• Title/Summary/Keyword: Versions Management

Search Result 121, Processing Time 0.035 seconds

A Study on Factors Influencing the Usage Level and Performance of EDI (EDI 활용수준 및 성과에 영향을 미치는 요인에 관한 연구)

  • Noh, Young;Chung, Yoon
    • Asia pacific journal of information systems
    • /
    • v.11 no.3
    • /
    • pp.105-126
    • /
    • 2001
  • The objective of research is to find out exogenous variables that influence the usage and performance EDI in the Korea firms. Specifically the goals of this research are; (1) to examine relationships between exogenous variables, such as management, technology, inter-firm relationship characteristics, and EDI performance, and (2) to measure EDI volume, EDI diversity, EDI depth among Korea firms. The questionnaire consists of two versions; One for the EDI system managers and the other for the EDI users. The analysis of this study is designed as cross level to examine the causal relationship among variables in different analysis level. The reliability and validity of data was tested by explanatory factor analysis, Cronbach's alpha coefficient, confirmatory factor analysis, and correlation analysis. Also, the structural equation model(SEM) analysis was performed to test the usefulness of the model. The analysis results revealed that education level, IS growth, trust, support, power are major influential variables on the usage level and performance of EDI. Especially, persuasive power turned out to be more important than coercive power, and technical financial support from organizations was also found to be a significant variables.

  • PDF

Android Real Target Porting Application Software Development (안드로이드 리얼 타깃 포팅 응용 소프트웨어 개발)

  • Hong, Seon Hack;Nam Gung, Il Joo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.1-10
    • /
    • 2011
  • In this paper, we implemented the Android NDK porting application with Eclipse(JDK) ADT and TinyOS 2.0. TinyOS and Cygwin are component based embedded system and an Open-source basis for interfacing with sensor application from H-mote. Cygwin is a collection of tools for using the Linux environment for commercially released with x86 32 bit and 64 bit versions of Windows. TinyOS-2. x is a component based embedded OS by UC Berkeley and is an Open-source OS designed for interfacing the sensor application with specific C-language. The results of Android porting experiment are described to show the improvement of sensor interfacing functionality under the PXA320 embedded RTOS platform. We will further more develop the software programming of Android porting under Embedded platform and enhance the functionality of the Android SDK with mobile gaming and kernel programming under sensor interfacing activity.

Management Strategy of Hotspot Temporal Data using Minimum Overlap (최소 중복을 이용한 Hotspot 시간 데이터의 관리)

  • Kang, Ji-Hyung;Yun, Hong-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.196-199
    • /
    • 2005
  • We propose a strategy to manage temporal data which are occurred on scientific applications. Firstly, We define LB and RB to separate temporal data, and entity versions to be stored in past, current, future segments. Also, We describe an algorithm to migrate temporal data with hotspot distribution among segments. The performance evaluation of average response time and space utilization is conducted. Average response time between two methods is similar, and spare is saved in proposed method.

  • PDF

A Software Consistency Management Model using Operation History (연산 히스토리를 이용한 소프트웨어 일관성 관리 모델)

  • Rho, Jungkyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.61-69
    • /
    • 2002
  • Software documents consist of a number of logical objects and relationships between them, and a lot of versions are generated during software development. When an object is changed, it is desirable to easily identify the change and the range of change propagation for efficient software development and maintenance. However, it is difficult to identify it in a coarse-grained object management model. To solve this problem, fine-grained object management is required. In this paper, I propose a consistency management model for fine-grained software objects based on operation history applied to edit software objects. This paper presents a formal model for consistency management at the fine-grained level. Consistency between documents is managed using dependency between objects and kinds of the operations applied to the objects so that unnecessary change propagation can be avoided.

  • PDF

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli;Naima, Hadj Said;Adda, Ali Pacha
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.152-173
    • /
    • 2017
  • Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

A Novel Node Management in Hadoop Cluster by using DNA

  • Balaraju. J;PVRD. Prasada Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.134-140
    • /
    • 2023
  • The distributed system is playing a vital role in storing and processing big data and data generation is speedily increasing from various sources every second. Hadoop has a scalable, and efficient distributed system supporting commodity hardware by combining different networks in the topographical locality. Node support in the Hadoop cluster is rapidly increasing in different versions which are facing difficulty to manage clusters. Hadoop does not provide Node management, adding and deletion node futures. Node identification in a cluster completely depends on DHCP servers which managing IP addresses, hostname based on the physical address (MAC) address of each Node. There is a scope to the hacker to theft the data using IP or Hostname and creating a disturbance in a distributed system by adding a malicious node, assigning duplicate IP. This paper proposing novel node management for the distributed system using DNA hiding and generating a unique key using a unique physical address (MAC) of each node and hostname. The proposed mechanism is providing better node management for the Hadoop cluster providing adding and deletion node mechanism by using limited computations and providing better node security from hackers. The main target of this paper is to propose an algorithm to implement Node information hiding in DNA sequences to increase and provide security to the node from hackers.

Stochastic Weapon Target Assignment Problem under Uncertainty in Targeting Accuracy (명중률의 불확실성을 고려한 추계학적 무장-표적 할당 문제)

  • Lee, Jinho;Shin, Myoungin
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.41 no.3
    • /
    • pp.23-36
    • /
    • 2016
  • We consider a model that minimizes the total cost incurred by assigning available weapons to existing targets in order to reduce enemy threats, which is called the weapon target assignment problem (WTAP). This study addresses the stochastic versions of WTAP, in which data, such as the probability of destroying a target, are given randomly (i.e., data are identified with certain probability distributions). For each type of random data or parameter, we provide a stochastic optimization model on the basis of the expected value or scenario enumeration. In particular, when the probabilities of destroying targets depending on weapons are stochastic, we present a stochastic programming formulation with a simple recourse. We show that the stochastic model can be transformed into a deterministic equivalent mixed integer programming model under a certain discrete probability distribution of randomness. We solve the stochastic model to obtain an optimal solution via the mixed integer programming model and compare this solution with that of the deterministic model.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

An Algorithm for Managing Storage Space to Maximize the CPU Availability in VOD Systems (VOD 시스템에서 CPU 가용성을 최대화하는 저장공간관리 알고리즘)

  • Jung, Ji-Chan;Go, Jae-Doo;Song, Min-Seok;Sim, Jeong-Seop
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.3
    • /
    • pp.140-148
    • /
    • 2009
  • Recent advances in communication and multimedia technologies make it possible to provide video-on-demand(VOD) services and people can access video servers over the Internet at any time using their electronic devices, such as PDA, mobile phone and digital TV. Each device has different processing capabilities, energy budgets, display sizes and network connectivities. To support such diverse devices, multiple versions of videos are needed to meet users' requests. In general cases, VOD servers cannot store all the versions of videos due to the storage limitation. When a device requests a stored version, the server can send the appropriate version immediately, but when the requested version is not stored, the server first converts some stored version to the requested version, and then sends it to the client. We call this conversion process transcoding. If transcoding occurs frequently in a VOD server, the CPU resource of the server becomes insufficient to response to clients. Thus, to admit as many requests as possible, we need to maximize the CPU availability. In this paper, we propose a new algorithm to select versions from those stored on disk using a branch and bound technique to maximize the CPU availability. We also explore the impact of these storage management policies on streaming to heterogeneous users.

Design and Implementation of the Management Agent for Mobile Devices based on OMA DM (이동 단말기를 위한 OMA DM 기반 관리 에이전트 설계 및 구현)

  • Shin, Jae-Young;Jung, Young-Woo;Ko, Kwang-Sun;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.61-68
    • /
    • 2008
  • With the rapid advancement of mobile communication, mobile devices are evolving into convergence devices with various multimedia capabilities. But, high performance of devices demands complicated settings, and thus contains latent error possibilities, and poor system performance caused by the collision of different softwares. To solve these problems, device management becomes an important issue. Open Mobile Alliance(OMA) developed OMA DM(Device Management), which is a device management standard. Recently released OMA DM v1.2 provides improved mobile device management methods compared to earlier versions. This paper introduces design and implementation of OMA DM v1.2 based management agent. By using Tree and Description Serialization(TNDS) for acquiring, adding, and editing objects in the mobile devices, it provides more effective device management with small amount of network traffic.