junghwan Kim;Hanjin Lee
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • The IT environment is changing due to the acceleration of digital transformation in enterprises and organizations. This expansion of the digital space makes centralized cybersecurity controls more difficult. For this reason, cyberattacks are increasing in frequency and severity and are becoming more sophisticated, such as ransomware and digital supply chain attacks. Even in large organizations with numerous security personnel and systems, security incidents continue to occur due to unmanaged and unknown threats and vulnerabilities to IT assets. It's time to move beyond the current focus on detecting and responding to security threats to managing the full range of cyber risks. This requires the implementation of asset Inventory for comprehensive management by collecting and integrating all IT assets of the enterprise and organization in a wide range. IT Asset Management(ITAM) systems exist to identify and manage various assets from a financial and administrative perspective. However, the asset information managed in this way is not complete, and there are problems with duplication of data. Also, it is insufficient to update of data-set, including Network Infrastructure, Active Directory, Virtualization Management, and Cloud Platforms. In this study, we, the researcher group propose a new framework for automated 'Comprehensive IT Asset Management(CITAM)' required for security operations by designing a process to automatically collect asset data-set. Such as the Hostname, IP, MAC address, Serial, OS, installed software information, last seen time, those are already distributed and stored in operating IT security systems. CITAM framwork could classify them into unique device units through analysis processes in term of aggregation, normalization, deduplication, validation, and integration.

Role of e-Learning Environments in Training Applicants for Higher Education in the Realities of Large-Scale Military Aggression

  • Nataliia Bakhmat;Maryna Burenko;Volodymyr Krasnov;Larysa Olianych;Dmytro Balashov;Svitlana Liulchak
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.167-174
    • /
    • 2023
  • Electronic educational environments in the conditions of quarantine restrictions of COVID-19 have become a common phenomenon for the organization of distance educational activities. Under the conditions of Russian aggression, Ukrainian proof of their use is unique. The purpose of the article is to analyze the role of electronic educational environments in the process of training applicants for higher education in Ukraine in the realities of a large-scale war. General scientific methods (analysis, synthesis, deduction, and induction) and special pedagogical prognostic methods, modeling, and SWOT analysis methods were used. In the results, the general properties of the Internet educational platforms common in Ukraine, the peculiarities of using the Moodle and Prometheus platforms, and an approximate model of the electronic learning environment were discussed. The reasons for the popularity of Moodle among Ukrainian universities are analyzed, but vulnerable elements related to security are emphasized. It was also determined that the high cost of Prometheus software and less functionality made this learning environment less relevant. The conclusions state that the military actions drew the attention of universities in Ukraine to the formation of their own educational platforms. This is especially relevant for technical and military institutions of higher education.

The Impact of Professional Self-Concept on the Organizational Socialization of Hospital Nurses (전문직 자아개념이 병원간호사의 조직사회화에 미치는 영향)

  • Su-Hee Oh;Youngshin Song
    • Journal of Industrial Convergence
    • /
    • v.22 no.7
    • /
    • pp.93-102
    • /
    • 2024
  • The purpose of this study wa to analyze the impact of nurses' perceptions of care and professional self-concept on their organizational socialization. The participants were 193 nurses working in university hospitals and general hospitals in regions C and D. Data collection took place from July to August 2016, and the data were analyzed using descriptive statistics and multiple regression analysis with IBM SPSS 22 software. The results indicated that educational level and professional self-concept are determining factors influencing organizational socialization. Nurses with an associate degree showed higher levels of organizational socialization compared to those with a bachelor's degree or higher, and higher levels of professional self-concept were associated with higher organizational socialization. Therefore, it is necessary for hospitals to implement effective human resource management that enables nurses of each educational level to quickly socialize within the organization, providing differentiated support and programs based on educational level. Additionally, continuous research is required to enhance nurses' professional self-concept and establish their work identity.

The Empirical Study on the Effects of the Team Empowerment caused by the Team-Based Organizational Structure in KBS (팀제가 팀 임파워먼트에 미치는 영향에 관한 연구;KBS 팀제를 중심으로)

  • Ahn, Dong-Su;Kim, Hong
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2006.04a
    • /
    • pp.167-201
    • /
    • 2006
  • Korean corporations are transforming their vertical operational structure to a team-based structure to compete in the rapidly changing environment and for improved performance. However, a high percentage of the respondents in KBS said that despite the appearance of the present team structure, the organization operates much like a vertically-structured organization. This result can be attributed to the lack of study and implementation toward the goal of empowerment, the key variable for the success of the team-based structure. This study aims to provide policy suggestions on how to implement the process of empowerment, by investigating the conditions that hinder the process and the attitude of the KBS employees. For the cross-sectional study, this thesis examined the domestic and international references, conducted a survey of KBS employees, personal interviews and made direct observations. Approximately 1,200 copies of the Questionnaire were distributed and 474 were completed and returned. The analysis used SPSS 12.0 software to process the data collected from 460 respondents. For the longitudinal-study, six categories that were common to this study and "The Report of the Findings of KBS Employees' View of the Team Structure" were selected. The comparative study analyzed the changes in a ten-month period. The survey findings showed a decrease of 24.2%p in the number of responses expressing negative views of the team structure and a decrease of 1.29%p in the number of positive responses. The findings indicated a positive transformation illustrating employees' improved understanding and approval of the team structure. However, KBS must address the issue on an ongoing basis. It has been proven that the employee empowerment increases the productivity of the individual and the group. In order to boost the level of empowerment, the management must exercise new, innovative leadership and build trust between the managers and the employees first. Additional workload as a result of shirking at work places was prevalent throughout all divisions and ranks, according to the survey data. This outcome leads to the conclusion that the workload is not evenly distributed or shared. And the data also showed the employees do not trust the assessment and rewards system. More attention and consideration must be paid to the team size and job allocation in order to address this matter; the present assessment and rewards system need to be complemented. The type of leadership varies depending on the characteristics of the organization's structure and employees' disposition. KBS must develop and reform its own management, leadership style to suit the characteristics of individual teams. Finally, for a soft-landing of KBS team structure, in-house training and education are necessary.

  • PDF

The Change of the Fracture Risk by a Fracture Risk Factor in the FRAX Tool (FRAX Tool에서 골절위험인자에 따른 골절위험도의 변화)

  • Song, Hyeon-Seok;Lee, Hyo-Yeong;Yun, Jong-Jun;Lee, Hwa-Jin;Lee, Moo-Seok;Park, Sae-Yoon;Jeong, Ji-Wook
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.3
    • /
    • pp.132-136
    • /
    • 2009
  • Purpose: WHO(world health organization) announced the FRAX Tool(fracture risk assessment) of new software in the beginning of 2008. FRAX Tool was considered various risk factor, being different from existing fracture risk. In this study, we wanted to know the fracture risk of following the changing of the risk factor of fracture. Materials and Methods: A total of 50 women aged 50~60 were studied. We measured BMD at the part of femur neck which was based on the age, weight, height of individual with GE, Lunar-prodigy. The control group is fracture risk without considering fracture risk factor. The experimental group is previous fracture, parent fracture, current smoking, glucocorticoid, rheumatoid arthritis, secondary osteoporosis, alcohol. if each items makes one 'existence', others are all 'nothing'. and the results produced major osteoporotic region and hip fracture risk in 10-years. Statistics used t-test of SPSS 12.0. Results: The average rate of increment of major osteoporotic region between control group and experimental group, previous fracture-74% increase, parent fracture-96% increase, current smoking-2% increase, glucocorticoid-61% increase, rheumatoid arthritis-29% increase, alcohol-20% increase, secondary osteoporosis-0.18% decrease. The average rate of increment of hip region between control group and experimental group, previous fracture-84% increase, parent fracture-5% increase, current smoking-72% increase, glucocorticoid-84% increase, rheumatoid arthritis-40% increase, alcohol-52% increase, secondary osteoporosis-1.69% decrease. Conclusions: Each fracture risk factor has different rate of increment between major osteoporotic and hip region while in occasion of the second osteoporosis it has little relation because of low P-value. We could know that a contribution of the risk factor is different between major osteoporotic and hip region.

  • PDF

ULTRASTRUCTURAL ANALYSIS OF TOOTH PULP AFFERENTS TERMINALS IN THE MEDULLARY DORSAL HORN OF THE RAT (치수유래 구심성 신경섬유의 삼차신경 감각핵군에서의 연접특성)

  • Bae, Yong-Chul;Lee, Eun-Hee;Choy, Min-Ki;Hong, Su-Hyung;Kim, Hyun-Jung;Na, Soon-Hyeun;Kim, Young-Jin
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.28 no.2
    • /
    • pp.219-227
    • /
    • 2001
  • Little is known about processing mechanism of pain sensation of the oral cavity at the 1st synapse of trigeminal sensory nuclei. Serial ultrathin sections of tooth pulp afferent terminals, identified by the transganglionic transport of 1% wheatgerm agglutinin conjugated horseradish peroxidase, were investigated with electron microscope. Quantitative ultrastructural analysis was performed on digitizing tablet connected to Macintoshi personal computer (software; NIH Image 1.60, NIH, Bethesda, MD). Labeled boutons could be classified into two types by the shapes of containing vesicles : S bouton, which contained mainly spherical vesicles (Dia. 45-55 nm) and few large dense cored vesicles (Dia, 80-120nm), and LDCV bouton, which contained spherical vesicles as well as large number of large dense cored vesicles. Most of the parameters on the ultrastructural characteristic and synaptic organization of labeled boutons were similar between S and LDCV boutons, except shapes of containing vesicles. Majority of the labeled boutons showed simple synaptic arrangement. The labeled boutons were frequency presynaptic to dendritic spine, and to a lesser extent, dendritic shaft. They rarely synapsed with soma and adjacent proximal dendrite. A small proportion of labeled boutons made synaptic contacts with presynaptic, pleomorphic vesicles containing endings and synaptic triad. Morphometric parameters of labeled boutons including volume and surface area, total apposed area, mitochondrial volume, active zone area, vesicle number and density showed wide variation and these were not significantly different between S and LDCV boutons. The present study revealed characteristic features on ultrastructure and synaptic connection of pulpal afferents which may involved in transmission of oral pain sensation.

  • PDF

Study of Web Services Interoperabiliy for Multiple Applications (다중 Application을 위한 Web Services 상호 운용성에 관한 연구)

  • 유윤식;송종철;최일선;임산송;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.217-220
    • /
    • 2004
  • According as utilization for web increases rapidly, it is demanded that model about support interaction between web-based applications systematically and solutions can integrate new distributed platforms and existing environment effectively, accordingly, Web Services appeared by solution in reply. These days, a lot of software and hardware companies try to adoption of Web Services to their market, attenpt to construct their applications associationing components from various Web Services providers. However, to execute Web Services completely. it must have interoperability and need the standardization work that avoid thing which is subject to platform, application as well as service and programming language from other companies. WS-I (Web Services Interoperability organization) have established Basic Profile 1.0 based on XML, UDDI, WSDL and SOAP for web services interoperability and developed usage scenario Profile to apply Web Services in practice. In this paper, to verify suitability Web Services interoperability between heterogeneous two applications, have design and implements the Book Information Web Services that based on the Web Services Client of J2SE platform and the Web Services Server of .NET platform, so that analysis and verify the service by adaptation of WS-I Basic Profile.

  • PDF