• Title/Summary/Keyword: software framework

Search Result 1,232, Processing Time 0.029 seconds

Study on establishing Green Port Policy in Korea to meet Ports' Characteristics: Development of Ulsan Green Port Policy by using AHP (우리나라 항만특성에 맞는 그린포트정책 수립에 관한 연구 - AHP를 이용한 울산항 그린포트 정책 우선순위 개발)

  • Kim, Tae-Goun;Kim, Hwan-Seong
    • Journal of Navigation and Port Research
    • /
    • v.38 no.5
    • /
    • pp.549-559
    • /
    • 2014
  • The increasing demand of maritime transportation and port development especially due to increased international trade resulted in a strengthening of regulating the greenhouse gas emissions mainly from ships by International Maritime Organization (IMO). Responding to these international environmental regulation and enforcement, the United States and the European seaports have expanded their Green Port Policy, which can promote the public welfare by reducing pollution caused by ships and ports. Accordingly, in 2010, Korean government enacted "The Framework Act on Low Carbon, Green Growth" and had pushed for all Korean ports to establish and implement their own green port policies. Therefore, the objective of this study is to establish the Green Port Policy Plan for sustainable and environmental friendly operations and developments of Ulsan port, which plans to be the oil hub port of Northeast Asia. To this end, we studied the current status of the environmental policy issues in Ulsan Port and international-&-domestic case studies on establishment of green port policy. With these studies, Ulsan green policy alternatives were identified that through the experts advice, and then were prioritized by adopting AHP survey analysis. As the result of this study, it was notified that LED lights replacement and AMP establishment as the hardware policy and the port environmental management department as the software policy were equally important policy options for the implementation of sustainable Ulsan Green Port Policy to meet port's characteristics.

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

Mobile Cloud Context-Awareness System based on Jess Inference and Semantic Web RL for Inference Cost Decline (추론 비용 감소를 위한 Jess 추론과 시멘틱 웹 RL기반의 모바일 클라우드 상황인식 시스템)

  • Jung, Se-Hoon;Sim, Chun-Bo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.1
    • /
    • pp.19-30
    • /
    • 2012
  • The context aware service is the service to provide useful information to the users by recognizing surroundings around people who receive the service via computer based on computing and communication, and by conducting self-decision. But CAS(Context Awareness System) shows the weak point of small-scale context awareness processing capacity due to restricted mobile function under the current mobile environment, memory space, and inference cost increment. In this paper, we propose a mobile cloud context system with using Google App Engine based on PaaS(Platform as a Service) in order to get context service in various mobile devices without any subordination to any specific platform. Inference design method of the proposed system makes use of knowledge-based framework with semantic inference that is presented by SWRL rule and OWL ontology and Jess with rule-based inference engine. As well as, it is intended to shorten the context service reasoning time with mapping the regular reasoning of SWRL to Jess reasoning engine by connecting the values such as Class, Property and Individual which are regular information in the form of SWRL to Jess reasoning engine via JessTab plug-in in order to overcome the demerit of queries reasoning method of SparQL in semantic search which is a previous reasoning method.

Direct Pass-Through based GPU Virtualization for Biologic Applications (바이오 응용을 위한 직접 통로 기반의 GPU 가상화)

  • Choi, Dong Hoon;Jo, Heeseung;Lee, Myungho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.113-118
    • /
    • 2013
  • The current GPU virtualization techniques incur large overheads when executing application programs mainly due to the fine-grain time-sharing scheduling of the GPU among multiple Virtual Machines (VMs). Besides, the current techniques lack of portability, because they include the APIs for the GPU computations in the VM monitor. In this paper, we propose a low overhead and high performance GPU virtualization approach on a heterogeneous HPC system based on the open-source Xen. Our proposed techniques are tailored to the bio applications. In our virtualization framework, we allow a VM to solely occupy a GPU once the VM is assigned a GPU instead of relying on the time-sharing the GPU. This improves the performance of the applications and the utilization of the GPUs. Our techniques also allow a direct pass-through to the GPU by using the IOMMU virtualization features embedded in the hardware for the high portability. Experimental studies using microbiology genome analysis applications show that our proposed techniques based on the direct pass-through significantly reduce the overheads compared with the previous Domain0 based approaches. Furthermore, our approach closely matches the performance for the applications to the bare machine or rather improves the performance.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Message Interoperability in e-Logistics System (e-Logistics시스템의 메시지 상호운용성)

  • Seo Sungbo;Lee Young Joon;Hwang Jaegak;Ryu Keun Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.5
    • /
    • pp.436-450
    • /
    • 2005
  • Existing B2B, B2C computer systems and applications that executed business trans-actions were the client- server based architecture which consists of heterogeneous hardware and software including personal computers and mainframes. Due to the active boom of electronic business, integration and compatibility of exchanged data, applications and hardwares have emerged as hot issue. This paper designs and implements a message transport system and a document transformation system in order to solve the interoperability problem of integrated logistics system in e-Business when doing electronic business. Message transport system integrated ebMS 2.0 which is standard business message exchange format of ebXML, the international standard electronic commerce framework, and JMS of J2EE enable to ensure reliable messaging. The document transformation system could convert non-standard XML documents into standard XML documents and provide the web services after integrating message system. Using suggested business scenario and various test data, our message oriented system preyed to be interoperable and stable. We participated ebXML messaging interoperability test organized by ebXML Asia Committee ITG in oder to evaluate and certify the suitability for message system.

Agile Framework for SOA-based Application Development (SOA 기반 애플리케이션 개발을 위한 Agile 프레임워크)

  • Shin, Seung-Woo;Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.55-64
    • /
    • 2009
  • Various business model and computing environments are currently merged into web services and many web related application products are also develop. Most of IT enterprises in Korea use the Service-oriented architecture (SOA) whenever they develop the web applications. SOA is an approach to loosely coupled, protocol independent, standards-based distributed computing where software resources available on the network are considered as Services. SOA is believed to become the future enterprise technology solution that promises the agility and flexibility the business users have been looking for by leveraging the integration process through composition of the services spanning multiple enterprises. But, There are no specific development methodology to apply into SOA standard model until now. The developer uses the currently existing methodology to develop the application with SOA. The users have some limitations to use it. In this paper, we suggest a Frameworks for applying agile methodology into SOA to address the productivity and quality of small web related project. We design and implement a frameworks architecture for applying the agile method into SOA and describe the process model to implement it. We finally evaluate the frameworks with productivity, flexibility and maintainability.

A Study on Maturity Model of Information Integration System (정보연계 시스템의 성숙도 모델에 관한 연구)

  • Ha, Hyodong;Lee, Ook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.570-578
    • /
    • 2019
  • In this era of big data, a variety of government organizations are trying to create new added value via Information Integration. Therefore, several projects related to government agencies' information sharing have activated system connection/integration. The risk factors of system operation, however, have increased as the volume of Information Integration System grows. The interference in information sharing is predicted to affect the operation of the agencies, and the issue will grow even worse with massive impact on civil society when the agency operation is interrupted due to system failures in terms of infrastructure, software, data quality, and security. Diverse studies related to the maintenance of Information System have been conducted, but there is currently no evaluation framework for the operational system of Information Integration between various government agencies. In this respect, this study distinguishes each of the Information System components, Data, IT, People, Process, systematizes with Plan-Do-See, and finally presents a maturity model for Information Integration. Nine derived processes were analyzed through interview and questionnaires from Information Integration System officials, further suggesting maturity stage applying CMMI. This model allows diagnosis of the maturity level of an Information Integration System, and is expected to be utilized as resource for improving organizational processes.

Systematic review for economic benefit of poison control center (중독관리센터의 경제적 효과에 대한 체계적 고찰)

  • Han, Eunah;Hwang, Hyuna;Yu, Gina;Ko, Dong Ryul;Kong, Taeyoung;You, Je Sung;Choa, Minhong;Chung, Sung Phil
    • Journal of The Korean Society of Clinical Toxicology
    • /
    • v.19 no.1
    • /
    • pp.1-7
    • /
    • 2021
  • Purpose: The purpose of this study was to conduct a systematic review to investigate the socio-economic benefits of the poison control center (PCC) and to assess whether telephone counseling at the poison control center affects the frequency of emergency room visits, hospitalization, and length of stay of patients with acute poisoning. Methods: The authors conducted a medical literature search of the PubMed, EMBASE, and Cochrane Library databases. Two reviewers evaluated the abstracts for eligibility, extracted the data, and assessed the study quality using a standardized tool. Key results such as the cost-benefit ratio, hospital stay days, unnecessary emergency room visits or hospitalizations, and reduced hospital charges were extracted from the studies. When meta-analysis was possible, it was performed using RevMan software (RevMan version 5.4). Results: Among 299 non-duplicated studies, 19 were relevant to the study questions. The cost-benefit ratios of PCC showed a wide range from 0.76 to 36 (average 6.8) according to the level of the medical expense of each country and whether the study included intentional poisoning. PCC reduced unnecessary visits to healthcare facilities. PCC consultation shortened the length of hospital stay by 1.82 (95% CI, 1.07-2.57) days. Conclusion: The systematic review and meta-analysis support the hypothesis that the PCC operation is cost-beneficial. However, when implementing the PCC concept in Korea in the future, it is necessary to prepare an institutional framework to ensure a costeffective model.

Effective Utilization of Domain Knowledge for Relational Reinforcement Learning (관계형 강화 학습을 위한 도메인 지식의 효과적인 활용)

  • Kang, MinKyo;Kim, InCheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.3
    • /
    • pp.141-148
    • /
    • 2022
  • Recently, reinforcement learning combined with deep neural network technology has achieved remarkable success in various fields such as board games such as Go and chess, computer games such as Atari and StartCraft, and robot object manipulation tasks. However, such deep reinforcement learning describes states, actions, and policies in vector representation. Therefore, the existing deep reinforcement learning has some limitations in generality and interpretability of the learned policy, and it is difficult to effectively incorporate domain knowledge into policy learning. On the other hand, dNL-RRL, a new relational reinforcement learning framework proposed to solve these problems, uses a kind of vector representation for sensor input data and lower-level motion control as in the existing deep reinforcement learning. However, for states, actions, and learned policies, It uses a relational representation with logic predicates and rules. In this paper, we present dNL-RRL-based policy learning for transportation mobile robots in a manufacturing environment. In particular, this study proposes a effective method to utilize the prior domain knowledge of human experts to improve the efficiency of relational reinforcement learning. Through various experiments, we demonstrate the performance improvement of the relational reinforcement learning by using domain knowledge as proposed in this paper.