• Title/Summary/Keyword: ISIS

Search Result 65, Processing Time 0.022 seconds

ISIS Architecture for Developing Complex Enterprise Applications (복잡한 엔터프라이즈 응용 개발을 위한 ISIS 아키텍처)

  • Jo, Eun-Hwan;Lee, Kap-Hoon;Lee, Min-Soo;Lee, Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.392-404
    • /
    • 2010
  • Recently, as both business processes and IT systems become ever more complex. Especially, enterprise applications tend to become unmanageably complex and increasingly costly to maintain. Therefore complexity is the insidious enemy of software development. It is critical to have a methodology that recognizes and manages this enemy effectively. In this paper, we propose ISIS (Integrated System of Independent Subsystems) - the architectural style needed to develop the complex enterprise applications. The ISIS was developed to meet the challenge of reducing the complexity of a larger enterprise application today. It gives us architecture models for reducing development complexity and composite application. The enterprise application is partitioned into a collection of independent subsystems using ISIS decomposition schemes and equivalence relations. We use middleware named ISIS engine that provides a service for subsystems interoperability by enabling the integration of distributed, cross-platform subsystems. We have implemented an ITSM system that achieves our objectives, reducing development complexity, using the ISIS architecture. Finally, ISIS architecture provides greater flexibility and productivity when an organization needs either to change its business processes, or to update the underlying systems.

Using of CDS/ISIS on Information Processing (정보처리시(情報處理時)의 CDS/ISIS 이용(利用))

  • Seo, Jinn-Y
    • Journal of Information Management
    • /
    • v.23 no.2
    • /
    • pp.57-72
    • /
    • 1992
  • Look for definition and characters of information and data, CDS/ISIS which is one of the total system in information processing are introduced. Explain the main function, characters and advantages of CDS/ISIS and forethermore try to encourage of the function of current ISIS. We need program for Korean language are available.

  • PDF

A Computer-Aided Text Analysis to Explore Recruitment and Intellectual Polarization Strategies in ISIS Media

  • Khafaga, Ayman Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.87-96
    • /
    • 2022
  • This paper employs a computer-aided text analysis (CATA) and a Critical Discourse Analysis (CDA) to explore the strategies of recruitment and intellectual polarization in ISIS (Islamic State in Iraq and Syria) media. The paper's main objective is to shed light on the efficacy of employing computer software in the linguistic analysis of texts, and the extent to which CATA software contribute to deciphering hidden meanings of texts as well as to arrive at concise and authentic results from these texts. More specifically, this paper attempts to demonstrate the contribution of CATA software represented in the two variables of Frequency Distribution Analysis (FDA) and Content Analysis (CA) in decoding the strategies of recruitment and intellectual polarization in one of ISIS 's digital publication: Rumiyah (a digital magazine published by ISIS). The analytical focus is on three strategies of recruitment and intellectual polarization: (i) lexicalization, (ii) intertextual religionisation, and (iii) justification. Two main findings are revealed in this study. First, the application of CATA software into the linguistic investigation of texts contributes effectively to the understanding of the thematic and ideological messages pertaining to the analyzed text. Second, the computational analysis guarantees concise, credible, authentic and ample results than is the case if the analysis is conducted without the work of computer software. The paper, therefore, recommends the integration of CATA software into the linguistic analysis of the various types of texts.

A study on possibility of soft target terrorism by ISIS in South Korea (자국내 IS테러단체에 의한 소프트타깃 테러발생 가능성에 대한 연구)

  • Oh, Sei-Youen;Yun, Gyeong-Hui
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.85-117
    • /
    • 2016
  • These days, ISIS terrorists have been expanding not only to european countries, but also to asian countries so South Korea is no longer safe from terrorists' attacks. Especially, 'soft target terrorism' makes many people maximizing fear of terrorism because it is caused by small groups - those who are armed with small arms and light weapons - and they are able to carry out hit and run attacks on civilian targets. It poses even more dangerous to kill massively. That is why November 2015 Paris attacks and January 2016 Jakarta attacks killed and injured many people because of 'soft target terrorism.' Therefore, the South Korea has also recognized the seriousness of terrorism by ISIS. The study has shown the precautionary measures about 'soft target terrorism' and how to defend against 'soft target terrorism' by looking through overseas examples. It is for the possibilities of 'soft terrorism' in South Korea because of the expansion of ISIS. As a result, 'soft target terrorism', caused by ISIS, could happen in South Korea. The counterplan is as in the following. First of all, 'soft target terrorism', which is collaborated with ISIS and domestic terrorists, could be caused by negative awareness of foreign residents and xenophobia so the public should change stereotypes about the foreign residents and there should be legislation about racial discrimination enacted by parliament and the government must practice the law. Second, the Korean anti-terrorism laws should be modified to minimize violations of human rights, related to the Korean citizens' personal information, and to stop the concentration of power into the hands of one law enforcement. Third, the government has to develop and to initiate the refuge&evacuation simulation, which prepares for 'soft target terrorism' and minimizes the damages if terrorists attack hot spots like central commercial areas or event halls.

  • PDF

A Study on Information Retrieval Techniques of VOCED Database (직업교육 데이터베이스 VOCED의 검색기법 연구)

  • Kim, Soon-Won
    • Journal of Information Management
    • /
    • v.27 no.1
    • /
    • pp.40-65
    • /
    • 1996
  • This study is to review information retrieval techniques of VOCED database. The VOCED database contains internationally relevant information on vocational and adult education, training and related subjects. The software used is CDS/ISIS and the records are indexed using the APSDEP Thesaurus. When searching the VOCED database, various types of search techniques can be used. Multiple word, phrase, boolean logic, term truncation, defind field, and proximity searching techniques or a mixture of all of them, make it possible to find exactly what you want in seconds.

  • PDF

Development Methodology of Enterprise Applications based on the ISIS (ISIS 기반의 엔터프라이즈 어플리케이션 개발방법)

  • Jo, Eun-Hwan;Lee, Jong-Kook;Lee, Min-Soo;Chang, Young-Chul;Lee, Bong
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.529-535
    • /
    • 2010
  • 오늘날의 엔터프라이즈 IT 환경은 비즈니스 요구사항이 빠르게 변하면서 기존 시스템들의 민첩한 대응이 어렵고, 비즈니스 프로세스가 점점 복잡해지면서 시스템 개발 및 제어가 힘든 상황이다. 이 때문에 관리비용은 점점 증가하고 시스템의 수명주기가 단축되면서 전체적인 개발생산성이 낮아지고 있다. 최근 이와 같은 소프트웨어 개발문제를 극복하기 위해서 XP(eXtreme Programming)와 SCRUM 같은 애자일(agile) 방법론이 등장하게 되었고, 점차 대규모의 엔터프라이즈 어플리케이션 개발에 적용할 필요성이 대두되고 있다. 따라서 본 논문에서는 엔터프라이즈 어플리케이션의 개발생산성을 향상시키고 수명주기를 연장시키는데 효과적인 ISIS(Integrated System of Independent Sub-systems) 개발방법을 제안하고자 한다.

  • PDF

Analysis System for SNS Issues per Country based on Topic Model (토픽 모델 기반의 국가 별 SNS 관심 이슈 분석 시스템)

  • Kim, Seong Hoon;Yoon, Ji Won
    • Journal of KIISE
    • /
    • v.43 no.11
    • /
    • pp.1201-1209
    • /
    • 2016
  • As the use of SNS continues to increase, various related studies have been conducted. According to the effectiveness of the topic model for existing theme extraction, a huge number of related research studies on topic model based analysis have been introduced. In this research, we suggested an automation system to analyze topics of each country and its distribution in twitter by combining world map visualization and issue matching method. The core system components are the following three modules; 1) collection of tweets and classification by nation, 2) extraction of topics and distribution by country based on topic model algorithm, and 3) visualization of topics and distribution based on Google geochart. In experiments with USA and UK, we could find issues of the two nations and how they changed. Based on these results, we could analyze the differences of each nation's position on ISIS problem.

Suggestion of the design guideline of the GFRP rebar (GFRP 보강근의 설계지침(안))

  • Sim, Jong-Sung;Park, Young-Hwan;Choi, Dong-Uk;Park, Seok-Kyun;Park, Cheol-Woo;Oh, Hong-Seob
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2008.11a
    • /
    • pp.899-902
    • /
    • 2008
  • The GFRP rebar have been interested as the substituting material of the conventional steel rebar to the concrete structure for high durable concrete structure. The GFRP rebar, however, has different way to be fabricated and mechanical characteristics comparing with the conventional steel rebar. Therefore, to apply the GFRP rebar to the construction field, it needs the proper and reasonable design theory, codes and guidelines. In this study, for the design recommendation of the GFRP rebar, ACI440.IR and ISIS Canada design manual were investigated and concluded that the design theory of ISIS Canada design manual was relatively better design concept considering the limit state of the GFRP rebar in design and analysis. With this design concept, new design equation for the GFRP rebar was suggested and investigated with other design equations.

  • PDF