• Title/Summary/Keyword: Enterprise Information System

Search Result 1,169, Processing Time 0.024 seconds

Design and Implementation of Data Replication Web Agent between Heterogeneous DBMSs based on XML (XML 기반의 이기종 DBMS간 데이터 복제 웹 에이전트 설계 및 구현)

  • Yu, Sun-Young;Yim, Jae-Hong
    • Journal of Navigation and Port Research
    • /
    • v.26 no.4
    • /
    • pp.427-433
    • /
    • 2002
  • Since current HTML used on the internet is to use restricted tag, it is not easy to store information and extract data from information of document. XML defined newly tag and is easy to store information and extract data from information. So XML is easier to transact information rather than HTML. XML is suitable for enterprise's requirement needs data exchange between heterogeneous databases. This paper proposes web agent for data replication between heterogeneous DBMSs(Database Management System). Web agent system maneges database on the web and exchange data in heterogeneous database using XML. Then we designed and implemented for web agent of data replication between heterogeneous DBMSs.

The Policy Distribution Algorithm of Firewall in Integrated Security Management (통합보안관리시스템의 방화벽정책 분배를 위한 알고리즘 : FALCON)

  • Kim, Gwang-Hyeok;Gwon, Yun-Ju;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.467-472
    • /
    • 2002
  • Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalis to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.

Management Result Effecting Factors Through the Business Intelligence (비즈니스 인텔리전스 도입이 경영성과에 미치는 영향)

  • Kim, Hyun-Joon;Yang, Hae-Sool
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.431-448
    • /
    • 2008
  • The change of management paradigm is that information technology change according to technology evolution at present is applied to corporate management, is that management level must be adapted to uncertainty management environment with activity and be made decision based on analyzed real time information through information system. This produces the effective target achievement and efficiency business productivity guarantee. At the present day, importation of business intelligence like enterprise information system has been the essential factor in business activities. Therefore, It is very important to give lessons the enterprises for building the business intelligence selecting the major success factors of more influence to managing results. In this paper, to authorize the research model and research constructions through theory study of literatures and surveying statics analysis prove the relational influences among the influencing factors related business intelligence system buliding.

Study Level Inference System using Education Video Watching Behaviors (학습동영상 학습행위 기반의 학습레벨 추론시스템)

  • Kang, Sang Gil;Kim, Jeonghyeok;Heo, Nojeong;Lee, Jong Sik
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.371-378
    • /
    • 2013
  • Video-demand learning through E-learning continuously increases on these days. However, not all video-demand learning systems can be utilized properly. When students study by education videos not matched to level of their own, it is possible for them to lose interest in learning. It causes to reduce the learning efficiency. In order to solve the problem, we need to develop a recommendation system which recommends customized education videos according the study levels of students. In this paper, we estimate the study level based on the history of students' watching behaviors such as average watching time, skipping and rewinding of videos. In the experimental section, we demonstrate our recommendation system using real students' video watching history to show that our system is feasible in a practical environment.

A Store Recommendation Procedure in Ubiquitous Market (U-마켓에서의 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Kim, Min-Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.45-63
    • /
    • 2007
  • Recently as ubiquitous environment comes to the fore, information density is raised and enterprise is being able to capture and utilize customer-related information at the same time when the customer purchases a product. In this environment, a need for the recommender systems which can deliver proper information to the customer at the right time and right situation is highly increased. Therefore, the research on recommender systems continued actively in a variety of fields. Until now, most of recommender systems deal with item recommendation. However, in the market in ubiquitous environment where the same item can be purchased at several stores, it is highly desirable to recommend store to the customer based on his/her contextual situation and preference such as store location, store atmosphere, product quality and price, etc. In this line of research, we proposed the store recommender system using customer's contextual situation and preference in the market in ubiquitous environment. This system is based on collaborative filtering and Apriori algorithms. It will be able to provide customer-centric service to the customer, enhance shopping experiences and contribute in revitalizing market in the long term.

  • PDF

Development of an OLAP Database System for SME Growth Support -Centering around the Small Business Policy Funds Support Project- (중소기업성장지원 OLAP 데이터베이스 시스템 구축 - 중소기업 정책금융지원 사업을 중심으로-)

  • Hwang, Man-Mo;Choi, In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.157-167
    • /
    • 2012
  • The purpose of this paper is to develop an OLAP (online analytical processing) database system that supports the SMBA (Small and medium Business Administration) policy funding. A heterogeneous dimension schema will be central in staged support of policy funds. In this paper, therefore, we designed the FREQUENCY dimension table which has a heterogeneous dimension schema structure. In this paper, we made a model of measuring SME (small and medium-sized enterprise) size first. The model is composed of six determinants of firm growth such as sales, employment, own technology, the operating profit to sales ratio, the debt ratio, and the current ratio. We developed the OLAP database system by using three dimensions including the FREQUENCY dimension, and using the model of measuring SME size. Also we assessed past decisions on policy funding in the Small Business Policy Funds Support Project (2004-2007) by using the OLAP database system.

A Study of Advanced N-Tier Model for Improving Maintainability of Web Applications in Cloud Environment (클라우드 환경에서 웹 어플리케이션의 유지보수성 향상을 위한 N-계층 모델의 개선에 관한 연구)

  • Kim, In-Kyu;Shin, Joon-Chul
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.537-552
    • /
    • 2013
  • Software-as-a-Service (SaaS) has led to paradigm shifts in the information management area by combining it with SOA and Mashup. System developers now have more chances to access various high-quality functions through API opened on the web. But external resources are controlled by service providers so that it raises the component's uncertainty in system management which is related to external resources. In the cloud environment, components related to external resources causes negative effects on system's maintainability by making them dependant on service providers. This study proposes a way to enhance maintainability by using stable external resources. For this work, we suggest the N+1-tier model in which an external resource tier is added to the N-tier model. After that, we analyze how adding an external resource tier affects the decreasing complexity of maintainability and improving maintainability on web application.

Applying Intelligent Agent and Petri Net Modeling Technology to ERT Maintenance (지능형 에이전트와 페트리네트 모형화 기술을 활용한 ERP 유지보수 방법론)

  • 권오병;이재준
    • Journal of Information Technology Application
    • /
    • v.2 no.1
    • /
    • pp.113-137
    • /
    • 2000
  • Even though there is no doubt that ERP(Enterprise Resource Planing) system is a prevailing solution for integrating corporate information, many companies still hesitate adopting ERP system because of a great deal of cost including maintenance cost. In special, unless consulting knowledge that is infused into process reengineering phase or adequately embedded in customized ERP system is upgraded on time, then we cannot guarantee the optimality of system performance. Hence, this paper aims to construct an ERP system that adapts itself to environmental changes that are issued by database and users. To do so, we adopt intelligent agent technology and Petri net theory. The agents autonomously cooperate each other to investigate databases and to find any exceptional changes and analyze how the changes will affect ERP performance. The dynamics of the agents are represented as Petri nets. The newly proposed ERP system is to make corresponding BPR processes maintain optimality. To show the feasibility of the proposed ERP maintenance system, logistics component is described as an illustrative example.

  • PDF

A Study on the Effects of ICT Infrastructure Cost on Information System Life Cycle (정보시스템 수명주기에 인프라가 미치는 영향관계에 대한 연구)

  • Moon, Heoungkeun;Kim, Jeongho;Lee, Seogjun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.323-334
    • /
    • 2013
  • There are many studies on the project planning, project management and quality management. The cost of the new project takes only 20% of system's lifetime resource and the costs of the maintenance and infrastructure take more than 80%, so the study on the maintenance is much more important than the study on the new project. There has been many studies on the economic life cycle of the system using it's maintenance cost, but no studies on it's infrastructure cost. This paper provides how we can adapt infrastructure cost, which takes more than 40% of system's life cycle cost, to the economic life cycle of the system and its effects on the system's economic life cycle.

A Study on Conversion Security Control System for Industrial Security (산업보안을 위한 융합보안관제시스템에 관한 연구)

  • Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.1-6
    • /
    • 2009
  • Current paradigm of industrial security is changing into the effective operation and management from simple establishment of security equipments. If the physical security system(entry control system, video security system, etc.) and the IT integrated security control system are conversed, it makes us possible to prevent, disrupt and track afterwards the insider's information leakage through the risk and security management of enterprise. That is, Without the additional expansion of the existing physical security and IT security manpower, the establishment of systematic conversion security management process in a short time is possible and can be expected the effective operation of professional organization system at all times. Now it is needed to build up integrated security management system as an individual technique including the security event collection and integrated management, the post connected tracking management in the case of security accident, the pattern definition and real time observation of information leakage and security violation, the rapid judgement and response/measure to the attempt of information leakage and security violation, the establishment of security policy by stages and systematically and conversion security.

  • PDF