• Title/Summary/Keyword: Internal Network Information

Search Result 502, Processing Time 0.03 seconds

Design and Implementation of Component-Based XML/EDI System (컴포넌트기반의 XML/EDI 시스템 설계 및 구현)

  • 문태수;김호진
    • The Journal of Information Systems
    • /
    • v.12 no.1
    • /
    • pp.87-116
    • /
    • 2003
  • One of the important applications for business-to-business electronic commerce is in procurement and inventory management using electronic data interchange(EDI). Using online catalogs and approved supplier lists, firms can easily create requisitions and purchasing documents. The emerging trend in EDI technology is changed from VAN(Value Added Network) based EDI to XML based EDI. This paper intends to suggest a component-based XML/EDI system using Unified Modeling Language(UML), as an application system for automobile part industry. Applying component based XML/EDI systems designed with UML methodology, we analyzed the workflow and the document on procurement process between trading partners and implemented a prototype of efficient XML/EDI system, as a surrogate of existing VAN/EDI. The result of applying object-oriented CBD(Component Based Development) technique is to minimize the risk of life cycle and facilitate the reuse of software as mentioned to limitation of information engineering methodology. It enables the interoperability with corporate legacy systems such as ERP(Enterprise Resource Planning), SCM(Supply Chain Management). This system proposes a solution to apply analysis phase and design phase in implementation of XML/EDI system. The implementation of XML/EDI system using CBD shows the ease of use in software reuse and the interoperability with corporate internal information system. The purchasing department with XML/EDI system can electronically communicate purchase orders, delivery schedules to external suppliers and interoperate with other application systems.

  • PDF

Metro Telecommunication Basis Facilities Standardization and Functional Improvement Research (도시철도 구내정보통신 기반설비 표준화 및 기능 향상방안)

  • Kim Moon-Tae;Yoon In-Young
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.964-968
    • /
    • 2005
  • The standardization of information communication is doing a Internal each other connection and each other characteristic stability operation security in objective. From the low-speed network of the subway operation beginning currently it changes with the superhigh speed digital information transmission communication service environment which is a quality service, the hazard which plans the quality improvement of the efficient communication service use which hits to here and passenger service the standardization of the technical standard which stands and the improvement which hits to an engineering standard and facility must come to accomplish. The facility which existing is been old or the enclosure communication equipments which are insufficient. it improves, establishment itexpands efficiently, like this facilities it is stabilized and it is economic and rationally use maintenance it manages with the plan for the inside and outside of the country information communication relation technical standard and engineering standard service feature improvement and future expandability and economical efficiency, the possibility of having a pliability in order to be, rational technical standard and standard it takes a triangular position, efficient characteristic security of information communication service there is a place objective which promises the rational development of course city railroad communication system with character. Function improvement of enclosure communication base equipment, against an improvement and standardization plan it described trom the prosecution which it sees.

  • PDF

A Preliminary Study on the Effective Management Plan for the International Science Business Library (국제과학비즈니스도서관의 효과적 운영에 관한 기초연구)

  • Park, Hyun-Hee;Lee, Sung-Sook
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.2
    • /
    • pp.235-254
    • /
    • 2015
  • The aim of this study is to propose the effective management plan for (New) Library at International Science Business Belt in Korea. For this purpose, this study analyzed cases of domestic and overseas libraries which have been providing the special Science Business Service. Also user questionnaire surveys were conducted for the user demand in (New) Library. Based on case studies and user surveys, the management plan for ISBL was suggested as follow with its division into five realms; that is, information resources and special programs, manpower, space facilities, internal cooperation and international network. The research could be used as basic resources for the International Science Business Library in Korea.

Design and Implementation of a Digital Evidence Management Model Based on Hyperledger Fabric

  • Jeong, Junho;Kim, Donghyo;Lee, Byungdo;Son, Yunsik
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.760-773
    • /
    • 2020
  • When a crime occurs, the information necessary for solving the case, and various pieces of the evidence needed to prove the crime are collected from the crime scene. The tangible residues collected through scientific methods at the crime scene become evidence at trial and a clue to prove the facts directly against the offense of the suspect. Therefore, the scientific investigation and forensic handling for securing objective forensic in crime investigation is increasingly important. Today, digital systems, such as smartphones, CCTVs, black boxes, etc. are increasingly used as criminal information investigation clues, and digital forensic is becoming a decisive factor in investigation and trial. However, the systems have the risk that digital forensic may be damaged or manipulated by malicious insiders in the existing centralized management systems based on client/server structure. In this paper, we design and implement a blockchain based digital forensic management model using Hyperledger Fabric and Docker to guarantee the reliability and integrity of digital forensic. The proposed digital evidence management model allows only authorized participants in a distributed environment without a central management agency access the network to share and manage potential crime data. Therefore, it could be relatively safe from malicious internal attackers compared to the existing client/server model.

A Study on the Blocking of Commercial Mail Systems for the Prevention of Information Leakage in Public Institutions (공공기관 내부 정보유출 방지를 위한 상용메일시스템 차단 방안)

  • Kim, Seo-Hye;Kim, Do-hyun;Lee, Dae-sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.195-197
    • /
    • 2022
  • In this paper, we intend to study the fundamental blocking methodology for the use of external commercial mail systems in the corporate internal Internet network, which is a common concern of public and administrative agencies. By checking the limitations of the blacklist-based blocking method used in the past, and by analyzing packet of the mail sending web page, the delimiter used for mail transmission is extracted, and the purpose is to monitor and block the leakage of intenal information of the company using whitelist technology.

  • PDF

Performance Evaluation of RSIP Gateway in Intranet Environment (인트라넷 환경에서 RSIP 게이트웨이의 성능분석)

  • Kim, Won;Lee, Young-Taek;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.683-688
    • /
    • 2004
  • NAT is a very useful IP address translation technique that allows two connected networks using different and incompatible IP address schemes. But it is impractical to use NAT for an application which uses the encrypted IP packet, embedding IP addresses inside of data payloads, to guarantee End-to-End Security such as IPSec. In addition to rewriting the source/destination IP addresses in the packet, NAT must modify IP checksum every time, which could lead to considerable performance decrease of the overall system in the process of the address translation. RSIP is an alternative to solve these disadvantages of NAT and the address shortage problems. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable public address to a RSIP client temporarily to communicate with public net-work outside of the private network. In this paper, RSIP gateway for intranet environment is designed and its performance is evaluated. From the results of performance evaluation, we knew that RSIP is operated less sensitive to the data traffic. Also, the experiment shows that RSIP performs better than NAT when the transmission data grows larger.

Initial development of wireless acoustic emission sensor Motes for civil infrastructure state monitoring

  • Grosse, Christian U.;Glaser, Steven D.;Kruger, Markus
    • Smart Structures and Systems
    • /
    • v.6 no.3
    • /
    • pp.197-209
    • /
    • 2010
  • The structural state of a bridge is currently examined by visual inspection or by wired sensor techniques, which are relatively expensive, vulnerable to inclement conditions, and time consuming to undertake. In contrast, wireless sensor networks are easy to deploy and flexible in application so that the network can adjust to the individual structure. Different sensing techniques have been used with such networks, but the acoustic emission technique has rarely been utilized. With the use of acoustic emission (AE) techniques it is possible to detect internal structural damage, from cracks propagating during the routine use of a structure, e.g. breakage of prestressing wires. To date, AE data analysis techniques are not appropriate for the requirements of a wireless network due to the very exact time synchronization needed between multiple sensors, and power consumption issues. To unleash the power of the acoustic emission technique on large, extended structures, recording and local analysis techniques need better algorithms to handle and reduce the immense amount of data generated. Preliminary results from utilizing a new concept called Acoustic Emission Array Processing to locally reduce data to information are presented. Results show that the azimuthal location of a seismic source can be successfully identified, using an array of six to eight poor-quality AE sensors arranged in a circular array approximately 200 mm in diameter. AE beamforming only requires very fine time synchronization of the sensors within a single array, relative timing between sensors of $1{\mu}s$ can easily be performed by a single Mote servicing the array. The method concentrates the essence of six to eight extended waveforms into a single value to be sent through the wireless network, resulting in power savings by avoiding extended radio transmission.

Design of Security Method for Network Rendering of Augmented Reality Object (홀로그램 용 증강현실 객체의 네트워크 랜더링을 위한 보안 기법 설계)

  • Kim, Seoksoo;Kim, Donghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.92-98
    • /
    • 2019
  • Due to the development of hologram display technology, various studies are being conducted to provide realistic contents for augmented reality. In the case of the HMD for hologram, since augmented reality objects must be rendered by a small processor, it is necessary to use a low-capacity content. To solve this problem, there is a need for a technique of rendering resources by providing resources through a network. In the case of the existing augmented reality system, there is no problem of contents modulation because the resources are loaded and rendered in the internal storage space. However, when providing resources through the network, security problems such as content tampering and malicious code insertion should be considered. Therefore, in this paper, we propose a network rendering technique applying security techniques to provide augmented reality contents in a holographic HMD device.

Development of an IoT System Based on the oneM2M Communication Protocol (oneM2M 통신 프로토콜 기반 사물인터넷 시스템 개발)

  • Park, Kee-Hyun;Lee, Jong-Hwi;Woo, Min-Woo;Park, Joon-Suu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.41-49
    • /
    • 2016
  • In this paper, an IoT system which is increasingly popular in these days is developed. Among various international standards on the area, one M2M communication protocol is used in the system. The 0neM2M-based IoT system consists of ADN-AE modules and CSE modules. The ADN-AE module provides applications of various services. It also monitors a CSE module. The CES module is a platform that provides common services which should be provided to various AEs in an IoT system. The CSE module consists of a Network Manager module, a Message Handler module, and a Resource Manager module. The Network Manager module controls oneM2M communication and data flow in the system. The Message Handler module processes transmitted messages and the Resource Manager module manages the Resource Tree. The resource tree stores information of the objects to be managed in the system. Also, internal data flow and protocol mapping in the modules are explained.

Using Analytic Network Process to Construct Evaluation Indicators of Knowledge Sharing Effectiveness in Taiwan's High-tech Industries

  • Liu, Pang-Lo;Tsai, Chih-Hung
    • International Journal of Quality Innovation
    • /
    • v.9 no.2
    • /
    • pp.99-117
    • /
    • 2008
  • High-tech industry has been the principal economic source for Taiwan in recent years. The characteristics of high-tech industries in Taiwan are changeable product markets, short product life cycles and high company attrition rate. In the globalization trend, the high-tech industry has gradually increased corporate competitiveness and reached the goal of sustainable operations through knowledge management, knowledge sharing and new product research and development. Firms have aggressively strengthened and integrated their internal and external resources and enhanced knowledge sharing to increase industry operational performance. Effectively strengthening the knowledge management operation and performance evaluation of knowledge sharing in Taiwan's high-tech industry has become a critical issue. In the selection of knowledge sharing Key Performance Indicators (KPI), this research divided the knowledge sharing indicators into representative strategic indicators such as organizational knowledge learning, organizational knowledge resources, organizational information capacity and organizational knowledge performance through screening using Factor Analysis. The characteristics of the constructs were interdependent. This research calculated and adjusted the correlation among the key performance knowledge sharing indicators using ANP and determined the relative weight of knowledge sharing.