• Title/Summary/Keyword: Information Infrastructures

Search Result 431, Processing Time 0.025 seconds

세계 u-city 건설 현황 및 이슈

  • 정창덕
    • Information and Communications Magazine
    • /
    • v.22 no.7
    • /
    • pp.67-80
    • /
    • 2005
  • In these days, international Ubiquitous Cities are being developed in many places, and their settings, aims, designs, organizations, and functionality differ among many different kinds of solutions and systems. This paper has been based on quantitative and qualitative research, and used lots of relevant data and information. Even though Ubiquitous cities are generally conceived as local information infrastructures and as a means for enhancing democratic participation, users primarily appreciate it as a tool for communication. We also observed among others, how cyberspace reproduces the dynamics of established and outsiders, which inclines us to think that virtual public is not as open as is often claimed. However, Ubiquitous cities will always offer you more comfortable life than ever from now on.

DOC: A Distributed Object Caching System for Information Infrastructure (분산 환경에서의 객체 캐슁)

  • 이태희;심준호;이상구
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.249-254
    • /
    • 2003
  • Object caching is a desirable feature to improve the both scalability and performance of distributed application systems for information infrastructure, the information management system leveraging the power of network computing. However, in order to exploit such benefits, we claim that the following problems: cache server placement, cache replacement, and cache synchronization, should be considered when designing any object cache system. We are under developing DOC: a Distributed Object Caching, as a part of building our information infrastructures. In this paper, we show how each problem is inter-related, and focus to highlight how we handle cache server deployment problem

  • PDF

A Study on the State Policy for the Development of National Information Infrastructure (국가정보화 추진정책에 관한연구 - 초고속정보통신망기반의 구축을 중심으로 -)

  • 정충식
    • Journal of the Korea Society of Computer and Information
    • /
    • v.1 no.1
    • /
    • pp.7-24
    • /
    • 1996
  • In the emerging information society. a well-established national Information network plays a crucial role In enhancing economic efficiency and creating national wealth. Most of the advanced nations In the world are putting forward government-driven projects for the construction of their national Information Infrastructures. strategically focusing on the development of key technologies and Industrial essential for their Infrastructures. Development of the NII (National Infrastructure) can help unleash an Information revolution that will change forever the way people 1ive, work. and interact with each other. Nonetheless. the present Information Infrastructure In Korea loaves a lot to be Improved In order to realize the vision of Information society. The establishment of the KII (korea Information Infrastructure) does not merely mean the construction of physical network that enables the transmission of various modes of information such as voice, data, and image. It further implies the creation of a new kind of social overhead capital, ranging from the establishment of social and cultural which are conductive to seamless flow of information. For the successful implementation of the KII, it is critical to build the public consensus on the importance and necessity of informatization. At the same time, careful consideration should be given to the institutional factors such as timely and adequate supply of specialized personnel, the updating of policy and regulations, and the strengthening of interntional cooperation.

  • PDF

Development of BIM for a Maintenance System of Subway Infrastructures (지하철 구조물 유지관리 시스템을 위한 BIM 개발)

  • Shim, Chang-Su;Kim, Seong-Wook;Song, Hyun-Hye;Yun, Nu-Ri
    • Journal of KIBIM
    • /
    • v.1 no.1
    • /
    • pp.6-12
    • /
    • 2011
  • BIM(Building Information Modeling) technologies are the most effective for the maintenance of infrastructures because they provide information sharing througout the life-cycle of structures and support close communication between different project stages. Systematic and well-organized data play a fundamental role for the effective maintenance of subway tunnel. In this paper, 3D information models for maintenance of BIM-based subway tunnel structures are developed. Standard classifications for the maintenance and construction information classification system were adopted. A classification system based on construction information classification system was built considering procedures of maintenance work. It provides optimization and standardization of the work flow for the maintenance of subway structures by applying information modeling processes instead of the current maintenance practices. It can effectively reduces the life cycle cost and time for the maintenance. The proposed system can be utilized for the maintenance history management to enhance current maintenance system.

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • Chaudhry, Junaid Ahsenali
    • Journal of Information Processing Systems
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

An Empirical Study on the Usage and Performance of Electronic Commerce in Northeast Asian Nations (동북아지역 국가들의 전자상거래 활용과 성과에 관한 실증적 연구)

  • Choi, Seok-Beom;Choi, Hyuk-Jun
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.3-31
    • /
    • 2008
  • Northeast Asia is expected to be on economic bloc which is competed with other economic blocs such as EU, NAFTA. E-Commerce based on IT and networking results in paradigm shift in Northeast Asian Nations, that is, Korea, China, Japan, Taiwan etc. There are the similarities and differences in e-Commerce situations in these nations. The differences are the gaps in e-Commerce infrastructures such as Internet, e-Commerce solution, e-payment system and e-logistics system etc. A number of interorganizational, intraorganizational and usage level factors influences the performances of all firms using e-Commerce tools. As result of this empirical study, China records low level of e-Commerce in terms of environmental aspects, usage and performance while Korea and Japan record relatively high levels. It is also found that non-economic performance is higher than economic performance in Northeast Asian firms. The purpose of this paper contributes to resolve the digital divide in Northeast Asia and to improve e-Commerce infrastructures in Northeast Asia by estimating current e-Commerce levels of Northeast Asian countries and suggesting future development strategies of those countries through e-Commerce cooperation.

  • PDF

Application of the Cost-Distance Measures for Designating Zone Boundaries in DIF Zoning

  • Choi, Joon Young;Choei, Nae Young
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.2
    • /
    • pp.3-13
    • /
    • 2016
  • The development impact fee (DIF) zoning is used to adequately provide the pre-planned urban infrastructures in those urban and regional sectors where significant urban sprawl has already taken place followed by the rapid population growth. The infrastructure installation fees are levied to those landowners whose properties belong to the DIF zone in which they enjoy the direct benefits that accrue from the installed infrastructures. While the law is deemed to be equitable in that the actual beneficiaries pay for their benefits, it is required to designate the zone boundaries accurately and consistently since they are the very dividers that differentiate the legitimate fee-payers and the free-riders. This study, especially, tries to test a seemingly advanced alternative, so-called the cost-weighted distance measure, as a potential candidate to replace the current air-distance measures to designate the zone boundaries. The statistics indicate that the coefficient of variation for major indices spread from 11.75 to 35.6 in the case of the latter method, it only ranges from 0.21 to 0.76 in the case of the former. The zonal outcomes also show much higher consistency in their shapes. It is hoped, in this context, that the study findings could possibly be adopted in the future research efforts expected soon to amend and improve the current DIF zoning law.

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

An Analysis of the Security Threats and Security Requirements for Electric Vehicle Charging Infrastructure (전기자동차 충전 인프라에서의 보안위협 및 보안요구사항 분석)

  • Kang, Seong-Ku;Seo, Jung-Taek
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1027-1037
    • /
    • 2012
  • With response to the critical issue of global warming, Smart Grid system has been extensively investigated as next efficient power grid system. Domestically, Korean is trying to expand the usage of Electric Vehicles (EVs) and the charging infrastructure in order to replace the current transportation using fossil fuels holding 20% of overall CO2 emission. The EVs charging infrastructures are combined with IT technologies to build intelligent environments but have considerable number of cyber security issues because of its inherent nature of the technologies. This work not only provides logical architecture of EV charging infrastructures with security threats based on them but also analyses security requirements against security threats in order to overcome the adversarial activities to Smart Grid.

A Technical Approach for Suggesting Research Directions in Telecommunications Policy

  • Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4467-4488
    • /
    • 2014
  • The bibliometric analysis is widely used for understanding research domains, trends, and knowledge structures in a particular field. The analysis has majorly been used in the field of information science, and it is currently applied to other academic fields. This paper describes the analysis of academic literatures for classifying research domains and for suggesting empty research areas in the telecommunications policy. The application software is developed for retrieving Thomson Reuters' Web of Knowledge (WoK) data via web services. It also used for conducting text mining analysis from contents and citations of publications. We used three text mining techniques: the Keyword Extraction Algorithm (KEA) analysis, the co-occurrence analysis, and the citation analysis. Also, R software is used for visualizing the term frequencies and the co-occurrence network among publications. We found that policies related to social communication services, the distribution of telecommunications infrastructures, and more practical and data-driven analysis researches are conducted in a recent decade. The citation analysis results presented that the publications are generally received citations, but most of them did not receive high citations in the telecommunications policy. However, although recent publications did not receive high citations, the productivity of papers in terms of citations was increased in recent ten years compared to the researches before 2004. Also, the distribution methods of infrastructures, and the inequity and gap appeared as topics in important references. We proposed the necessity of new research domains since the analysis results implies that the decrease of political approaches for technical problems is an issue in past researches. Also, insufficient researches on policies for new technologies exist in the field of telecommunications. This research is significant in regard to the first bibliometric analysis with abstracts and citation data in telecommunications as well as the development of software which has functions of web services and text mining techniques. Further research will be conducted with Big Data techniques and more text mining techniques.