• Title/Summary/Keyword: 웹 서비스 적합성

Search Result 163, Processing Time 0.04 seconds

Effective Prioritized HRW Mapping in Heterogeneous Web Server Cluster (이질적 웹 서버 클러스터 환경에서 효율적인 우선순위 가중치 맵핑)

  • 김진영;김성천
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.12
    • /
    • pp.708-713
    • /
    • 2003
  • For many years clustered heterogeneous web server architecture has been formed on the internet because the explosive internet services and the various quality of requests. The critical point in cluster environment is the mapping schemes of request to server. and recently this is the main issue of internet architecture. The topic of previous mapping methods is to assign equal loads to servers in cluster using the number of requests. But recent growth of various services makes it hard to depend on simple load balancing to satisfy appropriate latency. So mapping based on requested content to decrease response time and to increase cache hit rates on entire servers - so called “content-based” mapping is highly valuated on the internet recently. This paper proposes Prioritized Highest Random Weight mapping(PHRW mapping) that improves content-based mapping to properly fit in the heterogeneous environment. This mapping scheme that assigns requests to the servers with priority, is very effective on heterogeneous web server cluster, especially effective on decreasing latency of reactive data service which has limit on latency. This paper have proved through algorithm and simulation that proposed PHRW mapping show higher-performance by decrease in latency.

The Type of Attachment of e-commerce Users Impact on the Intention to Accept Technology (e-커머스(e-commerce) 이용자의 애착유형이 기술수용의도에 미치는 영향)

  • Choi, Jun-seok;Kim, Seong-jun;Kwon, Do-Soon
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.4
    • /
    • pp.35-45
    • /
    • 2021
  • The e-commerce industry using mobile or web is growing rapidly, and the emergence of various platform services is causing innovative changes in the e-commerce industry. This study aims to identify the attachment types of e-commerce users and to demonstrate the relationship between the PPerceived Usefulness, and Perceived Ease of Use by TAM. In order to empirically verify the research model of this study, a survey was conducted on ordinary people with experience using e-commerce and path analysis was conducted by using PLS to analyze its Internal consistency, Confirmatory factor analysis, Discriminant validity and Goodness-of-fit verification. As a result, a significant relationship between Perceived Stability, Perceived Usefulness, and Perceived Ease of Use was identified, could verify the association with the TAM and Acceptance Intention.

A Derivation of Resource Level Domain Names (자원단위 도메인이름의 도출)

  • Han, Young-S.
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.179-186
    • /
    • 2008
  • The access to web applications has continuously evolved toward the adoption of content centric interfaces. Services and information items are much of user's concern than web sites. For an efficient accommodation of increasing needs of content oriented operations, the scope of domain names is extended in two directions. A naming scheme is derived that is suitable for resource level access units and the semantics of domain names is conceived as very flexible functions. First extension regards the removal of unnecessary TLD's of domain names for resource level binding. Second extension makes the resource level domain names rich in functional binding and consequently various applications can be directly triggered by the invocation of domain names without intervening medium. These extensions may lay a certain direction for the future internet evolution.

  • PDF

TRED : Twitter based Realtime Event-location Detector (트위터 기반의 실시간 이벤트 지역 탐지 시스템)

  • Yim, Junyeob;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.8
    • /
    • pp.301-308
    • /
    • 2015
  • SNS is a web-based online platform service supporting the formation of relations between users. SNS users have usually used a desktop or laptop for this purpose so far. However, the number of SNS users is greatly increasing and their access to the web is improving with the spread of smart phones. They share their daily lives with other users through SNSs. We can detect events if we analyze the contents that are left by SNS users, where the individual acts as a sensor. Such analyses have already been attempted by many researchers. In particular, Twitter is used in related spheres in various ways, because it has structural characteristics suitable for detecting events. However, there is a limitation concerning the detection of events and their locations. Thus, we developed a system that can detect the location immediately based on the district mentioned in Twitter. We tested whether the system can function in real time and evaluated its ability to detect events that occurred in reality. We also tried to improve its detection efficiency by removing noise.

Cascade Composition of Translation Rules for the Ontology Interoperability of Simple RDF Message (단순 RDF 메시지의 온톨로지 상호 운용성을 위한 변환 규칙들의 연쇄 조합)

  • Kim, Jae-Hoon;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.6
    • /
    • pp.528-545
    • /
    • 2007
  • Recently ontology has been an attractive technology along with the business strategy of providing a plenty of more intelligent services. The essential problem in application domains using ontology is that all members, agents, and application programs in the domains must share the same ontology concepts. However, a variety of mobile devices, sensing devices, and network components manufactured by various companies, a variety of common carriers, and a variety of contents providers make multiple heterogeneous ontologies more likely to coexist. We can see many past researches fallen into resolving this semantic interoperability. Such methods can be broadly classified into by-mapping, by-merging, and by-translation. In this research, we focus on by-translation among them which uses a translation rule directly made between two heterogeneous ontology data like OntoMorph. However, the manual composition of the direct translation rule is not convenient by itself and if there are N ontologies, the direct method has the rule composition complexity of $O(N^2)$ in the worst case. Therefore, in this paper we introduce the cascade composition of translation rules based on web openness in order to improve the complexity. The research result made us recognize some important factors in an ontology translation system, that is speediness of translation, and conveniency of translation rule composition, and some experiments and comparing analysis with existing methods showed that our cascade method has more conveniency with insuring the speediness and the correctness.

A Study on the Quality Determinant Factors of User-Support Service under Web-based Information System (웹정보시스템(WIS) 사용지원 서비스의 품질결정요인에 관한 연구)

  • 정상철;임형수
    • Journal of Information Technology Application
    • /
    • v.2 no.1
    • /
    • pp.25-53
    • /
    • 2000
  • As Information Technology has developed, The structure of information system used in organizations is changing from centralized computing structure to distributed computing structure. The roles of information department have expanded, which is not only develope and maintain system but also provide usage-support service to end-user. If organization support end-user properly, they get many benefits. if they don't do it properly, they waste many resource. Therefore, the purpose of this study is the search for quality determinant factors and type of information that provide user effective service under web-based information system. The result of this study is as follow First, when SERVQUAL is used, the quality determinant factors of usage-support service are categorized three, which is responsibility and assurance, empathy and tangable, and reliability. When SERVPERF is used, the determinant factors consist of five, but the use of assurance as a factor is cautious. Second, reliability and tangability among determinant factors affect general service quality, and tangibility is most important factors. third, When the locations of user are distributed the degree of general service quality is not different whether formal or informal information center provide usage-support service. This study may suggest practical implication as follows; First, as user are good at to use information system the degree of importance for tangibility are decreased. when user are individualized and improve their ability to use information system, empathy will not be important factors any more, therfore it assume that reliability will be most important factors. Second, if organizations promote not only formal informaton center but also informal inforamtion center they may support end-user more effectively. However, this study has the following limitations: First, it is difficult to generalize the result of this study Second, service quality determinant factors used in this study don't explain the influence to general service quality fully. Third, this study analyze a simple relation between service quality determinant factor and general service quality. Finally, this study don't distinguish between information system service and information support service.

  • PDF

Efficient Attack Traffic Detection Method for Reducing False Alarms (False Alarm 감축을 위한 효율적인 공격 트래픽 탐지 기법)

  • Choi, Il-Jun;Chu, Byoung-Gyun;Oh, Chang-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.65-75
    • /
    • 2009
  • The development of IT technology, Internet popularity is increasing geometrically. However, as its side effect, the intrusion behaviors such as information leakage for key system and infringement of computation network etc are also increasing fast. The attack traffic detection method which is suggested in this study utilizes the Snort, traditional NIDS, filters the packet with false positive among the detected attack traffics using Nmap information. Then, it performs the secondary filtering using nessus vulnerability information and finally performs correlation analysis considering appropriateness of management system, severity of signature and security hole so that it could reduce false positive alarm message as well as minimize the errors from false positive and as a result, it raised the overall attack detection results.

TPEG-based User Created Message Service Model Design for Terrestrial DMB (지상파DMB TPEG 기반 사용자 주도형 메시지 서비스 모델 설계)

  • Lee, Sang-Hee;Jo, Kang-Hyun
    • Journal of Broadcast Engineering
    • /
    • v.13 no.6
    • /
    • pp.817-827
    • /
    • 2008
  • The terrestrial-digital multimedia broadcasting(T-DMB) is now provided for the public service and the number of receivers reaches 15 million at the present of August 2008. The service of T-DMB itself has been succeeded in the presence. It is however remained as a supplementary role of stationed TV. It is necessary to find an additional business model as a new media to acquire surplus escaping from the deficit of the present T-DMB service. In the present paper, data service of T-DMB is proposed as candidate of such solution. Especially, TTI(Traffic and Travel Information) service is proposed as a killer application using TPEG(Transport Protocol Experts Group). At present, TPEG has not been so popular in the sense of various user satisfaction. Thus the variety of service including bi-directional service using DMB2.0 as in the sphere of Web2.0 is necessary for the service providers. In the paper, the restriction of TPEG-POI(Point of Interest) application service using the conventional mobile communication infrastructure is indicated. To overcome such restriction, TPEG-UCM(User Created Message) application service model using individual bi-directional media which is initiated and interacting by the users is proposed. In the experiment, the application program shows the usability of the proposed method so that the implementation results show its operability.

An Adaptation of Consistency Criteria for Applications in the Cloud (클라우드 환경에서 응용에 맞는 일관성의 적용)

  • Kim, Chi-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.341-347
    • /
    • 2012
  • In cloud computing, a enterprise or a client can use resources of computers that they are not own them. In case of Web 2.0 applications, such as Facebook, it is difficult to predict the maximum popularity of the service. But, the cloud computing may give a solution about this problem without high cost, thus becomes wildly popular. One of the advantage of cloud computing is providing a high availability. To provide the availability when the cloud computing that has shared-nothing architecture, strict consistency is not well with cloud computing. So, some consistency was proposed including the eventual consistency that was weaken the traditional consistency and has been adopted to many cloud applications. In this paper, we observe various consistency criteria that can adjust to cloud computing and discuss about some consistency that can be adapted to many applications of cloud computing.

Analysis on the core factors in the successful importing of ERP system in Small & Medium Enterprises - Focusing on the Cooperation Model between Industry and Education in Chung-Buk province (중소기업 ERP 시스템 도입 핵심성공요인 분석 -충북지역 산학연계 모델을 중심으로-)

  • 김범년;김영렬
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.3
    • /
    • pp.51-60
    • /
    • 2003
  • In the radical char]go of the business environments that the existing facilities can not guarantee the business-frosts anymore, enterprises have been importing ERP system. In Korea, Sam-sung Electronics did it for the first tin in the latter half of 1994 and other enterprises succeeded. Currently, government and public enterprises as well as most of the large enterprises are employing ERP system to sharpen the competitiveness and to win the business transparency. On the other hand, it is harder for small and medium enterprises shaded by the large enterprises to be well-equipped with information system such as ERP, because they have already suffered from chronic financial difficulties and shortage of many resources. Most of all, they prefer the short-term project that does not need much tine for them to make decisions and to carry out fully. Grounded on the above factors, in this work, I suggest the suitable ERP model for the small and medium enterprises and the successful importing process of ERP, which is derived from the previous researches made by other masters' thesis. If necessary information and human resources are interchanged pertinently between local education institute and small and medium enterprise, the latter could not only deal with the confronted difficulties successfully inside and outside but attain the goal of being proficient in up-to-minute high technology. Besides, giving the students the opportunity of researching into the practice of the business they have not ever known, local universities could help their students accumulate knowledges and acquire ideas which could not be achieved in pure academic studies. When the above-mentioned procedure is over, the students might get the intellectual faculty to ponder on the future more concretely and enter a profession more carefully. In the result, we would raise up the percentage of the employment among the graduates. And active participation of university professors is the last important factor that assists the small and medium enterprises for introducing ERP system successfully. Their scholarly attainments play an important role in strengthening local economy and make the business competitiveness balanced between the capital and the local economy.

  • PDF