• Title/Summary/Keyword: Enterprise Information System

Search Result 1,167, Processing Time 0.029 seconds

Open Source Cloud Computing: An Experience Case of Geo-based Image Handling in Amazon Web Services

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.3
    • /
    • pp.337-346
    • /
    • 2012
  • In the view from most application system developers and users, cloud computing becomes popular in recent years and is still evolving. But in fact it is not easy to reach at the level of actual operations. Despite, it is known that the cloud in the practical stage provides a new pattern for deploying a geo-spatial application. However, domestically geo-spatial application implementation and operation based on this concept or scheme is on the beginning stage. It is the motivation of this works. Although this study is an introductory level, a simple and practical processed result was presented. This study was carried out on Amazon web services platform, as infrastructure as a service in the geo-spatial areas. Under this environment, cloud instance, a web and mobile system being previously implemented in the multi-layered structure for geo-spatial open sources of database and application server, was generated. Judging from this example, it is highly possible that cloud services with the functions of geo-processing service and large volume data handling are the crucial point, leading a new business model for civilian remote sensing application and geo-spatial enterprise industry. The further works to extend geo-spatial applications in cloud computing paradigm are left.

A Study on Spot Color Proofing using ICC-based Color Management System (ICC 기반의 컬러 매니지먼트 시스템을 사용한 별색 교정에 관한 연구)

  • Jung, Chung-Suk;Kang, Sang-Hoon
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.25 no.1
    • /
    • pp.81-94
    • /
    • 2007
  • Recently, the trend in the printing industry includes shorter run lengths and with fast turnaround times. As new markets have made it possible to produce small quantities of high-quality color products at affordable price, the general commercial printing meets the customer's diverse demand by using spot color besides process four colors. Especially, by using spot color for printing the enterprise's logo or specific color, we can see the effect of printing is getting better. With the combination of the right software, ink, media, and device can be treated as a digital proofer for spot color printing, providing significant time and cost savings compared to conventional procedures. The objective of this study is to investigate the quality of spot color proofs printed by ink-jet and dye sublimation proofer using ICC-based color management system. An Epson Stylus Color 3000 ink-jet proofer combined with Best Color Proof XXL RIP was tested for glossy and matte paper. 3M Rainbow dye sublimation proofer was examined using 3M Rainbow controller ver. 4.1 RIP on the manufacturer recommended proofing paper. ICC profiles were generated for each device using ECI 2002 visual target and evaluated for the accuracy of process 4 color reproduction. The test charts consisting of Pantone color 1140 was selected to test the quality of spot color reproduction.

  • PDF

ICS Security Risk Analysis Using Attack Tree (공격 트리를 이용한 산업 제어 시스템 보안 위험 분석)

  • Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.53-58
    • /
    • 2011
  • There is increasing use of common commercial operation system and standard PCs to control industrial production systems, and cyber security threat for industrial facilities have emerged as a serious problem. Now these network connected ICS(Industrial Control Systems) stand vulnerable to the same threats that the enterprise information systems have faced and they are exposed to malicious attacks. In particular Stuxnet is a computer worm targeting a specific industrial control system, such as a gas pipeline or power plant and in theory, being able to cause physical damage. In this paper we present an overview of the general configuration and cyber security threats of a SCADA and investigate the attack tree analysis to identify and assess security vulnerabilities in SCADA for the purpose of response to cyber attacks in advance.

A Workflow Enactment Model supporting Internet-scale Collaboration (인터넷 규모의 협업 지원을 위한 워크플로우 수행 모델)

  • 이이섭;박수현;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.6
    • /
    • pp.662-673
    • /
    • 2003
  • This paper proposed a workflow enactment model to provide process management functions for the next generation Internet service environment such as Web Service and Grid Computing. The existing enterprise workflow enactment models could not meet the scalability and reliability requirements for aforementioned environments. To satisfy these requirements, this study addressed on applying P2P model to the workflow enactment model. Mathematical description and proof were employed to show the recovery based on set theory and we also showed performance enhancement through simulations, which demonstrated a comprehensive result giving more than 100 times fast response time than the existing centralized model on the same resources.

A Study on Phon Call Big Data Analytics (전화통화 빅데이터 분석에 관한 연구)

  • Kim, Jeongrae;Jeong, Chanki
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.387-397
    • /
    • 2013
  • This paper proposes an approach to big data analytics for phon call data. The analytical models for phon call data is composed of the PVPF (Parallel Variable-length Phrase Finding) algorithm for identifying verbal phrases of natural language and the word count algorithm for measuring the usage frequency of keywords. In the proposed model, we identify words using the PVPF algorithm, and measure the usage frequency of the identified words using word count algorithm in MapReduce. The results can be interpreted from various viewpoints. We design and implement the model based HDFS (Hadoop Distributed File System), verify the proposed approach through a case study of phon call data. So we extract useful results through analysis of keyword correlation and usage frequency.

A Study on Job Training for Risk Factors Analysts of Work-related Musculoskeletal Disorders (근골격계질환 관련 유해요인조사자의 직무교육에 관한 연구)

  • Choi, In-Seok;Jeong, Byung-Yong
    • Journal of the Ergonomics Society of Korea
    • /
    • v.27 no.4
    • /
    • pp.65-71
    • /
    • 2008
  • This study conducted two surveys to establish an educational system to prevent work-related musculoskeletal disorders. The first survey investigates the factors influencing the recognition of job specifications for risk factor analysts of work-related musculoskeletal disorders. The respondents of the first survey were selected from 173 different small-sized manufacturing enterprises having less than 300 workers and had experienced the inspection of risk factors. The results of the first survey shows that better recognition of job specifications are followed by the increase of education time, but regardless of the positions and periods of job experience. Among the respondents with a high level recognition, the second survey was conducted. According to the results, it is presented that 2, 8, 16 hours are the most suitable for educating workers, superintendents, and risk factors analysts. Based on the results of the second survey, educational contents have also been suggested. This research will provide the basic information when forming education systems to prevent musculoskeletal disorders.

Study on Miniaturized RF Components for Application to Ship Radio Communication (선박 무선통신 응용을 위한 초소형 RF 소자에 관한 연구)

  • Young Yun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.390-391
    • /
    • 2022
  • Recently, SpaceX, private enterprise dealing in space development company, has reported a plan for launching of low earth orbit satellites via Starlink Business, and launched 900 satellites until now. Concretely, it plans tp operate Ku/Ka band satellite, and launch 7,518 of V band satellites for broadband communication. Therefore, wireless communication service for ship will be provided, and various solutions will be offered through the low earth orbit satellites. In this work, we investigated RF characteristics of coplanar waveguide employing periodic 3D coupling structures, and examined its potential for a development of marine radio communication FISoC (fully-integrated system on chip) semiconductor device.

  • PDF

Text Network Analysis of Korean Trade Stakeholder's Interactions - A Focus on the Trade Ministry and the Legislature (통상 이해관계자 간 상호작용 관련 텍스트 네트워크 분석(TNA) - 한국 통상부처와 입법부 관계를 중심으로)

  • Bomin Ko
    • Korea Trade Review
    • /
    • v.45 no.6
    • /
    • pp.23-43
    • /
    • 2020
  • This study aims at analyzing the interactions between two of the most significant trade stakeholders in Korea, the Trade Ministry and the Legislature, using text network analysis. Tackling seven Action and Plan Reports for Requests from Parliamentary Inspection released by the National Assembly, this paper conducts a topic modelling analysis, particularly focusing on the reports for the three trade-related institutes: the MOTIE headquarter, Korea Trade Insurance Corporation, Korea Trade and Investment Promotion Agency. According to the analysis, such traditional topics of the MOTIE as enterprise, industry, business, management, development were frequently appeared in the reports. Trade-related topics including export, trade, commerce, investment, overseas, domestic, dispute, cooperation, efficiency, negotiation, service, promotion were repeatedly shown. Lastly, a case study on 2019 Parliamentary Inspection Report showed specific trade-related topics and relevant contents that raised issues in that year. This analysis implies that the text data driven from the Parliamentary Inspection Reports between the MOTIE and the National Assembly, can be established as so called 'trade policy information system' which are valuable not only for the two but also the rest of the trade stakeholders in Korea.

A Case Study on the Internal and External Use of Information Sharing Network: A Qualitative Approach (정보공유 네트워크의 조직 내외부 활용에 관한 사례 연구: 질적 연구를 바탕으로)

  • Kim, Jonghyuk;Kim, Suk-Chul
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.205-226
    • /
    • 2016
  • As knowledge workers have increased and information interchanges become more diverse, only the resources of internal enterprise is not longer useful, and the practical use of external information through information public sharing network is even more crucial. But, few studies that use both internal and external information sharing systems together have been conducted. In this research, we carried on the depth interview to analyze the main factors that intend to utilize outside information as well as to share inside information voluntarily. In conclusion, sharing internal information is directly involved with the performance of their job exchanging simple data, past documents, and technical materials. On the other hand, using the external information belonged to several other organizations is mostly caused by the voluntary participants' satisfaction sharing their individual experience through the network systems. Based on the study, we propose the idea that can activate both internal and external information sharing network through the system with user feedback function regarding the customized information, and with the space expansion where people can freely raise their private opinion. We also introduce the plan of the construction of communication systems with various experts, and the development of compatible devices with diverse interfaces.

  • PDF

Personal Information System risk analysis standard supporting tool development (개인정보시스템 위험도 분석 기준 지원 도구 개발 연구)

  • Han, Kyung-Su;Jung, Hyun-Mi;Lee, Gang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.663-666
    • /
    • 2012
  • Since September 30 2011, depending on Personal Information Protection Act article 29 and Act standard securing personal information safety the fifth clause of article 7, in case personal information manager of public and private enterprise saves unique indentifying information to internal network, the manager can enforce that decide checking of cryptographic application and a range of application following risk analysis criteria result. Until December 31 2012, enterprises complete the application of cryptographic technology or the equivalent. The paper is research and development on supporting tool that suggest risk analysis criteria based on personal information risk analysis criteria that be provided by MOPAS(Ministry Of Public Administration and Security) and KISA(Korea Internet Security Agency) for personal information processing.

  • PDF