• Title/Summary/Keyword: Software as Service

Search Result 1,438, Processing Time 0.025 seconds

Software Development for Optimal Productivity and Service Level Management in Ports (항만에서 최적 생산성 및 서비스 수준 관리를 위한 소프트웨어 개발)

  • Park, Sang-Kook
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.137-148
    • /
    • 2017
  • Port service level is a metric of competitiveness among ports for the operating/managing bodies such as the terminal operation company (TOC), Port Authority, or the government, and is used as an important indicator for shipping companies and freight haulers when selecting a port. Considering the importance of metrics, we developed software to objectively define and manage six important service indicators exclusive to container and bulk terminals including: berth occupancy rate, ship's waiting ratio, berth throughput, number of berths, average number of vessels waiting, and average waiting time. We computed the six service indicators utilizing berth 1 through berth 5 in the container terminals and berth 1 through berth 4 in the bulk terminals. The software model allows easy computation of expected ship's waiting ratio over berth occupancy rate, berth throughput, counts of berth, average number of vessels waiting and average waiting time. Further, the software allows prediction of yearly throughput by utilizing a ship's waiting ratio and other productivity indicators and making calculations based on arrival patterns of ship traffic. As a result, a TOC is able to make strategic decisions on the trade-offs in the optimal operating level of the facility with better predictors of the service factors (ship's waiting ratio) and productivity factors (yearly throughput). Successful implementation of the software would attract more shipping companies and shippers and maximize TOC profits.

Study on APT Penetration Analysis and Plan of Reaction for Secure XaaS (안전한 XaaS 구현을 위한 APT 공격 분석과 대응방안에 관한 연구)

  • Lee, Sun Ho;Kim, DaeYoub
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.841-850
    • /
    • 2015
  • XaaS (Everything as a Service) provides re-usable, fine-grained software components like software, platform, infra across a network. Then users usually pay a fee to get access to the software components. It is a subset of cloud computing. Since XaaS is provided by centralized service providers, it can be a target of various security attacks. Specially, if XaaS becomes the target of APT (Advanced Persistent Threat) attack, many users utilizing XaaS as well as XaaS system can be exposed to serious danger. So various solutions against APT attack are proposed. However, they do not consider all aspects of security control, synthetically. In this paper, we propose overall security checkup considering technical aspect and policy aspect to securely operate XaaS.

A software-assisted comparative assessment of the effect of cement type on concrete carbonation and chloride ingress

  • Demis, S.;Papadakis, V.G.
    • Computers and Concrete
    • /
    • v.10 no.4
    • /
    • pp.391-407
    • /
    • 2012
  • Utilization of supplementary cementing materials (SCM) by the cement industry, as a highly promising solution of sustainable cement development aiming to reduce carbon dioxide emissions, necessitates a more thorough evaluation of these types of materials on concrete durability. In this study a comparative assessment of the effect of SCM on concrete durability, of every cement type as defined in the European Standard EN 197-1 is taking place, using a software tool, based on proven predictive models (according to performance-related methods for assessing durability) developed and wide-validated for the estimation of concrete service life when designing for durability under harsh environments. The effect of Type II additives (fly ash, silica fume) on CEM I type of cement, as well as the effect of every Portland-composite type of cement (and others) are evaluated in terms of their performance in carbonation and chloride exposure, for a service life of 50 years. The main aim is to portray a unified and comprehensive evaluation of the efficiency of SCM in order to create the basis for future consideration of more types of cement to enter the production line in industry.

Building a Private Cloud-Computing System for Greenhouse Control

  • Kim, JoonYong;Lee, Chun Gu;Park, Dong-Hyeok;Park, Heun Dong;Rhee, Joong-Yong
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.440-444
    • /
    • 2018
  • Purpose: Cloud-computing technology has several advantages, including maintenance, management, accessibility, and computing power. A greenhouse-control system utilizing these advantages was developed using a private cloud-computing system. Methods: A private cloud needs a collection of servers and a suite of software tools to monitor and control cloud-computing resources. In this study, a server farm, operated by OpenStack as a cloud platform, was constructed using servers, and other network devices. Results: The greenhouse-control system was developed according to the fundamental cloud service models: infrastructure as a service, platform as a service, and software as a service. This system has four additional advantages - security, control function, public data use, and data exchange. There are several considerations that must be addressed, such as service level agreement, data ownership, security, and the differences between users. Conclusions: When the advantages are utilized and the considerations are addressed, cloud-computing technology will be beneficial for agricultural use.

Utilization of Knowledge Intensive Services for the Innovation of Manufacturers in Korea

  • Lee, Kong-Rae
    • Journal of Technology Innovation
    • /
    • v.12 no.2
    • /
    • pp.209-225
    • /
    • 2004
  • This study aims to explore and understand the role of knowledge intensive service activities in the industrial innovation of Korea. It analyzes public and private service inputs to the innovation of manufacturers. The contribution of KISs to the innovation of both service suppliers and manufacturers was analyzed by using survey questionnaire. The results of the analysis revealed that the contribution of KISs to the innovation capability of manufacturers is significant. Large manufacturers that hold internal capability to supply KISs are also active in using external KISs. The manufacturing firms that utilized KISs intensively proved to be more innovative than those did not. Heavy KISs users also entertained benefits of capability enhancement as they improved monitoring and achieved efficient application of knowledge asset into product and process innovation. The role of public KISs in the innovation of manufacturers appeared to be indirect and done mainly through education and public R&D activities. Direct input, such as public software service, was not utilized as much in service suppliers themselves. The major reason is that public KISs may not be relevant to their actual needs. Manufacturers have implemented both tighter integration of familiar KISs and loosely coupled unfamiliar KISs.

  • PDF

A Study on IISS Software Architecture of Combat Management System for improving modifiability

  • Park, Ji-Yoon;Yang, Moon-Seok;Lee, Dong-Hyeong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.133-140
    • /
    • 2020
  • The IISS(Integrated Interface Storage System) software uses communication methods such as DSS(Data Sharing Service), UDP to perform the function of sending all messages from the Combat Management System to the analytical computer. Because IISS software handles all message used in the Combat Management System, the source code is large and has a highly dependent feature on message changes. Modification of software is a task that requires a lot of labor, such as series of software reliability test. so research has been conducted to reduce software development costs, including minimizing software modifications. In this paper, We study the method of messages receiving and architectural structure improvement to minimize reliance on message changes in the Combat Management System and improve the modifiability. Reduced message dependency by changing the way DSS and UDP protocols are communicated to Packet Sniffing. In addition, Factory Method Pattern were applied to improve the software design. Test comparing existing software and development elements have confirmed that the software has improved its modifiability and reuse.

우리나라 S/W 벤처기업의 경영현황

  • 한계섭;손성호
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2000.11a
    • /
    • pp.26-31
    • /
    • 2000
  • It is said that the focus of managing venture business is currently moving from technology competition to management competition. By the way, the software venture business(SVB) has some weak points in its structural composition and itematization and no professional personnel in other several sections except technology development section. In addition, such basic functions as technology and R & D, finance and accounting, marketing required to the management of business are concentrated on only one man, its representative director. Therefore, this study aims to provide the basic data useful to the establishment of governmental policy in information and communication, to the rearing of the SVB by a local government related to the software, and to the administration of SVB by investigating the actual conditions. This study attempts to examine the literature on venture business and software industry, and its management with a questionnaire about the actual conditions of managing the SVB. The questionnaire is given to 527 local enterprises belonging to the Software Industry Association and to 171 enterprises in the Software Center. This study compromises the characteristics of the SVB, the actual conditions of its technology and R & D, finance and accounting, and marketing. The characteristics of the SVB are classified into categories such as the stage of its growth(the stage of its seed and start-up, the stage of tis development and growth, the stage of its stability and maturity) and the main business(the system integration, the software development for contract, the package software development service, the software-related service). Additionally, the study attempts to analyze positively the actual condition of its management after classified by the areas of business profile, its general management, its technology development, its finance and accounting, and its marketing The result of this study is found that the SVB has a lot of troubles in part of marketing and finance & accounting activity as well as general management. The SVB realizes the importance of the technology development rather than that of management activity including marketing activity. So we expect this study can assist the SVB to establish the business guidelines for own management plans.

  • PDF

Degraded Quality Service Policy with Bitrate based Segmentation in a Transcoding Proxy

  • Lee, Jung-Hwa;Park, Yoo-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.245-250
    • /
    • 2010
  • To support various bandwidth requirements for many kinds of devices such as PC, notebook, PDA, cellular phone, a transcoding proxy is usually necessary to provide not only adapting multimedia streams to the client by transcoding, but also caching them for later use. Due to huge size of streaming media, we proposed the 3 kinds of segmentation - PT-2, uniform, bitrate-based segmentation. And to reduce the CPU cost of transcoding video, we proposed the DQS service policy. In this paper, we simulate the combined our previous two researches that are bitrate-based segmentation and DQS(Degraded Quality Service) policy. Experimental results show that the combined policy outperforms companion schemes in terms of the byte-hit ratios and delay saving ratios.

A Mechanism for Configurable Network Service Chaining and Its Implementation

  • Xiong, Gang;Hu, Yuxiang;Lan, Julong;Cheng, Guozhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3701-3727
    • /
    • 2016
  • Recently Service Function Chaining (SFC) is promising to innovate the network service mode in modern networks. However, a feasible implementation of SFC is still difficult due to the need to achieve functional equivalence with traditional modes without sacrificing performance or increasing network complexity. In this paper, we present a configurable network service chaining (CNSC) mechanism to provide services for network traffics in a flexible and optimal way. Firstly, we formulate the problem of network service chaining and design an effective service chain construction framework based on integrating software-defined networking (SDN) with network functions virtualization (NFV). Then, we model the service path computation problem as an integer liner optimization problem and propose an algorithm named SPCM to cooperatively combine service function instances with a network utility maximum policy. In the procedure of SPCM, we achieve the service node mapping by defining a service capacity matrix for substrate nodes, and work out the optimal link mapping policies with segment routing. Finally, the simulation results indicate that the average request acceptance ratio and resources utilization ratio can reach above 85% and 75% by our SPCM algorithm, respectively. Upon the prototype system, it is demonstrated that CNSC outperforms other approaches and can provide flexible and scalable network services.

An Exploratory Study on the SaaS Adoption Behavior of Small and Medium Sized Company (중소기업의 SaaS 채택의도의 영향요인에 관한 탐색적 연구)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.81-86
    • /
    • 2012
  • The global recession circumstances, cloud computing has emerged as a new paradigm in the business IT sector. This paper focuses on Software as a Service (SaaS) among cloud services. The Technology Acceptance Model (TAM) has been popularly utilized for examining how users come to accept a new technology, but have not yet been employed to handle issues regarding SaaS adoption. This paper aims at developing an exploratory model that examines important factors affecting SaaS adoption of small and medium sized companies. The proposed exploratory model tests a number of hypotheses which integrate TAM related theories with additional imperative constructs such as marketing effort. Thus, the findings of this study can not only help company users gain insights into SaaS adoption, but also help SaaS providers obtain inspiration in their efforts to discover more effective courses of action for developing their service and improving marketing strategy.