• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.035 seconds

Survey for U-Greenhouse System Technology (U-온실 시스템 기술에 대한 분석)

  • Park, Sang-Oh;Lee, Yang-Sun;Kim, Se-Han;Park, Ji-Soo;Yi, Ki-Jung;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.89-95
    • /
    • 2012
  • This paper introduces domestic and international trends and researches related with U-Greenhouse systems. USN (Ubiquitous Sensor Networks), along with the development of networks as well as science and technology, is a new computing paradigm which is the convergence of user-oriented physical activity space and virtual space of electronics and computing and also provides services according to change in surrounding environment at anytime and anywhere. The U-Greenhouse system is to apply USN to agricultural production, logistics and distribution management which are relatively insufficient to utilize IT technology. Thus, applying u-IT technology to agriculture can reinforces international competitiveness of the agricultural sector through the effects such as cost cutting as a rise in output, logistics and distribution management.

A Study on Users' Need Analysis for Building Textbook Special Libraries Portal Sites (교과서전문도서관 포털사이트 구축을 위한 이용자 요구분석 연구)

  • Noh, Younghee;Choi, Won-Tae;Yun, Dayoung
    • Journal of the Korean Society for information Management
    • /
    • v.31 no.4
    • /
    • pp.69-102
    • /
    • 2014
  • In this study, we propose an approach of building a portal site that can offer integrated services for textbook through special libraries For this purpose, we analyzed previous related studies and investigated textbook portal construction sites domestically and abroad. Based on this research, we developed survey questions and conducted a survey targeting users of textbook libraries. As a result, the following projects are required for creating a textbook library: a comprehensive list of textbooks and other content construction, digitization projects of library holdings, collection and delivery of various textbook-related reference books, building a textbook database by topic, collecting and providing textbook-related research publications, a cooperation network with textbook-related organizations, and active promotion of portal sites.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

Connected-IPs: A Novel Connected Industrial Parks Architecture for Building Smart Factory in Korea (연결형 산업단지(CIPs): 한국의 스마트공장 구축을 위한 연결형 산업단지 아키텍처)

  • Yang, Young-Chuel;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.131-142
    • /
    • 2018
  • In Korea, for the past 50 years, industrial parks have played an important role in economic growth as a cluster of national key industries. However, due to various problems of these old industrial parks, they are weakening competitiveness. It is necessary to be converted into a model for the management and fostering of high-tech industrial complex park by classifying them into development plans, management plans, and support plans according to types and characteristics of industrial parks. For this purpose, we propose CIPs (Connected-Industrial parks) using new technologies such as Cloud Computing, RFID, WSN, CPS, and Big Data analysis based on IoT. It is a hub that supports various services in transportation, warehousing and manufacturing fields while possessing and operating physical assets as concept. each CIP (Connected-Industrial park) is connected and expanded Through such CIPs, network-type collaborative manufacturing and intelligent logistics innovation enables cost reduction, delivery shortening, quality improvement.

The Methods of Collecting, Preservation, Reproduction for Records of Public Sector's Facebook Pages (정부부처의 페이스북 페이지 기록물 수집·보존·재현 방법)

  • Jang, In-Ho;Hwang, Yun-Young;Lee, Kyu-Chul
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.14 no.2
    • /
    • pp.117-128
    • /
    • 2014
  • Social Network Service (SNS) has gained great popularity. Recently, facebook has been used most active. Most of government ministries of Republic of Korea operates facebook. In the case of facebook, it takes advantages of possibilities to inform the direction of policy to aggregate opinions of people for issues. Information gained from facebook has a very important value to be reflected in the policy or to understand public opinions. Long-term storage for this information should be considered. In the case of overseas, tools for long-term storage of documentary facebook have recently been developed. However, it does not save all the data in facebook and ignores the principles for long-term storage. These tools are limited to a simple backup. Therefore, this study aims to investigate how to reproduce, store and collect facebook page records of the government ministries.

Analysis of Market and Management for Global Container Terminal Operators (글로벌 컨테이너 터미널 운영사의 시장 및 경영 현황 분석)

  • Lee, Joo-Ho;Won, Seung-Hwan;Choi, Na-Young-Hwan;Yun, Won-Young
    • Journal of Korea Port Economic Association
    • /
    • v.32 no.3
    • /
    • pp.47-66
    • /
    • 2016
  • Once it has been built, a container terminal is impossible to move to another location. It is hard to rectify wrong decisions in a container terminal. This highlights the importance of decision making for a container terminal. The port management about a container terminal has developed from a cargo interface location between sea and land transport, to the standardization of information and procedures due to globalization among global shipping and terminal operators. This research focuses on the current states of market and management for global container terminal operators by investigating up-to-date data for them. The current market states for global container terminal operators are analyzed by using by Herfindahl-Hirschman Index. The analyses of current management states for global container terminal operators are divided into profitability analysis, activity analysis, and bankruptcy risk analysis. Finally, global container terminal operators are clustered into three groups by the current management states.

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

A Systematic Review of The Health Promotion for Workers; Participatory Action Research and Community Based participatory Research (근로자의 건강증진에 대한 체계적 문헌고찰 참여적 실행연구와 지역사회기반 참여연구 중심으로)

  • Hwang, Won Ju;Ha, Ji Sun;Jo, Hyun Hee
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.459-466
    • /
    • 2018
  • This study investigated a systematic literature review on local and international literatures focusing on Participatory Action Research(PAR), Community Based Participatory Research(CBPR) in workplace and community. Eighty percent of the 10 studies reviewed included research involving health professionals, community networks, workers, and university researchers. Health promotion programs varied from health and safety awareness, smoking cessation, diabetes management, physical activity, self-efficacy enhancement, cardiovascular disease, musculoskeletal disorders and mental health. PAR, CBPR are required to participate actively in research through community collaboration to promote health. We can solve problems at the community level. And identified sustainable effects when developing and implementing a health promotion program. PAR and CBPR are expected to continuously pursue change by adjusting the scope of individuals, organizations, communities, and institutional dimensions. They are also expected to be implemented for workers in the various workplace.

Identification of Strategic Fields for Developing Smart City in Busan Using Text Mining (텍스트 마이닝을 이용한 스마트 도시계획 수립을 위한 전략분야 도출연구: 부산 사례를 바탕으로)

  • Chae, Yoonsik;Lee, Sanghoon
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.1-15
    • /
    • 2018
  • The purpose of this study is to analyze bibliographic information of Busan and other cities' reports for urban development initiative and identify the strategic fields for future smart city plan. Text mining method is used in this study to extract keywords and identify the characteristics and patterns of information in urban development reports. As a result, in earlier stage, Busan city focused on service creation for industrial development but there are lack of discussions on the linkage of information systems with ICT technology. However, recent urban planning in Busan contained various contents related to integrated connections of infrastructure, ICT system, and operation management of city in the specific fields of traffic, tourism, welfare, port/logistics, culture/MICE. This results of study is expected to provide policy implications for planning the future urban initiatives of smart city development.

Development of IoT Device Management System Using Blockchain DPoS Consensus Algorithm (블록체인 DPoS 합의 알고리즘을 활용한 IoT 장치 관리 시스템 개발)

  • Kim, Mihui;Kim, Youngmin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.508-516
    • /
    • 2019
  • Smart home with various IoT devices provides convenient and efficient services. However, security is important because sensitive information such as private video and audio can be collected and processed, as well as shared over the Internet. To manage such smart home IoT devices, we use blockchain technology that provides data integrity and secure management. In this paper, we utilize a PoS(Proof of Stake) method that verifies the block through the accumulated stake in the network rather than the computation power, out of the PoW(Proof of Work) block chain, in which the computation for the existing verification must be continuously performed. Among them, we propose a blockchain based system with DPoS(Delegated Proof of Stake) method to actively solve the scalability part, for security that is suitable for smart home IoT environment. We implement the proposed system with DPoS based EOSIO to show realization, and we show performance improvement in terms of transaction processing speed.