• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.034 seconds

Design and Implementation of Internet GIS based on ObjectWeb (ObjectWeb을 기반으로 한 Internet GIS의 설계 및 구현)

  • Kang, Myoung-Soo;Choy, Yoon-Chul;Koh, Kyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.4
    • /
    • pp.441-447
    • /
    • 2000
  • In this paper, we design and implement an Internet GIS based on ObjectWeb, which makes to use various distributed services and object paradigm. We use CORBA, which is the standard of distributed object middleware and supports interoperability and reusability regardless of the execution environment and the implementation language of a distributed code, so that it easily extends established systems in networking environment and accesses distributed heterogeneous spatial data. Our method distributes parts of user interactive tasks to clients to reduce and to improve the system performance while existing approaches concentrate all workloads on a server. We implement a travel information system on the developed IGIS. Users receive services from remote servers employing a Java client system running on a web browser.

  • PDF

A Scheme of Embedded System Performance Evaluations Using Embedded Kernel Trace Toolkit (임베디드 커널 추적 도구를 이용한 임베디드 시스템 성능 측정 기법)

  • Bae, Ji-Hye;Yoon, Nam-Sik;Park, Yoon-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.462-475
    • /
    • 2007
  • The Embedded system provides human-centric services in many fields of education, information, industry and service, and monitoring programs have been variously developed for managing, controlling and testing for these embedded systems. Currently, many kernel trace toolkits are being used for monitoring. These trace toolkits are so complicate that we present $ETT^{plus}$, our simple and explicit embedded kernel trace toolkit, for embedded systems and describe the transmission method for trace data between the embedded target system and the host system. $ETT^{plus}$ provides the solution to solve the problems such as the difficult kernel patch and file system dependency in existing kernel trace toolkits like LTT. Furthermore, we present the experimental results about embedded system performance evaluations such as system call execute time or network data transmission time by using $ETT^{plus}$.

A Study on Exploring Factors Influencing Continuance Intention in the SNS (SNS에서 지속적인 사용 의도에 영향을 미치는 요인 연구)

  • Lee, Moon-Bong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.5
    • /
    • pp.151-161
    • /
    • 2011
  • Social Network Service is a web-based service that allows the people to construct relationship among users with same interest and supports various activities such as managing personal relations and sharing information or contents. Based on the IS Post-Acceptance model and Success Model, this study examines factors influencing the continuance intention in the SNS. Questionnaires are collected from 275 students who are using the SNS. The results are following: first, the perceived usefulness and satisfaction have positive effect on the continuance intention. Second, the perceived usefulness, confirmation, system quality and information quality have positive effect on the satisfaction. Third, the confirmation has positive effect on the perceived usefulness. Fourth, the system quality and information quality have positive effect on the confirmation. Fifth, the satisfaction is the strongest predictor of the continuance intention and the perceived usefulness is the strongest predictor of the satisfaction.

A Study on Structural Relationship between Privacy Concern and Post-Adoption Behavior in SNS (SNS 이용자의 프라이버시 염려도와 수용후 행동 간의 구조적 관계에 관한 연구)

  • Jung, Chul-Ho;Namn, Su-Hyeon
    • Management & Information Systems Review
    • /
    • v.30 no.3
    • /
    • pp.85-105
    • /
    • 2011
  • The primary purpose of this study is to examine the effects of privacy concern on user's satisfaction and continuance intention in SNS. Based on relevant literature reviews, this study posits five characteristics, that is, privacy concern, perceived usefulness, perceived enjoyment, satisfaction, and continuance intention as key factors. And then we structured a research model and hypotheses about relationship between these variables. A total 298 usable survey responses of SNS users have been employed in the analysis. The major findings from the data analyses are as follows. Firstly, privacy concern had a significant influence upon perceived usefulness and enjoyment, however, privacy concern had not a significant influence upon satisfaction Secondly, perceived usefulness and enjoyment had a positive influence upon satisfaction. Lastly, user's perceived usefulness, perceived enjoyment, and satisfaction had significantly related to continuance intention in SNS. From this study, we expect to suggest practical and managerial implications to SNS providers.

  • PDF

Factor Analysis of Negative SNS Behaviors using Association Rules (연관규칙을 이용한 SNS에서의 부정적 행동 요인 분석)

  • Lee, Soojung
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2013
  • SNS is a social networking service that helps people to have a two-way communication, manage their personal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated recently. Under these circumstances, immature students are more likely to show negative cyber behavior. This study attempted to analyze the relationship between the use of SNS, motives of SNS use, the use of active SNS functions, SNS-dependency and views in SNS and negative SNS behaviors among elementary and middle school students. For this, negative cycber behaviors are classified into four stages depending on the severity, for each of which distribution of factors is investigated and the combination of factors to determine each stage is obtained through association rule analysis. As a result, it is found that 85% of the students rarely show negative cyber behaviors, stealing personal information and contacting with strangers are the most frequent negative behaviors, and students with a great dependency on SNS are highly probable to show negative behaviors.

  • PDF

Analysis on value research trend and building the resource and competence based research framework for value creation (가치 연구의 동향 분석 및 가치창출에 대한 자원 및 역량기반 연구체계 구축)

  • Park, Changhyun;Lee, Heesang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.1923-1931
    • /
    • 2014
  • A value creation is understood as important business strategy these days in both academics and industry. But this phenomenon is not fully understood based on systematized framework. In this paper, we summarized value research trend based on exploratory research and inductive reasoning by exploring both international and domestic journals. And we built a research framework that can analyze value creation between supplier and customer. Value research prior to 2004 is primarily divided into values of goods or services and relationship values. After 2004, service-dominant (SD) logic has been outlined. There are other research trends to see the relationship value in terms of relationship benefits and relationship in the network or supply chain. 4 critical resource types (financial resource, knowledge resource, efficiency resource, and intellectual resource) and 5 competence types (relational capability, collaboration capability, innovation capability, managing capability) are constructed as principal factors for value creation from inductive reasoning based upon a resource-based view (RBV) and a competence-based view (CBV). The research framework was built based on 4 resources and 4 competences.

Design of Life Habits Disease System using Neural Network (신경망을 이용한 생활습관성 질환 시스템 설계)

  • Lee, Young-Ho;Chung, Kyung-Yong;Kang, Un-Gu
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.1-6
    • /
    • 2012
  • In modern society, the amount of information has been significantly increased according to the development of IT convergence technology. That leads to develop information obtaining and searching technologies from lots of data. However, they don't seem to have been actually effective for users' health care and promotion not only for limitations of Web-based information and but for lack of personalization. Health information support services have been generally developed in a format of inputting data on bio-information acquired into the computer for the existing network-based transmission. In this paper, a life habits disease system that uses the existing medical data and Framingham risk factor(FRS) performs neural network is proposed. Based on the proposed system, it is possible to provide the fundamental data and guideline to doctors for recognizing the life habits disease diagnosis of patients and that represents increases in the welfare of patients.

Study on Construction of Simulation Model based on Analysis of Container Handling Database - A case of HICCT in Japan - (컨테이너터미널의 하역 데이터베이스 분석에 의한 하역시뮬레이션 모델 구축에 관한 연구 - 일본의 HICCT를 중심으로 -)

  • Kim, Hwa-Young
    • Journal of Navigation and Port Research
    • /
    • v.31 no.8
    • /
    • pp.717-723
    • /
    • 2007
  • In recent years, the transportation sector has been undergoing very rapid and multifarious changes due to the M&A, alliances between shipping companies, introduction of larger container ship as it cost reduction measure and the application of integrated logistics to satisfy the needs of customers. Therefore, container terminal is required adequate terminal facilities, sufficient channel depth, efficient handling and low cost of port fees and dues. The purpose of this paper is for functional assessment of efficient container terminal. Firstly, the container operating process information about yard equipment and chassis is extracted through the analysis of practical daily work report of container terminal. Also, the formulae of skill factor and troubles of operator on transfer crane are defined. Lastly, container handling simulation model which consideration of skill factor and trouble of operator is proposed by Petri network model.

Mtigating the IGMP Flooding Attacks for the IPTV Access Network (IPTV 접속망에서의 IGMP 플러딩 공격 효과 감소 기법)

  • Kim, Sung-Jin;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.998-1002
    • /
    • 2009
  • In IPTV multicast architecture, the IGMP(Internet Group Management Protocol) is used for access networks. This protocol supports the functionality of join or leave for a specific multicast channel group. But, malicious attackers can disturb legitimate users being served appropriately. By using spoofed IGMP messages, attackers can hi-jack the premium channel, wasting bandwidth and exhausting the IGMP router's resources. To prevent the message spoofing, we can introduce the packet-level authentication methods. But, it causes the additional processing overhead to an IGMP processing router, so that the router is more susceptible to the flooding attacks. In this paper, we propose the two-level authentication scheme in order to mitigate the IGMP flooding attack.

A Study on the Industrial Data Processing for Control System Middle Ware and Algorithm RFID is Expected (RFID을 이용한 산업용 제어 관리시스템에 적합한 미들웨어 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5A
    • /
    • pp.451-459
    • /
    • 2007
  • RFID it reads information which is it writes, the semiconductor chip for and the radio frequency system which uses the hazard antenna it has built-in transmission of information it talks. Formation which is transmitted like this collection and America which it filtrates wey the RFID search service back to inform the location of the server which has commodity information which relates with an object past record server. The hazard where measurement analysis result the leader for electronic interference does not occur consequently together from with verification test the power level which is received from the antenna grade where it stands must maintain minimum -55dBm and the electronic interference will not occur with the fact that, antenna and reel his recognition distance the maximum 7m until the recognition which is possible but smooth hazard it must stand and and with the fact that it will do from within and and and 3-4m it must be used Jig it is thought.