• 제목/요약/키워드: Application services

검색결과 3,782건 처리시간 0.048초

Damages of Young Persimmon Tree as Affected by Application of Immature Liquid Pig Manure

  • Choi, Seong-Tae;Park, Yeo-Ok;Ahn, Gwang-Hwan;Kim, Eun-Gyeong;Son, Ji-Young;Joung, Wan-Kyu;Hong, Kwang-Pyo
    • 한국환경농학회지
    • /
    • 제38권2호
    • /
    • pp.89-95
    • /
    • 2019
  • BACKGROUND: Liquid pig manure (LPM) has been used as an alternative for conventional fertilizers on some gramineous crops. However, its chemical properties varied widely depending on the degree of the digestion. A pot experiment was conducted to determine the responses of persimmon trees to immature (not well-digested) LPM application. METHODS AND RESULTS: Ten application levels of immature LPM, consisted of a total of 3 to 30 L in 3-L increment, were applied during summer to 5-year-old 'Fuyu' trees grown in 50-L pots. Increasing the LPM application rate caused defoliation, wilting, and chlorosis in leaves. When applied with the rate of 3 L during summer, the tree produced small fruits with low soluble solids and bore few flower buds the following season, indicating insufficient nutritional status. In trees applied with the LPM rates of 6~12 L, both fruit characteristics and above-ground growth of the trees appeared normal but some roots were injured. However, application of higher LPM rates than 27 L resulted in small size, poor coloration, or flesh softening of the fruits the current season. Furthermore, the high LPM rates caused severe cold injury in shoots during winter and weak shoot growth the following season. It was noted that the application of higher LPM rate than 9 L damaged the root, even though above-ground parts of the tree appeared to grow normally. CONCLUSION: The results indicated that an excessive immature LPM application could cause various injuries on leaves, fruits, and the roots in both the current and the following season.

웹 어플리케이션 특성 분석을 통한 공격 분류 (Attack Categorization based on Web Application Analysis)

  • 서정석;김한성;조상현;차성덕
    • 한국정보과학회논문지:정보통신
    • /
    • 제30권1호
    • /
    • pp.97-116
    • /
    • 2003
  • 최근 웹 서비스의 증가와 한께 엘 서비스에 대한 공격과 피 피해 규모는 증가하고 있다. 그러나 웹 서비스에 대한 공격은 다른 인터넷 공격들과 성격이 다르고 그에 대한 연구 또한 부족한 현실이다. 더욱이 기존의 침입 탐지 시스템들도 낄 서비스를 보호하는데 적합하지 않다. 이 연구에서는 먼저 웹 공격들을 공격 발생 원인과 공격 탐지 관점에서 분류하고, 마지막으로 위험성 분석을 통하여 웹 공격들을 분류하였다. 이를 통해 엘 서비스를 보호하기 적합한 웹 서비스 특화된 침입 탐지 시스템을 설계, 개발하는데 도움을 주고자 한다.

웹 서비스 분석기의 디자인과 구현 (Design and Implementation of Public Web Services Analyzer)

  • ;한동수
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2005년도 가을 학술발표논문집 Vol.32 No.2 (1)
    • /
    • pp.241-243
    • /
    • 2005
  • Web services (WS) present a new promising software technology, which provides application-to-application interaction. They are built on the top of existing web protocol and based on open XML standards. Web services are described using WSDL, and the UDDI is a integration directory provide registry of Web Services descriptions. WSDL provides information of Web Services but it is getting more and more important to know more than those provided by WSDL. From WSDL we can not get the information like usage of WS, performance of WS, complexity of WS, usability of WS with other web service. In this paper, we proposed a new method for Web Services so called Public Web Services Analyzer (PWSA). This technique is based on analyzing various public UDDI registries in order to get various kinds of statistics of web services. Those statistics will be used by both web services developers and consumers for finding them suitable services for their needs. PWSA guarantees that it can provide enough information to find right web services for both Web Services Consumers and Web Service Developers.

  • PDF

스마트폰 애플리케이션 서비스의 기술-서비스 융합 양상 분석 (Analyzing Technology-Service Convergence Using Smartphone Application Services)

  • 금영정;민혜종
    • 대한산업공학회지
    • /
    • 제42권1호
    • /
    • pp.1-19
    • /
    • 2016
  • Recently, the emergence of smartphone foster the technological convergence. This convergence no longer takes place within technologies only. Rather, convergence phenomena happen as a form of embodied services. However, previous research on convergence has been subject to the technology-oriented studies, including suggesting patent-based indexes or analyzing technological characteristics. However, investigating technology-service convergence is critical since most of new smart services are technology-based convergence services. Therefore, we analyze the pattern of technology-service convergence which occurs in the smartphone application services. We divided the smatphone application services into four categories, and employ a network analysis to represent the convergence phenomena of each category. Our study is expected to provide meaningful implication in new service development practice.

클라우드에서 서비스 지향 응용을 위한 최적 서비스 배치와 우선순위 결정 기법 (Service Deployment and Priority Optimization for Multiple Service-Oriented Applications in the Cloud)

  • 김길환;금창섭;배현주
    • 한국IT서비스학회지
    • /
    • 제13권3호
    • /
    • pp.201-219
    • /
    • 2014
  • This paper considers service deployment and priority optimization for multiple service-oriented applications sharing reusable services, which are deployed as multiple instances in the cloud. In order to handle variations in the workloads of the multiple applications, service instances of the individual reusable services are dynamically provisioned in the cloud. Also service priorities for each application in a particular reusable service are dynamically adjusted. In this paper, we propose an analytic performance model, based on a queueing network model, to predict the expected sojourn times of multiple service-oriented applications, given the number of service instances and priority disciplines in individual reusable services. We also propose a simple heuristic algorithm to search an optimal number of service instances in the cloud and service priority disciplines for each application in individual reusable services. A numerical example is also presented to demonstrate the applicability of the proposed performance model and algorithm to the proposed optimal decision problem.

Design of 4S Web Services Model for the Infrastructures of National Spatial Clearinghouse of Spatial Data and Services

  • Kim, M.S.;Oh, B.W.;Kim, M.J.;Jang, B.T.
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2003년도 Proceedings of ACRS 2003 ISRS
    • /
    • pp.834-836
    • /
    • 2003
  • Recently, web services concept is rapidly rising as new solution to solve the integration problem among heterogeneous application systems . This web servic es concept is adaptable in the field of 4S application systems integration that handles the spatial information of GIS, SIIS, GNSS and ITS. So, this paper suggests a new 4S web services model for the infrastructures of nationwide spatial clearinghouse, which is mainly based on the OGC and W3C web services specifications. Conclusively, this proposed model that could serve various spatial data and services has some advantages of being flexibly and powerfully capable of integrating the 4S application systems owing to adapting the international standard specifications of OGC and W3C.

  • PDF

Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services

  • Jin Kim;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권2호
    • /
    • pp.173-184
    • /
    • 2024
  • The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.

EA 온톨로지 기반 비즈니스 서비스 자동 식별방안 (Automatic Identification of Business Services Using EA Ontology)

  • 정찬기;황상규
    • 한국IT서비스학회지
    • /
    • 제9권3호
    • /
    • pp.179-191
    • /
    • 2010
  • Service identification and composition is one of the key characteristics for a successful Service-Oriented Computing, being receiving a lot of attention from researchers in recent years. In the Service-Oriented Analysis, the identification of business services has to be preceded before application services are identified. Most approaches addressing the derivation of business services are based on heuristic methods and human experts. The manual identification of business services is highly expensive and ambiguous task, and it may result in the service design with bad quality because of errors and misconception. Although a few of approaches of automatic service identification are proposed, most of them are in focus on technical architectures and application services. In this paper, we propose a model on the automatic identification of business services by horizontal and vertical service alignment using Enterprise Architecture as an ontology. We verify the effectiveness of the proposed model of business services identification through a case study based on Department of Defense Enterprise Architecture.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • 인터넷정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

과업특성 및 기술특성이 클라우드 SaaS를 통한 협업 성과에 미치는 영향에 관한 연구 (A Study of Factors Affecting the Performance of Collaborative Cloud SaaS Services)

  • 심수진
    • 한국IT서비스학회지
    • /
    • 제14권2호
    • /
    • pp.253-273
    • /
    • 2015
  • Cloud computing is provided on demand service via the internet, allowing users to pay for the service they actually use. Categorized as one kind of cloud computing, SaaS is computing resource and software sharing model with can be accessed via the internet. Based on virtualization technology, SaaS is expected to improve the efficiency and quality of the IT service level and performance in company. Therefore this research limited cloud services to SaaS especially focused on collaborative application service, and attempts to identify the factors which impact the performance of collaboration and intention to use. This study adopts technological factors of cloud SaaS services and factors of task characteristics to explore the determinants of collaborative performance and intention to use. An experimental study using student subjects with Google Apps provided empirical validation for our proposed model. Based on 337 data collected from respondents, the major findings are following. First, the characteristics of cloud computing services such as collaboration support, service reliability, and ease of use have positive effects on perceived usefulness of collaborative application while accessability, service reliability, and ease to use have positive effects on intention to use. Second, task interdependence has a positive effects on collaborative performance while task ambiguity factor has not. Third, perceived usefulness of collaborative application have positive effects on intention to use.