• Title/Summary/Keyword: Software service

Search Result 2,475, Processing Time 0.024 seconds

A Web Service System Analysis Method Using Petri Net with Queue (대기행렬 페트리넷을 이용한 웹서비스 시스템 분석 방법)

  • Shim, Kyu-Bark;Yim, Jae-Geol;Lee, Gye-Young;Kim, Jin-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1409-1419
    • /
    • 2011
  • It is well known that estimating the system processing time and cost at the early stage of the software system development is very important, and many Petri net methods of analysing processing time have been published. In another field of computer science, web service has been widely studied as a key of an efficient application software development method. Considering these two phenomena, this paper introduces a Petri net method of analysing the process time of application software consisting of web services. It is not plausible to represent the process time of a web application system as a constant. Therefore, we propose to use "Petri net with queues" to represent a web application system. The main contribution of this paper is to introduce a method of analysing a "Petri net with queues".

A Study on the PKI based Technology for Internet Banking Service in the Open Software Environment (공개 소프트웨어 환경에서의 인터넷 뱅킹 서비스를 위한 PKI 기반 기술에 대한 연구)

  • Han, Myung-Mook;Lee, Chul-Soo
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.13-20
    • /
    • 2006
  • Since the domestic internet banking environment has established for Microsoft Internet Explorer (IE), the internet banking service is not able to use in the open operating system and web browser such as linux and freeBSD. To solve the :problem, we develop the digital signature system used the seed for the digital payment system in the open software environment. Because the domestic internet banking performs the certificate and digital signature verification through official certificate that the official certificate authority issues, we analyze and develop the verification of validity system for the official certificate. Since the virtual internet banking environment is already established in the web server developing under the self-abilities, the basic internet banking service can be performed installing the certificate in the client which has the mozilla porting the seed. Finally, we can confirm that the certificate and digital signature are performed normally through the experiment.

  • PDF

A Study on the Detection Technique of DDoS Attacks on the Software-Defined Networks (소프트웨어-정의 네트워크에서 분산형 서비스 거부(DDoS) 공격에 대한 탐지 기술 연구)

  • Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.81-87
    • /
    • 2020
  • Recently, the network configuration is being rapidly changed to enable easy and free network service configuration based on SDN/NFV. Despite the many advantages and applications of SDN, many security issues such as Distributed Denial of Service (DDoS) attacks are being constantly raised as research issues. In particular, the effectiveness of DDoS attacks is much faster, SDN is causing more and more fatal damage. In this paper, we propose an entropy-based technique to detect and mitigate DDoS attacks in SDN, and prove it through experiments. The proposed scheme is designed to mitigate these attacks by detecting DDoS attacks on single and multiple victim systems and using time - specific techniques. We confirmed the effectiveness of the proposed scheme to reduce packet loss rate by 20(19.86)% while generating 3.21% network congestion.

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

Sports Injury and Physiotherapy Services in the 2018 PyeongChang Winter Paralympic Games: Considerations and Potential Recommendations for Future Paralympics

  • Park, Haeun;Chang, Joon Young;Hwang, Jongseok;Lee, Young Hee;You, Joshua (Sung) Hyun
    • Physical Therapy Korea
    • /
    • v.29 no.3
    • /
    • pp.241-248
    • /
    • 2022
  • Background: The PyeongChang 2018 Winter Paralympic Games (WPG) being one of the most successful Paralympic Games (PG) in modern athletic world history, hosted the largest number of elite athletes representing 49 National Paralympic Committees (NPCs). Objects: The present investigation highlighted the demographic and clinical characteristics of injured athletes and non-athletes and the physiotherapy services provided during the PyeongChang 2018 WPG. Methods: Prospective descriptive epidemiology study, in which the study group comprised of 201 participants (51 athletes and 150 non-athletes) who were admitted to and utilized the polyclinic physiotherapy service of 2018 PyeongChang WPG in Physiotherapy Department of Paralympic Village from March 1, 2018 to March 20, 2018. Results: Qualitative frequency analysis of injury type demonstrated highest number of chronic injuries (51%, n = 100) in athletes and non-athletes. Anatomical injury site analysis revealed that the spine and shoulder areas were affected with equal frequency for athletes (54.9%, n = 14), whereas for non-athletes, the frequencies of spine and shoulder area injuries were 36.7% (n = 55) and 26% (n = 39), respectively. The Pyeongchang WPG showed a high rate of athletes visiting the physiotherapy service during the pre-competition period (33.3%, n = 50), which may have led to smaller incidence rate of traumatic injury. The physiotherapy treatment service analysis demonstrated that manual therapy (35.4%, n = 230) was most commonly utilized, followed by transcutaneous electrical nerve stimulation/interference current therapy (TENS/ICT), therapeutic massage and therapeutic exercise. Conclusion: We established the importance of prophylactic and preventive physiotherapy services to reduce the risk of sports injuries during WPG.

A Design-phase Quality Model for Ubiquitous Service Ontology (유비쿼터스 서비스 온톨로지를 위한 설계 품질 모델)

  • Lee, Mee-Yeon;Park, Seung-Soo;Lee, Jung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.6
    • /
    • pp.430-445
    • /
    • 2010
  • Effective service description and modeling methodologies are essential for dynamic service composition to provide autonomous services for users in ubiquitous computing environments. In our previous research, we proposed a 'u-Service' as an abstract and structured concept for operations of devices in ubiquitous environments. In addition, we established the mechanism to structure u-Services as an ontology and the description specification to represent attributes of u-Services. However, it did not provide enough methods or standards to analyze and evaluate the effectiveness of the u-Service ontology in the design time. Since existing quality models for software products or computing systems cannot consider characteristics of ubiquitous services, they are not suitable for ubiquitous service ontology. Therefore, in this paper, we propose a quality evaluation model to design and modeling a good ubiquitous service ontology, based on our u-Service ontology building process. We extract modeling goals and evaluation indicators according to characteristics of ubiquitous service ontology, and establish quality metrics to quantify each quality sub-characteristics. The experiment result of the proposed quality evaluation model for u-Service ontologies which are constructed for our previous works shows that we can analyze the design of ubiquitous service ontology from various angles, and indicate recommendations for improvement.

An Empirical Study on Pricing Model for Software Operation (소프트웨어 운영 대가산정 방식에 대한 실증적 연구)

  • Kim, Heungshik;Kim, Choong Nyoung;Seo, Yongwon
    • Journal of Information Technology Services
    • /
    • v.18 no.4
    • /
    • pp.67-82
    • /
    • 2019
  • The purpose of this study is to improve the calculation method of the software operation pricing proposed by the software business price calculation guide from 'input manpower method' to 'rate calculation method'. The software operation pricing of the input manpower method is not objectively calculated in the domestic IT outsourcing situation where the statistical data based on the activity based estimating is insufficient and it is decided by agreement between the owner and the client. In addition, there was no standard for adjusting the productivity according to the characteristics of the operation service. In order to improve this, an operational correction factor item that can affect the software operation productivity was selected based on foreign and domestic standards, and it was confirmed through the first questionnaire to IT operation managers. In order to determine the level of difficulty of the fixed operational correction factors, the operational correction factor using AHP technique was confirmed through a second questionnaire for pairwise comparison. The operational difficulty calculation table was developed with reference to COCOMO and ITIL standards. Finally, we propose a new pricing scheme that reflects the operating rate. Regression analysis was carried out by collecting the data of the domestic public institutions on the estimated cost and the actual cost calculated from the new rate method software operation pricing. The results of the regression analysis show that the estimated cost and the actual cost are related to each other. Mean magnitude of relative error(MMRE) and PRED[25] analysis were added for accuracy analysis. MMRE and PRED also showed satisfactory results, confirming the possibility of replacing the rate method software operation pricing.

Design and Implementation of File Cloud Server by Using JAVA SDK (Java SDK를 이용한 파일 클라우드 시스템의 설계 및 구현)

  • Lee, Samuel Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.2
    • /
    • pp.86-100
    • /
    • 2015
  • Cloud computing is a computing term that evolved in the late 2000s, based on utility and consumption of computer resources. Google say that "Cloud computing involves deploying groups of remote servers and software networks that allow different kinds of data sources be uploaded for real time processing to generate computing results without the need to store processed data on the cloud. Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility (like the electricity grid) over a network. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Cloud computing, or in simpler shorthand just "the cloud", also focuses on maximizing the effectiveness of the shared resources." The cloud service is a smart and/or intelligent service to save private files in any device, anytime, anywhere. Dropbox, OAuth, PAClous are required that the accumulated user's data are archives with cloud service. Currently we suggest an implementation technique to process many tasks to the cloud server with a thread pooling. Thread pooling is one of efficient implementating technique for client and service environment. In this paper, to present the implementation technique we suggest three diagrams in the consideration of software engineering.

A SOA based Framework Using AOP for Reliable Service Applications (AOP를 이용한 신뢰성 있는 서비스 어플리케이션의 SOA 기반 프레임워크)

  • Kim, Eun-Sun;Lee, Jae-Jeong;Lee, Byung-Jeong
    • Journal of Information Technology Services
    • /
    • v.10 no.2
    • /
    • pp.223-234
    • /
    • 2011
  • Loosely coupled properties of SOA(Service Oriented Architecture) services do not guarantee that service applications always work properly. Service errors may also influence other services of SOA. These characteristics adversely affect software reliability. Therefore, it is a challenge to effectively manage system change and errors for operating services normally. In this study, we propose a SOA based framework using AOP(Aspect Oriented Programming) for reliable service applications. AOP provides a way to manipulate cross-cutting concerns such as logging, security and reliability and these concerns can be added to applications through weaving process. We define a service specification and an aspect specification for this framework. This framework also includes service provider, requester, repository, platform, manager, and aspect weaver to handle changes and exceptions of applications. Independent Exception Handler is stored to exhibited external Aspect Service Repository. When exception happened, Exception Handler is linked dynamically according to aspect rule that is defined in aspect specification and offer function that handle exception alternate suitable service in systematic error situation. By separating cross-cutting concerns independently, we expect that developer can concentrate on core service implementation and reusability, understanding, maintainability increase. Finally, we have implemented a prototype system to demonstrate the feasibility of our framework in case study.

Dynamic Information Service Quality Model (동태적 정보서비스 품질 관리 모델)

  • Kim, Sang-Wook;Jung, Jae-Lim;Jo, Hyun-Woong
    • Korean System Dynamics Review
    • /
    • v.12 no.4
    • /
    • pp.125-156
    • /
    • 2011
  • The information service management models developed thus far have put their focuses mostly on technical dimensions of information systems (IS), finding their rationale from the goods-dominant logic (GDL) that IS as goods has value in itself. Information systems, however, is nothing more than a mechanism by which value is delivered to the users. According to the service-dominant logic (SDL), value is created and determined not at the time serve is made by the providers but at the time it is consumed by the users. The users therefore should be regarded as active value creators not as passive consumers of the value delivered by the providers. Based on the service-dominant logic, DISQM (Dynamic Information Service Quality Model) is developed. DISQM's backbone is designed in causal loop diagrams referring to and reinterpreting in systems thinking the 'Parasuraman, Zeithaml & Berry's GAP Model' and 'SERVQUAL' as an operational tool for the GAP Model, and the main IS success constructs are mapped onto the model exploiting the 'DeLone & MacLean's IS Success Model'. With VENSIM simulation software, this paper also shows how DISQM works in computer-simulation settings. After confirming DISQM's validity with the base simulation run, two scenarios are developed for the exemplary purpose and tested in terms of IS quality, service quality, and net benefits from the service for the public information service. Implications from the simulation runs are also discussed.

  • PDF