• Title/Summary/Keyword: software updates

Search Result 70, Processing Time 0.023 seconds

Factors Influencing Successful Implementation of Cloud ERP Solutions at Small and Medium Enterprises in Vietnam

  • CHU, Hai Hong Thi;NGUYEN, Thuy Van
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.5
    • /
    • pp.239-250
    • /
    • 2022
  • A business's Enterprise Resource Planning (ERP) solution is software that fully integrates the services that businesses require, continuously updates business processes and department operations in real-time, and so aids in the successful management of enterprise resources. Previously, ERP solutions were often deployed for large enterprises, but along with the strong digital transformation process, many small and medium enterprises have been deploying Cloud ERP (CERP) solutions. The objective of the study is to measure the factors affecting the successful implementation of CERP solutions at small and medium enterprises and the impact of successful implementation of CERP solutions on business process re-engineering and enterprise performance. Using a quantitative method based on data collected from 230 small and medium enterprises in Vietnam that have been implementing CERP solutions, the results show that there are 5 factors affecting, which are Organizational ERP Strategic, Top management Commitment, Data Security, Training in ERP Projects, Organizational Culture. Research results also show that Successful implementation of CERP has a direct impact on business process re-engineering and business performance. Based on the results, the study has made a number of policy implications in the successful implementation of CERP towards re-engineering business processes to improve the performance of small and medium enterprises.

Characteristics Analysis of Accident Factors of UK Civil Unmanned Aircraft Using SHELL Model and HFACS (SHELL 모델과 HFACS를 활용한 영국 민간 무인 항공기 사고 요인 특징 분석)

  • Do Yun Kim;Jo Won Chang
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.32 no.1
    • /
    • pp.1-9
    • /
    • 2024
  • The unmanned aerial vehicle industry has developed a lot, but the possibility of accidents is increasing due to potential risks. In this study, SHELL models and HFACS were used to analyze unmanned aerial vehicle accidents in the UK and to identify the main causes and characteristics of accidents. The main cause analyzed by the SHELL model was identified as an abnormality in the alarm system. The main cause of the accident analyzed by HFACS was identified as the technical environment. The common cause identified by the SHELL model and HFACS was identified as a mechanical problem of unmanned aerial vehicles. This is due to the lack of accurate information or functionality of the alarm system in the operator interface, which often prevents the operator from responding to sensitive information. Therefore, in order to prevent civil UAV accidents, the stability and reliability of the system must be secured through regular inspections of the UAV system and continuous software updates. In addition, an ergonomic approach considering human interfaces is needed when developing technologies.

A Swapping Red-black Tree for Wear-leveling of Non-volatile Memory (비휘발성 메모리의 마모도 평준화를 위한 레드블랙 트리)

  • Jeong, Minseong;Lee, Eunji
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.139-144
    • /
    • 2019
  • For recent decades, Non-volatile Memory (NVM) technologies have been drawing a high attention both in industry and academia due to its high density and short latency comparable to that of DRAM. However, NVM devices has write endurance problem and thus the current data structures that have been built around DRAM-specific features including unlimited program cycles is inadequate for NVM, reducing the device lifetime significantly. In this paper, we revisit a red-black tree extensively adopted for data indexing across a wide range of applications, and make it to better fit for NVM. Specifically, we observe that the conventional red-black tree wears out the specific location of memory because of its rebalancing operation to ensure fast access time over a whole dataset. However, this rebalancing operation frequently updates the long-lived nodes, which leads to the skewed wear out across the NVM cells. To resolve this problem, we present a new swapping wear-leveling red-black tree that periodically moves data in the worn-out node into the young node. The performance study with real-world traces demonstrates the proposed red-black tree reduces the standard deviation of the write count across nodes by up to 12.5%.

A New Rekeying Scheme for 802.11 Wireless Packets Transmission (802.11 무선패킷 전송을 위한 새로운 Rekeying 스킴)

  • Phang, Seong-Yee;They, Yu-Shu;Yang, Chi-Shian;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.274-277
    • /
    • 2008
  • Rekeying is the process of changing the encryption key of an ongoing communication. The main objective is to limit the amount of data encrypted with the same key. The IEEE 802.11 standard defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. MAC at sender encrypts the payload (frame body and CRC) of each 802.11 frame before transmission using RC4 stream cipher. MAC at receiver decrypts and passes data to higher level protocol. WEP uses symmetric key stream cipher (RC4) where same key will be used for data encryption and decryption at the sender and the receiver. WEP is not promising with the advancement of the wireless technology existing today. We propose to use the existing information to define the security attributes. This will eliminate the steps that regenerated keys have to be sent to each other over certain period. The rekeying scheme is according to the number of bytes transmitted. Therefore, even the attacker has recorded the packets, it will be insufficient information and time for the attacker to launch the attacks as the key is not deterministic. We develop a packet simulation software for packet transmission and simulate our propose scheme. From the simulation, our propose scheme will overcome the weak WEP key attack and provide an alternative solution to wireless packet transmission. Besides that, our solution appears to be a software approach where only driver updates are needed for the wireless client and server.

  • PDF

The Design and Implementation of User Interface Builder to support Software Reuse System (소프트웨어 재사용 시스템을 지원하는 사용자 인터페이스 구축기의 설계 및 구현)

  • Kim, Sang-Geun;Hong, Chan-Gi;Lee, Gyeong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.324-334
    • /
    • 1995
  • Most UIMS(User Interface Management System) adopt dialogue model of user interface Implementation of UIMS influenced by adopted dialogue model of user interface strongly. While the Model-View-Controller framework has contributed to many aspects of user interface development in Smalltalk environment- user interfaces generated with MVC have highly coupled model, view, and controller classes. Such coupling impedes the reuse of software component. So In this paper, we suggest MVCD model to resolve a decline of reuse with MVC have highly coupled. User messages are not changed by Controller immediately, but sent to Dialogue object which maintains the syntatic structure of the interaction. Dialogue object invokes Model object to updates is value. Since Model objects have active values, the value change propagates to the linked Controllers. Finally, Controller object convert the new value and update the View object. User interface builder is implemented on X-window with OSF/Motif that is base on this user dialogue model.

  • PDF

A Study on the MMORPG Server Architecture Applying with Arithmetic Server (연산서버를 적용한 MMORPG 게임서버에 관한 연구)

  • Bae, Sung-Gill;Kim, Hye-Young
    • Journal of Korea Game Society
    • /
    • v.13 no.2
    • /
    • pp.39-48
    • /
    • 2013
  • In MMORPGs(Massively Multi-player Online Role-Playing Games) a large number of players actively interact with one another in a virtual world. Therefore MMORGs must be able to quickly process real-time access requests and process requests from numerous gaming users. A key challenge is that the workload of the game server increases as the number of gaming users increases. To address this workload problem, many developers apply with distributed server architectures which use dynamic map partitioning and load balancing according to the server function. Therefore most MMORPG servers partition a virtual world into zones and each zone runs on multiple game servers. These methods cause of players frequently move between game servers, which imposes high overhead for data updates. In this paper, we propose a new architecture that apply with an arithmetic server dedicated to data operation. This architecture enables the existing game servers to process more access and job requests by reducing the load. Through mathematical modeling and experimental results, we show that our scheme yields higher efficiency than the existing ones.

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.

An Improvement Plan of the Interactive ROK Army Interactive Electronic Technical Manuals (육군 전자식 기술교범 개선방안 연구)

  • Lee, Pan-Ju;Shim, Sang-Ryul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.399-406
    • /
    • 2020
  • The R.O.K Army has developed and operated TM to maintain the operation of weapons systems since its establishment. As more modern weapons systems were developed, the more efficient operation was limited by a large quantity. As a countermeasure, the DAPA has operated the IETM using the KAIS TOOL since 2003. However, 16 years later, they were shunned by operators for software instability and other reasons. Based on the results of an operational test and evaluation team of the Army headquarters, the analysis results of software instability, limited compatibility and integration, limited real-time updates, etc. were analyzed. It was confirmed that KAIS development tools were urgently needed. Therefore, in order to solve this current problem for the Army IETM, the first phase of this paper focused on improving the IETM by maintaining the application present, the second of the Army Electronic Technology manual, phase going to propose improvement plans for operational test and evaluation by lining 11 elements of comprehensive logistics support with an electronic technology code.

Efficient Path Search Method using Ant Colony System in Traveling Salesman Problem (순회 판매원 문제에서 개미 군락 시스템을 이용한 효율적인 경로 탐색)

  • 홍석미;이영아;정태충
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.9
    • /
    • pp.862-866
    • /
    • 2003
  • Traveling Salesman Problem(TSP) is a combinational optimization problem, Genetic Algorithm(GA) and Lin-Kernighan(LK) Heuristic[1]that is Local Search Heuristic are one of the most commonly used methods to resolve TSP. In this paper, we introduce ACS(Ant Colony System) Algorithm as another approach to solve TSP and propose a new pheromone updating method. ACS uses pheromone information between cities in the Process where many ants make a tour, and is a method to find a optimal solution through recursive tour creation process. At the stage of Global Updating of ACS method, it updates pheromone of edges belonging to global best tour of created all edge. But we perform once more pheromone update about created all edges before global updating rule of original ACS is applied. At this process, we use the frequency of occurrence of each edges to update pheromone. We could offer stochastic value by pheromone about each edges, giving all edges' occurrence frequency as weight about Pheromone. This finds an optimal solution faster than existing ACS algorithm and prevent a local optima using more edges in next time search.

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF