• Title/Summary/Keyword: service oriented architecture

Search Result 337, Processing Time 0.025 seconds

The Recovery Techniques on the Web Services-based e-Engineering Framework for Reliability Improvement (웹 서비스 기반 e-엔지니어링 프레임워크의 신뢰성 향상을 위한 회복 기법)

  • Kim, Dong-Uk;Kuk, Seung-Hak;Kim, Hyeon-Soo;Lee, Jai-Kyung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.76-80
    • /
    • 2008
  • In order to reduce a product life cycle and to improve productivity, it is required to automate the design/analysis processes. In general, since the design/analysis processes need a lot of time and resources, the various engineering resources should be integrated and utilized effectively in the distributed environments. KIMM (Korea Institute of Machinery and Materials) constructed the SOA-based e-Engineering framework to automate the execution of the design/analysis processes and to integrate the engineering resources in the distributed environments. This paper presents the concepts and the structures of the e-Engineering framework. Also it classifies the exceptional cases that will be able to occur in the e-Engineering framework and suggests the recovery techniques from the exceptional cases with viewpoints of the engineering process and the task, respectively.

Web-based Open Distributed HW/SW Codesign Environment (웹에 기반한 개방형 분산 HW/SW 통합설계 환경)

  • 김승권;김종훈
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.4
    • /
    • pp.476-489
    • /
    • 1999
  • HW/SW codesign is integrated design of systems implemented using both hardware and software components. Many design tools has been developed to support this new paradigm, so far. Current codesign tools are not widely used as been expected because of variety problems - rapidly evolving technology, platform dependency, absence of standard specification method, inconsistent user interface, varying target system, different functionality In this paper, we propose a web-based distributed HW/SW codesign environment to remedy this kinds of problem. Our codesign environment has object-based 3 tier client/server architecture. It supports collaborative workspace through session service. Fully object-oriented design of user interface(OOUI) enables easy extension without change of user Interface. Furthermore it contains transaction server and security server for efficient and safe transfer of design data. To show a validity of our design, we developed prototype of web-based HW/SW codesign environment called WebCEDA. Our model of HW/SW codesign can be used for web-based generic CAD tools.

  • PDF

An Automatic Business Process Model Generation Tool Using Business Process Family Models (비즈니스 프로세스 패밀리 모델을 이용한 비즈니스 프로세스 모델 자동 생성 도구)

  • Hong, Min-Woo;Moon, Mi-Kyeong;Yeom, Keun-Hyuk
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.8
    • /
    • pp.479-492
    • /
    • 2008
  • Nowadays, lots of requirements are changed quickly and variously. So, we need the ability to support the change of business process which is the asset of a company. To support this ability, the core asset that supports analyzing and describing about changes of business process should be exist from generating phase of a business process model. And a business process model that is satisfied the changed requirements should be automatically generated using core assets. In this paper, we present a business process family model (BPFM) which represents the commonalities and the variabilities of a set of business processes, we propose the automated tool using variabilities of BPFM and decision-making information for generation of business process model that is satisfied the changed requirements.

Space Reengineering and Amended UML Approach to Requirement Analysis for Ubiquitous Smart Space Development (유비쿼터스 지능 공간 요구분석을 위한 공간재설계법 및 수정된 UML 접근법)

  • Kwon, Oh-Byung;Lee, Nam-Yeon;Sim, Jae-Mun
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.99-125
    • /
    • 2007
  • Recently, as the development of Ubiquitous Smart Space (USS) such as U-City is proliferating, preparing a development methodology dedicated to USS characteristics has become one of the crucial issues to increase the productivity of the USS projects. However, since the legacy development methodologies such as traditional UML do not consider the critical components of ubiquitous computing space such as context-awareness, service oriented architecture and multi-agent communication, they are not optimized for USS analysis and design. Hence, the purpose of this paper is to propose a USS-sophisticated development methodology. To do so, a hybrid approach, BPR-USS for space reengineering and UML-USS by amending UML with corresponding toolkit based on StarUML has been implemented. To show the feasibility of the approach described in this paper, an illustrative example with an actual USS development project for a multiplex space in Seoul is shown.

  • PDF

Content Description on a Mobile Image Sharing Service: Hashtags on Instagram

  • Dorsch, Isabelle
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.2
    • /
    • pp.46-61
    • /
    • 2018
  • The mobile social networking application Instagram is a well-known platform for sharing photos and videos. Since it is folksonomy-oriented, it provides the possibility for image indexing and knowledge representation through the assignment of hashtags to posted content. The purpose of this study is to analyze how Instagram users tag their pictures regarding different kinds of picture and hashtag categories. For such a content analysis, a distinction is made between Food, Pets, Selfies, Friends, Activity, Art, Fashion, Quotes (captioned photos), Landscape, and Architecture image categories as well as Content-relatedness (ofness, aboutness, and iconology), Emotiveness, Isness, Performativeness, Fakeness, "Insta"-Tags, and Sentences as hashtag categories. Altogether, 14,649 hashtags of 1,000 Instagram images were intellectually analyzed (100 pictures for each image category). Research questions are stated as follows: RQ1: Are there any differences in relative frequencies of hashtags in the picture categories? On average the number of hashtags per picture is 15. Lowest average values received the categories Selfie (average 10.9 tags per picture) and Friends (average 11.7 tags per picture); for highest, the categories Pet (average 18.6 tags), Fashion (average 17.6 tags), and Landscape (average 16.8 tags). RQ2: Given a picture category, what is the distribution of hashtag categories; and given a hashtag category, what is the distribution of picture categories? 60.20% of all hashtags were classified into the category Content-relatedness. Categories Emotiveness (about 4.38%) and Sentences (0.99%) were less often frequent. RQ3: Is there any association between image categories and hashtag categories? A statistically significant association between hashtag categories and image categories on Instagram exists, as a chi-square test of independence shows. This study enables a first broad overview on the tagging behavior of Instagram users and is not limited to a specific hashtag or picture motive, like previous studies.

Efficient Evaluation of Shared Predicates for XForms Page Access Control (XForms 페이지의 접근제어를 위한 공유 조건식의 효율적 계산 방법)

  • Lee, Eun-Jung
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.441-450
    • /
    • 2008
  • Recently, access control on form-based web information systems has become one of the useful methods for implementing client systems in a service-oriented architecture. In particular, XForms language is being adopted in many systems as a description language for XML-based user interfaces and server interactions. In this paper, we propose an efficient algorithm for the evaluation of XPath-based access rules for XForms pages. In this model, an XForms page is a sequence of queries and the client system performs user interface realization along with XPath rule evaluations. XPath rules have instance-dependent predicates, which for the most part are shared between rules. For the efficient evaluation of shared predicate expressions in access control rules, we proposed a predicate graph model that reuses the previously evaluated results for the same context node. This approach guarantees that each predicate expression is evaluated for the relevant xml node only once.

Design and Implementation of IEC 61162-4 based TLI Protocol for e-Navigation on Ship (선박의 통합정보처리를 위한 IEC 61162-4 기반 TLI 프로토콜 설계 및 구현)

  • Jang, Kil-Woong;Lee, Jang-Se;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.351-359
    • /
    • 2010
  • In this paper, we propose a transmission algorithm of the TLI protocol of the IEC 61162-4 standard to perform the e-Navigation on ship, and we design and implement the TLI protocol according to the proposed algorithm. The implemented protocol is a TCP/IP based protocol, and is a network protocol with the MAU and LNA components proposed in the IEC 61162-4 standard. In addition, it makes a data transmission over the network architecture based on client/server network model. In the implemented protocol, there are a communication between the MAU and the LNA in one host, and also a communication between the LNA and the LNA in each other hosts. In order to provide a variety of service in a host, every client host has a LNA and multiple MAUs. According to the standard specification and the proposed transmission algorithm, we designed and implemented the TLI protocol using object-oriented mechanism. We carried out the experiment under a simple network model similar to real ship environment, and confirmed that it successfully transmits and receives data between the hosts.

Design and Implementation of User-Oriented Virtual Dedicate Network System Based on Software-Defined Wide Area Network (SD-WAN 기반의 사용자 중심 가상 전용 네트워크 시스템 설계 및 구현)

  • Kim, Yong-hwan;Kim, Dongkyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1081-1094
    • /
    • 2016
  • KREONET is a principal national R&E network running by KISTI in Korea. It uniquely provides production research network services for around 200 non-profit research and educational organizations, based on hybrid (IP and non-IP) network infrastructure. However, KREONET is limited to meet various needs of new network services for advanced Science & Technology (S&T) users because its infrastructure is inherently derived form classical hardware-based, fixed and closed environments. So, KREONET-S is designed to provide advanced S&T services to catch up with time-to-research and time-to-collaboration. In this paper, we present a system architecture of KREONET-S based on network infrastructure that consists of data and control planes separately. Furthermore, we propose and describe VDN service which is capable of building a virtual dedicate & bandwidth-guaranteed network for S&T group dynamically. we implement VDN application on KREONET-S and then perform performance analysis for proving that KREONET-S system and VDN application can be a good solutions to cope with new network paradigms for various advanced S&T applications and users.

Network Slice Selection Function on M-CORD (M-CORD 기반의 네트워크 슬라이스 선택 기능)

  • Rivera, Javier Diaz;Khan, Talha Ahmed;Asif, Mehmood;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.21 no.2
    • /
    • pp.35-45
    • /
    • 2018
  • As Network Slicing functionality gets applied to mobile networking, a mechanism that enables the selection of network slices becomes indispensable. Following the 3GPP Technical Specification for the 5G Architecture, the inclusion of the Network Slice Selection Function (NSSF) in order to leverage the process of slice selection is apparent. However, actual implementation of this network function needs to deal with the dynamic changes of network instances, due to this, a platform that supports the orchestration of Virtual Network Functions (VNF) is required. Our proposed solution include the use of the Central Office Rearchitected as a Data Center (CORD) platform, with the specified profile for mobile networks (M-CORD) that integrates a service orchestrator (XOS) alongside solutions oriented to Software Defined Networking (SDN), Network Function Virtualization (VNF) and virtual machine management through OpenStack, in order to provide the right ecosystem where our implementation of NSSF can obtain slice information dynamically by relying on synchronization between back-end services and network function instances.

A Methodology for Translation of Operating System Calls in Legacy Real-time Software to Ada (Legacy 실시간 소프트웨어의 운영체제 호출을 Ada로 번역하기 위한 방법론)

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2874-2890
    • /
    • 1997
  • This paper describes a methodology for translation of concurrent software expressed in operating system (OS) calls to Ada. Concurrency is expressed in some legacy software by OS calls that perform concurrent process/task control. Examples considered in this paper are calls in programs in C to Unix and calls in programs in CMS-2 to the Executive Service Routines of ATES or SDEX-20 other software re/reverse engineering research has focused on translating the OS calls in a legacy software to calls to another OS. In this approach, the understanding of software has required knowledge of the underlying OS, which is usually very complicated and informally documented. The research in this paper has focused on translating the OS calls in a legacy software into the equivalent protocols using the Ada facilities. In translation to Ada, these calls are represented by Ada equivalent code that follow the scheme of a message-based kernel oriented architecture. To facilitate translation, it utilizes templates placed in library for data structures, tasks, procedures, and messages. This methodology is a new approach to modeling OS in Ada in software re/reverse engineering. There is no need of knowledge of the underlying OS for software understanding in this approach, since the dependency on the OS in the legacy software is removed. It is portable and interoperable on Ada run-time environments. This approach can handle the OS calls in different legacy software systems.

  • PDF