• Title/Summary/Keyword: Software service

Search Result 2,475, Processing Time 0.029 seconds

A CACV Software Architecture for A Multimedia Collaboration Works based on IP-USN for Transportation Safety Service (운송 안전 서비스를 위한 IP-USN 기반 멀티미디어 공동 작업을 위한 CACV 소프트웨어 구조)

  • Ko, Eung-Nam
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.690-692
    • /
    • 2010
  • 본 논문에서는 운송 안전 서비스를 위한 IP-USN 기반의 윈도우 오버레이 기능에 세션 제어, 발언권 제어 등을 추가한 윈도우 공유 방법의 CACV 소프트웨어 구조를 제안한다. 운송 안전 서비스를 위한 IP-USN 기반의 공동 작업 환경에 참여하는 모든 사용자들은 사용자의 명령 또는 오류가 발생된 응용들을 제어 가능하며 상호 작용 가능하다. 상호 인지란 상호 작업 이해, 참여자 관계 설정 등 결합이라는 구현 기술을 말한다.

Development of Culture Information Community Service based on Software Engineering Methodology (소프트웨어공학 방법론을 기반으로 한 문화재 정보 커뮤니티 서비스 개발)

  • Kim, Young Gwan;Kim, Joong Soo;Lee, Eun-Ser
    • Annual Conference of KIPS
    • /
    • 2011.11a
    • /
    • pp.1289-1292
    • /
    • 2011
  • 본 논문은 융합의 형태로서 전통문화의 정보를 효율적으로 제공하기 위하여 최신 이슈인 스마트 폰을 기반으로 만들었다. 전통문화의 정보를 체계적으로 관리하기 위하여 소프트웨어 공학의 분석 및 설계 방법론을 활용하였으며, 스마트폰에서 전통문화의 정보를 검색할 수 있도록 하고자 한다. 또한 논문에서는 정보를 분석하는 과정을 분석과 설계를 통하여 수행하였다.

The Design of Component Repository Management System for Semantic Web (시멘틱 웹 기반 컴포넌트 저장소 관리 시스템 설계)

  • Kim, Yang-Hoon;Jang, Joon-Sik;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.2
    • /
    • pp.237-246
    • /
    • 2008
  • According to the development of information & web technology and the amount of information increases, there have been numerous problems exposed. Although, software engineers try to overcome the limitations by using software agent and web service, there hasn't been satisfactory result in the paradigm of current software agent being a provider to the user's demand. Moreover, the latest configuration of software development is based on CBD (Component Based Development). However, to construct new component using CBD costs great deal of expenses and therefore, a new model which can acquirecomponent information on the web promptly and accurately with low expenses is required. In this paper, the repository management system which acquires and manages on the Semantic web is designed and compare them to the existing component repository management and present its analysis result. In addition, to overcome the limitations of existing component repository system; low accuracy of search result, restrictive search vocabulary and faulty information, the specific plan is presented to perform a knowledge search for the component.

  • PDF

A Study on Reconfigurable Network Protocol Stack using Task-based Component Design on a SoC Platform (SoC 플랫폼에서 태스크 기반의 조립형 재구성이 가능한 네트워크 프로토콜 스택에 관한 연구)

  • Kim, Young-Mann;Tak, Sung-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.617-632
    • /
    • 2009
  • In this paper we propose a technique of implementing the reconfigurable network protocol stack that allows for partitioning network protocol functions into software and hardware tasks on a SoC (System on Chip) platform. Additionally, we present a method that guarantees the deadline of both an individual task and messages exchanging among tasks in order to meet the deadline of real-time multimedia and networking services. The proposed real-time message exchange method guarantees the deadline of messages generated by multimedia services that are required to meet the real-time properties of multimedia applications. After implementing the networking functions of TCP/IP protocol suite into hardware and software tasks, we verify and validate their performance on the SoC platform. Experimental results indicate that the proposed technique improves the performance of TCP/IP protocol suit as well as application service satisfaction in application-specific real-time.

  • PDF

A Study on Open Software based IP Network System Practice Platform and Practicing Scenario (공개 소프트웨어 기반 IP 네트워크 시스템 실습 플랫폼 및 실습 시나리오)

  • Kim, Tae-Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.106-114
    • /
    • 2020
  • It is very important for beginners in networking to build, test, and operate an IP network system, which is the key infrastructure of the fourth industrial revolution. An IP network system consists of the IP network itself, covering both the internet and underlying layers, plus the basic network system supporting fundamental network services, with a DNS, the DHCP, email, WWW, and application service systems, such as VoIP. This paper suggests an open software-based practice platform with a minimal network configuration on which beginners can practice on nearly all of the IP network system, and it presents a practice scenario and results. In addition, it adds both IP address allocation and routing table manipulation functions to the network simulator software, which will allow beginners to learn table-based datagram routing schemes in advance. This platform may be useful for networking beginners in order to practice on an IP network system on their own personal computers without additional equipment and costs.

A Study on the Factors Affecting Diffusion of Open Source Software (공개소프트웨어 도입 및 확산의 영향요인 연구)

  • Kwon, Moon Ju;Park, Seong-Taek;Kim, Tae Ung
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.225-234
    • /
    • 2012
  • OSS(Open source software) pursues the freedom to have access to open source and offers several advantages, over the proprietary software, to enterprises. Based upon Rogers(1995)' innovation-diffusion process, we assume that attributes of innovations includes five characteristics of innovations: relative advantage, compatibility, complexity, trialability, and observability, and that firms' perceptions of these characteristics predict the rate of adoption of OSS. To test this hypothesis, we presents a survey result from 201 companies and institutions concerning the use of OSS. Statistical analysis shows that adoption is highly correlated with each of those characteristics of innovations, but the regression analysis indicates that only compatibility and observability have effects on the adoption of OSS. This implies that intrinsic value of OSS is important, but unless the appropriate service package for improving IT environment is provided, it is not easy to change the perspective of corporate customers more favorable toward OSS use. As a conclusion, the academic and practical implications are also discussed.

A Korean CAPTCHA Study: Defeating OCRs In a New CAPTCHA Context By Using Korean Syllables

  • Yang, Tae-Cheon;Ince, Ibrahim Furkan;Salman, Yucel Datu
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Internet is being used for several activities by a great range of users. These activities include communication, e-commerce, education, and entertainment. Users are required to register regarding website in order to enroll web activities. However, registration can be done by automated hacking software. That software make false enrollments which occupy the resources of the website by reducing the performance and efficiency of servers, even stop the entire web service. It is crucial for the websites to have a system which has the capability of differing human users and computer programs in reading images of text. Completely Automated Public Turing Test to Tell Computers and Human Apart (CAPTCHA) is such a defense system against Optical Character Recognition (OCR) software. OCR can be defined as software which work for defeating CAPTCHA images and make countless number of registrations on the websites. This study proposes a new CAPTCHA context that is Korean CAPTCHA by means of the method which is splitting CAPTCHA images into several parts with random rotation values, and drawing random lines on a grid background by using Korean characters only. Lines are in the same color with the CAPTCHA text and they provide a distortion of image with grid background. Experimental results show that Korean CAPTCHA is a more secure and effective CAPTCHA type for Korean users rather than current CAPTCHA types due to the structure of Korean letters and the algorithm we are using: rotation and splitting. In this paper, the algorithm of our method is introduced in detail.

PDA-Based Software Development for Forest Inventory Data (PDA기반의 산림자원조사용 소프트웨어 개발에 관한 연구)

  • Lee, Heonho;Lee, Dohyung;Suk, Sooil
    • Journal of Korean Society of Forest Science
    • /
    • v.95 no.6
    • /
    • pp.690-695
    • /
    • 2006
  • This study was carried out to develop a system for forest resources inventory using PDA. The Forest Inventory Software running on PDA was developed based on a Forest Resources Inventory Method by Korea Forestry Service and 4th National Forest Inventory Method. The forest inventory data stored in PDA contains sea level and GPS positioning data. Forest inventory input items are 34 tree species, 18 diameter class by each tree species, number of trees, tree height per each diameter class, thickness of bark, and annual growth of tree. Application test of the software with the forest workers shorted that, hours of forest works were remarkably reduced. It is possible to do forest inventory effectively using Forest Inventory Software developed by this study. Therefore, investigation and management expenses can be reduced and labor productivity will be improved.

Cost-Effective, Real-Time Web Application Software Security Vulnerability Test Based on Risk Management (위험관리 기반의 비용 효율적인 실시간 웹 애플리케이션 소프트웨어 보안취약점 테스팅)

  • Kumi, Sandra;Lim, ChaeHo;Lee, SangGon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.59-74
    • /
    • 2020
  • The web space where web applications run is the cyber information warfare of attackers and defenders due to the open HTML. In the cyber attack space, about 84% of worldwide attacks exploit vulnerabilities in web applications and software. It is very difficult to detect web vulnerability attacks with security products such as web firewalls, and high labor costs are required for security verification and assurance of web applications. Therefore, rapid vulnerability detection and response in web space by automated software is a key and effective cyber attack defense strategy. In this paper, we establish a security risk management model by intensively analyzing security threats against web applications and software, and propose a method to effectively diagnose web and application vulnerabilities. The testing results on the commercial service are analyzed to prove that our approach is more effective than the other existing methods.

A Study on the Utilization of the SaaS Model UPnP Network in e-Trade (전자무역의 SaaS모형 UPnP 네트워크 활용방안에 관한 연구)

  • Jeong, Boon-Do;Yun, Bong-Ju
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.563-582
    • /
    • 2012
  • In this paper, UPnP Network SaaS model has been studied. Currently, this model of UPnP Network and the trade mission is being used by outsourcing. From now on, the introduction of new trading systems and existing systems and the commercialization of this model as a UPnP network service connection should work. The future of UPnP network SaaS model will become commercially available software, commercial software can be accessed remotely via the Internet should be. Customer site activities must be managed from a central location. Application software architecture, pricing, partnerships, management should not include the character models. N should be the model. When used in small and medium enterprises have a very high value.

  • PDF