• Title/Summary/Keyword: Building services

Search Result 1,234, Processing Time 0.027 seconds

Method to Evaluate and Enhance Reusability of Cloud Services (클라우드 서비스의 재사용성 평가 및 향상 기법)

  • Oh, Sang-Hun;La, Hyun-Jung;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.19D no.1
    • /
    • pp.49-62
    • /
    • 2012
  • In cloud computing, service providers develop and deploy services with common and reusable features among various applications, service consumers locate and reuse them in building their applications. Hence, reusability is a key intrinsic characteristic of cloud services. Services with high reusability would yield high return-on-investment. Cloud services have characteristics which do not appear in conventional programming paradigms, existing quality models for software reusability would not applicable to services. In this paper, we propose a reusability evaluation suite for cloud services, which includes quality attributes and metrics. A case study is presented to show its applicability.

Building On/off Attacks Detector for Effective Trust Evaluation in Cloud Services Environment

  • SALAH T. ALSHAMMARI;AIIAD ALBESHRI;KHALID ALSUBHI
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.101-107
    • /
    • 2024
  • Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is quite versatile, which is why extensive amounts of data can be stored in the cloud. Furthermore, businesses can access various services over the cloud without having to install applications. However, the cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Though there are several advantages of cloud computing services, especially to business owners, various challenges are also posed in terms of the privacy and security of information and online services. A kind of threat that is widely faced in the cloud environment is the on/off attack. In this kind of attack, a few entities exhibit proper behavior for a given time period to develop a highly a positive reputation and gather trust, after which they exhibit deception. A viable solution is provided by the given trust model for preventing the attacks. This method works by providing effective security to the cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on-off attacks.

Generation of Indoor Network by Crowdsourcing (크라우드 소싱을 이용한 실내 공간 네트워크 생성)

  • Kim, Bo Geun;Li, Ki-Joune;Kang, Hae-Kyong
    • Spatial Information Research
    • /
    • v.23 no.1
    • /
    • pp.49-57
    • /
    • 2015
  • Due to high density of population and progress of high building construction technologies, the number of high buildings has been increasing. Several information services have been provided to figure out complex indoor structures of building such as indoor navigations and indoor map services. The most fundamental information for these services are indoor network information. Indoor network in building provides topological connectivity between spaces unlike geometric information of buildings. In order to make indoor network information, we have to edit network manually or derive network properties based on the geometric data of buildings. This process is not easy for complex buildings. In this paper, we suggest a method to generate indoor network automatically based on crowdsourcing. From the collected individual trajectories, we derive indoor network information with crowdsourcing. We validate our method with a sample set of trajectory data and the result shows that our method is practical if the indoor positioning technology is reasonably accurate.

A Proposal of Heuristic Using Zigzag Steiner Point Locating Strategy for GOSST Problem (GOSST 문제 해결을 위한 지그재그 스타이너 포인트 배치 방법을 이용한 휴리스틱의 제안)

  • Kim, In-Bum;Kim, Chae-Kak
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.317-326
    • /
    • 2007
  • We propose more enhanced heuristic for the GOSST(Grade of Services Steiner Minimum Tree) problem in this paper. GOSST problem is a variation of Steiner Tree problem and to find a network topology satisfying the G-Condition with minimum network construction cost. GOSST problem is known as one of NP-Hard or NP-Complete problems. In previous our research, we proposed a heuristic employing Direct Steiner Point Locating strategy with Distance Preferring MST building strategy. In this paper, we propose new Steiner point locating strategy, Zigzag Steiner point Locating strategy. Through the results of out experiments, we can assert this strategy is better than our previous works. The Distance Zigzag GOSST method which hires the Distance Preferring MST building strategy and Zigzag Steiner point Locating strategy defrays the least network construction cost and brings 31.5% cost saving by comparison to G-MST, the experimental control and 2.2% enhancement by comparison to the Distance Direct GOSST method, the best GOSST method in our previous research.

Convergence Mechanism from Mobile Loading Block to SMP Building Component of AIN (Mobile Loading Block으로부터 AIN SMP Building Component로의 수렴 메카니즘)

  • Park, Soo-Hyun
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.06a
    • /
    • pp.141-146
    • /
    • 2002
  • AIN CS-3를 기반으로 하는 IMT-2000 망은 지능망의 구성 요소들과 통합 및 연동을 통하여 기존에 개발되었거나 앞으로 개발될 유선 지능망의 서비스들을 쉽게 수용할 수 있게 된다. 본 논문에서는 IMT-2000 및 IMT-2000과 연동되는 타 네트워크의 상이한 플랫폼 환경의 개발환경 및 향후 유지보수과정에서 발생 할 것으로 예측되는 TMN 시스템 내 에이전트의 Q3 인터페이스 구현상의 표준을 이룰 수 없다는 등의 문제점을 해결하기 위하여 I-Farmer 모델 및 I-Farmer 방법론을 제안하였다.

  • PDF

A Study on the Reformation of Aged Person Welfare Facility supported by Government (우리나라 정부지원 노인복지시설의 개선방안에 관한 연구)

  • Cho Young-Jun;Ham Jung-Bok;Yoon In
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2005.11a
    • /
    • pp.197-200
    • /
    • 2005
  • Now, our country is in the face of increasement of aged person, and because of this fact many problems about aged person are show themselves. The main problems can be summarized as services provided by suppliers, inefficient management of welfare facility, violation of human rights, and nonprofessionalism of caring. Therefore to increasement of welfare quality, the direction of aged person welfare facility was suggested in this study.

  • PDF

Development of wireless charging drone station prototype for construction sites (건설현장용 무선충전 드론스테이션 프로토타입 개발)

  • Han, Jae Goo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.11a
    • /
    • pp.225-226
    • /
    • 2022
  • In order to secure the practicality of services using drones, improve on-site operability, and improve the convenience of aircraft maintenance, it is necessary to develop a drone station that can be safely stored while ensuring charging performance. Therefore, a total seven points of improvement were derived through laboratory experiments after the development of the first prototype, and an improved second prototype will be developed in the future based on the preceding processes.

  • PDF

A Study on the Trust Building of Trusted Third Parties in e-Trade (제3자 신뢰기관의 전자무역 신뢰구축에 관한 연구)

  • Cho, Won-Gil;Shin, Seung-Man
    • International Commerce and Information Review
    • /
    • v.6 no.3
    • /
    • pp.159-180
    • /
    • 2004
  • This paper focus on building online trust in electronic commerce between partner that have never traded with each other before, the so-called first trade situation. For this, this paper proposes the model to build trust for conduction first trade transaction in e-trade(so-ca1led Trust Matrix Model : TMM). The TMM is based on the idea that for business to business electronic trade a balance has to be found between anonymous procedural trust, i.e. procedural solutions for trust building, and personal trust based on positive past experiences within for first trade situation, because of the lack of experience in these situations. The procedural trust solutions are related in the notion of institution-based trust, because the trust in the procedural solutions depends on the trust one has in the institutions that issued or enforces the procedure. The TMM can be used as a tool to analyze and develope trust-building services to help organizations conduct first -trade electronic trade.

  • PDF

A Study on the Diffusion and Removal of Airborne Microorganism Pollution in Multistoried Apartment by the Multi-Zone Simulation (멀티존 시뮬레이션에 의한 공동주택의 미생물 오염원 확산과 제거에 관한 연구)

  • Hong, Jin-Kwan;Choi, Sang-Gon
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.19 no.4
    • /
    • pp.291-298
    • /
    • 2007
  • The purpose of this study is to evaluate the efficacy of multizone simulation that enables to grasp of details about microbial contaminant problem in an multistoried apartment. We used actual indoor test data to figure up microbial contaminant level as initial value for the multizone simulation and estimated the various effects of indoor occupant infected with germs such as bacteria and fungus and the performance of air sterilization by using multizone simulation in substitute for infeasible experimental approach. The results show that natural ventilation make ourselves generally useful for removing indoor microbial contaminants. The results also show that the performance of air sterilization reach the maximum in the case of using mechanical ventilation and UVGI air sterilizer. The conclusion is that this multizone simulation is useful tool for actual design method for immune building systems.

Progressive collapse analysis of two existing steel buildings using a linear static procedure

  • JalaliLarijani, Reza;Celikag, Murude;Aghayan, Iman;Kazemi, Mahdi
    • Structural Engineering and Mechanics
    • /
    • v.48 no.2
    • /
    • pp.207-220
    • /
    • 2013
  • In this study, the vulnerability of two existing asymmetric steel building frames to Progressive Collapse (PC) is assessed. The buildings have different frame systems, steel sections and number of stories (nine and six). An alternate path method (APM) with a linear static analysis (LS) is carried out according to General Services Administration (GSA) 2003 guidelines. The Demand Capacity Ratio (DCR) of each primary element (beams and columns) is given with its specific details for all frames. The results show that the nine-story building with a dual frame system (moment frame with bracing system) has a lower susceptibility and greater resistance to PC than the six-story building with a simple building frame system (gravity system with bracing system). Implementing built-up box-shaped sections for columns is a better choice than using built-up I-shaped sections because there is no weak axis for the box section.