• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.041 seconds

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.

Application and development of radiation worker management program (방사선종사자 관리프로그램의 개발 및 적용)

  • Kim, Jeong-Ho;Yoo, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.367-373
    • /
    • 2017
  • The O2O service is an efficient way to operate based on systematic connection of the offline and online states. At present, education, health checkups, and exposure management of radiation workers are separated from offline and online at nuclear-related workplaces. Therefore, we developed a radiation workers management program at the workplace and tried to link online and offline states. After applying the program to the local network, we developed a written employee management system as a computer program and applied it to radiation workers and radiation safety managers at a university hospital in Daejeon using a questionnaire. As a result of the survey, the results of this program can enhance the awareness of safety management and work convenience. There is also a demand for radiation closed workers as well as radiation relative workers. It will be necessary to collect opinions regarding the characteristics of each workplace for the generalization of the radiation workers management program. As a result, real-time radiation safety management and work improvement can be expected through network connections between the workplace, supervisory authority, and related organizations in the future. If a circle structure is formed using the employee management program, development of radiation safety management can be expected.

The Effect of Patent Citation Relationship on Business Performance : A Social Network Analysis Perspective (특허 인용 관계가 기업 성과에 미치는 영향 : 소셜네트워크분석 관점)

  • Park, Jun Hyung;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.127-139
    • /
    • 2013
  • With an advent of recent knowledge-based society, the interest in intellectual property has increased. Firms have tired to result in productive outcomes through continuous innovative activity. Especially, ICT firms which lead high-tech industry have tried to manage intellectual property more systematically. Firm's interest in the patent has increased in order to manage the innovative activity and Knowledge property. The patent involves not only simple information but also important values as information of technology, management and right. Moreover, as the patent has the detailed contents regarding technology development activity, it is regarded as valuable data. The patent which reflects technology spread and research outcomes and business performances are closely interrelated as the patent is considered as a significant the level of firm's innovation. As the patent information which represents companies' intellectual capital is accumulated continuously, it has become possible to do quantitative analysis. The advantages of patent in the related industry information and it's standardize information can be easily obtained. Through the patent, the flow of knowledge can be determined. The patent information can analyze in various levels from patent to nation. The patent information is used to analyze technical status and the effects on performance. The patent which has a high frequency of citation refers to having high technological values. Analyzing the patent information contains both citation index analysis using the number of citation and network analysis using citation relationship. Network analysis can provide the information on the flows of knowledge and technological changes, and it can show future research direction. Studies using the patent citation analysis vary academically and practically. For the citation index research, studies to analyze influential big patent has been conducted, and for the network analysis research, studies to find out the flows of technology in a certain industry has been conducted. Social network analysis is applied not only in the sociology, but also in a field of management consulting and company's knowledge management. Research of how the company's network position has an impact on business performances has been conducted from various aspects in a field of network analysis. Social network analysis can be based on the visual forms. Network indicators are available through the quantitative analysis. Social network analysis is used when analyzing outcomes in terms of the position of network. Social network analysis focuses largely on centrality and structural holes. Centrality indicates that actors having central positions among other actors have an advantage to exert stronger influence for exchange relationship. Degree centrality, betweenness centrality and closeness centrality are used for centrality analysis. Structural holes refer to an empty place in social structure and are defined as efficiency and constraints. This study stresses and analyzes firms' network in terms of the patent and how network characteristics have an influence on business performances. For the purpose of doing this, seventy-four ICT companies listed in S&P500 are chosen for the sample. UCINET6 is used to analyze the network structural characteristics such as outdegree centrality, betweenness centrality and efficiency. Then, regression analysis test is conducted to find out how these network characteristics are related to business performance. It is found that each network index has significant impacts on net income, i.e. business performance. However, it is found that efficiency is negatively associated with business performance. As the efficiency increases, net income decreases and it has a negative impact on business performances. Furthermore, it is shown that betweenness centrality solely has statistically significance for the multiple regression analysis with three network indexes. The patent citation network analysis shows the flows of knowledge between firms, and it can be expected to contribute to company's management strategies by analyzing company's network structural positions.

Simple Mobility Management Protocol Based on P2P for Global IP Mobility Support (글로벌 IP 이동성 지원을 위한 P2P 기반 간단한 이동성 관리 프로토콜)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.12
    • /
    • pp.17-27
    • /
    • 2011
  • Most of the previous mobility management protocols such as IETF MIPv4/6 and its variants standardized by the IETF do not support global seamless handover because they require partially changes of the existing network infrastructure. In this article, we propose a simple mobility management protocol (SMMP) which can support global seamless handover between homogeneous or heterogeneous wireless networks. To do this, the SMMP employs separate location management function as DMMS to support global user and service mobility and the bidirectional tunnels are dynamically constructed to support seamless IP mobility by using the IEEE MIH extension server, which is extended the IEEE 802.21 MIH standards. The detailed architecture and functions of the SMMP have been designed. Finally, the mathematical analysis and the simulation have been done. The performance results show the proposed SMMP outperforms the existing MIPv6 and HMIPv6 in terms of handover latency, packet loss, pear signal noise ratio (PSNR).

Time-based DHT Peer Searching Scheme for P2P VOD Service (P2P VOD 서비스를 위한 시간 기반 DHT 피어 탐색 기법)

  • Suh, Chedu;Ko, Choonghyo;Choi, Changyeol;Choi, Hwangkyu
    • Journal of Digital Contents Society
    • /
    • v.15 no.2
    • /
    • pp.251-261
    • /
    • 2014
  • In the typical P2P VOD system, it is very important to develop the fast and efficient peer searching scheme since the peers frequently join and leave to/from P2P system. This paper proposes a new peer searching scheme for P2P VOD system based on DHT network environment. The proposed scheme constructs DHT network by managing the peers having close playback starting times and close network locations into a peer all together. The peer information is mapped onto DHT nodes by hashing the key values each of which consists of the starting time and network location of the peer. From the simulation results, the number of messages required to search the partner peers are decreased, and the number of buffer maps exchanging among the peers are also decreased. The proposed scheme can reduce the average network distances among the partner peers. As a result, the proposed scheme makes routing more efficient and it saves the network resources by decreasing communication traffic overhead.

Development of Activity Pattern Analysis and its Application to the Health Check-up Service Organization (활동패턴분석방법론의 개발과 적용 : 종합건강검진서비스 적용사례를 중심으로)

  • Moon, Jae Ung;Ahn, Joong Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.69-92
    • /
    • 2013
  • Activity Pattern Analysis(APA) is the methodology to Design the functions of information systems, to Estimate the monetary value of IS based on Activity Based Costing, to Acquire feasibility of IT Project. This study shows APA case in Health Check-up Service Organization (G-Center) and the Utility of APA. G-Center had acquired Five Outcomes through APA: (1) IT Strategy, (2) IT Project Goals, (3) Transformed Business Process, (4) Functional Blueprint of Information Systems, (5) IT Project budget and its feasibility. APA consists of three analysis processes; Activity Separation, Activity Rearrangement, Activity Costing. APA is flexible in determinating the range and the time of analysis, and is able to expand the Actors(as analysis objects) based on the purpose of analysis by researcher. Eventually APA can be used to do internal IT Management effectively.

An Efficient Hierarchical Authentication Scheme through Brokers in Mobile IPv6 Networks (브로커를 통한 모바일 IPv6 네트워크의 효율적인 계층적 인증기법)

  • Jung, Ha-Gwon;Jeong, Jong-Pil
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.15-26
    • /
    • 2011
  • As quick and secure mobility service is becoming a critical issue in the ubiquitous environment. Internet Engineering Task Force (IETF) has done a lot of meaningful work in order to cope with the critical issues, which is a key technology of guaranteeing the legally and safely using of network resources, they has proposed Hierarchical Mobile IPv6 (HMIPv6) to complement for such problems as handover latency and signaling overhead in existing MIPv6. Most of the current research about HMIPv6 focuses on how to optimize the interactive processes between the HMIPv6 and AAA (Authentication, Authorization, Accounting) protocol. This paper describes a cost-effective hierarchical authentication scheme, which makes its focus on minimizing the authentication latency in AAA processing. In this scheme, a hierarchical AAA architecture is proposed, in which the AAA servers are deployed on the Mobility Anchor Point (MAP), the Root AAA server manages several Leaf AAA servers and the Brokers on behalf of the AAA server in home domain. The simulation results shows that the proposed scheme reduces the handoff and authentication latency evidently compared to the previous traditional authentication combination modeling.

A Real-Time Performance Enhancement Scheme for Ethernet-based DAVIC Residential Network (이더네트 기반 DAVIC 주거망에서의 실시간 성능향상 기법)

  • Lee, Jung-Hoon;Kim, Sung-Baik;Kim, Tae-Woong
    • Journal of KIISE:Information Networking
    • /
    • v.27 no.2
    • /
    • pp.197-205
    • /
    • 2000
  • This paper proposes and evaluates a scheme which enhances real-time performance on the Ethernet-based residential network where cable length is very short and most of traffic passes through a specific device. The scheme aims at enhancing deadline meet ratio of the real-time traffic, for example, video stream by means of applying the functionalities such as queue discrimination and early packet discard as well as maintaining network load properly. The design includes the description on hardware interfaces along with the software modules such as scheduler, device driver and connection manager. The simulation results via SMPL suggest that the proposed network can be used as a cost-effective residential network. We also measure the permissible bandwidth for non-real-time traffic without degrading the performance of real-time traffic.

  • PDF

The Component Design of a Diverse Sensing Data Recognition Trigger (다양한 센싱 데이터 인식 트리거 컴포넌트 설계)

  • Kim, KyeongOg;Ban, KyeongJin;Ryu, NamHoon;Jang, MoonSuk;Kim, EungKon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.770-775
    • /
    • 2009
  • Along with the advance of USN technology in a human-oriented informatization society these days, society is quickly changing into a ubiquitous computing society in which information even between objects can be organically combined and utilized. In order to successfully build such a ubiquitous computing society, it is indispensable to have core USN technologies such as USN sensor nodes, sensor networks, USN middleware, and USN applied services that efficiently manage sensing information collected from sensor nodes, and support the abstraction function for the composition of sensor networks. In order to process the transmission event of sensing values that are generated from various USN terminal devices, this study designs a process that performs the abstraction of data for the efficient process of diverse sensing values transferred from USN and RFID terminal devices.

  • PDF

A Study on Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 아키텍처에 관한 연구)

  • Kim, Chang-Su;Kim, Tak-Chen;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.782-785
    • /
    • 2007
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

  • PDF