• Title/Summary/Keyword: IT Resource Sharing

Search Result 297, Processing Time 0.029 seconds

Dsign of Virtual Manufacturing Device for MMS Operations in MAP Network (MAP네트웨크에서 MMS운영을 위한 가상 제조 기기의 설계)

  • Kim, Jeong-Ho;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.397-405
    • /
    • 1995
  • In order to operate the automatic devices of manufacturing process more efficiently and to solve the needs of the resource sharing,network technology is applied to the unit control devices located in common manufacturing zone and operated by connecting them.In this paper,functional standard of the network operation layer is set as MAP standard application layer of MMS(manufacturing message standard)for the cell or group,which is suggested by CIM (computer integrated manufacturing) standardization as common manufacturing zone.MMS is composed of abstract message which is not consider specific devices.Then,specific message standard must be defined to operate MMS.It is designed as VMD (virtual manufacturing device)objects which are abstract objects to perform group management based on the companion standard.Also they are operated in the group management model system.Group management operation takes multicast communication method which is the communication from single source to the multiple sinks, and the group management system and unit control devices are performed as VMD and real device mapping.

  • PDF

GNUnet improvenemt for anonymity supporing in large multimedia file (대형 멀티미디어 파일의 익명성 지원을 위한 수정 GNUnet)

  • Lee Myoung-Hoon;Park Byung-Yeon;Jo In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.81-90
    • /
    • 2006
  • The GNUnet proposed a file encoding method by 1KB block size to support anonimity of files, decentralizes encoded block to peers through unstructed mode and original data decoding method a block searching or encoded blocks. but, the encoding and block decentralizing method with $600\sim700MB$ large multimedia file appered two problems. First problem, it need addition R block and I block, which make about 4% of storage resource. Second problem, unstructured model added network load by broadcasting decentralizing method. Third problem, The critical point of keyword search function. This paper suggest variable encoding block size and structured model by block decentralizing solution. Suggested encoding method reduced block request supplementary block generation from 4% to 1%, network load by proposal structured model sending answer through dedicated peer to decentralize block and we defined content-based keyword and identifier of sharing file.

  • PDF

Error Time Message Broadcast Method to Prevent Deadlock in Dynamic Reconfiguration Environment (동적 재구성 환경에서 교착상태를 예방하기 위한 오차 시간 메시지 브로드캐스트 기법 연구)

  • Shin, Hyun-Jun;Kim, Sung-Jin;Oh, Chang-Heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2131-2136
    • /
    • 2016
  • Before Industry 4.0, a purpose of manufacturing processes is simply overcoming the weakness of product line. However, Industry 4.0 should determine its method of work of facilities' own accord. Manufacturing processes such as FMS, AMS, MAS have been developed in these procedures, but there are possibilities of deadlock that can be happened for the reason of machine, agent or resource sharing. There were many studies to solve this problem. However, studies about prevention of deadlock happened in the situation that manufacturing processes are reconfigured dinamically because of human's intervention are incomplete. This paper proposes the model of the situation reconfigured dinamically and the method to prevent the deadlock in this situation. The proposed method adjusts production and manufacturing time by broadcasting time error messages to machines around when the manufacturing time of machine intervened by human is changed. Through this, it is anticipated to prevent the deadlock if conditions of the product line are changed.

A Configuration Change Control Procedure for Software Maintenance (소프트웨어 유지보수를 위한 형상변경통제절차)

  • Choe, Gwang-Jun;Kim, Gi-Bong;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2745-2755
    • /
    • 1997
  • Many large-scale enterprises have developed software systems to build management information system for their business. However, it is hard to maintain share ability of data, compatibility of operation methedology, and interoperability among subsystems when the development project progresses since each distributed team prepares a development plan for its subsystem and must have poor communication problem among those teams. We must apply software configuration management to the whole life cycle of the software system in order to solve those Problems. We need a model and a repository in order to execute configuration management on configuration products like document, data, and source code which are generated through the life cycle of software development. In this paper, we suggest a model for configuration change control where cross- referencing among life cycle Phases and data-sharing are highlighted, and define ER model to use IRDS(Information Resource Dictionary system) and IRD schemas.

  • PDF

NCS Learning Module Providing System Using CORS Based on Filter (CORS 기반 필터를 이용한 NCS 학습모듈 제공 시스템)

  • Kim, Dae-Kyeong;Na, Seung-Cheul;Kim, Chang-Bok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.2
    • /
    • pp.161-167
    • /
    • 2015
  • This paper proposed system for providing the national competency standards learning module, which has changed and updated from time to time. The provisioning server of the proposed system provides learning module, and the management server carry out fault management, billing, request management, statistics and aggregate, etc, and the target server requests the learning module in the provisioning server through the domain. The proposed system determines provide of the learning module by CORS based on filter, which is to determine whether matches or not with domain of the provisioning server and the target server. The proposed system can be patch and maintenance remotely about NCS based learning module to be new update and removed. Also, the proposed system may provide contents in conjunction with existing educational systems, and may be extended in the future to enable the management for domain of the target server.

Enhancing Social Value of Hospital School through Open Innovation with Networking: The Cooperative Case of YUH's Hospital School and YUBS's Volunteering Club of Herewego (병원학교의 사회적 가치 증진을 위한 개방형 혁신 네트워킹에 관한 연구: 영남대학교의료원 병원학교와 영남대학교 경영대학 교육기부봉사 사업단 '희열위고'의 협업사례를 중심으로)

  • Park, Jaechan;Lee, Jae-Min
    • Knowledge Management Research
    • /
    • v.19 no.4
    • /
    • pp.133-148
    • /
    • 2018
  • The hospital school is an organization designed to encourage long-term health-impaired students to receive treatment and education at the same time. There are 33 hospital schools in Korea. However, the management of hospital schools varies greatly depending on the amount of resources and support they possess, and especially the lack of manpower and quality improvement of education programs were found to be the biggest problems. This study aims to discuss the case of Hospital School in Yeungnam University Hospital (YUH), which successfully overcame internal resource limitations while solving existing hospital schools through networking and open innovation with external organizations. In particular, through cooperation with students of Herewego, volunteering club in Yeungnam University business school(YUBS), we increased the social interest of hospital school by creating a special program with financial support of Daegu city. They created customized education service programs for hospital schools that reflect their major-business management. The cooperativ e case of YUH's Hospital School and YUBS's Volunteering Club of Herewego showed that the cooperation is not only about volunteering service but also the open innovation, introduced as a platform to expand the company's source of product development. We think that this is a case of value creation through exchange of knowledge. It could have many implications for solving the problem of hospital school.

A Study on the Building of Tuna Farming in Floating Offshore Wind Power Generation Field at East Sea (동해 부유식 해상풍력발전단지 내 참다랑어 양식장 조성에 관한 연구)

  • Choi, Gun Hwan;Kim, Mi Jeong;Jang, Ki Ho;Kim, Hyo Seon
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.33 no.5
    • /
    • pp.179-186
    • /
    • 2021
  • We need measures that can come up with alternative about fishery living zone and enhance local acceptance for responding to the increase in the proportion of renewable energy production and construction of 12GW Offshore wind power according to Korea's Renewable Energy 3020 initiative and Korean-version New Deal. In this study, We suggest that differentiation plans of co-location model in connection with offshore wind power generation suitable for the East Sea. The East Sea is an optimal site for building of a floating offshore wind power generation(FOWPG) field. It is expected that economic effects like energy production, aquatic resource development and tourism industrialization by farming bluefin tuna which is high valued fish and suitable for offshore aquaculture on public waters in FOWPG field. And we can confirm that budget reduction, smart management by sharing operation management technology and increase in fishermen income.

Design of an Efficient AES-ARIA Processor using Resource Sharing Technique (자원 공유기법을 이용한 AES-ARIA 연산기의 효율적인 설계)

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Chang, Tae-Joo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.39-49
    • /
    • 2008
  • AEA and ARIA are next generation standard block cipher of US and Korea, respectively, and these algorithms are used in various fields including smart cards, electronic passport, and etc. This paper addresses the first efficient unified hardware architecture of AES and ARIA, and shows the implementation results with 0.25um CMOS library. We designed shared S-boxes based on composite filed arithmetic for both algorithms, and also extracted common terms of the permutation matrices of both algorithms. With the $0.25-{\mu}m$ CMOS technology, our processor occupies 19,056 gate counts which is 32% decreased size from discrete implementations, and it uses 11 clock cycles and 16 cycles for AES and ARIA encryption, which shows 720 and 1,047 Mbps, respectively.

Priority Analysis for Agricultural Water Governance Components by Using Analytic Network Process(ANP) (ANP 기법 활용 농업용수 거버넌스 구성요인 우선순위 분석)

  • Lee, Seulgi;Choi, Kyung-Sook
    • Journal of Korean Society of Rural Planning
    • /
    • v.29 no.4
    • /
    • pp.27-34
    • /
    • 2023
  • Recently, worldwide to respond to climate change and secure sustainability. Korea aimed to increase water use efficiency by implementing integrated management according to the water management unification policy. Therefore, the necessity of establishing and operating governance is expanding to ensure the sustainability of agricultural water. In this study aims to evaluate the importance of agricultural water governance components and provide essential data for the participation of stakeholders in the efficient use of agricultural water in Korea. For this study, a total of 19 respondents to the ANP survey for this study were composed of experts in agricultural water and governance in Korea. As a result, the ranking for the main components was in the order of law, policy, and systems(0.222), core subjects(0.191), information sharing and communication(0.180), budget support(0.178), mutual learning(0.124), and external experts(0.105). The most important components for the operation of agricultural water governance are laws, policies, and systems. Since Korea's agricultural water management is a public management system, national standards are considered the first priority. This study, which is the purpose of the agricultural water governance model, evaluated the importance of the constituent components for participating in demand management with a sense of responsibility. Moreover, if agricultural water governance is expanded nationwide by reflecting agricultural and water resource policies in the future, it is believed that positive effects can be achieved in increasing utilization efficiency and securing sustainability through agricultural water saving.

A Study on Vulnerability for Isolation Guarantee in Container-based Virtualization (컨테이너 기반 가상화에서 격리성 보장을 위한 취약성 고찰)

  • Dayun Yum;Dongcheon Shin
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.23-32
    • /
    • 2023
  • Container-based virtualization has attracted many attentions as an alternative to virtual machine technology because it can be used more lightly by sharing the host operating system instead of individual guest operating systems. However, this advantage may owe some vulnerabilities. In particular, excessive resource use of some containers can affect other containers, which is known as the noisy neighbor problem, so that the important property of isolation may not be guaranteed. The noisy neighbor problem can threat the availability of containers, so we need to consider the noisy neighbor problem as a security problem. In this paper, we investigate vulnerabilities on guarantee of isolation incurred by the noisy neighbor problem in container-based virtualization. For this we first analyze the structure of container-based virtualization environments. Then we present vulnerabilities in 3 functional layers and general directions for solutions with limitations.