• Title/Summary/Keyword: Shared Service

Search Result 585, Processing Time 0.031 seconds

Development of XML Web Service for Load Flow by Using XML Dataset DB (XML DataSet DB를 연동한 조류계산용 XML Web Service의 개발)

  • 최장흠;김건중
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.52 no.10
    • /
    • pp.571-576
    • /
    • 2003
  • XML Web Service based on internet can cause problems on transmission speed and data error. Also system analysis results simulated by several different research groups can hardly have reliability because of error data that come from improperly managed files. In order to solve this problems, algorithm sever using XML Web Service is shared on the internet so widely that various application programs based on basic analysis module with a united IO can be developed. And also XML Dataset DB is interacted with XML Web Service, which prevents propagation of error data. It causes to improve reliabilityon the load flow analysis result and solve the problems on data error or transmission speed that can possibly come from internet.

Analysing Spatial Usage Characteristics of Shared E-scooter: Focused on Spatial Autocorrelation Modeling (공유 전동킥보드의 공간적 이용특성 분석: 공간자기상관모형을 중심으로)

  • Kim, Sujae;Koack, Minjung;Choo, Sangho;Kim, Sanghun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.1
    • /
    • pp.54-69
    • /
    • 2021
  • Policy improvement such as the revision of the Road Traffic Act are proposed for personal mobility(especially e-scooter) usage. However, there is not enough discussion to solve the problem of using shared e-scooter. In this study, we analyze the influencing factors that amount of pick-up and drop-off of shared e-scooter by dividing the Seoul into a 200m grid. we develop spatial auotcorrelation model such as spatial lag model, spatial error model, spatial durbin model, and spatial durbin error model in order to consider the characteristics of the aggregated data based on a specific space, and the spatial durbin error model is selected as the final model. As a result, demographic factor, land use factor, and transport facility factors have statistically significant impacts on usage of shared e-scooter. The result of this study will be used as basic data for suggesting efficient operation strategies considering the characteristics of weekday and weekend.

Station Extension Algorithm Considering Destinations to Solve Illegal Parking of E-Scooters

  • Jeongeun, Song;Yoon-Ah, Song;ZoonKy, Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.131-142
    • /
    • 2023
  • In this paper, we propose a new station selection algorithm to solve the illegal parking problem of shared electric scooters and improve the service quality. Recently, as a solution to the urban transportation problem, shared electric scooters are attracting attention as the first and last mile means between public transportation and final destinations. As a result, the shared electric scooter market grew rapidly, problems caused by electric scooters are becoming serious. Therefore, in this study, text data are collected to understand the nature of the problem, and the problems related to shared scooters are viewed from the perspective of pedestrians and users in 'LDA Topic Modeling', and a station extension algorithm is based on this. Some parking lots have already been installed, but the existing parking lot location is different from the actual area of tow. Therefore, in this study, we propose an algorithm that can install stations at high actual tow density using mixed clustering technology using K-means after primary clustering by DBSCAN, reflecting the 'current state of electric scooter tow in Seoul'.

The Effects of Shared Leadership, Organizational Communication, and Nursing Service Quality Perceived by Nurses on Patient Safety Management Activities (간호사가 지각하는 공유리더십, 조직의사소통, 간호서비스 질이 환자안전관리활동에 미치는 영향)

  • Ji In Nam;Nam Joo Je;Gyeong Hye Kang;Kyeong Hwa Cho;Sung Ju Lee;Min Yeong Kim;Min Jung Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.685-694
    • /
    • 2023
  • This study is a descriptive research study to analyze factors affecting patient safety management activities by identifying shared leadership, organizational communication, and nursing service perceived by nurses to prepare basic data for theoretical and practical information and intervention measures. This study collected data from 155 clinical nurses in C region in G-do from July 17 to July 28, 2023, and a total of 154 copies were finally analyzed. Using the SPSS Win. 25.0 program, technical statistics, t-test, one-way ANOVA, Pearson correlation coefficient, and hierarchical multiple regression were analyzed. As a result of analyzing variables affecting the subject's patient safety management activities with multiple regression using hierarchical selection, the higher the shared leadership, the higher the patient safety management. In order to efficiently perform nursing for nurses' patient safety management activities, research should be continuously conducted to develop specific intervention programs that can support patient safety nursing activities and verify their effectiveness

Hot Spot Prediction Method for Improving the Performance of Consistent Hashing Shared Web Caching System (컨시스턴스 해슁을 이용한 분산 웹 캐싱 시스템의 성능 향상을 위한 Hot Spot 예측 방법)

  • 정성칠;정길도
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5B
    • /
    • pp.498-507
    • /
    • 2004
  • The fast and Precise service for the users request is the most important in the World Wide Web. However, the lest service is difficult due to the rapid increase of the Internet users recently. The Shared Web Caching (SWC) is one of the methods solving this problem. The performance of SWC is highly depend on the hit rate and the hit rate is effected by the memory size, processing speed of the server, load balancing and so on. The conventional load balancing is usually based on the state history of system, but the prediction of the state of the system can be used for the load balancing that will further improve the hit rate. In this study, a Hot Spot Prediction Method (HSPM) has been suggested to improve the throughputs of the proxy. The predicted hot spots, which is the item most frequently requested, should be predicted beforehand. The result show that the suggested method is better than the consistent hashing in the point of the load balancing and the hit rate.

Stateless Randomized Token Authentication for Performance Improvement of OAuth 2.0 MAC Token Authentication (OAuth 2.0 MAC 토큰인증의 효율성 개선을 위한 무상태 난수화토큰인증)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1343-1354
    • /
    • 2018
  • OAuth 2.0 bearer token and JWT(JSON web token), current standard technologies for authentication and authorization, use the approach of sending fixed token repeatedly to server for authentication that they are subject to eavesdropping attack, thus they should be used in secure communication environment such as HTTPS. In OAuth 2.0 MAC token which was devised as an authentication scheme that can be used in non-secure communication environment, server issues shared secret key to authenticated client and the client uses it to compute MAC to prove the authenticity of request, but in this case server has to store and use the shared secret key to verify user's request. Therefore, it's hard to provide stateless authentication service. In this paper we present a randomized token authentication scheme which can provide stateless MAC token authentication without storing shared secret key in server side. To remove the use of HTTPS, we utilize secure communication using server certificate and simple signature-based login using client certificate together with the proposed randomized token authentication to achieve the fully stateless authentication service and we provide an implementation example.

An Impact on Management Performance by IT Service Firm's Creativity and Knowledge Management Factor (IT서비스 기업의 창의성 및 지식경영 요인이 경영성과에 미치는 영향)

  • Ahn, Yeon S.
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.95-109
    • /
    • 2013
  • This paper discussed about creativity and knowledge management variables as for effect factors on the management performance of IT service firms. Specially the mediation effects of knowledge management variables between the creativity and management performance were examined. To prove empirically the related hypothesis, the statistical analysis were based on the response from the 160 Korean IT Service firms. As an analysis results, it was found that the creativity of organizations was not the direct effector on the management performance. But the virtue of knowledge which are accumulated from knowledge management activity and shared in organizations was the direct effector. Also, the knowledge management activity is mediator on the in the relationship between the creativity and management performance. So this paper suggests that knowledge management activity and knowledge's virtue in the related the creativity in organizations are the important mediate factors for enhancement of IT service firm's performance.

A Study of Virtual Home Environment Implementation Scenario for Subscriber Privacy (가입자 정보보호를 위한 Virtual Home Environment 시나리오 보안 취약점 분석)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of Industrial Technology
    • /
    • v.21 no.A
    • /
    • pp.117-122
    • /
    • 2001
  • Currently, the VHE (suggested for global roaming user to provide personal service environment) implementation scenario is being proposed to realize 3G network requirements. However, developing VHE scenarios are focused on signal flow between node and network, and network and network. this case may result in weakness to protect subscriber's privacy in 3G network which commonly uses visited network. In this paper, we reanalyze a several VHE implementation scenarios for user profile protection, indicate a problem concerning user privacy, and finally, design a procedure to cope with vulnerability in VHE implementation scenario.

  • PDF

The Directory Service System for Efficient Shared-Object Access in Collaborative-Authoring (공동저작에서의 효율적인 공유객체 액세스를 위한 디렉토리 서비스 시스템)

  • 전재우;오삼권
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.233-235
    • /
    • 1999
  • 공동저작 관리 시스템은 효율적인 공동저작을 위해 공유객체관리기능, 세션관리기능, 텔리포인팅(telepointing) 기능, 그리고 공동저작 인지(collaboration awareness) 기능들을 제공해야 한다. 이 중 공유객체관리기능은 저작자로 하여금 등록된 공유객체들을 편리하게 액세스 할 수 있도록 하고 저작에 필요한 공유객체들을 등록, 변경, 그리고 삭제할 수 있도록 함으로써 작업효율을 증대시킬 수 있는 핵심기능이다. 최근의 연구는 주로 등록된 공유객체의 변경 및 불필요한 정보전송으로 인한 작업지연, 그리고 공유객체 액세스 권한의 효율적인 관리를 위한 플로어 제어(floor control)에 그 초점을 맞추고 있으나 공유객체관리를 위한 기법이나 구조에 관한 연구는 미흡하다. 편리한 공동저작을 위해서는 분산환경의 특징상 가 저작자들의 시스템에 자연스럽게 분산되어 있는 공유객체들을 저작자나 공유객체들의 실제 위치에 상관없이 액세스할 수 있도록 하고, 저작자로 하여금 공유객체의 등록 시에 유일명 부여(unique naming)를 가능하게 하여 필요한 공유객체를 쉽게 검색할 수 있도록 해야 한다. 이를 위해 본 논문은 공유객체 디렉토리 서비스(shared-object directory service)를 제안한다. 공유객체 디렉토리 서비스는 일반 디렉토리(normal directory)와 세션 디렉토리(session directory)를 저작자에게 제공하여 공유객체의 등록시에 유일명 부여를 가능하게 하고 필요한 공유객체 검색을 용이하게 한다.

  • PDF

Client Authentication Scheme based on Infinitely Overlapped Hashchains on Hyperledger Fabric (Hyperledger Fabric을 이용한 중첩형 무한 해시체인 기반의 클라이언트 인증기법)

  • Shin, Dong Jin;Park, Chang Seop
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.3-10
    • /
    • 2018
  • Each online user should perform a separate registration and manage his ID and password for each online commerce or SNS service. Since a common secret is shared between the user and the SNS server, the server compromise induces the user privacy breach and financial loss. In this paper, it is considered that the user's authentication material is shared between multiple SNS servers for user authentication. A blockchain service architecture based on Hyperledger Fabric is proposed for each user to utilize an identical ID and OTP using the enhanced hash-chain-based OTP.

  • PDF