• Title/Summary/Keyword: Standard service model

Search Result 523, Processing Time 0.025 seconds

Analysis on Deployment of Fire Service Force in Korea (한국 소방력배치의 실태 분석)

  • Back, Min-Ho;Lee, Hae-Pyeong
    • Fire Science and Engineering
    • /
    • v.20 no.1 s.61
    • /
    • pp.55-70
    • /
    • 2006
  • The purpose of this study is to analyze an adequate deployment of fire service force to be prepared to respond appropriately and effectively in Korea by settlement pattern. In order to examine the deployment of fire service force by the present standard, we analyzed the logical basis and the deployment of fire service force by city and province. We also classified clusters for settlement pattern through the statistical methods and raised several points for the existing deployment model of fire service force by the classified settlement pattern. As a result, it was confirmed that the deployment of fire service force by the settlement pattern was irrelevant to fire service need.

A Study on Key Information Service Protocol for Secure XML Web Service (안전한 XML 웹 서비스를 위한 키 정보 서비스 프로토콜에 관한 연구)

  • Park, Nam-Je;Moon, Ki-Young;Sohn, Sung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.769-778
    • /
    • 2003
  • XKMS(XML Key Management Specification), one of XML Security specification, defines the protocol for distributing and registering public keys for verifying digital signatures and enciphering XML documents of web service applications with various and complicate functions. In this paper, we propose XML Key Information protocol service model and implements reference model of protocol component based on standard specification. Also describes the analysis and security method of Key Information Service(XKIS) for Secure XML Web Service,paying attention to the features of XML based security service. This protocol component supported includes public key location by given identifier information, the binding of such keys to edentifier information. This reference model offers the security construction guideline for future domestric e-Business Frameworks.

Performance Analysis of IEEE 802.15.6 MAC Protocol in Beacon Mode with Superframes

  • Li, Changle;Geng, Xiaoyan;Yuan, Jingjing;Sun, Tingting
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1108-1130
    • /
    • 2013
  • Wireless Body Area Networks (WBANs) are becoming increasingly important to solve the issue of health care. IEEE 802.15.6 is a wireless communication standard for WBANs, aiming to provide a real-time and continuous monitoring. In this paper, we present our development of a modified Markov Chain model and a backoff model, in which most features such as user priorities, contention windows, modulation and coding schemes (MCSs), and frozen states are taken into account. Then we calculate the normalized throughput and average access delay of IEEE 802.15.6 networks under saturation and ideal channel conditions. We make an evaluation of network performances by comparing with IEEE 802.15.4 and the results validate that IEEE 802.15.6 networks can provide high quality of service (QoS) for nodes with high priorities.

A Study on the Logistics Information Synchronization based Smart SCM Model (물류정보동기화 기반의 Smart SCM 모델에 관한 연구)

  • Kim, JangGoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.5
    • /
    • pp.311-318
    • /
    • 2013
  • Recently, there have been many studies on RFID-based SCM. Yet, studies of synchronizing errors caused by tracking logistics information in supply chain, and activating & monitoring RFID infra is still insufficient. Also, there is no case of developing the intelligent SCM system enabling total monitoring and controlling RFID Infra by applying these technologies. Logistics information synchronization based Smart SCM model is intelligent supply chain service model to monitor the status of the RFID equipments in supply chain and the synchronization of the logistics process in each logistics point through one integrated view, as well as to react instantly by providing the information to help the various decision makings, when the emergency occurs. By adopting global logistics standard, RFID related standard specification, EPCIS standard, and SSI middleware platform, this model provides the domestic standard specification.

Design and Implementation of Integrated Query System for e-Business Registries (e-비즈니스 레지스트리 통합 질의 시스템 설계 및 구현)

  • 김계용;이규철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.1
    • /
    • pp.127-146
    • /
    • 2003
  • With the spread of Internet, e-business using Internet technology is being actively developed and operated. Currently, on behalf of the international e-business framework, International standard such as ebXML and Web Service is being advanced. We are able to publish and search business information through ebXML and Web Service and then actual trading between partners is accomplished. By the way, it is Registry that play an important part in e-business. Registry is an e-business infrastructure for enabling building, deploying, and the discovery of business Information. We can do e-business through Registries dynamically and share the resources. Representatives of Registry are ebXML and UDDI used as an international standard. We will meet with some problems when using Registries. ebXML Is focused on B2B collaborations and Web Service Is focused on application integrations. So we must use ebXML and Web Service characteristically, and sometimes use all at need. ebXML and Web Service contain business information by Registry specific way. So When using the services offered by ebXML and Web Service, we should access each Registry by using Registry specific tools. This thesis intended to integrate business information from ebXML Registry and UDDI Registry to accomplish e-business conveniently This thesis defined the common data model as well as integrated query language for integrated access to ebXML and Web Service along with design and implementation of the system.

  • PDF

A Policy-driven RFID Device Management Model (정책기반 RFID 장치 관리 모델)

  • Lee, Woo-Sik;Kim, Nam-Gi
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.75-81
    • /
    • 2012
  • Previous RFID systems exclusively manage the tags and readers for each company in individual manner. Thus, RFID system manager should understand and design specifications such as tag events, data format, and etc, based on individual companies. But it is very difficult to know all statements. To resolve theses problems, there has been conceptual research about policy-based RFID service management model that is not restrained from standards of typical RFID systems, including EPCglobal standard, and ISO/IEC standard. However, previous proposed service management model only aimed event management without including device management. Therefore, in this paper, we propose extended device management policy model for giving shape to the proposed policy-based RFID service management model. If the proposing device management policy model is used for device management, we can integrate control management for heterogeneous middleware, diverse RFID devices, and applications for each company. Moreover, we show that the RFID device management policy is translated and processed as an example using the proposing policy model in real-time RFID system.

XML Key Information Service Modeling for Secure Electronic Commerce (안전한 전자상거래를 위한 XML 키 정보 서비스 모델링)

  • 박남제;문기영;송유진
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.241-257
    • /
    • 2003
  • XML is a global standard for the Internet and e-business, and its use is growing in proportion to the spreading speed of e-Commerce. Thus, a policy for providing more safe security service for exchanging e-documents within e-Commerce is necessary. XKMS, one of XML security specification, defines the protocol for distributing and registering public keys for verifying electronic signatures and enciphering e-documents of e-Commerce applications with various and complicate functions. In this paper, we propose X-KISS service reference model and implement service component based on standard specification. Also describes the analysis and security of XML key information service for safe e-Commerce, paying attention to the features of XML based security service. This reference model supported include public key location by given identifier information, the binding of such keys to identifier information. The client service component controls the number of locate threads and validate threads to analyze the minimum requirements of real-time key retrievals. This service modeling offers the security construction guideline for future domestic e-business frameworks.

  • PDF

A study on Support System for Standard Korean Language of e-Learning Contents (e-Learning 콘텐츠의 남북한 표준언어 지원시스템 연구)

  • Choi, Sung;Chung, Ji-Moon;Yoo, Gab-Sang
    • Journal of Digital Convergence
    • /
    • v.5 no.2
    • /
    • pp.25-36
    • /
    • 2007
  • In this paper, we studied on the effective structure of an e-Learning Korean Support System for foreigner based on computer systems which is to obey the rules of IMS/AICC International Standard regulations based on LCMS and SCORM. The most important task on this study is to support the function of self-study module through the review of the analysis and results of Korean learning and learning customs. We studied the effective PMS detail modules as well as the Standard Competency Module Management System, which related to LMS/LCMS, Learning an Individual Competency Management System, Competency Registry/Repository System, Knowledge Management System based on Community Competency Module, Education e-survey System and Module learning Support Service System. We suggested one of standard Effective Model of learning Korean Support System which is adopted in a various techniques for foreigner.

  • PDF

A study of SSO design based SAML for public library clustering (공공도서관 클러스터링을 위해 SAML 기반의 사용자통합인증 설계에 관한 연구)

  • Byeon, Hoi Kyun;Ko, Il Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.55-67
    • /
    • 2008
  • The user has to subscribe to the library so that user use the library service. User has to register at that in order to use of the nearby another library. Moreover, service such as the inter-library loan and returning my loan book to other library in which the mutual cooperation between the library is needed necessity. But it services due to the constraint condition because of the administrative or technical problems. In this paper excludes the administrative element. The web service model is forming the cluster based on the mutual cooperation between the technologically adjacent public library and provides the technologically necessary single sign-on (SSO) in order to support the additional service. The single sign-on of the library which is concluded by this model using the security information exchange standard (Security Assertion Markup Language : SAML), it is processed by XML base. In using this model, the loan information is confirmed in the attribution in return service library and the model can utilize for the return of loan book in other library. It designs the single sign-on about it.

An Empirical Study on Contract Model for IT Outsourcing Application Operation (IT 아웃소싱 어플리케이션 운영 계약모델에 대한 실증적 연구)

  • Kim, Heungshik;Park, Soah
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.45-60
    • /
    • 2017
  • The study suggests a contract model of application operation through case study of A bank's IT outsourcing application contract based on workload. The IT outsourcing order form has a problem in that the scope of work is ambiguous due to the integration of operation and maintenance. In this study, application operation and maintenance were separated by referring to application operation history provided in ISO/IEC15504-5 standard. The scope of the IT outsourcing service was clarified by organizing the definition and detail activities of the application operation business. Application operation contract method has generally applied estimation method by the number of input manpower and period by agreement between buyer and client. As there is no activity to calculate the number of input manpower based on the operational work history and based on the standard workload per activity. In this case is not guaranteed due to the simple agreement between the contractors. In this paper, we propose an application operating cost estimation model that measures the size of the operating software using function point analysis that is the basis of application operation tasks. In order to verify the validity of the application operation cost model, we verified the correlation between the application size and the labor cost through regression analysis using SPSS.