• Title/Summary/Keyword: return flows

Search Result 83, Processing Time 0.017 seconds

Design of Integrated Management System for Electronic Library Based on SaaS and Web Standard

  • Lee, Jong-Hoon;Min, Byung-Won;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.41-51
    • /
    • 2015
  • Management systems for electronic library have been developed on the basis of Client/Server or ASP framework in domestic market for a long time. Therefore, both service provider and user suffer from their high cost and effort in management, maintenance, and repairing of software as well as hardware. Recently in addition, mobile devices like smartphone and tablet PC are frequently used as terminal devices to access computers through the Internet or other networks, sophisticatedly customized or personalized interface for n-screen service became more important issue these days. In this paper, we propose a new scheme of integrated management system for electronic library based on SaaS and Web Standard. We design and implement the proposed scheme applying Electronic Cabinet Guidelines for Web Standard and Universal Code System. Hosted application management style and software on demand style service models based on SaaS are basically applied to develop the management system. Moreover, a newly improved concept of duplication check algorithm in a hierarchical evaluation process is presented and a personalized interface based on web standard is applied to implement the system. Algorithms of duplication check for journal, volume/number, and paper are hierarchically presented with their logic flows. Total framework of our development obeys the standard feature of Electronic Cabinet Guidelines offered by Korea government so that we can accomplish standard of application software, quality improvement of total software, and reusability extension. Scope of our development includes core services of library automation system such as acquisition, list-up, loan-and-return, and their related services. We focus on interoperation compatibility between elementary sub-systems throughout complex network and structural features. Reanalyzing and standardizing each part of the system under the concept on the cloud of service, we construct an integrated development environment for generating, test, operation, and maintenance. Finally, performance analyses are performed about resource usability of server, memory amount used, and response time of server etc. As a result of measurements fulfilled over 5 times at different test points and using different data, the average response time is about 62.9 seconds for 100 clients, which takes about 0.629 seconds per client on the average. We can expect this result makes it possible to operate the system in real-time level proof. Resource usability and memory occupation are also good and moderate comparing to the conventional systems. As total verification tests, we present a simple proof to obey Electronic Cabinet Guidelines and a record of TTA authentication test for topics about SaaS maturity, performance, and application program features.

A Scheme of Distributed Network Security Management against DDoS Attacks (DDoS 공격에 대응하는 분산 네트워크 보안관리 기법)

  • Kim Sung-Ki;Yoo Seung-Hwan;Kim Moon-Chan;Min Byoung-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.72-83
    • /
    • 2006
  • It is not a practical solution that the DDoS attacks or worm propagations are protected and responded within a domain itself because it clogs access of legitimate users to share communication lines beyond the boundary a domain. Especially, the DDoS attacks with spoofed source address or with bogus packets that the destination addresses are changed randomly but has the valid source address does not allow us to identify access of legitimate users. We propose a scheme of distributed network security management to protect access of legitimate users from the DDoS attacks exploiting randomly spoofed source IP addresses and sending the bogus packets. We assume that Internet is divided into multiple domains and there exists one or more domain security manager in each domain, which is responsible for identifying hosts within the domain. The domain security manager forwards information regarding identified suspicious attack flows to neighboring managers and then verifies the attack upon receiving return messages from the neighboring managers. Through the experiment on a test-bed, the proposed scheme was verified to be able to maintain high detection accuracy and to enhance the. normal packet survival rate.

International Monetary System Reform and the G20 (국제통화제도의 개혁과 G20)

  • Cho, Yoon Je
    • KDI Journal of Economic Policy
    • /
    • v.32 no.4
    • /
    • pp.153-195
    • /
    • 2010
  • The recent global financial crisis has been the outcome of, among other things, the mismatch between institutions and the reality of the market in the current global financial system. The International financial institutions (IFIs) that were designed more than 60 years ago can no longer effectively meet the challenges posed by the current global economy. While the global financial market has become integrated like a single market, there is no international lender of last resort or global regulatory body. There also has been a rapid shift in the weight of economic power. The share of the Group of 7 (G7) countries in global gross domestic product (GDP) fell and the share of emerging market economies increased rapidly. Therefore, the tasks facing us today are: (i) to reform the IFIs -mandate, resources, management, and governance structure; (ii) to reform the system such as the international monetary system (IMS), and regulatory framework of the global financial system; and (iii) to reform global economic governance. The main focus of this paper will be the IMS reform and the role of the Group of Twenty (G20) summit meetings. The current IMS problems can be summarized as follows. First, the demand for foreign reserve accumulation has been increasing despite the movement from fixed exchange rate regimes to floating rate regimes some 40 years ago. Second, this increasing demand for foreign reserves has been concentrated in US dollar assets, especially public securities. Third, as the IMS relies too heavily on the supply of currency issued by a center country (the US), it gives an exorbitant privilege to this country, which can issue Treasury bills at the lowest possible interest rate in the international capital market. Fourth, as a related problem, the global financial system depends too heavily on the center country's ability to maintain the stability of the value of its currency and strength of its own financial system. Fifth, international capital flows have been distorted in the current IMS, from EMEs and developing countries where the productivity of capital investment is higher, to advanced economies, especially the US, where the return to capital investment is lower. Given these problems, there have been various proposals to reform the current IMS. They can be grouped into two: demand-side and supply-side reform. The key in the former is how to reduce the widespread strong demand for foreign reserve holdings among EMEs. There have been several proposals to reduce the self-insurance motivation. They include third-party insurance and the expansion of the opportunity to borrow from a global and regional reserve pool, or access to global lender of last resort (or something similar). However, the first option would be too costly. That leads us to the second option - building a stronger globalfinancial safety net. Discussions on supply-side reform of the IMS focus on how to diversify the supply of international reserve currency. The proposals include moving to a multiple currency system; increased allocation and wider use of special drawing rights (SDR); and creating a new global reserve currency. A key question is whether diversification should be encouraged among suitable existing currencies, or if it should be sought more with global reserve assets, acting as a complement or even substitute to existing ones. Each proposal has its pros and cons; they also face trade-offs between desirability and political feasibility. The transition would require close collaboration among the major players. This should include efforts at the least to strengthen policy coordination and collaboration among the major economies, and to reform the IMF to make it a more effective institution for bilateral and multilateral surveillance and as an international lender of last resort. The success on both fronts depends heavily on global economic governance reform and the role of the G20. The challenge is how to make the G20 effective. Without institutional innovations within the G20, there is a high risk that its summits will follow the path of previous summit meetings, such as G7/G8.

  • PDF