• Title/Summary/Keyword: 생명 주기

Search Result 602, Processing Time 0.023 seconds

An User-driven Service Creation Architecture in Consumer Networking Environments (소비자 네트워킹 환경에서의 사용자 주도 서비스의 효율적 생성)

  • Jung, Yuchul;Kim, Jin-Young;Lee, Hyejin;Kim, Kwang-Young;Suh, Dongjun
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.479-487
    • /
    • 2016
  • In a Web 2.0 context, users are exposed to numerous smart devices and services that allow real-time interaction between users (or consumers) and developers (or producers). For the provisioning of new user-created services based on user's context, the data management of service creation experiences becomes a non-trivial task. This article introduces a data model for service creation and then proposes a service creation management architecture which enables new service creation using the data model, the management of the service creation data, and the semantic service discovery across internal/external service repositories. The article also explains the use of the proposed architecture with two different scenarios: home and mobile environments. The proposed architecture for service creation data management offers consistent and seamless handling of the service creation data throughout its usage lifecycle.

A Study on Mobile Game Security Threats by Analyzing Malicious Behavior of Auto Program of Clash of Clans (클래시 오브 클랜 오토 프로그램의 악성 행위 분석을 통한 모바일 게임 보안 위협에 관한 연구)

  • Heo, Geon Il;Heo, Cheong Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1361-1376
    • /
    • 2015
  • Recently, the size of the mobile game market and the number of mobile game users are growing. Also, as the mobile game's life cycle is increasing at the same time, auto program issue reappears which has been appeared in PC online games. Gamers usually tend to ignore warning messages from antivirus programs and even worse they delete antivirus program to execute auto programs. Therefore, mobile game users are easily compromised if the auto program performs malicious behaviors not only for the original features. In this paper, we analyze whether seven auto programs of "clash of clans" which has a lot more users for a long time perform malicious behaviors or not. We forecast the possible security threats in near future and proposed countermeasures based on this analysis. By analyzing auto programs of highly popular mobile game of today, we can acquire the knowledge on auto program's recent trend such as their development platform, operating mode, etc. This analysis will help security analysts predict auto program's evolving trends and block potential threats in advance.

(Performance Monitoring Techniques for EJB Applications) (EJB 어플리케이션의 성능 모니터링 기법)

  • 나학청;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.529-539
    • /
    • 2003
  • Due to the emersion of J2EE (Java 2, Enterprise Edition), many enterprises inside and outside of the country have been developing the enterprise applications appropriate to the J2EE model. With the help of the component model of Enterprise JavaBeans (EJB) which is the J2EE core technology, we can develop the distributed object applications quite simple. EJB application can be implemented by using the component-oriented object transaction middleware and the most applications utilize the distributed transaction. Due to these characteristics, EJB technology became popular and then the study for EJB based application has been done quite actively. However, the research of techniques for the performance monitoring during run-time of the EJB applications has not been done enough. In this paper, we propose the techniques for monitoring the performance of EJB Application on the run time. First, we explore the workflow for the EJB application service and classily the internal operation into several elements. The proposed techniques provide monitoring the performance elements between the classified elements. We can also monitor by extracting the performance information like state transition and process time of the bean which is related to the lifetime occurred during one workflow, and the resource utilization rate.

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game (소셜 네트워크 게임(SNG) 서비스의 개인정보 유출 및 보안위협 대응방안에 관한 연구)

  • Lee, Sang Won;Kim, Huy Kang;Kim, Eun Jin
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.77-88
    • /
    • 2015
  • As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.

An Analysis of the Professional's Cognition Regarding the Plant Factory Feasibility (식물공장 사업타당성에 관한 전문가 인식 연구)

  • Lee, Ji-Eun;Cha, WoonCheol
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.89-97
    • /
    • 2015
  • Plant factory was started in Europe in the 1960. Thanks to the development of seeds science, nutrient study, environment control technology and automated systems, it has developed into the form of full artificial light system. In recent years, productivity of plant factory has increased with the convergence of ICT. An interest in plant factory has increased with several outstanding achievements. However, the plant factory industry is still stuck at an introductory stage and government investment has been reduced. In order to verify the feasibility of the plant factory, we conducted a survey targeting experts in politics, R&D and business field. We analyze the feasibility of investment in plant factory and strategies to enhance the competitiveness of plant factory.

A Study on the Effective Alcohol Education Strategies for the Prevention of Alcohol Problems (음주문제 예방을 위한 효과적인 보건교육방안에 관한 연구)

  • Lee, Young-Sook
    • Korean Journal of Health Education and Promotion
    • /
    • v.12 no.2
    • /
    • pp.139-145
    • /
    • 1995
  • 본 연구의 목적은 알코올 문제의 현황을 파악하고 효과적인 음주교육 방안을 모색하기 위한 것이다. 사회문화적 행위로서의 음주행동의 특징을 파악하고 음주로 인한 위해가 우리에게 미치는 영향을 파악하기 위한 것이다. 음주행동은 한 사람이 속한 사회의 문화와 관습이 허용하는 범위에 따라 그 사회가 공유하는 음주에 대한 태도나 가치의 영향을 받아 학습을 통해 습득하게 된다. 음주는 사망률, 이환율, 유산율, 범죄율 등에 막대한 영향을 끼치고 있으며 이로 인한 사회적 비용과 생명손실은 엄청난 것이다. 매스미디어를 통한 음주교육은 다른법적 제재와 병행될 때 효과적이다. 음주연령이나 세금부과 등을 통해 음주행위를 통제하는 것이 가능하다. 음주교육의 주기능은 법령과 처벌에 대한 두려움(perceived fear)를 높이는 것이다. 음주행위에 관용적인 사회 분위기를 변화시키는 것이 법령이나 처벌보다 더 효과적이다. 과도한 음주행위에 대한 비판적인 사회적 분위기와 같은 비공식적인 사회적인 제재가 음주문제의 예방에 더욱 중요하다. 청소년의 음주행위는 부모와 동료집단과의 관계에 의해 크게 영향을 받기 때문에 부모와 동료집단의 참여하에 객관적인 태도를 통해 자율적인 결정을 할 수 있도록 유도해야 한다. 음주교육에 대해 지식과 경험을 갖춘 교사가 교육을 실시하여야 하며 소그룹 활동을 통해 음주문제에 대한 이해와 바람직한 태도를 습득하게 하고 동료집단의 압력을 거부할 수 있는 능력을 키우는 것이 필요하다. 교사는 편견이 없는 객관적인 태도를 갖추어야 하고 최종적 결정은 지식에 근거하여 청소년이 하도록 하여야 한다. 음주는 가정불화, 좌절감, 실업, 이혼 둥의 부정적 감정과 연관되어 있으며 깊은 인간관계를 통한 상담이 효과적이다. 단주친목과 같은 자발적인 민간단체는 알코올 문제를 가진 사람들이 서로 모여 친목하는 가운데 도움과 치료를 받을 수 있다는 점에서 매우 효과적이다. 이러한 단체의 활용이 더욱 확대되어야 한다. 병원에서의 음주교육은 노조의 참여하에 전문적인 의료인들에 의해 이루어져야 한다. 이전에 알코올중독에서 회복된 사람을 동료교육가(peer educator)로 활용하는 것도 효율적인 교육방법중의 하나이다. 의과대학의 교과과정에 음주교육에 대한 내용을 더욱 확대하여야 한다. 음주교육은 음주라는 행위의 저변에 깔린 문화적 심리적 요인에 대한 깊은 이해를 토대로 계획되고 실시되어야 한다. 음주교육은 지역사회 전체의 참여를 통해 부모, 학생, 정부, 민간단체, 매스미디어의 공동참여를 통한 다각적인 접근이 요구된다.

  • PDF

A Comparison of Calibration Methods for the COCOMO II Post-Architecture Model (COCOMOII의 후구조 모델에 대한 캘리브레이션 방법 비교)

  • Yoon, Myoung-Young
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2000.05a
    • /
    • pp.135-143
    • /
    • 2000
  • The COCOMO Ⅱ model is well-suited for the new software development life cycle such as non-sequential and rapid-development processes. The traditional regression approach based on the least square criterion is the most commonly used technique for empirical calibration in the COCOMO Ⅱ model. But it has a few assumptions frequently violated by software engineering data sets. It is true that the source data is also generally imprecise in reporting size, effort, and cost-driver ratings, particularly across different organizations. And that the outlier for the source data is a peculiarity and indicates a data pint To cope with difficulties, in this paper, we propose a new regression method for calibrating COCOMO Ⅱ post-architecture model based on the minimum relative erro(MRE) criterion. The characteristic of the proposed method is insensitive to the extreme values of the data in the empirical calibration. As the experimental results, It is evident that our proposed calibration method MRE was shown to be superior to the traditional regression approach for model calibration, as illustrated by the values obtained for standard deviation(^σ), and prediction at level L PRED(L) measures.

  • PDF

A Disjoint Multi-path Routing Protocol for Efficient Transmission of Collecting Data in Wireless Sensor Network (무선 센서 네트워크에서 수집 데이터의 효과적인 전송을 위한 비겹침 다중경로 라우팅 프로토콜)

  • Han, Dae-Man;Lim, Jae-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.433-440
    • /
    • 2010
  • Energy efficiency, low latency and scalability for wireless sensor networks are important requirements, especially, the wireless sensor network consist of a large number of sensor nodes should be minimized energy consumption of each node to extend network lifetime with limited battery power. An efficient algorithm and energy management technology for minimizing the energy consumption at each sensor node is also required to improve transfer rate. Thus, this paper propose no-overlap multi-pass protocol provides for sensor data transmission in the wireless sensor network environment. The proposed scheme should minimize network overhead through reduced a sensor data translation use to searched multi-path and added the multi-path in routing table. Proposed routing protocol may minimize the energy consumption at each node, thus prolong the lifetime of the sensor network regardless of where the sink node is located outside or inside the received signal strength range. To verify propriety proposed scheme constructs sensor networks adapt to current model using the real data and evaluate consumption of total energy.

A Study on the Reengineering Tool with Concepts Recognition and Logical l Analysis of Objects (객체의 개념적 인식과 논리적 분석에 의한 재공학 툴에 대한 연구)

  • Kim, Haeng-Gon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.1
    • /
    • pp.200-210
    • /
    • 1996
  • Re-engineering has the potential to improve software productivity and quality y across the entire life cycle. It involves improving the software maintenance process and improving existing systems by applying new technologies and tools to software maintenance. Re-engineering can help us understanding existing systems and discover software components(e.g., design structure, data structure that are common across systems. These common components then can be reused in the development (or redevelopment )of systems, thereby significantly shortening the time and lessening the risk of developing systems. The Object-Oriented paradigm has been known to improve software maintainability. There still exist many problems in recognizing object, attributes and operations that are conceptually integrated and constructing of object class. In this paper, we propose a method that defines a fundamental theories of re-engineering and a concept recognition for object- oriented paradigm. We also describe the re-engineering tool that translates the existing procedure-oriented program into object-oriented system. This tool has a strength to solve the conceptual integrity problem in object-oriented recognition.

  • PDF

Algorithm selecting Software development route suitable for Project environment and characteristics (프로젝트 환경과 특성에 따른 소프트웨어 개발 경로 선정 알고리즘)

  • Jung Byung-Kwon;Yoon Seok-Min
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.87-96
    • /
    • 2006
  • This paper focused on the method for customizing software development path, considering the project environments and characteristics. he selection standard of development path is composed of ten items, based on the process of ISO/IEC TR 15721 Information Technology Guide for ISO/IEC 12207 (Software Life Cycle Process) and ISO/IEC 15504 Information technology - Process assessment. The ten items were reflected the project environments and characteristics, at the same time the items conduct the adjustment item of selecting project development path. An algorithm for selecting software development path through items of the project environments and characteristics is presented. To test the algerian in this paper, a system for selecting development path, which reflected algorithm was developed. The development project for web-based system were also adopted to the system for selecting development path. In addition, provened hand-worked project path process differed from machine-worked project path process. The reason why it differs is that outputs were mixed or their names were changed. The effect is to select easily software development route suitable for project environment and characteristics.