• Title/Summary/Keyword: 정보시스템 도입방법

Search Result 1,122, Processing Time 0.028 seconds

Optimizing Performance and Energy Efficiency in Cloud Data Centers Through SLA-Aware Consolidation of Virtualized Resources (클라우드 데이터 센터에서 가상화된 자원의 SLA-Aware 조정을 통한 성능 및 에너지 효율의 최적화)

  • Elijorde, Frank I.;Lee, Jaewan
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.1-10
    • /
    • 2014
  • The cloud computing paradigm introduced pay-per-use models in which IT services can be created and scaled on-demand. However, service providers are still concerned about the constraints imposed by their physical infrastructures. In order to keep the required QoS and achieve the goal of upholding the SLA, virtualized resources must be efficiently consolidated to maximize system throughput while keeping energy consumption at a minimum. Using ANN, we propose a predictive SLA-aware approach for consolidating virtualized resources in a cloud environment. To maintain the QoS and to establish an optimal trade-off between performance and energy efficiency, the server's utilization threshold dynamically adapts to the physical machine's resource consumption. Furthermore, resource-intensive VMs are prevented from getting underprovisioned by assigning them to hosts that are both capable and reputable. To verify the performance of our proposed approach, we compare it with non-optimized conventional approaches as well as with other previously proposed techniques in a heterogeneous cloud environment setup.

An Extensible Transaction Model for Real-Time Data Processing (실시간 데이타 처리를 위한 확장 가능한 트랜잭션 모델에 관한 연구)

  • 문승진
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.11-18
    • /
    • 2000
  • In this paper we present a new extensible model based upon the concept of subtransactions in real-time transaction systems. The nested transaction model originally proposed by J. Moss is extended for real-time uniprocessor transaction systems by adding explicit timing constraints. Based upon the model, an integrated concurrency control and scheduling algorithm is developed, that not only guarantees timing constraints of a set of real-time transactions but also maintains consistency of the database. The algorithm is based on the priority ceiling protocol of Sha et al. We prove that the Real-Time Nested Priority Ceiling Protocol prevents unbounded blocking and deadlock, and maintains the serializability of a set of real-time transactions. We use the upper bound on the duration that a transaction can be blocked to show that it is possible to analyze the schedulability of a transaction set using rate-monotonic priority assignment. This work is viewed as a step toward multiprocessor and distributed real-time nested transaction systems. Also, it is possible to be extended to include the real-time multimedia transactions in the emerging web-based database application areas.

  • PDF

Study on Algorithm to Generate Trip Plans with Prior Experience Based on Users' Ratings (사용자 평점 기반의 사전 체험형 여행계획 자동생성 알고리즘)

  • Jung, Hyun Ki;Lim, Sang Min;Hong, Seong Mo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.12
    • /
    • pp.537-546
    • /
    • 2014
  • The purpose of this study is to develope an algorithm which generates trip plans based on rating points of travel app users and travel experts to help potential travellers experience their desired destinations in advance. This algorithm uses the above rating points and the gradually created hierarchy to generate the most preferred and efficient trip courses. Users can go through video clips or panoramic VR videos of the actual destinations from their trip plans generated by the algorithm which may add excitement to their actual trips. With our heuristic methods, the more users input their ratings, the better trip plans can be generated. This algorithm has been tested on android OS and proven efficient in generating trip plans. This research introduces a way to experience travel destinations with panoramic VR video and proposes the algorithm which generates trip plans based on users' ratings. It is expected to be useful for travellers' trip planning and to contribute growth in the travel market.

A Solution of Production Scheduling Problem adapting Fast Model of Parallel Heuristics (병렬 휴리스틱법의 고속화모델을 적용한 생산 스케쥴링 문제의 해법)

  • Hong, Seong-Chan;Jo, Byeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.959-968
    • /
    • 1999
  • several papers have reported that parallel heuristics or hybrid approaches combining several heuristics can get better results. However, the parallelization and hybridization of any search methods on the single CPU type computer need enormous computation time. that case, we need more elegant combination method. For this purpose, we propose Fast Model of Parallel Heuristics(FMPH). FMPH is based on the island model of parallel genetic algorithms and takes local search to the elite solution obtained form each island(sub group). In this paper we introduce how can we adapt FMPH to the job-shop scheduling problem notorious as the most difficult NP-hard problem and report the excellent results of several famous benchmark problems.

  • PDF

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

The Processing Method of Stream Data in the Small-size Operating System (소규모 운영체제에서의 스트림데이터 처리기법)

  • Kim, Jin-Deog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.871-874
    • /
    • 2007
  • Stream data need a efficient data management with high reliability and real time processing. The characteristics of these data are a large volume, a short report interval and asynchronous report time. The typical queries of these systems consist of the current query to search the latest signal value, the snapshot query to search the signal value of a past time, the historical query to search the signal value of a past time to current. This paper proposes the efficient method to manage the above signals by using a file structured database in QNX operating systems. The query model to accommodate various query for stream data is proposed. The proposed methods are applied to reactive protection system to verify their usefulness. The COM(Cabinet Operator Module) based on the QNX employs file database that adopts a delta version and a buffering method for the resource limit of a small storage and a low computing power.

  • PDF

Methods to Design Provided, Required and Customize Interfaces of Software Components (소프트웨어 컴포넌트의 Provided, Required와 Customize인터페이스 설계 기법)

  • 박지영;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.10
    • /
    • pp.1286-1303
    • /
    • 2004
  • Component-based Development is gaining a wide acceptance as an economical software development paradigm to develop applications by utilizing reusable software components. Well-defined interface manages coupling and cohesion between components, minimizes the effect on the user in case of component evolvement, and enhances reusability, extendibility and maintainability. Therefore, study on systematic development process and design guidelines for component interface has been required since the component has been introduced. In this paper, we propose three types of interfaces based on software architecture layers and functionality types; Provided Interface which provides functionality of a component, Required Interface which specifies required functionality that is provided by other components, and Customize Interface which tailors the component to customer's requirement. In addition, we suggest design criteria for well-designed interface, and systematic process and instructions for designing interface. We firstly cluster operations extracted from use case model and class model to identify Provided interfaces, and design Customize interfaces based on artifacts for variability. We also specify Required interfaces by identifying dependency among interfaces. Proposed interface design method provides traceability, throughout the component interface design. And furthermore, proposed guidelines support practical design for high quality component based on a case study.

Scalability Estimations of a Workcase-based Workflow Engine (워크케이스 기반 워크플로우 엔진의 초대형성 성능 평가)

  • Ahn, Hyung-Jin;Park, Min-Jae;Lee, Ki-Won;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.89-97
    • /
    • 2008
  • Recently, many organizations such as companies or institutions have demanded induction of very large-scale workflow management system in order to process a large number of business-instances. Workflow-related vendors have focused on physical extension of workflow engines based on device-level clustering, so as to provide very large-scale workflow services. Performance improvement of workflow engine by simple physical-connection among computer systems which don't consider logical-level software architecture lead to wastes of time and cost for construction of very large-scale workflow service environment. In this paper, we propose methodology for performance improvement based on logical software architectures of workflow engine. We also evaluate scalable performance between workflow engines using the activity instance based architecture and workcase based architecture, our proposed architecture. Through analysis of this test's result, we can observe that software architectures to be applied on a workflow engine have an effect on scalable performance.

  • PDF

Queue Detection using Fuzzy-Based Neural Network Model (퍼지기반 신경망모형을 이용한 대기행렬 검지)

  • KIM, Daehyon
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.2
    • /
    • pp.63-70
    • /
    • 2003
  • Real-time information on vehicle queue at intersections is essential for optimal traffic signal control, which is substantial part of Intelligent Transport Systems (ITS). Computer vision is also potentially an important element in the foundation of integrated traffic surveillance and control systems. The objective of this research is to propose a method for detecting an exact queue lengths at signalized intersections using image processing techniques and a neural network model Fuzzy ARTMAP, which is a supervised and self-organizing system and claimed to be more powerful than many expert systems, genetic algorithms. and other neural network models like Backpropagation, is used for recognizing different patterns that come from complicated real scenes of a car park. The experiments have been done with the traffic scene images at intersections and the results show that the method proposed in the paper could be efficient for the noise, shadow, partial occlusion and perspective problems which are inevitable in the real world images.

Incentive Optimization Scheme for Small Cell Base Station Cooperation in Heterogeneous Networks (이기종 네트워크에서 스몰셀 기지국 협력을 위한 인센티브 최적화 기법)

  • Jung, Sukwon;Kim, Taejoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.203-210
    • /
    • 2018
  • Mobile traffic is increasing consistently, and mobile carriers are becoming more and more hard to meet this ever-increasing mobile traffic demand by means of additional installation of base stations. To overcome this problem, heterogeneous networks, which can reuse space and frequency by installing small cells such as femto cells in existing macro cells, were introduced. However, existing macro cell users are difficult to increase the spectral efficiency without the cooperation of femto owners. Femto owners are also reluctant to accommodate other mobile stations in their femto stations without proper incentive. In this paper, a method of obtaining the optimal incentive is proposed, which adopts a utility function based on the logarithm of throughput of mobile stations, and the incentive is calculated to maximize the utility of the entire network.