• Title/Summary/Keyword: 네트워크구조적특성

Search Result 784, Processing Time 0.027 seconds

Service Level Agreement Specification Model of Software and Its Mediation Mechanism for Cloud Service Broker (클라우드 서비스 브로커를 위한 소프트웨어의 서비스 수준 합의 명세 모델과 중개 방법)

  • Nam, Taewoo;Yeom, Keunhyuk
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.591-600
    • /
    • 2015
  • SLA (Service Level Agreement) is an essential factor that must be guaranteed to provide a reliable and consistent service to user in cloud computing environment. Especially, a contract between user and service provider with SLA is important in an environment using a cloud service brokerage. The cloud computing is classified into IaaS, PaaS, and SaaS according to IT resources of the various cloud service. The existing SLA is difficult to reflect the quality factors of service, because it only considers factors about the physical Network environment and have no methodological approach. In this paper, we suggested a method to specify the quality characteristics of software and proposed a mechanism and structure that can exchange SLA specification between the service provider and consumer. We defined a meta-model for the SLA specification in the SaaS level, and quality requirements of the SaaS were described by the proposed specification language. Through case studies, we verified proposed specification language that can present a variety of software quality factors. By using the UDDI-based mediation process and architecture to interchange this specification, it is stored in the repository of quality specifications and exchanged during service binding time.

Thermal Properties and Microencapsulation of a Phosphate Flame Retardant with a Epoxy Resin (에폭시 수지를 이용한 인계 난연제의 마이크로캡슐화 및 열적 특성 연구)

  • Baek Kyung-Hyun;Lee Jun-Young;Hong Sang-Hyun;Kim Jung-Hyun
    • Polymer(Korea)
    • /
    • v.28 no.5
    • /
    • pp.404-411
    • /
    • 2004
  • The microcapsules containing triphenyl phosphate (TPP), a flame retardant, were prepared by phase-inversion emulsification technique using the epoxy resin (Novolac type) with excellent physical properties and network structure. This microencapsulation process was adopted for the protection of TPP evaporation and wetting of polymer composite during the polymer blend processing. The TPP, epoxy resin and mixed surfactants were emulsified to oil in water (O/W) by the phase inversion technology and then conducted on the crosslinking of epoxy resin by in-situ polymerization. The capsule size and size distribution of TPP capsules was controlled by mixed surfactant ratio, concentration and TPP contents, The formation and thermal property of TPP capsules were measured by differential scanning calorimetry and thermogravimetric analysis. The morphology and size of TPP capsules were also investigated by scanning and transmission electron microscopies. As the surfactant concentration increased, the TPP capsules were more spherical and mono-dispersed at the same weight ratio of mixed surfactants (F127: SDBS).

Application and development of radiation worker management program (방사선종사자 관리프로그램의 개발 및 적용)

  • Kim, Jeong-Ho;Yoo, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.367-373
    • /
    • 2017
  • The O2O service is an efficient way to operate based on systematic connection of the offline and online states. At present, education, health checkups, and exposure management of radiation workers are separated from offline and online at nuclear-related workplaces. Therefore, we developed a radiation workers management program at the workplace and tried to link online and offline states. After applying the program to the local network, we developed a written employee management system as a computer program and applied it to radiation workers and radiation safety managers at a university hospital in Daejeon using a questionnaire. As a result of the survey, the results of this program can enhance the awareness of safety management and work convenience. There is also a demand for radiation closed workers as well as radiation relative workers. It will be necessary to collect opinions regarding the characteristics of each workplace for the generalization of the radiation workers management program. As a result, real-time radiation safety management and work improvement can be expected through network connections between the workplace, supervisory authority, and related organizations in the future. If a circle structure is formed using the employee management program, development of radiation safety management can be expected.

Social Network Analysis for New Product Recommendation (신상품 추천을 위한 사회연결망분석의 활용)

  • Cho, Yoon-Ho;Bang, Joung-Hae
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.183-200
    • /
    • 2009
  • Collaborative Filtering is one of the most used recommender systems. However, basically it cannot be used to recommend new products to customers because it finds products only based on the purchasing history of each customer. In order to cope with this shortcoming, many researchers have proposed the hybrid recommender system, which is a combination of collaborative filtering and content-based filtering. Content-based filtering recommends the products whose attributes are similar to those of the products that the target customers prefer. However, the hybrid method is used only for the limited categories of products such as music and movie, which are the products whose attributes are easily extracted. Therefore it is essential to find a more effective approach to recommend to customers new products in any category. In this study, we propose a new recommendation method which applies centrality concept widely used to analyze the relational and structural characteristics in social network analysis. The new products are recommended to the customers who are highly likely to buy the products, based on the analysis of the relationships among products by using centrality. The recommendation process consists of following four steps; purchase similarity analysis, product network construction, centrality analysis, and new product recommendation. In order to evaluate the performance of this proposed method, sales data from H department store, one of the well.known department stores in Korea, is used.

  • PDF

Design of a Real-Time Certificate Status Validation Mechanism Using Identity Information Hash Value of Signer (서명자의 신원정보 해쉬값을 이용한 실시간 인증서 상태 검증 메커니즘의 설계)

  • Kim Hyun-Chul;Kim Jung-Jae;Lee Jong-Hee;Oh Hae-Seok;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.2 s.105
    • /
    • pp.147-154
    • /
    • 2006
  • The certificate status validation mechanism is a critical component of a public key infrastructure based on certificate system. The most generally mechanisms used these days are the use of the certificate revocation list and the real-time certificate status protocol. But the certificate revocation list can not give the real-time certificate status because the certificate is being delivered periodically, and the real-time certificate status protocol method will generate a concentrated load to the server because the protocol in the central server will be accessed whenever a certification is necessary. It will also take a long time to validate the certificate because each trade has to send mass information through the network. This paper will present that real-time validation is guaranteed as the real-time certificate status protocol method and the traffic congestion in the network Is reduced in a way that the certification would be requested using the user information hash value and would be validated using the user information kept in the certification authorities and the service providers. Based on the this study, we suggest a real-time certificate status validation mechanism which can reduce the certificate status validation time using the signed user information hash value. And we confirm speed of certificate status verification faster than existing CRL(Certificate Revocation List) and OCSP(Online Certificate Status Protocol) method by test.

A Study on the Evolution of Logistics Policy and Response on Low Carbon Economy in China: Focused on 12th 5-Year Plan (중국 물류정책의 변화와 저탄소 경제 대응에 관한 연구 - 제12차 5개년 계획을 중심으로 -)

  • Seo, Su-Wan
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.4
    • /
    • pp.329-353
    • /
    • 2010
  • This paper deal with government logistics policy in related low carbon in China. The government policy of promoting low-carbon way is more dependent on the top-down enforcement rather than voluntary market principles. It will succeeded in transforming the environment-friendly image, to focus on creating a mindset the company can go on voluntary carbon-reduction. The three factors of low-carbon economy and the new energy and industrial development policy is technology and funding, and that most of the government's policy has a crucial role. Due to the nature of the Chinese economy, government policies impact on the development of the industry is very important, and even for China's industrial restructuring of the logistics industry in the areas of government policy support for green economic growth, its role is expected to be very large. In Future, Chinese government will promote low carbon policies through the optimization of the logistics network to reduce energy waste, pursue the low carbon-reduction of logistics machinery and equipment, and develop an mode to appropriate demand for green low-carbon economic growth.

Employment Relations of the Low-Wage Production Base : Volkswagen and Hyundai in Central and Eastern Europe (저임금 생산기지의 고용관계 : 폭스바겐과 현대기아 중동부유럽 자회사를 중심으로)

  • Kim, Chulsik
    • Korean Journal of Labor Studies
    • /
    • v.24 no.1
    • /
    • pp.65-105
    • /
    • 2018
  • This study examines the employment relations of TNC subsidiaries in Central and Eastern Europe(CEE). Specifically, this study analyzes the employment relations of Volkswagen subsidiaries, which has led the restructuring the CEE's automobile industry since the collapse of socialist regimes, and Hyundai subsidiaries, which has sought to cast employment relations through Greenfield Investment as a latecomer. After the collapse of socialism, with the massive inflow of foreign direct investment and the social legacy of weak labor unions, CEE has been included in the global production network as low-wage production base. Both VW and Hyundai have entered the CEE with their own characteristics and global strategies that have been developed in their home countries and have developed the local production. In the process, both have formed local employment relations, combining low-wage, unstable employment, and weak labor unions of CEE under their own strategy. In recent years, however, it has been doubtful of the sustainability of employment relations based on the advantages of low-wage production bases, as the pools of low-wage workforce decline and new union movements occur in CEE. These changes in CEE are an indication of the inherent contradiction of low-wage production base strategies.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

A Study on Estimating the Crossing Speed of Mobility Handicapped for the Activation of the Smart Crossing System (스마트횡단시스템 활성화를 위한 교통약자의 횡단속도 추정)

  • Hyung Kyu Kim;Sang Cheal Byun;Yeo Hwan Yoon;Jae Seok Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.87-96
    • /
    • 2022
  • The traffic vulnerable, including elderly pedestrians, have a relatively low walking speed and slow cognitive response time due to reduced physical ability. Although a smart crossing system has been developed and operated to improve problem, it is difficult to operate a signal that reflects the appropriate walking speed for each pedestrian. In this study, a neural network model and a multiple regression model-based traversing speed estimation model were developed using image information collected in an area with a high percentage of traffic vulnerability. to support the provision of optimal walking signals according to real-time traffic weakness. actual traffic data collected from the urban traffic network of Paju-si, Gyeonggi-do were used. The performance of the model was evaluated through seven selected indicators, including correlation coefficient and mean absolute error. The multiple linear regression model had a correlation coefficient of 0.652 and 0.182; the neural network model had a correlation coefficient of 0.823 and 0.105. The neural network model showed higher predictive power.

Perceptions of Information Technology Competencies among Gifted and Non-gifted High School Students (영재와 평재 고등학생의 IT 역량에 대한 인식)

  • Shin, Min;Ahn, Doehee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.2
    • /
    • pp.339-358
    • /
    • 2015
  • This study was to examine perceptions of information technology(IT) competencies among gifted and non-gifted students(i.e., information science high school students and technical high school students). Of the 370 high school students surveyed from 3 high schools(i.e., gifted academy, information science high school, and technical high school) in three metropolitan cities, Korea, 351 students completed and returned the questionnaires yielding a total response rate of 94.86%. High school students recognized the IT professional competence as being most important when recruiting IT employees. And they considered that practice-oriented education was the most importantly needed to improve their IT skills. In addition, the most important sub-factors of IT core competencies among gifted academy students and information science high school students were basic software skills. Also Technical high school students responded that the main network and security capabilities were the most importantly needed to do so. Finally, the most appropriate training courses for enhancing IT competencies were recognized differently among gifted and non-gifted students. Gifted academy students responded that the 'algorithm' was the mostly needed for enhancing IT competencies, whereas information science high school students responded that 'data structures' and 'computer architecture' were mostly needed to do. For technical high school students, they responded that a 'programming language' course was the most needed to do so. Results are discussed in relations to IT corporate and school settings.