• Title/Summary/Keyword: Software service

Search Result 2,457, Processing Time 0.029 seconds

A Design of Diabetes Mellitus Scheduling Program for Diabetic Patients: A Software Engineering Approach

  • Choi, Jeong-Hoon;Huh, Jun-Ho;Weon, Sunghyun
    • Journal of Multimedia Information System
    • /
    • v.5 no.1
    • /
    • pp.53-58
    • /
    • 2018
  • The Republic of Korea (ROK) has been putting much effort to deal with diabetes which is being increasingly found in all age groups due to inadequate diet. Diabetes is closely related to one's eating habits and lifestyle that often cause hyperglycemia so that it is essential for the diabetic patients to change them to improve or control the major symptoms of diabetes. This study introduces a software engineering solution to support these patients. The software designed for the solution lets the patients to easily recognize their sugar levels and current treatment schemes and then advises a more effective approach along with the essential information through the embedded push service. The major goal of this study is to support diabetes patients by providing a convenient but effective means to prevent or improve diabetic symptoms by patients themselves who will in turn change their lifestyles in a positive manner.

Improvement of Software Cost Estimation Guideline Using OLAP Multidimensional Model (OLAP 다차원 모델을 이용한 소프트웨어 사업대가기준의 개선)

  • Park, Hye-Ja;Hwang, In-Soo;Kwon, Ki-Tae
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.197-210
    • /
    • 2012
  • This paper presents the ways that can improve the Software Cost Estimation Guidelines in order to replace those that are expected to be abolished at February, 2012, and solve the problems that are being occurred in the current Software Cost Estimation Guidelines. By using multidimensional modeling of OLAP(On-Line Analytical Processing), this paper does three dimensional modeling that considers the product/service view, process view and skill view. Also, it presents the identification method of cost estimation data through the view of each dimension. Furthermore, it defines the software cost estimation process and adapts them into the bottom up estimation and the top down estimation. Finally, it proposes the access of cost estimation data by the multidimensional analysis of OLAP.

A Measurement-based Quality Evaluation Scheme for Mobile VoIP Service over Wireless Broadband (WiBro) Networks (와이브로를 통한 모바일 VoIP 서비스의 측정 기반 품질 평가 방안)

  • Kim, Dong-Yon;Kim, Beom-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.528-533
    • /
    • 2010
  • Currently the telephone service using Internet grows and the recent introduction of a smart phone is expected to accelerate the trend. In particular, considering the domestic situation that the wireless broadband (WiBro) system deployed over the nation, the telephone service over WiBro can be a solution toward its fast expansion. Unlike telephone service over a conventional telephone network or mobile network, however, internet telephone cannot guarantee it service quality, which can be severer in a wireless environment such as a WiBro network. Therefore, a more strict and systematic management for controlling the quality of internet telephone service over WiBro in a more efficient way. As the first step to establish the management system, this paper proposes a scheme to manage the quality of internet telephone service over WiBro and introduces a software developed for the purpose. The developed software is installed on a user terminal and facilitates efficient service quality management by measuring the quality of internet telephone service over WiBro in terms of VoIP metric, network metric, and wireless metric.

A Specification and Exchange Method for Supporting SLA in SaaS Environment (SaaS 환경에서 SLA 보장을 위한 명세 및 교환 방법)

  • Nam, Taewoo;Kang, Taejun;Jang, Moonsoo;An, Youngmin;Yeom, Keunhyuk
    • Journal of Software Engineering Society
    • /
    • v.26 no.2
    • /
    • pp.45-52
    • /
    • 2013
  • A cloud computing service provider must assure Service Level Agreement (SLA) to provide reliable and consistent quality of service to a user. The SLA is a contract between the user and the service provider that connects to assure constant level such as availability to target provided service. The cloud computing is classified into IaaS, PaaS, and SaaS according to IT resources of the various cloud service. The existing SLA is difficult to reflect quality factors of service because it only considers factors about the physical Network environment. In this paper, we suggest the UDDI-based interchange process with the architecture and the specification language having a XML schema for the SLA specification. The quality requirements of SaaS are defined by a proposed specification language in the cloud environment. It is stored in the repository of a quality specification and exchanged on during the service binding time based on the exchange architecture.

  • PDF

A Centralized Network Policy Controller for SDN-Based Service Overlay Networking (소프트웨어정의네트워크 기반의 서비스 오버레이 네트워킹을 위한 네트워크 정책 제어기)

  • Jo, Jinyong;Lee, Soyeon;Kong, JongUk;Kim, JongWon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.4
    • /
    • pp.266-278
    • /
    • 2013
  • In this paper, to manage the efficient control of IP packet flows crossing multi-provider networks such as Internet, we propose a SDN(Software Defined Networking)-based policy controller. The proposed policy controller leverages the visibility of underlying network and manages both virtual links and ports to inter-connect networking elements. The controller is capable of quickly composing multiple on-demand virtual networks and dynamically managing the composed networks, thus it can provide more flexible and optimized overlay networking environment to end-user applications. More specifically, we first look into the proposed structure and features of policy controller. With two kinds of service applications, we then verify the applicability of the proposed controller by evaluating its service composition time.

Software Architecture of the Grid for implementing the Cloud Computing of the High Availability (고가용성 클라우드 컴퓨팅 구축을 위한 그리드 소프트웨어 아키텍처)

  • Lee, Byoung-Yup;Park, Jun-Ho;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.2
    • /
    • pp.19-29
    • /
    • 2012
  • Currently, cloud computing technology is being supplied in various service forms and it is becoming a ground breaking service which provides usage of storage service, data and software while user is not involved in technical background such as physical location of service or system environment. cloud computing technology has advantages that it can use easily as many IT resources as it wants freely regardless of hardware issues required by a variety of systems and service level required by infrastructure. Also, since it has a strength that it can choose usage of resource about business model due to various internet-based technologies, provisioning technology and virtualization technology are being paid attention as main technologies. These technologies are ones of important technology elements which help web-based users approach freely and install according to user environment. Therefore, this thesis introduces software-related technologies and architectures in an aspect of grid for building up high availability cloud computing environment by analysis about cloud computing technology trend.

An Exploratory Study on the SaaS Adoption Behavior of Small and Medium Sized Company (중소기업의 SaaS 채택의도의 영향요인에 관한 탐색적 연구)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.81-86
    • /
    • 2012
  • The global recession circumstances, cloud computing has emerged as a new paradigm in the business IT sector. This paper focuses on Software as a Service (SaaS) among cloud services. The Technology Acceptance Model (TAM) has been popularly utilized for examining how users come to accept a new technology, but have not yet been employed to handle issues regarding SaaS adoption. This paper aims at developing an exploratory model that examines important factors affecting SaaS adoption of small and medium sized companies. The proposed exploratory model tests a number of hypotheses which integrate TAM related theories with additional imperative constructs such as marketing effort. Thus, the findings of this study can not only help company users gain insights into SaaS adoption, but also help SaaS providers obtain inspiration in their efforts to discover more effective courses of action for developing their service and improving marketing strategy.

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

Improving Information Service for Earthquake Using Rapid ShakeMap

  • Hwang, Jinsang;Ha, Ok-Kyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.5
    • /
    • pp.95-101
    • /
    • 2021
  • In this study, we present how to improve the current seismic disaster information service by utilizing Shake, which can express the effects of earthquakes in the form of isolines. Using ShakeMap software provided by the U.S. Geological Survey, an automated rapid ShakeMap generation system was implemented, and based on this, an earthquake disaster information service improvement model was presented to identify earthquake risk in the form of intensity or peak ground acceleration. In order to verify the feasibility and effectiveness of the improved model, the seismic disaster information service app. was developed and operated on a trial basis in Pohang, Gyeongsangbuk-do. As a result of the operation, it was found that more detailed seismic risk information could be provided by providing information using rapid ShakeMap to induce users' safety behavior more effectively.

A Study on Activation of e-Reserve Service in University Libraries: Focusing on the case of University Libraries in the United States (대학도서관의 전자 지정자료 서비스 활성화에 대한 연구 - 미국 대학도서관 사례를 중심으로 -)

  • Kim, Juseop;Kim, Suntae;Choi, Sangki
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.199-221
    • /
    • 2021
  • Unlike the United States, course reserve and e-Reserve services of university libraries are very poorly operated in Korea. This paper studied cases of e-Reserve service operation of 131 university libraries in the United States to provide basic materials for revitalizing the e-Reserve service of domestic university libraries. To confirm the operation case, 131 university library websites were surveyed, and among them, the e-Reserve service operation methods of 7 university libraries were compared and analyzed, and the functions of 4 e-Reserve supporting software were checked. The research results can be used as reference materials in operating the e-Reserve service in domestic university libraries, and the function of the analyzed support software is considered to be a functional requirement to be considered when introducing the system.