• Title/Summary/Keyword: IT 비즈니스 네트워크

Search Result 225, Processing Time 0.027 seconds

Research on Web standards compliance and professional level of domestic Web Developer (국내 웹 개발자의 웹표준 준수 및 전문성 수준에 대한 연구)

  • Shin, Moon-sun;Jeong, Kyeong-ja;Kim, Byung-chul
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.201-208
    • /
    • 2016
  • Recently, non-standard techniques of web like Active-X caused not only user inconvenience but also barriers to the business of Internet. The government recognized that the serious environmental situation of using Internet is needed to be improved. Especially, HTML5 convergence technology is meant to be a specific platform over the devices, users, and systems. It also means web standards to support more creative business service model and emerging market. In this paper, we performed a survey on Web standards compliance and web development professional level of domestic web developers. In addition, we present the basic direction of government policy of software and software-positive human resources policy, that is based on the analysis of the survey results. Our study will be able to contribute to construct policies to support digital convergence industry and to strengthen technical assistance and expertise to build training programs for the spread of global Web standards (HTML5).

A simulation technique to create dataset of RFID business events (RFID 비즈니스 이벤트 데이터셋의 생성을 위한 시뮬레이션 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.289-291
    • /
    • 2013
  • As an wireless identification technology, RFID is now extending its application area including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as h/w, s/w, and so on. To adopt RFID, we need to evaluate validity of application area and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of RFID test datasets. In this paper, I propose a novel method for generating RFID business events dataset by means of the simulation of RFID application environment. Proposed method can generate near-real RFID event dataset by means of representing various RFID application environment into abstract network model based on petri-net. In addition, it can also be useful when determining adoption of RFID as well as when evaluating RFID system.

  • PDF

Extended Semantic Web Services Retrieval Model for the Intelligent Web Services (지능형 웹 서비스를 위한 확장된 시맨틱 웹서비스 검색 모델)

  • Choi, Ok-Kyung;Han, Sang-Yong;Lee, Zoon-Ky
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.725-730
    • /
    • 2006
  • Recently Web services have become a key technology which is indispensable for e-business. Due to its ability to provide the desired information or service regardless of time and place, integrating current application systems within a single business or between multiple businesses with standardized technologies are realized using the open network and Internet. However, the current Web Services Retrieval Systems, based on text oriented search are incapable of providing reliable search results by perceiving the similarity or interrelation between the various terms. Currently there are no web services retrieval models containing such semantic web functions. This research work is purported for solving such problems by designing and implementing an extended Semantic Web Services Retrieval Model that is capable of searching for general web documents, UDDI and semantic web documents. Execution result is proposed in this paper and its efficiency and accuracy are verified through it.

Transaction Model Suggestion by using Two Enforcements with a Blockchain based on a Service Platform (서비스 플랫폼 기반 이중강화적용 블록체인 응용 거래모델 제안)

  • Lee, Kwan Mok;Kim, Yong Hwan;Bae, Ki Tae
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.91-96
    • /
    • 2020
  • A blockchain is a technology in which all nodes participating in a distributed network manage each transaction's contents without a central server managing the transaction, which is a record of the transaction. The block containing the transaction record of a specific period is connected to the blockchain by referring to the hash value for the previous block, and the chain with the new block added is shared with all nodes again. Transactions using existing certificates will pass through FinTech, and in the near future, applications using blockchains are expected to emerge. In this study, we analyze the problems of the existing model, and propose a transaction model that applies the blockchain to come. Among various applications, this study develops a trading model targeting the energy sales market among the topics that will lead the fourth industrial revolution. As a result of analyzing the proposed model, it was possible to be sure of the possibility of a safer energy sales transaction than the existing method.

e-Business Security Framework and applied to Architecture (e-Business Security 프레임웍과 적용 방안)

  • 홍승필;김명철;김재현;김민형
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.87-97
    • /
    • 2002
  • Many firms are utilizing the Internet and various information technologies to effectively manage their business operations with a goal of gaining a competitive advantage in the rapidly changing business environments. Today, the business is characterized as digital economy where information freely flows and business processes are improved with the use of information technologies. Internet technology is playing a key role in transforming the organization and creating new business models. It has become the infrastructure of choice for electronic commerce because it provides process efficiency, cost reduction, and open standards that can easily be adopted by different organizations. Here, the vast amount of data and information slow among the related parties and security issues are very critical matter of research interests by academicians and practitioners. In this research, we address the importance of security framework in managing the data shared among the related parties in the e-business and suggest the security architecture for effectively supporting the needs of e-business in an organization. This research provides valuable contributions both in academics and industry in terms of how security framework and architecture should be set in order to provide the necessary e-business.

  • PDF

Implementation of Multilateral Control System for Small UAV Control-Focused on Design (소형 무인기 통제를 위한 다자간 방식 관제시스템 구축방안-설계 중심으로)

  • Choi, Hyun-Taek;Kim, Seok-Kwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.6 no.4
    • /
    • pp.65-71
    • /
    • 2017
  • In this paper, we propose a design method for the construction of LTE-based small unmanned aerial vehicle control system to quickly and reliably collect multiple small unmanned aerial vehicle position information simultaneously flying all over the country. In particular, the main requirements are the network (N/W), hardware (H/ W), software(SW), Database(DB), development architecture, and business needs. To satisfy these requirements, N/W, H/W, SW, DB design, and architectural design plan were suggested regarding the design requirements of a small UAV system. To effectively control the small unmanned multi-party system in the system design, the architecture is divided into the front-end service area and the back-end service area according to the function and role of the unit system. In the front-end service area that grasps and controls the position and state of small unmanned aerial vehicles (UAVs), we have studied the design part that can be expanded to N through TCP/IP network by applying Client PC method.

The Implementation of Communication Emulate Based on Component For Automation System (자동화시스템을 위한 컴포넌트 기반의 통신 Emulate 구현)

  • Jeong Hwa-Young
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.245-254
    • /
    • 2002
  • Currently, communication field for automation system can be divided by simple serial communication for communication between each internal devices and network base remote control system that is based on TCP/IP. In spite of great development of network, communication part for internal control is using simple RS232 base until present. Also, development techniques of system developed by object oriented program in modular programming techniques of each function unit. Currently, it developed by component base development technique that is parts unit of software. This is presented by the new alternative of software development techniques as techniques to composition independent operation unit including business logic and is connected to development of new system. Therefore, this research implemented internal communication Emulate in RS232C based on GUI that apply development techniques of component base. that is, I maked component to commnication control part between receiving and sending and, as composite it, Control part did to handling between send and receive data.

  • PDF

An Intelligent Character Manipulation System Suitable for Wireless Broadband Network Environment (휴대인터넷에 활용 가능한 지능형 캐릭터 제작 시스템 개발에 대한 연구)

  • Ryu, Seuc-Ho;Yun, Hwang-Rok;Kyung, Byung-Pyo;Lee, Dong-Lyeor;Lee, Wan-Bok;Lee, Kyoung-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.100-107
    • /
    • 2008
  • The aim of this paper is to design an intelligent character manipulation system suitable for the wireless broadband network environment named as Wibro and for the recent social networking service (SNS). The main feature of our proposed system is an automatic synthesis of a character utilizing the meta data which is attached to each component stored in a character database. It is the second advantageous feature that a user can make or modify his or her own character by modifying the component animation clip of its character. Once the character database is created, it can be represented and utilized in several ways by utilizing the meta data which is related to personal properties including emotion, life style, favorite things, and so on. The system can be evolved to a more powerful one by adopting the more user-related information and the more intelligent synthesis module.

A study on deriving success factors and activating methods through metaverse marketing cases (메타버스(Metaverse) 마케팅 사례를 통한 성공요인 및 활성화 방안 연구)

  • Jo, Jae-Wook
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.791-797
    • /
    • 2022
  • Through recent metaverse marketing case studies, success factors and activation methods were analyzed from the perspective of content, platform, network, and device of the metaverse ecosystem in each industry. The importance of contents and platform of metaverse could be found in entertainment, fashion, office space and real estate, education, advertisement and commerce industries. In order to vitalize the metaverse, firstly, it is necessary to strengthen active participation and retention by providing a stable revenue model for market participants. Secondly, the importance of attractive content to expand subscribers is a key trigger for metaverse activation. Thirdly, it is necessary to increase the convenience of using metaverse service by using a light and simple device for the user. Fourthly, a win-win cooperation strategy should be supported in the value chain of the industry through ecosystem scalability. In addition, business opportunities for market participants and additional revenue models should be continuously provided.

Consideration factors in implementing blockchain technology-based DID platform using ANP methodology - From a two-sided market perspective - (ANP 방법론을 이용한 블록체인 기술 기반 DID 플랫폼 구현 시 고려요소 - 양면시장 관점에서-)

  • Choi, Seungho;Youn, Daemyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.4
    • /
    • pp.127-136
    • /
    • 2022
  • As technological development continues, platforms with more diverse structures are emerging. Existing research predicts that a new structure based on technology and innovation will affect the two-sided market. This study evaluated the decentralized identifier (DID) platform, a new platform based on blockchain technology, of the importance of this platform from the perspective of the two-sided market. Using the Analytic Network Process, IT, platform, and blockchain experts conducted a dual comparison survey. Data with a consistency ratio value of 0.1 or less were selected and analyzed for 12 data. The research results showed the importance of service quality, policy support, openness, and uncertainty. This study is expected to be used to support the development of strategic decision-making for blockchain and DID platform-based business companies.